AST Digital Magazine June 2017 Digital-June | Page 25
Volume 13
ability assessment of the network based on ex-
posed and orphaned credentials and other vul-
nerabilities that create on-ramps for an attacker.
Additionally, topographical maps of the network
provide visibility to assets as they are come on
and off of the network.
Maps can also show attack time-lapsed replay so
that organizations can understand and analyze
the lateral movement of an attack.
The second area is indicators and
warning.
In this day and age, where we are heavily reliant
ICS, real-time situational awareness is critical.
Additionally, an increasing amount of proactive
government practitioners and organizations are
connecting sensor-based data and operational
infrastructure to enable real-time intelligence.
These both come with their own sets of security
risks.
ICS often operates on older unpatchable systems
where there is a lack of security standards, com-
mon passwords are often used and the concept
of a true ”air gap” is fading rapidly in a connected
world.
Ultimately, attackers can and will bypass perim-
eter security and get inside the network.
The BOTsink deception servers are de-
signed to provide early warning to attack-
ers in-the-network by setting traps that
appear as production assets.
These decoys run the same protocols as ICS and
IOT devices for authenticity and are designed to
deceive and misdirect the attack into engaging
and revealing their presence.
Attivo Deception for Threat Detection
June 2017 Edition
Response is the third area.
As the attacker engages with the deception en-
vironment, the BOTsink multi-correlation engine
analyzes the attack and creates the forensic re-
porting for the incident.
This attack information will then create evidence-
based alerts and be viewable in a threat intelli-
gence dashboard, in which double click actions
can be taken through 3rd party integrations to
block and quarantine attackers.
Companies and agencies can then create repeat-
able playbooks based on information that they
would like shared with their firewalls, endpoint,
NAC, and SIEM solutions, so that their security
policies can automatically be applied.
In ICS environments, where human lives and
safety can be quickly at risk, it is not enough to
simply think like an attacker and know how they
get in.
One must think like a responder and have deep
expertise in detecting and defending against
these attackers.
Attivo engineers have applied their extensive ex-
pertise in intrusion detection and protection and
have designed the ThreatMatrix- BOTsink solu-
tion for optimal efficiency for ICS network threat
detection and accelerated incident response.
Using Attivo deception, the game has changed,
attackers must now be right 100% of the time or
be caught, and now when they are, organizations
are equipped to quickly and efficiently respond to
them.
Comprehensive Deception and Decoy
Make the Entire Network a Trap to Confuse and
Misdirect Attackers into Revealing Themselves
• Decoys appear identical to production assets,
luring attackers into revealing themselves.
• Decoy configurations run real Linux, Mac, and
Windows OS and are customizable to match
the “golden image” of the production environ-
25