<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How to - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/category/formats-en/how-to-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/category/formats-en/how-to-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 13 Jun 2023 11:37:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>How to - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/category/formats-en/how-to-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Engaging the C-Suite on Information Security</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/#respond</comments>
		
		<dc:creator><![CDATA[Lloyd Barwood]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 13:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[C-Suite]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20710</guid>

					<description><![CDATA[<p>Introduction The ever-increasing threat of cyber-attacks on organisations around the world and their potentially devastating financial, reputational, or operational impact on the business means it has never been more important to position Cyber Security as a major issue in front...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/">Engaging the C-Suite on Information Security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 style="text-align: justify;"><strong>Introduction</strong></h3>
<p style="text-align: justify;">The ever-increasing threat of cyber-attacks on organisations around the world and their potentially devastating financial, reputational, or operational impact on the business means it has never been more important to position Cyber Security as a major issue in front of the C-Suite. The C-Suite holds ultimate accountability for an organisation’s approach to risk in both setting the appetite for Cyber risk for the business and ensuring sufficient budget &amp; resource is assigned to manage Cyber risk to within the appetite. If they are not appropriately informed of the risks associated with Information Security (IS), the organisation may not put in place the correct and appropriate mitigations to protect the organization from their top threats and risks.</p>
<p style="text-align: justify;">Failure to effectively protect against these cyber threats can have both organisational and personal consequences for executives. For example, The Senior Managers and Certification Regime (SMR) is an FCA enforced regulation that assigns responsibility for Information Security to executive level employees, making them liable for correct implementation of cyber protections for IS.</p>
<p style="text-align: justify;">This article will provide you with a 4-stage approach on how to better engage the C-Suite in your organisation on Information Security, to build a fruitful partnership between these executives who direct budget &amp; resource towards Information Security and the Cyber teams who are responsible for the oversight &amp; implementation of security.</p>
<h3 style="text-align: justify;"><strong>Stage 1: Introducing the Execs to Cyber Security</strong></h3>
<p style="text-align: justify;">In this first session with the C-Suite, it is imperative that you initiate the conversation by focusing on an introduction to Cyber Security that provides an overarching view of the organisation’s Cyber Security capabilities and operating model, that will encourage future more in-depth discussion.</p>
<p style="text-align: justify;">Outline the responsibilities the organisation and executives have towards Information Security and how these align with the strategic priorities of the organisation &amp; Cyber team. This should include a presentation of the top threats to the organization (both internal &amp; external), the risks that they expose the organisation to and the existing roadmap to mitigating these risks. This will provide a high-level overview of the organisation’s Cyber capability and will set the tone ready for future conversations with the C-Suite.</p>
<p style="text-align: justify;">Provide an overview showing the blueprint for Information Security and how security integrates and adds value to the rest of the business. It is important to include metrics that can be used to compare the organisation’s approach to Cyber Security against peers within the market. A difference in budget or team size compared to a competitor can provide guidance on whether the organisation is assigning adequate resources and budget to the issue. </p>
<h3 style="text-align: justify;"><strong>Stage 2: 360 Audit</strong></h3>
<p style="text-align: justify;">After successfully introducing the C-Suite to Information Security, it is now essential that you lock in that second session where you can provide a more granular breakdown of the organisation’s Cyber Security capability with a clear focus on where resources need to be focussed.</p>
<p style="text-align: justify;">Industry standard frameworks, such as ISO and NIST, should be deployed to measure an organisation’s Cyber Security maturity and provide analysis on potential improvements that can be presented to the C-Suite executives. These frameworks offer controls against which the organisation can be benchmarked, to identify areas that require maturing to mitigate risk from the organisation’s top threats. While these frameworks in their original state offer a good measurement of maturity, it is important to refine the controls so that the framework is tailored towards the organisation, taking into consideration the industry sector and regulatory environment. Wavestone recommends taking the NIST framework as a basis and fitting it to the specific stakes of the organisation to overcome any framework limitation and focus it on the businesses’ needs.</p>
<p style="text-align: justify;">Wavestone have built our own framework, called the Cyber Benchmark, that leverages the best of industry frameworks to provide a comprehensive approach to maturity assessment with organisational &amp; technological perspectives included. We recommend organisations follow a similar approach to accelerate their framework improvements to increasing their Cyber maturity.</p>
<p style="text-align: justify;">Capturing the attention of senior executives to invest time &amp; resources into developing a framework to improve Cyber maturity can be difficult. A good methodology is to provide real life evidence of their security vulnerabilities, for example by presenting evidence of how an internal ‘Red Team’ gained access to the mailboxes of the senior executives present, with an explanation of how few days it took. </p>
<h3 style="text-align: justify;"><strong>Stage 3: Programme and Framework</strong></h3>
<p style="text-align: justify;">Once this more granular breakdown has been presented, a key priority must be to ensure the C-Suite has bought into the Cyber Security strategy &amp; roadmap; developed using the maturity improvement opportunities identified through the framework assessment. Buy in from the C-Suite on the roadmap will guarantee the required funding &amp; resources required to implement these enhancements.</p>
<p style="text-align: justify;">Using the customised framework, develop a roadmap that focuses on maturing controls that will most effectively reduce the risk from the organisation’s top threats. This roadmap will become the building blocks for the security programme. The security programme should be defined so that it provides clear targets to be met to ensure compliance with the customised framework controls, beginning with a remediation approach that will guarantee a standard Cyber maturity across the organisation, and followed by steps to achieve the Cyber maturity goals. Ensuring a standard maturity across the organisation will alleviate the risk from current threats, while building on this to achieve maturity targets will reduce the potential risk from over-the-horizon threats.</p>
<p style="text-align: justify;">Programme support can be leveraged from a specialised Project Management Office (PMO) that will supervise the execution of the programme. It is important that this PMO curates a good relationship between IT who will implement the roadmap to maturity and the business, so that the benefits are understood and extracted across the organisation.</p>
<h3 style="text-align: justify;"><strong>Stage 4: Risk Quantification and Business Accelerators </strong></h3>
<p style="text-align: justify;">The final stage of engaging with the C-Suite requires you to demonstrate the return on investment (ROI) that Cyber Security can deliver, both through risk reduction from top threats and as a business enabler that encourages expansion into new territories and engaging new client relationships.</p>
<p style="text-align: justify;">Implementing the appropriate customised framework to the organisation and following the established roadmap to Cyber Security maturity will require an increased budget allocation. However, it is important to emphasise to the board that the return on this investment will far exceed the initial cost due to a dramatic decrease in the scale and severity of risk that the organisation is exposed to. Use calculations to demonstrate this Return on Investment (ROI) quantitively and link this to the efforts and changes delivered by the security programme. It should also be explained that this initial outlay required to deliver the security programme is far less than the potential financial, reputational, and personal (e.g., SMR) repercussions that would result from a failure to adequately protect information systems during a cyber-attack.</p>
<p style="text-align: justify;">As well as preventing the serious repercussions of failing to protect information systems in an attack, Cyber Security can also become an important business enabler. Effective Cyber Security will ensure that your customers are retained in the event of a properly managed security breach, as well as confirming your organisation as a secure manager of customer data &amp; details, increasing your attractiveness to new customers. A secure organisation can move swiftly into new business environments &amp; seize opportunities with confidence that their Cyber Security maturity will be able to resist potential additional threats that may arise from this expansion; opening the door for the organisation to safely engage a wider client base.</p>
<h3 style="text-align: justify;"><strong>Conclusion</strong></h3>
<p style="text-align: justify;">Following the 4-stages outlined in this article will allow you to foster a strong relationship with the C-Suite on Information Security, ensuring they are aware of their responsibilities for Cyber Security under the SMR and that they assign budget &amp; resources appropriately to deal with the top threats facing the organisation. The customised framework will allow these executives to understand the current Cyber Security posture of the organisation and buy in to the roadmap for future maturity. Once this vision of mature Cyber Security has been delivered, the business incentives can be leveraged to ensure the C-Suite continues to invest in developing Information Security within your organisation.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/">Engaging the C-Suite on Information Security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Supply Chain Risk Management Best Practices : Operationalizing Your proactive C-SCRM Defenses</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/#respond</comments>
		
		<dc:creator><![CDATA[Constance Francois]]></dc:creator>
		<pubDate>Mon, 16 May 2022 16:40:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[BestPractices]]></category>
		<category><![CDATA[CyberSupplyChain]]></category>
		<category><![CDATA[SupplyChain]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17934</guid>

					<description><![CDATA[<p>Introduction Cyber Supply Chain attacks are a growing trend amongst cybercriminals where one attack can leave countless organizations vulnerable and potentially damaged.  You’ve seen the headlines following a number of high-profile incidents in recent months.  The European Union Agency for...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/">Cyber Supply Chain Risk Management Best Practices : Operationalizing Your proactive C-SCRM Defenses</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1><strong>Introduction</strong></h1>
<p>Cyber Supply Chain attacks are a growing trend amongst cybercriminals where one attack can leave countless organizations vulnerable and potentially damaged.  You’ve seen the headlines following a number of high-profile incidents in recent months.  The European Union Agency for Cybersecurity (ENISA) warns that these types of attacks are now growing 400% year-over-year as cybercriminals are shifting to larger, cross-border targets.</p>
<p>Attackers’ main motivations remain to gain access to source code and customer data, and now they can do so across multiple target organizations by first compromising vendor software being deployed to those companies and government agencies.  This is an ingenious (and nefarious!) approach on a few fronts:</p>
<ol>
<li>This type of attack can generally get around any target company’s strong cybersecurity posture, particularly related to its perimeter security; the attack is brought into the target environment via a trusted vendor’s product.</li>
<li>Such an unsuspected attack vector (a form of “friendly fire”) means that the attacker’s “dwell time” within the target can be quite long before discovered (or revealed in the form of ransomware!). Quite a lot of damage can be done during this time.   </li>
