Lumu Cybersecurity Ebook
Lumu Cybersecurity Ebook
Page 1
The Needed
in Cybersecurity
Why—despite continued investment in cyberdefenses—catastrophic data
breaches are more prevalent than ever and how control systems alongside new
technologies driven by network metadata can turn this dismal state around.
About the authors Page 2
Fernando Cuervo
Director of Product Growth
Lumu Technologies’ Director of Product Growth Fernando Cuervo has more
than 10 years of experience in cybersecurity and product management,
having served in different roles such as SOC Manager, IT Manager, Product
Owner, and others. Fernando has also presented cybersecurity talks
internationally and actively shares his professional views on blogs and
news websites. He attained a degree in systems engineering from the
Central University of Bogotá and holds further accredited certifications in
ITIL, Scrum Product Ownership, and Strategic Management.
Claudio Deiro
Senior Technical Product Architect
Claudio graduated from the Polytechnic University of Turin with a degree
in electronic engineering. Describing himself as ‘unapologetically an
engineer’, his career led him towards the cybersecurity industry, where he
served as Technical Product Manager and Technical Product Architect
until he joined Lumu Technologies as Senior Technical Product Architect.
Claudio is also the co-founder of Fundación S, a non-profit organization
that helps Colombians to develop the necessary skills and aptitudes
necessary to succeed in the software industry.
Page 3 Table of contents
Table of contents
04 Introduction
Introduction
I’ve committed the last 20 years of my life to solving some
of the most pressing cybersecurity challenges faced by
enterprises. In the last 5 years or so, one question has been
at the forefront of my mind: Why are we not continuously
and intentionally looking for compromises? Why is it that
the one thing that truly matters to every cybersecurity
defense is the one thing that we are not measuring?
Cybersecurity is complex. Success in complex scenarios
relies on the system’s ability to regulate and recover from
disturbances. The word ‘cybernetic’ stems from the Greek
word ‘kybernetes’ meaning ‘steersman’. As a boat veers to
one side, the steersman automatically corrects the rudder,
maintaining a steady course. Cybersecurity might be more
complex than a simple boat flowing down a river, but how
could we have lost this ability?
In practice, self-regulation is done via closed-loop systems
or “error-controlled systems” defining error as the state
of compromise for a particular cybersecurity incident.
The faster the industry moves towards developing
the necessary cybersecurity capabilities that help an
organization assess its continuous status of compromise,
the faster that cyber-resilience will be achieved. With small
but deliberate changes to the cyber-security architecture,
the disparity between the cyber incident and the detection
of the breach can be dramatically shortened.
This is the breakthrough my colleagues and I passionately
believe we need to achieve.
— Ricardo Villadiego
Page 5
Why We Need
a Breakthrough
Part 01
Why We Need a Breakthrough Page 6
200 2000
159
1632
145 1473
1257
150 1500
122 131
113
101 1093
95 781
88 614 783
100 447 1000
50 500
0 0
2012 2013 2014 2015 2016 2017 2018 2019
2500
2102
Data breaches and records exposed in millions
2000
1632
1473
1500 1257
1093
870
1000 783 781
656 662
614
498
446 447
419
500 321
222.5 197.61
157 127.7 169.07
66.9 91.98 85.61
19.1 35.7 16.2 22.9 17.3 36.6
0
2006 2008 2010 2012 2014 2016 2018
Page 7 Why We Need a Breakthrough
Banking/
Year Credit/ Business Educational Gov/military Medical Total
Financial
The same study reflects that the problem is widely spread across all industries.
It is untrue that organizations that adhere to the most stringent regulatory standards—
such as in the banking sector—perform better than others that are less regulated, or
that industries that invest heavily in cybersecurity are less breached. It is probably
time to accept that investment does not necessarily translate to protection.
For years, we have been conditioned to define success in terms of the investment of
time and money. In cybersecurity, this well-proven formula is not producing the results
we should expect to see from an industry that has such a high level of investment.
