Enabling Endpoint and Network Security with the SANS 20 Critical Security Controls

Expanding complexity and reach of threats Global infrastructure • Cyber-terrorism, morphing and complex threats Regional networks • AI (learn) hacking • XSS, SQL Injection attacks Multiple networks Individual networks Individual computers • Modern • Security computers • Espionage • Worms • Financial gain • Trojans • Homeland security threats • DOS / DDOS • Delivery via Web 2.0 and social networking sites • Physical again (portable media) • Firewall 101 • Individual • Internet • Watering-hole attacks • TSRs • Ransomware • Viruses • System-hopping malware 1980 1990 2000 2014 Figure 2. The expanding complexity and reach of threats Growing threats Meanwhile, threats continue to grow in both number and sophistication. For example, 280 million malicious programs, 134 million web-borne infections and 24 million malicious URLs were detected — all in just one month.5 Moreover, the complexity and range of those threats has morphed from “simple” viruses and worms to full-fledged cyber-terrorism and other attacks using sophisticated tactics such as SQL injection (see Figure 2). Limited IT staff and budget Finally, despite these growing pressures on endpoint protection, IT staff and budgets grow marginally or not at all (see Figure 3), making it difficult to keep your environment protected. For instance, StatCounter found that more than 16 percent of PCs worldwide still have Windows XP installed even though Microsoft’s support has already ended — a clear security and compliance risk. Part of the problem is that day-to-day IT operations costs are so high: an IDC white paper sponsored by Dell found that the average deployment cost per PC is $615, and WIPRO pegged the annual cost of supporting a laptop at $969 (assuming a five-year refresh rate). Such costs can quickly erode whatever budgets IT organizations have. 72% 212 billion $546 of IT budget spent on maintenance 1 devices by 2020 2 annual IT labor cost of PCs after deployment 3 2.1% average growth of IT budgets in 20144 Figure 3. IT departments today must do more with less. “How to balance maintenance and IT innovation,” Computerworld, Oct. 21, 2013. ”Rethinking IT Asset Management in the Age of the Internet of Things,” IDC, March 2014. 3 “Desktop Total Cost of Ownership: 2013 Update,” Gartner. 4 “Worldwide IT Spending Forecast, 2Q14 Update,” Gartner. 5 Kaspersky Threat Report, April 2012. 1 2 Share: 3 The complexity and range of threats has morphed from “simple” viruses and worms to fullfledged cyberterrorism and other attacks using sophisticated tactics such as SQL injection. AP Twitter feed hacked. In concert with a global consortium of agencies and experts from private industry, the SANS Institute created a list of 20 actionable controls with high payoff. Colossal malware attacks strike Staples corporate systems. Lost, unencrypted USB thumb drive impacts 50K Medicaid providers. 46% $49,246 $194 of lost laptops contain confidential data.1 average value of a lost laptop. >80% is due to data breaches.1 average cost per compromised record.2 1 out of 10 45% 80,000+ 37% $222 laptops are lost or stolen over the lifetime of the device.1 of organizations do not enforce employees’ use of private clouds.3 new malware variants created every day.4 of data breach cases involved malicious attacks.2 average cost per compromised record due to malicious attacks.2 Figure 4. Protecting your environment has never been more important. “The Billion Dollar Lost Laptop Problem,” Ponemon Institute, Sponsored by Intel, October 2010. 2 “2011 Cost of Data Breach Study,” Ponemon Institute, Sponsored by Symantec, March 2012. 3 “2013 State of the Endpoint,” Ponemon Institute, December 2012. 4 Panda Labs Q1 2012 Internet Threat Report. 1 Protecting your environment has never been more important Understanding the importance of mastering these challenges and protecting your environment requires only glancing at the headlines. Organizations are breached every day by attacks on their networks and also in other ways, such as theft of laptops containing confidential data (see Figure 4). As a result, organizations lose not only valuable intellectual property but also the customer trust that is the foundation of any business. Since these controls were derived from the most common attack patterns and vetted across a broad international community of governments and industries, with very strong consensus on the resulting set of controls, they serve as the basis for immediate, highvalue action. The 20 Critical Security Controls, as detailed in “The Critical Security Controls for Effective Cyber Defense, Version 5.0,” are: 1. Inventory of authorized and unauthorized devices Endpoint protection through the SANS 20 Critical Security Controls 2. Inventory of authorized and unauthorized software A set of controls to guide highvalue action 3. Secure configurations for hardware and software How, then, can organizations best protect their IT environments? In 2008, the National Security Agency (NSA) asked the same question, and began assessing which controls have the greatest impact in improving risk posture against real-world threats. In concert with a global consortium of agencies and experts from private industry, the SANS Institute created a list of 20 actionable controls with high payoff. 4. Continuous vulnerability assessment and remediation Share: 4 Massive attack: LivingSocial loses 50M passwords. 5. Malware defenses 6. Application software security 7. Wireless access control 8. Data recovery capability 9. Security skills assessment and appropriate training to fill gaps
Please complete the form to gain access to this content