<li>The shear breadth in number of targets that can be addressed via a single attack is immense; the economies for a cybercriminal vastly multiply their criminal profitability.</li>
</ol>
<p>About 50% of these attacks can be attributed to known advanced persistent threat (APT) organizations (e.g., the Russian state-sponsored threat group APT29, a.k.a. “Cozy Bear”, responsible for the 2020 SolarWinds attack).  These APT groups have access to many resources and much funding enabling their creativity for damage and not getting caught.  Hence, these attacks are growing rapidly and more complex with such backing; and this trend will continue, enlarging the gap between such risks and an organization’s ability to detect and remediate them in a timely fashion.     </p>
<p>Some most notable recent cyber supply chain attacks include:</p>
<ul>
<li>SolarWinds – Where attackers in 2020 exploited known vulnerabilities in its IT software Orion (used to manage servers in many organizations, including large businesses, several arms of the U.S. government, threat response firm FireEye, and Microsoft.</li>
<li>Kayesa – More recently in 2021, the notorious REvil ransomware gang (another APT organization) exploited known vulnerabilities in IT management platform Kayesa VSA, which ultimately compromised an estimated 1,000 organizations that use the platform.</li>
</ul>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #1</em><em>: </em></strong><em>In terms of your organization’s vendors for software or hardware, etc., it turns out that their risk model is now your risk model!  Frankly, it always has been, and attackers have evolved to take advantage of this existing threat vector.</em></p>
</blockquote>
<p> </p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-17921 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1.png" alt="" width="780" height="439" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1-768x432.png 768w" sizes="(max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic #1: Unavoidably Intertwined Operational Models in Managing Cyber Supply Chain Risk </em></strong></p>
<p> </p>
<p>Hence, the complete Cyber Supply Chain lifecycle for all your business applications and IT tools must be considered within your Cybersecurity strategy and practices.  This means that before you choose a vendor, you should assess their security posture and security &amp; incident management processes BEFORE you allow them to contribute software, tools, or equipment to your otherwise secure enterprise.</p>
<p>More so, beyond an initial assessment and acceptance of a vendor’s software, etc., the acceptability of a vendor’s continual access to your environments via releases and patches of their products needs to be continually monitored and assessed.     </p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #2</em></strong><em><strong>:</strong> Shift Security Left. The only way to fully secure your enterprise continually is to ensure the sanctity of anything that comes into it.  That includes all vendor products that would integrate into your IT environments, etc., and the vendor’s lifecycle for development and deployment of their products.  You can only be as secure as they are!   </em></p>
</blockquote>
<p><strong>C-Supply Chain Risk Management – Definition and Scope</strong></p>
<p>Attacks on Cyber Supply Chains continue to take advantage of ongoing disconnects in an organization’s understanding of the related supply chain risks and how to deal with them:</p>
<ul>
<li>Most organizations have a false sense of security (“blind spots“) based on assumptions that their vendors are already secure, and their products can be trusted in the organization‘s environment. They believe their recognizable “brand name“ vendors are at least as diligent and proactive about cybersecurity as their organization.</li>
<li>Many organizations also lack continual robust monitoring and reporting, particularly around their vendors‘ software product interactions within their environments; they’re simply not looking here with sufficient focus based on current events.</li>
<li>82% of organizations believe their executive teams and boards are confident in their approach to measuring and managing Supply Chain Risk.
<ul>
<li>Yet only 44% regularly report on their supply chain risks and related industry events to senior leadership. This is clearly a blind spot for leadership.</li>
</ul>
</li>
<li>Looking at financial services firms, for example, 79% say they would decline a business relationship due to a vendor’s cybersecurity performance.
<ul>
<li>But lack the data to make such decisions.</li>
</ul>
</li>
</ul>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-17923 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2.png" alt="" width="780" height="428" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2-768x421.png 768w" sizes="(max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic #2: Today’s Growing C-SCRM Threat Definition and Scope  </em></strong></p>
<p> </p>
<p>This false sense of security that most organizations have about their vendors’ software, etc. is based upon a (unverified) trust of a vendor’s own security diligence.  But we cannot assume this anymore, and perhaps never should have. </p>
<p>This is one big reason driving a growing need for:</p>
<ol>
<li>More continual and robust assessment of software (and hardware, firmware, etc.) providers’ cybersecurity performance.</li>
<li>Improved monitoring and reporting from both: a) upstream software vendors’ environments; as well as b) the downstream software buyers’ environments.</li>
</ol>
<p>These may seem to be separate issues at first, but they ultimately compound to corrupt downstream customer environments prolifically.  Hence, we must “Shift Left” and go upstream into the vendor’s cybersecurity practices in order to manage our own Supply Chain risks.</p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #3</em></strong><em><strong>:</strong>  Both initial and continual assessments of a vendor’s cybersecurity practices and incidents should be analyzed to ensure the security of an organization’s global supply chain before the vendor’s products or services touch their enterprise, and then continually throughout the relationship (and related product updates, patches, etc.).   </em></p>
</blockquote>
<p>Another growing need is for the establishment of cybersecurity consortiums of industries and organizations (”IT ecosystems”) to share vendor and product risk data, and to quickly and continually inform partner organizations of new risks and mitigations to ensure fewer downstream surprises.  Whether performed per organization or through a consortium information sharing, there is (for the first time) a recognized need for continual assessments of many vendors’ cybersecurity practices before and throughout an organization’s relationship with these providers of solutions within their enterprise.  This is an emerging best practice for maintaining your environments’ security.  </p>
<p>Because these types of attacks have proven very successful (and profitable) to cybercriminals over the past few years, organizations should expect more and larger cyber supply chain attacks in 2022 and beyond.  Hence, the cost of the supply chain status quo is going up and this trend cannot be allowed to persist.  This is causing organizations to embrace stronger operational resilience strategies and emerging approaches like never before.</p>
<p>Noted that it is not only financial damage that companies must avoid (or remediate!) in the case of these attacks that often end in data exfiltration and/or ransomware.  83% of compromised organizations have also experienced reputational damage to their brand and public perception of their company.  This “ups the ante” for proactive avoidance of such attacks and more work to do if you are attacked.  </p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #4</em></strong><em><strong>:</strong> Supply Chain attacks do more than financial harm to a company; in many cases these may also cause long-term reputational damage!  Hence, managing to reduce such attacks but also in robustly handling such attacks is vital to an organization’s survival.   </em></p>
</blockquote>
<p>In response to the increasing waves of Cyber Supply Chain attacks, it is no surprise that a global approach to securing their supply chains as well as increasing their operational resilience will be the top priorities for 50% of organizations by 2023.  This is survival of the cyber-fittest.</p>
<p>To accomplish this, 88% of companies state that visibility into their global supply chain is more important now than it was 2 years ago.  But unfortunately, 74% of organizations are still using inefficient and less adaptable manual methods to ascertain and manage their supply chain risks.  Such approaches cannot persist while such risks are increasing at an exponential rate.</p>
<p>For an example of where improved C-SCRM approaches and processes are heading, consider the emerging security ratings services that customer organizations can utilize to initially (and continually) assess the cybersecurity practices and incident management of their vendors.  This is another emerging best practice, yet only 22% of organizations are using these resources to continually monitor their vendors’ cybersecurity performance.  Expect this utilization to grow and for such services to become more robust with available security tracking data for vendors.  </p>
<p><strong>C-SCRM – Current Challenges and Opportunities</strong></p>
<p>The vast number of Cyber Supply Chain attacks are being enabled by many challenges affecting organizations that utilize vendor software.  Yes, you are right; this means almost all organizations.  Try imagining an organization that does not use vendor software; then pause to think about the many(!) types of vendor software your organization relies on.</p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #5</em></strong><em><strong>:</strong> Everyone has a cyber supply chain that can be corrupted!  There are very few exceptions.  In sort, every organization has a cyber supply chain whether the know it or not, complete with risks that can be exploited, and threats brought into their environment unexpectedly … EVEN IF the organization is highly secure in its perimeter defenses.</em><em>Hence,</em><em>cyber supply chain risks must be proactively managed by your organization. </em></p>
</blockquote>
<p>It’s quite clear what the breadth of target organizations can be for cybercriminals when they devise such supply chain attacks.  They only need to breach a small number of the right vendors to indirectly gain access to their preferred (many!) target organizations amongst a vendors’ customer list. </p>
<p>Some of the current challenges that organizations face in trying to regularly assess their vendor and supply chain cyber risks include:</p>
<ol>
<li>Lack of data that is readily available related to such risks, including its timeliness, accuracy, and actionability. Organizations have had to develop their own data for such analysis and decision-making to select or continue with a particular vendor or product.
<ol>
<li>This can be (too) time-consuming and resource-intensive for organizations.</li>
<li>Such data, when possible, is intended to help organizations to identify as early as possible any potential risk exposure when using a particular vendor’s product</li>
</ol>
</li>
<li>Even when such data is sufficiently available (rarely), most customer organizations have had little sway to force vendors to remediate their internal and supply chain processes to a point that they can regularly be confident in consuming their products as cyber-safe.</li>
<li>Such data would need to be refreshed frequently to be effective; but even where there are useful data points, these are generally not monitored continuously as would be needed based on today’s changing and escalating threats.</li>
<li>All this lack of actionable data from the above challenges means that the speed of any assessment is simply too long a cycle.
<ol>
<li>Especially true for continual monitoring where the threat is potentially already in your enterprise (vs. an initial assessment before bringing in a product).</li>
<li>But the only way an organization could previously speed up such assessments was to invest more of its resources into such focused efforts; but it generally didn’t have the capacity to do so.</li>
</ol>
</li>
<li>Lastly, how an organization would address its 3<sup>rd</sup> Party risk management is strongly determined by its structure, and defined roles and responsibilities for managing this. Most organizations have not made it clear who (what person or team) would own the responsibility for Cyber Supply Chain Risk Management.  This will have to change before many of the challenges above can be addressed considerably.    </li>
</ol>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-17925 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3.png" alt="" width="780" height="446" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-768x439.png 768w" sizes="(max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic #3: Current C-SCRM Challenges and Potential Solutions </em></strong></p>
<p> </p>
<p>There are emerging opportunities and options in addressing the challenges listed above and related ongoing Supply Chain concerns. For example:</p>
<ul>
<li>New technologies are becoming available to organizations that wish to be more proactive and quickly adaptive to their supply chain risks.