That universal formula (Success = Time + Money) has worked in most aspects of life,
from sports to sending a man to the moon. That same formula is producing impressive
results in the health field. In August of 2019, the WHO and the National Institute of
Allergies and Infectious Diseases announced a cure for Ebola, and significant progress
has been made towards an HIV vaccine, a disease that meant death about 20 years ago.
However, the cybersecurity outlook is disappointing, and the cyber-war may be lost.
Another indication of this is an iconic brand like Capital One announcing being a victim
of a massive breach. How we arrived to this point deserves exploration.
Why We Need a Breakthrough Page 8
b. Unlimited capital flowing into the industry is fueling defense vendors that fall
into the “detect, then mitigate” approach. The results are technologies in-market
that are not ready for primetime, inherently unstable and becoming obsolete as
soon as deployments are completed without ever testing if they delivered on
their promise.
A closer look at the different stages among the multiple variations of the Cyber Kill
Chain unveils the common denominator that enables adversaries evil intent: network
access. Network traffic is ground zero for illuminating threats. Almost all threats must
first be downloaded and then communicate back to its C&C to provide any value to
attackers.
The ability to collect network traffic to illuminate threats may be the feedback loop
that many cybersecurity and academic researchers have been envisioning for over a
decade. Even with the advances in bandwidth and storage, collecting network traffic
for a large organization might be cost-prohibitive. The problem now evolves into how
to collect signals of network traffic in a way that accurately represents the summary
of the “conversations” within an organization.
In his book Secrets and Lies, Bruce Schneier formulates “that often the patterns
Why We Need a Breakthrough Page 10
» The end-user who the adversary is targeting will point his or her device to a
new host.
» If the attack is successful, the device will attempt to connect with the adversary’s
infrastructure (C&C) seeking instructions and/or exfiltrating information.
» In more sophisticated attacks, the adversary will need to escalate privileges
and, in order to do so, the compromised device will attempt communications
with adjacent devices and/or high-value targets within the now compromised
organization. This is a clear sign of lateral movement.
» As the adversary conquers new victims, more devices will attempt to connect
with the adversary’s infrastructure.
Further analysis of the described steps among many others facilitated the key
elements of metadata, from required network traffic to an accurate representation the
summary of conversations within an organization, as described in the following table:
Signaling traffic in this form instead of doing a full packet capture is optimal, as it
represents only a tiny fraction of the total network traffic. Yet it’s still possible to
identify the compromise level of an organization.
Specific techniques have been developed to facilitate the data collection process while
minimizing friction in the multiple environments that define a network nowadays.
The remaining problem to solve is how to make it a continuous process. Collecting
and processing these signals for a specific timespan is feasible, but it is challenging.
Organizations can quickly become disenchanted due to the level of complexity in data
collection and processing, even using tools that promise to handle at least some of
these key signals, like SIEMs or network flow collectors.
To solve this last piece, a reliable, accurate and continuous process is required from
collection to Illumination as shown in the following image.
Gather information Standardize / feed Find threats and Add coor and make
from enterprise data to platform anomalies actionable
Only once the continuous process is implemented can we say that the feedback
loop has been built and this can be considered the breakthrough for cybersecurity in
modern days. A continuous compromise assessment process will not only simplify
the decision-making process for managers and practitioners but will also entirely
change the dynamics of the cybersecurity ecosystem and the cyber cycle of attackers
versus defenders.
The Needed Breakthrough Page 12
Limitations in
Cybersecurity
Testing
Part 02
Page 13 Limitations in Cybersecurity Testing
2. Ask a question: The purpose of the question is to narrow the focus of the inquiry,
to identify the problem in specific terms.
5. Analyze Data: Collect quantitative and qualitative data. On that information you
can find evidence to support or reject the hypothesis.
There are several real world applications of testing that go beyond academic objectives.
The world’s most powerful armies are a perfect example, who have made use of it in
preparation for war. Military groups have continuously needed to test their strategies
to simulate, evaluate, perfect their defenses, and confirm these were designed and
executed effectively.
