An Integrated Approach to Threat Management
by Steven Drew - Thursday, 11 September 2003.
Effective Threat Management embodies the actions organizations must take to defend themselves against today's ever-present cyber-threats. At a high-level, these actions form an intrusion prevention and protection lifecycle where each stage provides critical information to the next. These actions must include fortifying the environment through proper threat research and scanning, monitoring the network infrastructure for signs of malicious activity, responding to any incidents that do occur and, finally, conducting incident analysis through data mining to discover areas that need additional fortification. Organizations must have a dedicated, 24X7 team focused on these activities. Only by developing an integrated Threat Management program will organizations truly be able to achieve enterprise-wide intrusion prevention and protection.

Intrusion Prevention

Threat research and scanning represent the proactive Threat Management actions necessary to prevent intrusions across the enterprise. Threat research is a system that allows organizations to gain intelligence on the emerging vulnerabilities and threats that will impact their IT infrastructure. Additionally, this system must have workflow management capabilities that enable security teams to track new threats through to their resolution.

Currently, threat research is conducted inefficiently. Security teams today rely on email alerts from BugTraq and other service providers. Sometimes these emails are just forwarded to administrators for them to patch the affected systems. Only after events like Slammer and MSBlast do security teams find out that the systems were never patched. Instead, organizations should build a database for these alerts and any of the additional vulnerability research they conduct. Severity, priority and responsibility must then be assigned to all new threats. From there, security teams can pull reports to make sure all threats are addressed in a timely fashion.

Vulnerability scanning is the second preventative action. Organizations must conduct regular scans of their environment to find any vulnerabilities that could be exploited. Threat research alone does not guarantee successful prevention, since new devices are typically added frequently to the IT infrastructure. If possible, organizations should also schedule scans on remote users' computers, as these are increasingly becoming the starting points for successful attacks. Armed with scanning and an effective threat research program, security teams can prevent most external attacks.

Intrusion Protection

Unfortunately, fortifying the environment through threat research and scanning is not enough to guarantee the elimination of incidents. Organizations need to stay vigilant and continuously protect themselves against insider threats or the savvy hacker carrying out premeditated attacks. To accomplish this, security teams must conduct 24X7 security monitoring, immediate incident response and ongoing analysis of their enterprise-wide security activity.

Monitoring the network 24X7 will alert organizations to anything unusual that may signal malicious activity. Security monitoring should not be limited to just security devices. Instead, monitoring needs to be holistic, encompassing applications, databases and other critical, high risk components of the IT infrastructure. All the security information generated by the environment must be aggregated and correlated in real-time. This will provide security teams with the context of the attack in a timely fashion. Armed with this information they will be able to respond quicker and reduce the amount of exposure to an attack.


What's the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 11th