<ul>
<li>3<sup>rd</sup> Party Security Ratings – Services are becoming available where an organization can purchase one-time or recurring ratings for a particular vendor or set of products it wants to purchase (or already has).</li>
<li>Advanced Monitoring and Detection Tools and Services – Continued advancement and maturity of monitoring, detection, and action-oriented tools and services is enabling earlier detection and appropriate actions than ever before.</li>
<li>AI and its behavior analysis capabilities – This is one important advancement amongst monitoring and detection tool improvements; but this technology is also becoming engrained within many other aspects of cybersecurity
<ul>
<li>Wherever unusual patterns can be recognized by AI and enacted on appropriately far more quickly than a human could.</li>
<li>Expect AI to become a primary underpinning to many cybersecurity automation tools, not just C-SCRM.</li>
</ul>
</li>
<li>For supply chains, Blockchain is an emerging technology that will enable better security management in terms of a product manifest’s chain of custody and that it has not been tampered with during the supply chain deployment.
<ul>
<li>Note, however, that this doesn’t solve the issue of a vendor’s software development process being breached to inject a threat for downstream users; this risk would need to be assessed as part of the vendor’s security practices (see the 3<sup>rd</sup> Party Security Ratings services above).</li>
</ul>
</li>
<li>Perhaps most importantly, new organizational roles (and responsibilities) are being created to enable greater focus and proactivity in assessing and managing supply chain and other 3<sup>rd</sup> Party risks. This is long overdue, and a promising development in appropriately applying all the risk mitigation options listed above as needed for a particular organization’s target security posture.     </li>
</ul>
</li>
</ul>
<p><strong>If Every Organization has a Cyber Supply Chain that Can Be Corrupted to Create Extensive Damage </strong><strong>à</strong><strong> What are you going to do about it? </strong></p>
<p>Every organization has a supply chain with risks that can absolutely be exploited; there are no meaningful exceptions to this rule.  Hence, there is no room for a false sense of security, and no excuse to not address this immediately (and ongoing).  After all, you do not want to be the next cautionary tale about an organization in industry news!</p>
<p>To get started with your organization’s C-SCRM strategy, first consider these Success Factors in developing your overall approach.  Remember these factors as the “B-O-O-M“ strategy to pursue when ensuring C-SCRM success:</p>
<ol>
<li><u>B</u>oth internal and external supply chain processes and security checks require focus.
<ol>
<li>There are clearly a number of processes and capabilities that an organization has direct influence on immediately; start there, but do not end there.</li>
<li>Be sure to also include external forces, such as suppliers, where the organization has only indirect influence; but where failure to implement such influence creates greater risk.</li>
<li>Manage all threat vectors associated with your cyber supply chain risks; hence manage your supply chain vendors as well as your own organization.</li>
</ol>
</li>
<li><u>O</u>ptimize Your Organization and related processes to stay aware of current cyber events, industry trends, issues, and best practices.
<ol>
<li>Ensure sufficient focus by your organization on these items, including assigned roles and responsibilities for coverage.</li>
<li>Partner with industry organizations and vendor partner organizations to stay informed and influential for managing supply chain risks.</li>
</ol>
</li>
<li><u>O</u>ptimize Your Data for cyber supply chain and vendor risks, and extensively analyze these to be data-driven in your C-SCRM capabilities prioritization as well as your vendor selections and ongoing risk management.</li>
<li><u>M</u>ature your organization, data, and tailored best practices to keep pace with (or preferably ahead of!) the continually growing and evolving cyber supply chain threats you must manage. This is far from a static set of threat vectors in this cybersecurity space and may just be in its infancy in terms of the future number of threats and types of complexity to be managed!  </li>
</ol>
<p> </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17927 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4.png" alt="" width="780" height="437" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4-341x191.png 341w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4-768x430.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic 4: Success Factors for Managing Cyber Supply Chain Risk</em></strong></p>
<p> </p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #6</em></strong><em><strong>:</strong> Drop the “BOOM” to be successful in your C-SCRM strategy and approach:  Both internal and external forces need to be managed; Optimize your organization for C-SCRM coverage; Optimize your C-SCRM data for analysis, selection, and monitoring risks; and Mature the above as organizational-specific best practices to stay ahead of the curve!       </em></p>
</blockquote>
<p><strong>Defining &amp; Implementing C-SCRM Best Practices for Your Organization</strong></p>
<p>The previously listed success factors for C-SCRM lead directly to the following best practices and capabilities for an organization to implement (shown here in a step-wise approach): </p>
<ol>
<li><strong>Identify / Inventory all your types of vendor suppliers and service providers.</strong></li>
<li><strong>Define risk tolerance criteria for each type of relevant vendor and service for critical business processes.</strong>
<ul>
<li>Including important vendor dependencies, their critical software dependencies and single points of failure, etc.)</li>
</ul>
</li>
<li><strong>Assess each supply chain risk (e.g., a vendor or product) according to their specific business continuity impact assessment and requirements.</strong></li>
<li><strong>Define initiatives and best practice procedures based on industry best practices tailored for your organization and assessed risks.</strong></li>
<li><strong>Establish your organizational teams and roles for ownership and maturing these critical C-SCRM responsibilities, including –</strong>
<ul>
<li><em>C-SCRM Leadership and Communications</em> – Report to Executive Team &amp; Board regularly about risks and threats to the organization and identified in the industry (that may become threats which can be proactively avoided).</li>
<li><em>Risk Identification and Monitoring</em> – Continually assess prospective and current vendors via software and service types with their risk profiles and requirements.</li>
<li><em>Cyber Supply Chain Requirements</em> – Actively manage each vendor’s adherence to the organization’s C-SCRM established requirements; and hence, their incorporation into vendor contracts.</li>
<li><em>Cybersecurity Knowledgebase / Data Repository</em> – This resource should be maintained to be more broadly used than just for C-SCRM scenarios; but this is where business line managers as well as technical integrators can access requirements lists, contractual provisions, and ratings data associated with vendors and their products.</li>
<li><em>Supply Chain Risk Liaison to the rest of the organization</em> – In the case of insufficient data available for a vendor-related cybersecurity decision, or the needed investigation into a new vendor, product, or incident. <em> </em></li>
</ul>
</li>
<li><strong>Continually monitor supply chain risks and threats, based on internal and external sources of data.</strong>
<ul>
<li>Including findings from suppliers’ performance monitoring and reviews.</li>
<li>Maintain historical and trend data as long as relevant.</li>
</ul>
</li>
<li><strong>Make vendors aware of perceived or discovered risks or weaknesses associated with their products and processes.</strong>
<ul>
<li>g., managing such vendors throughput their entire product lifecycle, including procedures to manage releases, patches, and end-of-life considerations.</li>
<li>In some cases, you can help them improve their cybersecurity capabilities to advance your own security posture.</li>
<li>But if they fail to adhere to your supply chain security requirements or attempt to remediate based on findings you share, all bets are off.  </li>
</ul>
</li>
<li><strong>Continually use and enhance data to optimize your C-SCRM strategy and approach.</strong>
<ul>
<li>Strive for C-SCRM process and data maturity in both selecting vendors as well as strengthening these relationships (and your trust in them) over time.</li>
<li>Also use data to build an appropriate operational resilience strategy that will take over in the case of a vendor’s failure – via an attack needing remediation and/or the subsequent removal of such a unacceptable vendor or product.</li>
</ul>
</li>
<li><strong>Grow your C-SCRM Optimization maturity. </strong></li>
</ol>
<ul>
<li>This will never be a static set of vulnerabilities or threat vectors; stay diligent at continual improvement and maturity in your organization’s capabilities to actively avoid supply chain risk and to remediate it quickly if encountered.</li>
</ul>
<p>The listing above of C-SCRM best practices was laid out in a suggested chronological order (do this first, second, and so on).  However, for further elaboration on implementing your best practices, the list below in Graphic #5 shows these same best practices in relation to achieving organizational C-SCRM strategic objectives.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17929 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith.png" alt="" width="780" height="420" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith-768x414.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic 5: C-SCRM Best Practices to Implement Now and Ongoing</em></strong></p>
<p> </p>
<blockquote>
<p><em><strong>C-SCRM Survival Tip #7</strong>: Implement your C-SCRM Best Practices in the order that makes most sense for your organization’s transformation into C-SCRM maturity; but ensure these accomplish the strategic objectives above as you mature.</em></p>
</blockquote>
<h1><strong>Conclusion &amp; Next Steps</strong></h1>
<p><em>So, to what extent do you need a C-SCRM strategy?</em>  By now you should understand the value for any organization to have such a strategy and accompanying best practices.  But the extent to which SCRM should be aligned with and support your business and IT strategies will depend on your business model, vendors profile, cybersecurity capabilities, and risk tolerance.</p>
<p><em>How important are your vendors’ products (e.g., software, tools, hardware, or firmware) to your critical business operations?  Or to your potential growth?  How fragile are your business operations if a vendor in your supply chain was no longer a secure option?   What is your feasible risk tolerance for such external disruptions to operations?  </em>Think about these questions regarding your supply chain, vendor and product choices, and ongoing operational resilience requirements to determine how to develop your specific C-SCRM strategy for current and future needs.</p>
<p>Once you’ve determined the next steps that are appropriate for your organization, here are a few ways that Wavestone can assist you when you’re ready to build out your Cyber Supply Chain Risk Management optimization approach to enhance, baseline, or continually improve your C-SCRM capabilities:</p>
<ol>
<li>Develop a customized C-SCRM strategy for your organization.</li>
<li>Establish a Cyber Supply Chain Center of Excellence (CSC-CoE) with robust C-SCRM capabilities for vendor-related decision-making as well ongoing monitoring and reporting at all organizational levels.</li>
<li>Execute a C-SCRM (Vendor &amp; Product) Capabilities Maturity &amp; Risk Management Assessment to identify any vulnerabilities, risks, or threats; as well as to enable targeted decision-making about selected vendors or products of interest.</li>
</ol>