The need for testing has stood the test of time from generation to generation. However,
not all testing is created equal. Testing has the power to build industries, and take
them from small to dominant empires. Unfortunately, testing also has the power of
sabotaging industries when it is not performed diligently.
this industry is heavily focused on testing. Therefore, this has made flying the safest
method of transportation.
According to The Economist, the world saw an important decrease in the number of
airplane accidents after 1972, an increase in the 80s, and a steady drop after the 90s,
reaching a perfect year in 2017 with zero accidents or fatalities. Recognizing that airplane
travel has become more accessible, this is an important accomplishment for the industry.
Safer skies
Global passenger flights, number of accidents and fatalities
30 35
20
30
10
0 25
1953 60 70 80 90 2000 10 17
2,500 20
Fatalities
No accidents or
2,000
fatalities on 15
passenger-jet
1,500
flights in 2017
10
1,000
5
500
0 0
1953 60 70 80 90 2000 10 17 1970 80 90 2000 10 17 *
Source: Aviation Safety Network *Estimate
Economist.com
» All technology is developed with a clear purpose. After an accident, there are
mandatory detailed investigations that show the root cause. This leads to the
development of technology that helps ensure the same accident does not happen
again. This is why the art of flying has been nearly perfected. The industry itself
has pioneered an open and collaborative format to show incidents and accidents
and receive support from its community.
The entire industry is constantly trying to improve and learn from mistakes that lead
to accidents. A key component to their success is their open community, where the
interested parties transparently share detailed insights, accept their own errors and
take actions for continuous improvement.
Aviation is the perfect example where there is a clear motivation and urgency to solve
any and all problems. This is an industry that has developed the tools and methodologies
to measure and continuously lower their margin of error, demonstrating the benefits
of testing when done correctly. Several other industries must learn from the airplane
industry. Cybersecurity is no exception.
Whitebox testing: Full informa- Vulnerability identification in software: Must give feedback to develo-
tion about the target is shared pers on coding practices
with the testers. Scenario to identify vulnerabilities: The tester explores particular scena-
Blackbox testing: No informa- rios to find whether it leads to a vulnerability in your infrastructure.
tion is shared with the testers Scenario to test detection and response: The goal here is to measure
about the target. the detection and response capabilities of the organization.
Page 17 Limitations in Cybersecurity Testing
Penetration testing and vulnerability assessment’s primary goal was to test networks,
which is only part of the problem. Alone, they are insufficient, being preventive
techniques. Prevention is rendered useless once compromise takes place. These
tools have fallen short of expectations for the following reasons:
The greatest evidence that we are missing a part on our security strategy is that there
are breaches making headlines weekly, even in companies that devote a lot of resources
and comply with pentesting and vulnerability assessment regulatory requirements.
Citrix 10 Years
Marriott 4 Years
Equifax 6 Months
As we adjust the standard scientific method to fit the needs of the cybersecurity
industry, the steps below must be followed:
3. Form a Hypothesis: If we evolve the security testing methods then the breaches
will decrease.
4. Conduct an experiment: Analyze network data to find compromises. Check if
this information provides additional value when compared to traditional security
testing.
5. Analyze Data: Analyze how those findings improve or not an organization’s
stance against risk and whether it is improving its cyber-resilience.
6. Iterate: Develop a “rinse and repeat” culture. Repeat the process with additional
information
The single purpose of most of the cyber defense strategies is to avoid being
compromised. Yet, this is useless if a compromise happens, and the function
of detecting and measuring compromise is absolutely neglected. Continuous
compromise detection has become a necessity. Organizations that can unlock what
hides under their own data will become empowered to perfect their defense strategies.
For this reason, the feedback loop between defenses implemented and compromise
detection must be closed. The diagram below explains it in detail:
Compromise detection complements existing testing and vulnerability tools, and helps
companies evolve and perfect their own testing practice. Today, the cybersecurity
industry faces a solid opportunity: to arm organizations with the right knowledge
on compromised levels through the implementation of tried and true testing
methodologies.