<p><span style="color: #800080;"><strong>Feel free to reach out to us if you’d like to discuss your Cybersecurity journey and capabilities, and how to get started towards supply chain risk management success.</strong></span></p>
<p><em><strong>About Wavestone US</strong></em></p>
<p><em>Wavestone US is the North American arm of global management and IT consulting firm Wavestone. We have supported the transformations of more than 200 Fortune 1000 companies across a wide range of industries, leveraging a strong peer-to-peer culture, offering a practitioner’s perspective on IT strategy, cost optimization, operational improvements, cybersecurity, and business management. It is our mission to help business and IT leaders successfully deliver their most critical transformations and achieve positive outcomes. We drive change for growth, lower cost, and risk, and create the trust that gives people the desire to act.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/">Cyber Supply Chain Risk Management Best Practices : Operationalizing Your proactive C-SCRM Defenses</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Connecting your connected coffee machine: yes, but how?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/04/connecting-your-connected-coffe-machine-yes-but-how/</link>
		
		<dc:creator><![CDATA[Paul Fauchet]]></dc:creator>
		<pubDate>Mon, 05 Apr 2021 07:00:43 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[use cases]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15425</guid>

					<description><![CDATA[<p>Networks are at the backbone of every modern systems; for the ecosystems of connected objects, this is no exception. In this article, we will provide you with a methodology to use from the get-go to help in choosing a secure...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/connecting-your-connected-coffe-machine-yes-but-how/">Connecting your connected coffee machine: yes, but how?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Networks are at the backbone of every modern systems; for the ecosystems of connected objects, this is no exception. In this article, we will provide you with a methodology to use from the get-go to help in choosing a secure and suitable network for your IoT project.</p>
<p>In this example, we will assume that you are a coffee machine manufacturer. Your current project is to build a connected coffee machine for your corporate customers. You have identified multiple use cases for this IoT machine. For instance, it automatically orders new coffee capsules when the stock falls below a certain threshold. A second option would be that the coffee machine, sends automatic alerts to your servers when maintenance management such as cleaning, repairs, etc. is needed. Finally, it offers your clients functionalities for monitoring consumption.</p>
<p>How can you choose the right network for your needs? What questions should you ask yourself? How do you make a good choice while considering the overall security of your system?</p>
<p>&nbsp;</p>
<h2>First Step – Define your business requirements and perform a risk analysis</h2>
<p>First, you must identify the requirements for your IoT network which are twofold: business and security requirements. We characterize these requirements with levels 0 to 3, 0 being the lowest and 3 being the highest level.</p>
<p>For the business requirements, you must answer questions such as:</p>
<ol>
<li>How far should the object&#8217;s signal reach?</li>
<li>How much bandwidth do you need?</li>
<li>What is the autonomy of your object?</li>
</ol>
<p>In our example, we assume that your connected coffee machines will be distributed to corporate customers operating over a large geographical area (i.e. over 100 km radius). Therefore, you will need a wide coverage to enable your customers’ widespread machines to communicate with your Information System.</p>
<p>Two business cases are outlined here: If your customer agrees to connect your machine to its existing local network, you will then only need a short-range wireless network between the machine and the internet router. If they refuse to do so, you will then need to set up a long-range network as you will deploy your service and machines over a wide area.</p>
<p>For the bandwidth, a small/short amount will be needed as it solely requires to be able to send small data packages a few times a day at most (capsule orders, alerts, general status, …).</p>
<p>In regard to energy consumption, a coffee machine is traditionally connected to a power supply to perform its tasks; henceforth, power does not constitute an issue in terms of IOT, i.e. the object autonomy is therefore not constraint. There is no energy consumption requirement per se as it is already covered by the coffee machine’s connection to the power grid.</p>
<p>We summarize the levels for business requirements as follows:</p>
<ul>
<li>Range (R) = 3 or 1</li>
<li>Bandwidth (B) = 1</li>
<li>Energy consumption (E) = 0</li>
</ul>
<p>Having defined your business requirements, a risk analysis must be conducted to formulate the security requirements of your project for availability, integrity, confidentiality, and traceability purposes.</p>
<p>A loss of availability would occur in the event of a dysfunction on the connected coffee machine that would render it unusable for a customer. A loss of access to the network or unavailability of backend servers should never result in the machine being unavailable: it must remain working off-network. However, if a dysfunction of the machine occurs, we assume that you would want it to be reported back as quickly as possible through the network in order for maintenance actions to be triggered.</p>
<p>How long can this last? The answer would be several hours rather than several days, as we wouldn’t want to deprive employees from their coffee breaks! Therefore, 4 to 24 hours is an acceptable window of unavailability which can be translated into an availability requirement level of 2.</p>
<p>A loss of integrity would result in data corruption. For example, a potential excess order of coffee capsules may occur by altering the messages sent by the coffee machine or by replacing the same order multiple times. In both cases, this would result in a financial loss for your client. Data on the network needs to be communicated rigorously and exactly. Hence, we can conclude this is a requirement level of 3.</p>
<p>A loss of confidentiality would result in data being divulged; orders quantities are rather sensitive data that shouldn’t be shared with external parties. It needs to be ensured that data is communicated securely on the network and is not accessible by externals parties. &nbsp;Hence, we conclude that confidentiality has a requirement level of 2.</p>
<p>For traceability, and for simplification reasons, we choose to leave this aspect aside assuming that it is already accounted for by the study of the first 3 criteria.</p>
<p>In a nutshell, risk analysis concludes to the following security requirements:</p>
<ul>
<li>Availability (A) = 2</li>
<li>Integrity (I) = 3</li>
<li>Confidentiality (C) = 2</li>
</ul>
<p>For more details about risk analysis methodology for smart objects, you can refer to this <a href="https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/">article</a>.</p>
<p>At the end of this analysis, you obtain for both of your business cases a radar chart of your requirements.</p>
<h3>Business case 1: your customer connects your coffee machine to its local network</h3>
<figure id="post-15428 media-15428" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15428 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1.png" alt="" width="966" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1.png 966w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1-393x191.png 393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1-768x374.png 768w" sizes="auto, (max-width: 966px) 100vw, 966px" /></figure>
<h3>Business case 2: your customer does not connect your coffee machine to its local network</h3>
<figure id="post-15430 media-15430" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15430 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2.png" alt="" width="945" height="465" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2-388x191.png 388w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2-768x378.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></figure>
<p>Though not discussed in this article, financial aspects are also important and depend on various factors such as the network operator pricing model. Same goes for geographic constraints as some networks may not be available on some regions.</p>
<p>Eventually, the ease of configuration of the network may be included in your business requirements, especially if your connected object targets a B2C audience.</p>
<p>&nbsp;</p>
<h2>Second step &#8211; Choose your IoT Network</h2>
<p>Building on business and security requirements, we developed a methodology to choose the right network that will be optimal to meet your business and security needs: range, bandwidth, energy consumption, availability, integrity, confidentiality.</p>
<p>The three business requirements are mandatory, the network you choose must fulfil them, otherwise, it will be eliminated.</p>
<p>For security requirements, the assessment requires pre-emptive analysis. Between two networks that cover the same business requirements, you should choose the one that offers the best level of security with the minimum cost.</p>
<p>If a network doesn’t cover one of the security requirements, you will have to implement some additional security feature as a part of your project backlog, consequently raising your costs.</p>
<p>You should also be vigilant that the additional implementation doesn’t impact the system’s performance. For instance, if you implement data encryption at the application layer, increasing processing times would negatively impact your maximum data rate or could be constrained by the hardware capabilities of the device, with a potential financial impact in case of a hardware upgrade. Consequently, one of your business requirements may no longer be met.</p>
<p>In case high availability is required (A=3), you ought to choose a robust network by design that will meet your real-time needs.</p>
<p>In fact, spread spectrum (like Bluetooth or ZigBee) or frequency hopping modulated protocols (like Sigfox or Bluetooth) are more resistant to radio jamming or radio interferences.</p>
<p>These types of networks are particularly recommended when availability is an important requirement, such as on an industrial production line.</p>
<p>Moreover, mesh protocols are known to be more reliable and scalable than point to point protocols. However, for them to achieve efficiency, they need to be used in a context where multiple connected devices are linked together. Mesh protocols like WirelessHART can also guarantee real-time communications. Their usage is especially adapted to an industrial context.</p>
<p>A simple methodology to choose the right network is to confront your business requirements to the network’s business and security offerings.</p>
<p>In the following radar charts, we present different types of IoT networks providing different levels of business and security offerings, and we compare each one of them to our business requirements.</p>
<h3>Business case 1: your customer connects your coffee machine to its local network</h3>
<figure id="post-15432 media-15432" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15432 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3.png" alt="" width="1128" height="697" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3.png 1128w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3-768x475.png 768w" sizes="auto, (max-width: 1128px) 100vw, 1128px" /></figure>
<h3>Business case 2: your customer does not connect your coffee machine to its local network</h3>
<figure id="post-15434 media-15434" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15434 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4.png" alt="" width="1127" height="712" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4.png 1127w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4-302x191.png 302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4-768x485.png 768w" sizes="auto, (max-width: 1127px) 100vw, 1127px" /></figure>
<p>Let&#8217;s apply the previous methodology to your connected coffee machine. First, we use our previous radar charts to see which networks comply with our business requirements.</p>
<h3>Business case 1: your customer connects your coffee machine to its local network</h3>
<p>For your first business case, Bluetooth and Wi-Fi are two viable short-range options if your customer connects the machine to its local network. On the one hand, Bluetooth meets all the security requirements, but it is less straightforward to implement compared to Wi-Fi. On the other hand, Wi-Fi meets all of them except for availability but that is something we can work out with SLA agreements.</p>
<h3>Business case 2: your customer does not connect your coffee machine to its local network</h3>
<figure id="post-15439 media-15439" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15439 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1.png" alt="" width="1471" height="537" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1.png 1471w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1-437x160.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1-768x280.png 768w" sizes="auto, (max-width: 1471px) 100vw, 1471px" /></figure>
<p>For your second business case, Zigbee, BLE and Wi-Fi are clearly out of the equation because they do not meet the range requirements. However, LoRa, LTE-M and Sigfox are still in the mix.</p>
<p>We use the radar charts again, this time to assess these three candidate&#8217;s compliance with the security requirements.</p>
<p>Sigfox does not meet one of your security requirements (confidentiality) whereas LoRa complies with all security requirements. LTE-M is the best offering as it meets all your requirements, but it is also the most expensive. We conclude that LoRa is a relatively good candidate.</p>
<p>In conclusion, we have one good candidate: LoRa which will require the deployment of a new network and an alternative using a pre-existing Wi-Fi network. It should be noted that you may refuse to connect to the Wi-Fi network on company premises for security reasons.</p>
<p>We will undertake a new scenario in a next article: a customer company buys the machine and discusses what payment options to use.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/connecting-your-connected-coffe-machine-yes-but-how/">Connecting your connected coffee machine: yes, but how?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security accreditation for Agile projects: how to successfully do it !</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/</link>
		
		<dc:creator><![CDATA[Vincent Nguyen]]></dc:creator>
		<pubDate>Mon, 22 Mar 2021 09:00:42 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[accreditation]]></category>
		<category><![CDATA[agility]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15390</guid>

					<description><![CDATA[<p>[nota bene: this article has been translated to English for accessibility reasons. It does not address UK or US regulations, but only French ones regarding Security Accreditation (“homologation” in French). It is nonetheless useful for any organization wanting to implement...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/">Security accreditation for Agile projects: how to successfully do it !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><em>[<strong>nota bene</strong>: this article has been translated to English for accessibility reasons. It does not address UK or US regulations, but only French ones regarding Security Accreditation (“homologation” in French). It is nonetheless useful for any organization wanting to implement security accreditation in Agile projects.]</em></p>
<p style="text-align: justify;">“Security accreditation is a formal act by which the authority responsible for a system commits its responsibility to risk management.” <a href="#_ftn1" name="_ftnref1">[1]</a>. It is of course mandatory in some cases<a href="#_ftn2" name="_ftnref2">[2]</a>, but beyond that, it is also a way of sending a strong message to users and top management: <strong>security is indeed a major topic for the</strong> <strong>organization</strong>. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.</p>
<p style="text-align: justify;">This method disrupted working habits of product teams and ISS teams (Information System Security). The latter have to find a way to go beyond adapting old accreditation method and propose a new relevant solution to still comply with the original goal of the accreditation: “Find a balance between acceptable risk and security costs, then have it formally accepted by a manager/an authority who has the power to do so<a href="#_ftn3" name="_ftnref3">[3]</a>”.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">One solution: provisional accreditation and long-term accreditation</h2>
<p style="text-align: justify;">As a famous Agile Security expert from Wavestone once said: “Agile and accreditation, it’s not rocket science”. Without denying the difficulties, explaining it is quite simple. Faced with teams that must deliver faster and provide continuous releases, the risk levels and therefore the security accreditation must be dealt with at the same pace.</p>
<h3>What should the accreditation consider?</h3>
<p style="text-align: justify;">As always, security accreditation is all about giving thorough information on a project’s security risk level to the Accreditation Authority, for them to decide if it’s acceptable with regard to the organization ISS criteria (e.g. number of EUS still on the backlog, percentage of security baseline rules implemented on a given scope, etc.). Then, they take responsibility for the possible residual risks.</p>
<p style="text-align: justify;">For example, only a few features are available to a few users at the beginning of a project. This small scope will display a lower level of risk (because of a low level of exposure) despite not being fully secured yet. Provisional accreditation (for a few months for example) may be issued to allow experimentation. It will have to be renewed when renewal criteria (defined in advance) are met.</p>
<figure id="post-15391 media-15391" class="align-none"><img loading="lazy" decoding="async" class="wp-image-15391 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN.png" alt="" width="1652" height="930" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN.png 1652w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-1536x865.png 1536w" sizes="auto, (max-width: 1652px) 100vw, 1652px" /></figure>
<p style="text-align: center;"><strong><em>Figure 1 </em></strong><em>– Product exposure to residual risk<br />
From the ANSSI&nbsp;guide (in French): Digital Agility and Security, October 2018 (</em><a href="https://www.ssi.gouv.fr/uploads/2018/11/guide-securite-numerique-agile-anssi-pa-v1.pdf"><em>link to the guide</em></a><em>)</em></p>
<p style="text-align: justify;">For a project at cruising speed, accessible to its target audience with all the expected features, a firm accreditation (3 years for example) is pronounced. The criteria for renewal, leading to the issuance of a new accreditation, are also defined in advance.</p>
<h3>When to renew the accreditation?</h3>
<p style="text-align: justify;">The criteria used to know when to renew the accreditation are closely linked to the project, the context, or the scope, but here are <strong>some examples</strong> to build these criteria. The provisional accreditation is valid until:</p>
<ul style="text-align: justify;">
<li>New critical features are added (“critical” depending on the project),</li>
<li>A new threshold for the number of users has been reached (defined in advance, depending on the associated risks),</li>
<li>New personal data must be integrated and processed by the project,</li>
<li>New features related to payments must be implemented,</li>
<li>A new level of transaction volume is reached,</li>
<li>And of course when the accreditation deadline is reached.</li>
</ul>
<p style="text-align: justify;">Long-term accreditation is valid for a longer time because less changes are expected at this stage of the project. That being said, the accreditation will have to be renewed regularly (at least every 3 years) to check on security levels and in a will of <strong>continuous improvement</strong>.</p>
<h3>What evidence should squads bring?</h3>
<p style="text-align: justify;">Squads/feature teams should be able to bring different types of evidence/proofs (of the security level) to the Accreditation authority/responsible for the accreditation. The Evil User Stories (EUS) serve as what we used to call risks, where prioritization gives information about their criticality (see our <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-conduct-an-agile-cyber-security-workshop/">article on how to lead a workshop on risk analysis in Agile</a>). An extract from the backlog can be used as proof that the main EUS have been processed and that <strong>residual EUS</strong> are known (and accepted by the Accreditation Authority).</p>
<p style="text-align: justify;">The <strong>Security Form</strong> (or Passport, detailed in <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/">this article on Agile transformation</a> &#8211; <em>in French</em> -) is also a relevant way to follow-up on security levels of projects.</p>
<p style="text-align: justify;"><strong>Code review</strong> and <strong>vulnerability scan reports</strong> can also be used (for squads that have integrated DevSecOps and have the appropriate tools).</p>
<p style="text-align: justify;">If the X-team exists (see <a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">our article on the new ISS roles in Agile and the corresponding organization</a>) or if an external audit team was able to perform them, the penetration test reports are also presented.</p>
<p style="text-align: justify;">Any other existing documents can be used to give all necessary information (architecture documents, applicable regulations, etc.).</p>
<p style="text-align: justify;">For provisional accreditation, these documents don’t have to be gathered in a proper “accreditation folder”, which would imply losing time for squads. What is necessary is to ensure they exist and are available to anyone involved in the accreditation process (accreditation authority or their delegate, ISS team, etc.).</p>
<h3>Who are the actors in this process?</h3>
<p style="text-align: justify;">During product development, the <strong>Security Champion</strong> (<a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">see this article for definition</a>) is in charge of organizing the risk analysis workshops (identification of EUS and associated Security Stories). The ISS team is of course involved in the process, bringing their knowledge to the squads during workshops.</p>
<p style="text-align: justify;">The <strong>Product Owner</strong> is responsible for the creation and updates of the necessary documentation. They also make sure the ISS team is informed and asked for help when needed.</p>
<p style="text-align: justify;"><strong>The accreditation Authority</strong> should be a business manager (e.g. the Business Owner) as usual. They must have the capacity to accept <strong>residual risks</strong> and validate the product security levels. As security should not slow down any Agile processes, the signing of a provisional accreditation may be delegated to the Product Owner, <strong>as they are representative of the Business Owner in the squad</strong>. The temporary accreditation can thus be signed faster if criteria for validity are met. In some cases, where projects would pose a risk to other businesses or systems, a transversal officer/business owner must be found, to sign for both businesses or systems. If no one is found, or no compromise is achieved, the Chief Information Officer (CIO) will assume responsibility, as it is their role to ensure the operational conditions of the Information System.</p>