Page 21
The Path to
Continuous
Compromise
Assessment
Part 03
The Path to Continuous Compromise Assessment Page 22
Feedback loop
F (c)
F (s): Security architecture
F (c): Compromise level
For the system to work—that is to say to keep the compromise level within acceptable
limits and prevent serious damage—a precondition is the existence of sufficiently
precise and timely feedback. Nowadays the feedback is often the message of a
security researcher that notifies the victim that its data was found on the dark web. It
might be a uranium centrifuge unexpectedly failing: too late. Alternatively, it may be a
stream of thousands of alerts each day triggered by heuristic rules: too much.
Page 23 The Path to Continuous Compromise Assessment
Compromise as a Disease
To use a healthcare metaphor, compromise is like an infection. Firewalls and EDRs—
the current staples of cybersecurity—are preventative measures. Now, “no amount of
prevention will help you when prevention fails”7, and therefore you become sick. To
fight back the infection we need diagnostic tools and antibiotics.
In cyber the cure can be easy—format a machine, change access credentials, strengthen
firewall rules, run cleanup tools—to diagnose the infection is not. Our machines and
our networks are a mess, much like our bodies. Much like their real life counterparts,
computer viruses have learned to mutate, making the traditional signature-based
approach to detection reactive and very much dependent on the agility of the provider.
Thousands of processes, on thousands of machines, interchange thousands of
packets every second. Finding the malicious threat is like finding the proverbial needle
in the haystack. Behind a single IP address in the cloud there can be hundreds of
applications. Some of them may be malicious, or infected themselves. But how do we
find out?
There is simply no way for the unaided human eye to make sense of all this noise.
This is also the reason why a whitelist approach—only permitting what is known to be
safe—won’t work outside of very special cases. The whitelist would eventually outgrow
any management capacity, and what at one moment is known to be safe may become
infected, and infectious, a moment later.
Known Compromises
Lumu Customer
Portal
Deep
Anomalies Correlation
Artificial of Interest
Intelligence
Normal
Known
IOCs Activity
New IOCs
Organizations often overlook the power of their own network metadata. Today,
this is the most promising path for transformational improvement in the world of
cybersecurity. This goldmine contains incredible potential, as long as it is used
correctly. The process outlined below exemplifies how to best leverage network traffic:
$12.4/GB
107
10,000 times increase
in processing power
since 2000
2000 2017
2. The Cloud
There are good reasons to place processes and storage in a cloud computing
environment. A critical factor for the success of a system of this kind is the time
between when new intelligence is available and when such intelligence is incorporated
into the system. With on-premise systems there will always be a delay in the distribution
of such information.
On the other hand, with a cloud-based system, new intelligence will be available to all
users as soon as it is available to the system.
The most important factor that makes a cloud deployment ideal for a system like
this is the removal of all maintenance and management burdens on its users. The
valuable time of skilled security professionals should no longer be spent on system
maintenance, including monitoring disk space usage, or writing rules to catch the
The Path to Continuous Compromise Assessment Page 26
latest infection. All these menial tasks are transferred to the cloud environment.
Security professionals can concentrate on investigating and remediating incidents.
3. ML & AI Renaissance
Artificial intelligence was all the rage in the late ‘60s and early ‘70s. It then went out
of fashion, for a decade (or four). But now, with immensely more powerful hardware
and somehow curbed expectations, it is riding high again. Besides the fact that
talking about AI is trending, the use of machine learning and anomaly detection for
Continuous Compromise Assessment may bring real advantages
Today’s machine learning algorithms are sufficiently well understood and can be
supported by enough computing power to be successful in practical contexts.
Storage cost, computing power, combined with cloud, machine learning and AI, make
this approach absolutely practical, effective and possible. As they say, the devil is in
the details and a detailed look at how data is collected merits a discussion.