<p style="text-align: justify;">As a conclusion, security accreditation remains key when speaking about integration of security into projects, in particular within the Agile framework which changes the product teams’ way of working. The ISS teams must take advantage and (re)join these product teams (through the Security Champion and the security training of the product teams) and thus work together towards the incremental reduction of risk.</p>
<p>&nbsp;</p>
<p style="text-align: justify;">More articles to come on Agile Security, stay tuned!</p>
<p>&nbsp;</p>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> ANSSI guide (in French): <em>Digital</em> <em>Agility and Security</em>, October 2018 (<a href="https://www.ssi.gouv.fr/uploads/2018/11/guide-securite-numerique-agile-anssi-pa-v1.pdf">link to the guide</a>)</p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> (<strong>French regulations only</strong>) For administrations: decree n ° 2010-112 of February 2, 2010, terms of the General Safety Reference System (RGS). For any product dealing with information coming under National Defense secrecy: Interministerial General Instruction 1300. For operators of vital importance: cyber section of the LPM (law n ° 2013-1168 of 18 December 2013 &#8211; article 22), to strengthen the security of the critical information systems they operate, carried out as part of an accreditation process.</p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> ANSSI&nbsp;guide (in French): <em>The nine steps of the security accreditation</em>, August 2014 (<a href="https://www.ssi.gouv.fr/uploads/2014/06/guide_homologation_de_securite_en_9_etapes.pdf">link to the guide</a>)</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/">Security accreditation for Agile projects: how to successfully do it !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BEEMKA &#8211; Electron Post-Exploitation When The Land Is Dry</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/08/beemka-electron-post-exploitation-when-the-land-is-dry/</link>
		
		<dc:creator><![CDATA[Rémi Escourrou]]></dc:creator>
		<pubDate>Thu, 29 Aug 2019 16:15:54 +0000</pubDate>
				<category><![CDATA[Challenges]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[beemka]]></category>
		<category><![CDATA[compte rendu]]></category>
		<category><![CDATA[détection]]></category>
		<category><![CDATA[discord]]></category>
		<category><![CDATA[electron]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[github]]></category>
		<category><![CDATA[Skype]]></category>
		<category><![CDATA[Slack]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15574</guid>

					<description><![CDATA[<p>Lors de les BSides Las Vegas 2019, Pavel « @ sadreck » Tsakalidis a présenté un nouveau framework de post-exploitation qui repose sur l’utilisation d’Electron par des « applications desktop ». Sa présentation démontre que l’utilisation massive d’Electron ces dernières...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/08/beemka-electron-post-exploitation-when-the-land-is-dry/">BEEMKA &#8211; Electron Post-Exploitation When The Land Is Dry</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a style="margin-left: 1em; margin-right: 1em; text-align: center;" href="https://1.bp.blogspot.com/--k9GnoyEsSA/XWeNvLIgHmI/AAAAAAAAArc/MZmZ_YLU1tIfDG85RMpZVTRT_tYOvItFACLcBGAs/s1600/header.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/--k9GnoyEsSA/XWeNvLIgHmI/AAAAAAAAArc/MZmZ_YLU1tIfDG85RMpZVTRT_tYOvItFACLcBGAs/s640/header.png" width="640" height="240" border="0" data-original-height="350" data-original-width="927" /></a></p>
<div style="text-align: justify;">
<div>Lors de les BSides Las Vegas 2019, Pavel « @ sadreck » Tsakalidis a présenté un nouveau framework de post-exploitation qui repose sur l’utilisation d’Electron par des « applications desktop ». Sa présentation démontre que l’utilisation massive d’Electron ces dernières années peut être utilisée pour injecter du code malveillant dans des applications légitimes.</div>
<div>Le projet peut être retrouvé sur le dépôt GitHub suivant : <a href="https://github.com/ctxis/beemka">https://github.com/ctxis/beemka</a>.</div>
</div>
<div style="text-align: justify;"></div>
<h3 style="text-align: justify;">Introduction</h3>
<div style="text-align: justify;">Electron est un framework permettant de développer des applications multiplateformes avec des technologies web (Javascript, HTLM et CSS).</div>
<div style="text-align: justify;">Son fonctionnement est assez simple, Electron utilise « node.js » en backend et « Chromium » en frontend :</div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">
<figure id="post-15898 media-15898" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-15898" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/2-BEEMKA-437x165.png" alt="" width="437" height="165" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/2-BEEMKA-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/2-BEEMKA-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/2-BEEMKA-768x290.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/2-BEEMKA.png 927w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<div style="text-align: center;"><span style="font-size: x-small;"><i>Components of Electron </i></span></div>
<div style="text-align: center;"><span style="font-size: x-small;"><i><a href="https://www.wildnettechnologies.com/build-cross-platform-desktop-apps-with-electron/">https://www.wildnettechnologies.com/build-cross-platform-desktop-apps-with-electron/</a></i></span></div>
<div></div>
</div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">Electron a notamment permis de développer des applications aujourd’hui incontournables en entreprise :</div>
<div style="text-align: justify;"></div>
<div class="separator" style="clear: both; text-align: center;"><a style="margin-left: 1em; margin-right: 1em;" href="https://1.bp.blogspot.com/-tnbHTpC5ffw/XWeNuKPtguI/AAAAAAAAAro/jl-POTPMvlAqpnWfA56w1MVllExfB5BBgCEwYBhgL/s1600/2.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-tnbHTpC5ffw/XWeNuKPtguI/AAAAAAAAAro/jl-POTPMvlAqpnWfA56w1MVllExfB5BBgCEwYBhgL/s640/2.png" width="640" height="208" border="0" data-original-height="394" data-original-width="1201" /></a></div>
<div style="text-align: justify;"></div>
<div style="text-align: center;"><i><span style="font-size: x-small;">Applications Electron</span></i></div>
<div style="text-align: justify;"></div>
<h3 style="text-align: justify;">Principe de l’attaque</h3>
<div style="text-align: justify;">Les applications Slack, GitHub ou encore Microsoft Teams utilisent le dossier « App Data » lors de l’installation. Il est donc possible pour l’utilisateur d’accéder en écriture au répertoire d’installation.</div>
<div style="text-align: justify;">Toutes les applications Electron possèdent un dossier &#8220;resources&#8221; dans leur répertoire d&#8217;installation :</div>
<div style="text-align: justify;"></div>
<div class="separator" style="clear: both; text-align: center;"></div>
<div><img decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-xw6deGNkoZI/XWeNuBTgTyI/AAAAAAAAArg/8Gm4R6E1tA0Ox8jFgFR6Fca7U5HkKcfkwCEwYBhgL/s1600/3.png" /></div>
<div style="text-align: center;"><i><span style="font-size: x-small;">Illustration avec GitHubDesktop</span></i></div>
<div style="text-align: center;"><i> </i></div>
<div style="text-align: justify;">Ce dossier contient généralement :</div>
<ul>
<li>Le dossier « app » qui contient l’application ;</li>
<li>Le fichier « electron.asar » qui prépare l’environnement Chronium au lancement de l’application.</li>
</ul>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">Le fichier « electron.asar » peut être considéré comme une archive qui contient des scripts « *.js » :</div>
<div style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-16154" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beemka-js-437x37.png" alt="" width="437" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beemka-js-437x37.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beemka-js-71x6.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beemka-js.png 712w" sizes="auto, (max-width: 437px) 100vw, 437px" /></div>
<div></div>
<div></div>
<div class="separator" style="clear: both; text-align: center;"><img decoding="async" src="https://1.bp.blogspot.com/-G0TPjCyHF3c/XWeNuDmYBII/AAAAAAAAAro/OQ7CY0443e8i6GXHJwk_Z-_RAVK686RwgCEwYBhgL/s1600/4.png" /></div>
<div style="text-align: center;"><i><span style="font-size: x-small;">Conteneur « electron.asar »</span></i></div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">Le fichier « chrome-extension.js » permet la gestion de l’environnement Chronium :</div>
<figure id="post-16156 media-16156" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-16156 alignleft" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beem-ka-2-437x23.png" alt="" width="437" height="23" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beem-ka-2-437x23.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beem-ka-2-71x4.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/08/code-beem-ka-2.png 714w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">Pavel propose ainsi d’injecter directement dans ce fichier du code javascript, permettant de lancer une action malveillante lors d’un évènement spécifique :</div>
<p><span class="w-code"><span class="w-root">app</span>.on(&#8216;<span class="w-server">browser-window-focus</span>&#8216;, function (event, bWindow) { <span class="w-root">bWindow</span>.webContents.<span class="w-grepped">executeJavaScript</span>(&#8220;<span class="w-server">alert(Hello Github !!&#8217;);</span>&#8220;) }) </span></p>
<p>&nbsp;</p>
<div style="text-align: justify;">Lors de l’ouverture de l’application (après avoir packé le fichier « electron.asar » et redéposé dans le répertoire « resource »), un pop-up (XSS style) va s’ouvrir dans l’application GitHub Desktop :</div>
<div style="text-align: justify;"></div>
<div><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-AvxSdvn3kMg/XWeNu780hcI/AAAAAAAAArk/_psRbes4m7YyzYT5icMD_mYD7xRT2YeXQCEwYBhgL/s1600/5.png" width="314" height="177" /></div>
<div style="text-align: justify;"></div>
<div style="text-align: center;"><i><span style="font-size: x-small;">Illustration avec GitHub Desktop</span></i></div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">Le code est donc correctement exécuté.</div>
<div style="text-align: justify;"></div>
<h3 style="text-align: justify;">Démonstration</h3>
<div style="text-align: justify;">La vidéo suivante présente une démonstration du module « rshell_cmd » dans GitHub Desktop, permettant d’ouvrir un reverse shell vers notre listener :</div>
<div style="text-align: center;"><iframe loading="lazy" src="https://bit.ly/2PBBGb1" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">
<div>La commande utilisée est la suivante :</div>
<p><span class="w-code">$ <span class="w-cli">python3</span> ./beemka/beemka.py &#8212;<span class="w-cli">inject </span>&#8212;<span class="w-cli">module </span>rshell_cmd &#8212;<span class="w-cli">asar</span> ./electron_safe.asar &#8212;<span class="w-cli">output </span>./electron.asar</span></p>
</div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">De plus, l’exécutable de l’application « GitHub Desktop » n’est jamais modifié durant la modification du fichier « asar ». Cette technique peut donc permettre de contourner une politique de filtrage présente sur le poste.</div>
<div style="text-align: justify;"></div>
<h3 style="text-align: justify;">Conclusion</h3>
<div style="text-align: justify;">Le framework présenté par Pavel est très intéressant pour compléter ses techniques de persistance. En effet, il se base sur le fonctionnement intrinsèque d’Electron et ne nécessite pas d’exploiter une vulnérabilité présente dans les applications.</div>
<div style="text-align: justify;">Le framework permet aussi d’aller plus loin en accédant aux données des applications mais aussi de réaliser d’autres opérations comme déposer un keylogger, prendre un Screenshot, …</div>