How to Leverage Your Metadata & Overcome Challenges Along the Way
Data collection: Do you really want to see it all? The ground truth is in the network
data. Unlike logs, that can be tampered with or simply deleted, or EDRs (Endpoint
Detection and Response), that have to play at the same level as the attacking software,
there is no way for an attacker to interfere with packet capture and analysis. So a
conscientious network administrator should capture and analyze everything. Right?
As the ones familiar with Betteridge’s law of headlines9 have already guessed, the
answer is no: it would cost too much. You would need roughly double the amount of
bandwidth and computing power of the original network, simply to analyze all its data.
Fortunately, “traffic patterns reveal a lot about any organization and are much easier
to collect than actual communication data”10. This means that a much more effective
approach is possible. In this approach, what is collected and analyzed for the whole
network is the metadata.
Please note that a partial approach, where only the critical systems are under control,
would not suffice. Attackers inside your network would be able to move laterally
and take control of less critical systems until they are in the position of reaching the
resources they are after without raising suspicion. In case you are interested, reading
the account, in her own words, of how Phineas Fisher hacked Hacking Team [9] can
provide a good idea of the steps an attacker may take, from a peripheral firewall to
an unsecured test database to a backup storage and finally—with some additional
steps—to everything. It is therefore necessary to include in the analysis all network
devices, including the ones considered less critical.
Page 27 The Path to Continuous Compromise Assessment
The first problem can be overcome using de facto standards, like Cisco’s NetFlow11
and Elastic’s Packetbeat [11]. We can address the second problem using a stack of
existing software components that can be easily customized to fulfill the user’s needs.
Improving
Decision Making
in Cybersecurity
Part 04
Page 31 Improving Decision Making in Cybersecurity
Situation
Goals
We have evolved to make decisions in this manner in order to continue functioning under
stringent limitations. Such constraints include having limited time to make decisions,
too much information to process, not enough meaning from the information, and
fallible memories for retaining it all. Cognitive psychologist Daniel Kahneman calls this
thinking fast16—when we are not able to think slowly. While these “short cuts” may lead
to cognitive biases—more on that later—they are crucial for decision-making efficiency.
The average cybersecurity team could make hundreds of these reactive decisions in a
day. Every alert is an opportunity for a decision and there simply isn’t time to think ‘slowly’
at every juncture. The trick is knowing if the decision calls for some slow thinking.
Improving Decision Making in Cybersecurity Page 32
Complexity in Cybersecurity
Decision Making
In a research paper18, issued by the Cybersecurity Interdisciplinary Systems Laboratory
at MIT Sloan, researchers attempted to determine why poor decision making was so
prevalent in cybersecurity. The researchers ran a cybersecurity simulation game that
mimicked the complex systems—including prevention, detection, and response—
needed in a modern enterprise’s cybersecurity program. Players had to choose how to
invest in these processes, in order to protect against attacks and ultimately protect their
enterprise’s bottom line. Two groups of players were invited to play the simulation game.
One group consisted of cybersecurity professionals, the other of inexperienced players.
The study found that both groups struggled in making effective decisions, but over
multiple iterations, both groups managed to improve their scores. There were two
major sources of complexity that needed to be overcome:
Page 33 Improving Decision Making in Cybersecurity
The attackers were able to have access to Equifax’s databases for 76 days19. At that
time, they had reportedly not renewed an encryption license. Therefore, the encrypted
personal information of approximately half of all Americans was able to pass through
their HTTPS interception without being inspected. Only when the encryption had
been updated—ten months late—did full network visibility resume, and was the attack
detected.
Once the attack was discovered, Equifax’s response showed terrible event-based
reactive decision making. They delayed publicizing the breach for a month, when
transparency in such events is the best policy. During that time little was done in terms
of mitigating its effect on the American people, although several executives sold stock
in the company—one being convicted for insider trading.
Capital One
In early 2019, an attacker exposed a vulnerability in Capital One’s cloud integration in
order to steal the credentials from over 100 million credit applications. The attacker
executed a Server Side Request Forgery20 to trick a misconfigured web application
firewall into relaying information including current credentials. This type of vulnerability
had been known for years, but required specialized knowledge related to Amazon Web
Services’ Identity and Access Management as well as EC2 to identify and fix. Ultimately,
a lack of investment in these in-demand cybersecurity skills led to a vulnerability that
could have easily been avoided.
Marriot’s response23 to the breach caused further problems by using a wide range of
email domains and websites, some of which lacked HTTPS certification. This led to a
variety of phishing attacks imitating Marriott in the wake of the breach.
Overcoming Biases
How can we align our perception of security with its reality? How do we know if the
proper amount is being spent on security and spent effectively? It’s important to realize
that we are all susceptible to biases. However, the first true step towards achieving
this is arming ourselves with the facts—and keeping these facts updated.
Rs= C(Po-Ps)
Rs: Return of investment of a given solution s
C: Cost of a breach for my organization
Po: Probability of a breach in a given time frame,
with the current posture
Ps: Probability of a breach in the same time frame,
adopting the solution
Page 37 Improving Decision Making in Cybersecurity
The first fact that needs clarity is the cost of insecurity. A clear understanding of the
cost of a breach forms one part of the equation that tells you if your security trade-off
is balanced. This used to be a difficult number to quantify, but each year brings better
reporting26 that helps you understand the consequences for your industry, company
size, and geographic region.
The second critical fact is your business’ individual risk of a breach. Lumu’s Continuous
Compromise Assessment was developed to determine your organization’s real-time
factual level of compromise. The result of this process is a baseline for your cybersecurity
architecture. This metric informs those big strategic decisions like “Are my security tools
delivering on their promises?” and “Where do I need further investment?”
needs to be a tactical and mindset change if strategists and operators are going to be
able to turn around the hard reality our industry is up against.
Consistent Quality
Comprehensiveness should not come at the expense of quality. An example would
be the prevalence of false alarms. Low-quality alerts cause alert fatigue and security
operators to ignore alerts, as in the case of the boy who cried wolf. Alerts can only
achieve certainty in response to known attacks with documented techniques
and assets. Novel attacks will have to be represented by anomalies that require
investigation. However, the investigative burden can be eased and alert fatigue
lessened by improving the orchestration between alerts and investigating teams, and
by providing contextual information.
Greater Visibility
As with poor eyesight, poor network visibility leads to errors in judgment. Greater
network visibility helps to understand the main output of a cybersecurity system: its
level of compromise. This level of compromise is crucial feedback information that
can inform where additional investment is necessary in the system and tell you if
investments are performing according to their promise.
If Not Now,
Then When?
Almost every report written in cybersecurity ends with a
high sense of urgency. It is the nature of the industry we
are in. This one is no different. There is no doubt that it
is time for a breakthrough in cybersecurity. The current
state is simply unsustainable. This is not meant to sell the
famous fear. On the contrary, the solution is largely in the
hands of practitioners. In addition, because a lot of missing
pieces have recently fallen into place: cost of storage,
computing power, cloud infrastructures and functional
machine learning.
As an industry, it is our responsibility to respond to the
democratization of cybercrime with the democratization of
cybersecurity. The tools for executing sophisticated attacks
are readily available. This also means that advanced and
efficient technology is available to all who want them, and
those who dare to put them to work.
The challenges facing cybersecurity might seem complex
and daunting. However, success in complex scenarios
lies in the system’s ability to regulate from disturbances.
With small but deliberate changes to the cyber-security
architecture, the disparity between the cyber incident and
the detection of the breach can be dramatically shortened.
Individual breaches and the systemic risk they represent
can only be contained if we actively look for compromise,
and make this a foundational component of our security
testing frameworks and strategies. This fundamental shift
is in our hands to execute, and there is no time to waste.
Page 41 References
References
Illuminating threats
and adversaries
www.lumu.io
Lumu Technologies Inc. | 8350 NW 52nd Terrace Suite 301, Miami, FL 33166 | [email protected] | +1 (877) 909-5868