<div style="text-align: justify;">A ce jour, aucune solution n’était proposée par Electron pour mieux vérifier l’intégrité des fichiers des applications. Le plus simple est d’installer les applications dans « Programmes files » avec les privilèges administrateurs pour ne pas permettre à un utilisateur standard d’éditer le fichier « electron.asar ».</div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">Ps : BloodHound est aussi une application Electron, une bonne « blague » à faire aux équipes Red/Blue Team :</div>
<div style="text-align: center;"><iframe loading="lazy" src="https://bit.ly/2L30Yuk" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">
<div style="text-align: right;"></div>
<div style="text-align: justify;"></div>
<div style="text-align: justify;">
<h4>Références</h4>
</div>
<div style="text-align: justify;"><a href="https://www.contextis.com/en/blog/basic-electron-framework-exploitation">https://www.contextis.com/en/blog/basic-electron-framework-exploitation</a></div>
<div style="text-align: justify;"><a href="https://github.com/ctxis/beemka">https://github.com/ctxis/beemka</a></div>
<div style="text-align: justify;"><a href="https://electronjs.org/docs/tutorial/application-architecture">https://electronjs.org/docs/tutorial/application-architecture</a></div>
<div style="text-align: justify;"><a href="https://www.wildnettechnologies.com/build-cross-platform-desktop-apps-with-electron/">https://www.wildnettechnologies.com/build-cross-platform-desktop-apps-with-electron/</a></div>
<div style="text-align: justify;"></div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/08/beemka-electron-post-exploitation-when-the-land-is-dry/">BEEMKA &#8211; Electron Post-Exploitation When The Land Is Dry</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reverse Engineering &#8211; focus sur l’analyse dynamique de malware</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/06/reverse-engineering-focus-sur-lanalyse/</link>
		
		<dc:creator><![CDATA[Vincent Nguyen]]></dc:creator>
		<pubDate>Tue, 21 Jun 2016 16:57:29 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[analyse dynamique]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15773</guid>

					<description><![CDATA[<p>L’analyse dynamique d’un fichier correspond à analyser l’exécution de ce fichier. Cette analyse permet alors de déterminer le comportement réel du malware, là où certains éléments de l’analyse statique peuvent être présents uniquement pour détourner l’attention de l’analyste, ou lui...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/06/reverse-engineering-focus-sur-lanalyse/">Reverse Engineering &#8211; focus sur l’analyse dynamique de malware</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="separator" style="clear: both; text-align: center;">
<div style="margin-left: 1em; margin-right: 1em;"></div>
</div>
<div style="text-align: justify;">L’analyse dynamique d’un fichier correspond à analyser l’exécution de ce fichier. Cette analyse permet alors de déterminer le comportement réel du <i>malware</i>, là où certains éléments de l’analyse statique peuvent être présents uniquement pour détourner l’attention de l’analyste, ou lui compliquer la tâche.</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-left: 0cm; margin-top: 5px;">
<div style="text-align: justify;">Une première forme d’analyse dynamique correspond à l’exécution du <i>malware</i> et à l’observation des modifications qu’il entraine sur le système. Cette analyse a le plus souvent pour but de déterminer les actions à effectuer pour supprimer le <i>malware</i>, et/ou créer une signature.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-left: 0cm; margin-top: 5px;">
<div style="text-align: justify;"><i><span style="mso-fareast-language: FR;">Attention, </span>ce type d’analyse doit absolument être fait dans un environnement contrôlé (machine virtuelle, poste dédié et déconnecté du SI, etc.) afin de ne pas risquer la propagation de l’infection.</i></div>
</div>
<h2 style="margin-bottom: 15px; margin-top: 25px; text-align: justify;"><span style="mso-list: Ignore;">1)<span style="font: 7pt 'Times New Roman';">     </span></span>Analyse des opérations</h2>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">L’analyse dynamique permet la surveillance de nombreuses informations : les registres, le système de fichiers et les processus<i>. </i>Cette étape est au début assez fastidieuse étant donné que de nombreuses informations sont accessibles. Il existe différents outils permettant d’accéder à ces informations.<i> ProcessMonitor</i> est l’un de ces outils qui a l’avantage de permettre à l’analyste de filtrer ses recherches sur un exécutable, ce qui est très pratique pour l’analyse de <i>malwares</i>.</div>
<div style="text-align: center;">
<figure id="post-15774 media-15774" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15774 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2.jpg" alt="" width="604" height="163" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2.jpg 604w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-437x118.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-71x19.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-600x163.jpg 600w" sizes="auto, (max-width: 604px) 100vw, 604px" /></figure>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<div style="text-align: center;">
<div class="separator" style="clear: both; text-align: center;"></div>
</div>
<p><i>Figure 1 : Résultat d’une analyse de ProcessMonitor sur un malware appelé mm32.exe</i></p>
</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">L’analyse de ces différents éléments permet à l’analyste d’avoir une meilleure compréhension de l’activité du <i>malware</i>. Cependant, étant donné le nombre d’informations renvoyées par <i>ProcessMonitor</i> dont la plupart représentent des évènements standards du lancement d’un exécutable, l’analyse demande beaucoup de pratique et de la patience.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;"></div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Un autre outil permettant une analyse poussée des processus est <i>Process Explorer</i>. Il permet de lister les processus, les bibliothèques chargées par un processus, différentes informations sur ces processus, ainsi que des informations globales sur le système. L’avantage de cet outil est qu’il présente les informations sous forme d’arbre, exposant ainsi les relations entre les processus parents et enfants.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Les informations que <i>Process Explorer</i> renvoie sont le nom du processus, le PID (numéro d’identification du processus), l’utilisation du CPU, une description ainsi que le nom de l’entreprise ayant créé le binaire (champs laissés libres au créateur du binaire…). Par défaut les services sont surlignés en rose, les processus en bleu, les nouveaux processus en vert et les processus terminés en rouge. La vue se met alors à jour à chaque seconde. Lors de l’analyse de <i>malware</i> il est donc intéressant de repérer les différents processus qui sont modifiés ou créés afin de pouvoir enquêter dessus de manière plus approfondie.</div>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<div style="text-align: center;">
<figure id="post-15776 media-15776" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15776 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-3.jpg" alt="" width="605" height="454" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-3.jpg 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-3-255x191.jpg 255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-3-52x39.jpg 52w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>
<div class="separator" style="clear: both; text-align: center;"></div>
<p><i>Figure 2 : Résultat de Process Explorer sur un exécutable</i></p>
</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Ces techniques sont très efficaces pour comprendre ce que fait un exécutable, mais il ne faut pas négliger leur utilité pour déterminer si un document est malveillant ou non. Un moyen rapide de savoir si un PDF est malveillant, par exemple, est de lancer <i>Process Explorer</i> puis d’ouvrir le PDF et de regarder si de nouveaux processus sont créés.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;"><u>Remarque :</u> Pour l’analyse de documents, il est souvent intéressant d’utiliser des versions intentionnellement non <i>patchées</i> des logiciels afin de s’assurer que l’attaque est efficace. Une bonne manière de faire cela est par exemple de créer plusieurs <i>snapshots</i> d’une machine virtuelle d’analyse, chaque <i>snapshot</i> ayant une version différente, et généralement assez âgée, des logiciels.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Pour l’analyse de registres, l’outil <i>Regshot</i> permet de comparer les registres sur deux <i>snapshots </i>différents. Un extrait de résultat de <i>Regshot</i> peut ressembler à la figure 3.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Dans ce résultat, le premier constat est la création d’un mécanisme de persistance <i>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run</i> par le programme <i>ckr.exe</i>, le deuxième est la modification<i> </i>de la valeur de la <i>seed</i> pour le générateur de nombre aléatoire, ce qui représente un bruit habituel.</div>
<div style="text-align: center;">
<figure id="post-15778 media-15778" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15778 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-4.jpg" alt="" width="605" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-4.jpg 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-4-251x191.jpg 251w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-4-51x39.jpg 51w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>
</div>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<div class="separator" style="clear: both; text-align: center;"></div>
<p><i>Figure 3 : Extrait de résultat de Regshot après lancement du programme ckr.exe</i></p>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;"></div>
<h2 style="margin-bottom: 15px; margin-top: 25px; text-align: justify;"><span style="mso-list: Ignore;">2)<span style="font: 7pt 'Times New Roman';">     </span></span>Analyse réseau</h2>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">De nombreux <i>malwares</i> récupèrent des ressources ou transmettent des informations sur le réseau (en particulier vers des serveurs C2 « Command &amp; Control »). De ce fait il est très intéressant de réaliser une analyse réseau pour déterminer les actions du <i>malware</i>. L’environnement d’analyse n’étant pas connecté à internet, il se peut qu’une partie des fonctionnalités du <i>malware</i> restent non accessibles. Cependant il est préférable de récupérer de telles informations en faisant une analyse manuelle approfondie plutôt que de permettre au <i>malware</i> de se propager (une sortie directe vers Internet peut néanmoins être fortement utile aux équipes d’analyse).</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Quelques outils peuvent permettre d’effectuer une analyse réseau d’un <i>malware</i> :</div>
</div>
<div class="Enum1" style="margin-bottom: 4px; margin-top: 4px;">
<ul style="list-style-type: disc;">
<li style="text-align: justify;"><i>ApateDNS</i> permet de récupérer les requêtes DNS faites par le <i>malware</i>. Il permet également de simuler les réponses d’une adresse IP spécifiée en écoutant sur le port 53 de la machine locale <i>via</i> le protocole UDP. Il affiche alors les requêtes reçues en hexadécimal ou en ASCII. Par défaut <i>ApateDNS</i> utilise la passerelle (<i>gateway</i>) ou les paramètres de DNS courants dans les réponses DNS.</li>
</ul>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<figure id="post-15780 media-15780" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15780 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-5.png" alt="" width="605" height="439" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-5.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-5-263x191.png 263w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-5-54x39.png 54w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>
<div class="separator" style="clear: both; text-align: center;"></div>
<p><i>Figure 4 : Interception des requêtes DNS et simulation des réponses par ApateDNS en utilisant l’IP 192.168.120.1</i></p>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;"></div>
<div class="Enum1" style="margin-bottom: 4px; margin-top: 4px;">
<ul style="list-style-type: disc;">
<li style="text-align: justify;"><i>Netcat</i> permet le scan de port, <i>tunneling</i>, <i>proxying</i>, transfert de ports et bien d’autres choses sur des connections aussi bien entrantes que sortantes. Il existe deux modes de fonctionnement pour <i>Netcat</i>, le mode écoute, pour lequel <i>Netcat</i> agit comme un serveur, et le mode connexion pour lequel il agit comme un client.</li>
</ul>
</div>
<div class="Enum1Suite">
<div style="text-align: justify;"><u>Remarque :</u> les <i>malwares</i> utilisent souvent les ports 80 et 443 (HTTP et HTTPS respectivement) car ces ports ne sont généralement pas bloqués par les différents équipements de sécurité sur le réseau des entreprises (firewall, proxy, etc.).</div>
</div>
<div class="Enum1Suite">
<div style="text-align: justify;"><u>Remarque 2 :</u> certains <i>malwares</i> simulent des connexions usuelles afin de cacher leur comportement et tirer parti d’une méconnaissance de nombreux analystes réseau qui ne se concentrent que sur le début d’une session. Par exemple, en figure 5 le <i>reverse shell RShell</i> est instancié avec une redirection du domaine <i>www.google.com</i> vers l’hôte local 127.0.0.1 à l’aide d’<i>ApateDNS</i>. L’analyste écoute ensuite le trafic réseau sur le port 80 local avec <i>Netcat</i>.</div>
</div>
<div class="Enum1Suite">
<div style="text-align: justify;">Dans ce résultat, <i>RShell</i> simule une requête POST à <i>www.google.com</i> (comme le montre le point 2 sur la figure) mais par la suite, l’analyste récupère bien un <i>shell</i> (visible sur le point 3).</div>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<figure id="post-15782 media-15782" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15782 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-6.jpg" alt="" width="605" height="344" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-6.jpg 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-6-336x191.jpg 336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-6-69x39.jpg 69w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>
<div class="separator" style="clear: both; text-align: center;"></div>
<p><i>Figure 5 : Résultat renvoyé par Netcat lors de l’exécution de RShell en redirigeant les requêtes vers l’hôte grâce à ApateDNS</i></p>
</div>
<div class="Enum1" style="margin-bottom: 4px; margin-top: 4px;">
<ul style="list-style-type: disc;">
<li style="text-align: justify;"><i>Wireshark</i> permet la capture de paquets et de création de logs pour le trafic réseau. Il permet la visualisation, l’analyse de trames et l’analyse en détail de paquets individuels.</li>
</ul>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<div class="separator" style="clear: both; text-align: center;"></div>
<figure id="post-15784 media-15784" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15784 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-7.png" alt="" width="566" height="398" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-7.png 566w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-7-272x191.png 272w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-7-55x39.png 55w" sizes="auto, (max-width: 566px) 100vw, 566px" /></figure>
<p><i>Figure 6 : Capture d’écran d’une analyse Wireshark</i></p>
</div>
<div class="Enum1Suite">
<div style="text-align: justify;">Une des fonctionnalités très utiles de <i>Wireshark</i> est la fonctionnalité <i>Follow TCP stream</i> qui permet à partir d’un paquet de reconstituer le flot entier auquel il appartient.</div>
</div>
<div class="separator" style="clear: both; text-align: center;"></div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<div>
<figure id="post-15786 media-15786" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15786 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-8.jpg" alt="" width="605" height="373" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-8.jpg 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-8-310x191.jpg 310w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-8-63x39.jpg 63w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>
</div>
<div style="text-align: center;">Figure 7 : Fonctionnalité <i>Follow TCP Stream</i> de <i>Wireshark</i></div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;"><i>Wireshark</i> peut permettre à l’analyste de comprendre comment le <i>malware</i> réalise ses communications réseau.</div>
</div>
<h2 style="margin-bottom: 15px; margin-top: 25px; text-align: justify;"><span style="mso-list: Ignore;">3)<span style="font: 7pt 'Times New Roman';">     </span></span>Analyse via débogueur</h2>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Étape la plus complexe de l’analyse, l’analyse dynamique avancée correspond au passage de l’exécutable dans un débogueur afin de déterminer les actions qu’il effectue les unes après les autres, ainsi que les différents états qu’il génère sur le poste analysé. Il existe plusieurs débogueurs utilisables pour cette étape, notamment <i>IDA Pro</i>, <i>OllyDbg</i> et <i>WinDbg</i>.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Cette étape est extrêmement efficace mais nécessite de nombreuses connaissances et beaucoup de temps. Dans cette partie sera présenté un aperçu de ce qu’il est possible de faire avec un débogueur. Il est important de retenir que l’analyse dynamique révèle ce que le <i>malware</i> fait véritablement, contrairement à l’analyse statique qui montre ce que le <i>malware</i> est en théorie capable de faire. Certains bouts de code présents dans le <i>malware</i> peuvent en effet ne jamais être appelés, et les repérer durant l’analyse statique peut induire en erreur l’analyste sur l’action du <i>malware</i>.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">L’utilisation d’un débogueur permet également d’obtenir des informations impossibles à récupérer avec un désassemblage, comme par exemple les valeurs prises par les registres au fur et à mesure de l’exécution.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Il existe en fait deux types de débogueurs, ceux dits <i>source-level</i> qui sont généralement intégrés dans les <i>IDE</i> et bien connus des développeurs, leur permettant d’agir sur le code source afin de déterminer les comportements étranges de leurs programmes, et ceux dits <i>assembly-level</i> ou <i>low-level</i> qui agissent sur le code assembleur. C’est ce deuxième type de débogueur qui est utilisé par les analystes de <i>malware</i>, étant donné qu’ils n’ont pas accès au code source de l’application.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">De même il existe deux niveaux de débogage, celui en mode utilisateur, où le débogueur est lancé sur le même système d’exploitation que le programme en cours d’exécution, et celui plus complexe en mode noyau, qui permet de déboguer des applications ayant ce niveau d’interactions, mais qui nécessite deux machines reliées, l’une faisant tourner le programme, et l’autre permettant le débogage. Une deuxième machine est en effet nécessaire car il n’existe qu’un noyau par système d’exploitation, et si un <i>breakpoint</i> est mis sur une instruction exécutée par ce noyau, plus aucune application ne pourra répondre, le débogueur compris.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Dans les deux cas d’exécution, le résultat sera la mise en suspens du programme. Dans le premier cas le programme sera stoppé dès le point d’entrée (sauf configuration particulière) alors que dans le deuxième il sera arrêté là où il se trouvait. Une fois cela effectué, il est possible d’agir de différentes manières sur le programme :</div>
<ul style="list-style-type: disc;">
<li style="text-align: justify;">Avancer d’une instruction (<i>single-stepping</i>) : cette action est généralement utilisée uniquement sur les passages identifiés comme importants afin d’obtenir des détails sur le fonctionnement comme les valeurs prises par les registres.</li>
<li style="text-align: justify;">Avancer d’une fonction (<i>Stepping-over</i>) : cela peut permettre de passer des détails inutiles. Par exemple si le programme appelle la fonction <i>LoadLibrary</i>, il n’est pas nécessaire de rentrer dans les détails de cette fonction.<span style="font: 7pt 'Times New Roman';"> </span></li>
<li style="text-align: justify;">Rentrer dans une fonction (<i>Stepping-into</i>) : en opposition à l’action précédente, il peut parfois être intéressant de rentrer dans une fonction pour en comprendre les détails.</li>
<li style="text-align: justify;">Avancer jusqu’au prochain <i>breakpoint</i> : pour cela il faut souvent placer un <i>breakpoint</i> plus loin dans le code et relancer l’exécution, le débogueur s’arrêtera automatiquement au <i>breakpoint</i>.</li>
<li style="text-align: justify;">Modifier l’exécution d’un programme : par exemple pour éviter l’appel à une fonction, il est possible de mettre un <i>breakpoint</i> sur cette fonction et, lorsque l’interruption est levée, changer le pointeur d’instruction à après son appel.</li>
</ul>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Il existe trois types de <i>breakpoints</i> :</div>
</div>
<div class="Enum1" style="margin-bottom: 4px; margin-top: 4px;">
<ul style="list-style-type: disc;">
<li style="text-align: justify;">Les <i>software breakpoints</i> : ces points d’arrêt sont utilisés pour faire en sorte que le programme s’arrête lorsque l’instruction sur laquelle ils sont placés est appelée. Pour réaliser cela, le débogueur remplace le premier octet de l’instruction par <i>0xCC</i>, l’instruction pour INT3.</li>
</ul>
<div style="text-align: center;">
<figure id="post-15788 media-15788" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15788 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-9.png" alt="" width="512" height="111" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-9.png 512w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-9-437x95.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-9-71x15.png 71w" sizes="auto, (max-width: 512px) 100vw, 512px" /></figure>
</div>
</div>
<div class="MsoCaption" style="margin-bottom: 15px; margin-top: 15px; text-align: center;">
<div class="separator" style="clear: both; text-align: center;"></div>
<p>Figure 8 : Remplacement du premier octet de l’instruction par 0xCC lors d’un <i>software breakpoint</i>.</p>
</div>
<div class="Enum1" style="margin-bottom: 4px; margin-top: 4px;">
<ul style="list-style-type: disc;">
<li style="text-align: justify;">Les <i>hardware breakpoints</i> : ils sont placés sur une adresse mémoire, et déclenchés lorsque le programme tente d’accéder à cette ressource. L’avantage est qu’ils ne dépendent pas de la valeur présente dans cette adresse mémoire, et qu’ils interviennent à l’accès et non à l’exécution. Néanmoins ils nécessitent des registres particuliers qui sont en nombre limités sur un système.</li>
</ul>
</div>
<div class="Enum1" style="margin-bottom: 4px; margin-top: 4px;">
<ul style="list-style-type: disc;">
<li style="text-align: justify;">Les <i>conditional breakpoints</i> : ce sont des <i>software breakpoints</i> qui ne vont déclencher l’arrêt que si une certaine condition est vérifiée. Cela peut par exemple être utile si l’on veut s’arrêter à l’appel d’une fonction que si un certain paramètre est appelé.</li>
</ul>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;"></div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Ces différentes techniques d’analyse dynamique viennent en complément d’une analyse statique.</div>
</div>
<div class="MsoNormalIndent" style="margin-bottom: 5px; margin-top: 5px;">
<div style="text-align: justify;">Il convient néanmoins de prendre toutes les précautions nécessaires avant de se lancer dans une analyse de malware. Chaque résultat obtenu par les analystes doit être contrevérifié pour s’assurer qu’aucune technique anti-reverse n’est mise en œuvre dans le binaire.</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/06/reverse-engineering-focus-sur-lanalyse/">Reverse Engineering &#8211; focus sur l’analyse dynamique de malware</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
