Sourcefire Agile Security Manifesto
Sourcefire Agile Security Manifesto
Sourcefire Agile Security Manifesto
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Agile Security Manifesto #1 - Be More Adaptive than Our Adversaries. . . . . . . . . . . . . . . . . . . . . . . 1
Agile Security Manifesto #2 - Security Must be as Dynamic as Threats, Environments. . . . . . . . 3
Agile Security Manifesto #3 - No Such Thing as a Trusted Network or Device. . . . . . . . . . . . . . . . 4
Agile Security Manifesto #4 Offensive Research Has Limited Immediate Value. . . . . . . . . . . . . 5
Agile Security Manifesto #5 - You Cant Protect What You Cant See. . . . . . . . . . . . . . . . . . . . . . . . 6
Agile Security Manifesto #6 - Dynamic IT Environments Need Dynamic Intelligence. . . . . . . . . . 7
Agile Security Manifesto #7 - Beware of the Black Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Agile Security Manifesto #8 - Every Environment is Unique; Adapt Defenses Quickly . . . . . . . . . 9
Agile Security Manifesto #9 - Security is Not an Aggregation of Policies or Checkboxes. . . . . 10
Agile Security Manifesto #10 - Security is a Big Data Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Agile Security Manifesto #11 - Security is a People Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Agile Security Manifesto #12 - Security Must Be An Enabler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
INTRODUCTION
We have seen numerous attempts over the past 30 years to solve the security problem,
but the truth is,this isnt a problem as much as it is a reality. In the quest for a solution,
companiesand even entire industrieshave come and gone, regulations and compliance
groups have attempted to set standards, academics have searched for perfection, and
even the once unexploitable have fallen.
Every year new attempts at solving this problem are launched and all too often they
lack an understanding of the challenges that exist. If any further indication of this trend is
needed, have a look at the emergence of advanced persistent threats (APT) and the myriad
of solutions claiming to solve it.
With this situation at hand, Sourcefire harnessed its collective experience to develop the
12 core principles that make up our Agile Security Manifesto. This Manifesto defines our
philosophy on how to approach security in todays real world.
The principles in this paper take into account the fact that todays environment is an everexpanding and changing combination of services, devices, and software that are created,
utilized, evolved, and discarded daily. They are based on the foundation that companies
must learn to See Learn Adapt Act in order to achieve Agile Security.
The reality of defending these types of systems requires that we understand, and think
deeply, about how we operate. We believe the notion of a trusted network is a fairy tale,
there is no magic black box or silver bullet solution to the security problem, and current
security research is off the mark.
The considerations in this white paper define an important baseline that will help avoid
many of the challenges encountered in order to secure networks and data in dynamic
environments against equally dynamic threats.
As you read this paper, we hope it spurs you to create your own list of principles that will
help further shape the industry and, more importantly, help your organization become more
adaptive and dynamic in the way that it protects data.
So there we have it. Our misguided pursuit of stability has created our dependence on
technology and the failures of that technology ultimately result in catastrophic ripples in
our view of the world. We respond by being more regimented, introducing more processes,
adding layers of monitoring, and saying that will never happen again.
We do not implement processes that allow us to operate in the presence of failure. We no
longer have the ability to respond outside our processes and parameters because stability
has prevented us from exploring the possibilities. Our prior successes in implementing
this stability, wholly outside the presence of an adversary, has suppressed the need be
innovative and adaptive and even the awareness that there is an adversary.
If you think about it in terms of real world analogues you
might come up with this:
Squirrels are incredibly motivated to compromise bird
feeders. Not because they are lazy but because the
payoff is far greater than foraging around for nuts all
day. If they get into that feeder they have weeks worth
of food available and a consistent and reliable source
to return to for it. The birds have food, too, just not as
much.
In many ways this is the challenge we face: stopping the
squirrels while allowing the birds to feed. We have to
be more adaptive than the squirrels, be more innovative
in approaching the problem, think outside of the box, or
perhaps change how we design and protect the bird
feeders.
Back to the principle: The pursuit of security requires that we be more innovative and
adaptive than our adversaries. We are encumbered as practitioners by the need for stability
and comfort. We must find ways to overcome these challenges before we can be more
innovative and adaptive than our adversaries. We have to find the opportunities to innovate
our defenses in ways that do not significantly impact our businesses and users. We have
to take the time now to prepare for when the attack comes, be it a drive-by only looking
for users financial information, or an attack targeted at your intellectual property and a
stepping stone to the next target. We have to think of ways to know that the compromise is
there, ways to force attackers into becoming known, without impacting our users.
To be more innovative and adaptive than our adversaries requires we know a lot more
about our networks, users, applications, and weaknesses. As practitioners we have to test
them, understand that they are what they were designed to be, and then find creative ways
to mitigate risks, and we need to do it in such a way that our users are minimally affected.
Only you can do this though, outsiders cannot do it for you. Only you are empowered to
know these local weaknesses, unless of course the adversary is already there. We have
to be able to mitigate these risks while others evaluate making appropriate changes and
collectively we have to protect stability in the process.
In the end we must be more innovative and adaptive than our adversaries and the process
of getting there will be a challenging one. While our technologies are a good step towards
enabling adaptive defenses, it is nearly impossible to implement truly adaptive defenses in
any measure of time that approximates rapid. The bottom line is that if you dont start now
you will surely discover that it is too late when you realize you truly need it.
2
...We have to find the
opportunities to innovate our
defenses in ways that do
not significantly impact our
businesses and users.
...Security technologies
and operations must be as
dynamic as the threats they
face and the environments
they are protecting.
The second principle speaks directly to this situation. It acknowledges that regardless of
the stability of the technology in the absence of an adversary, the environment and threats
are dynamic. They are unquestionably at least as dynamic as the adversary intends them
to appear to be. Take Stuxnet as an example of how the adversary can and does manage
the dynamics of the environment. This was a tool designed to infiltrate, unbeknownst to the
users, and silently degrade effectiveness while providing the appearance of stability. Had
the adversary taken a different approach and caused chaos it would have been directly
destructive and not deviantly destructive. They clearly didnt want the environment to be
too dynamic and also clearly had the ability to make it chaotic if they chose.
The second principle, Security technologies and operations must be as dynamic as the
threats you face and the environments you are protecting, isnt just about technology; it is
about the people, process, and tools we use to deal with the currently unknown. It is about
building systems that allow users to act with appropriate information, in appropriate ways,
to an environment that can become instantly dynamic when it has never been before.
These questions are harder to answer now more than ever because of explosive change
occurring in the enterprise environment. Economic conditions have forced consolidation,
driven outsourcing of traditionally internal services, commoditized our data, pushed new
services into production, and increased our tolerance for risk to allow us to effectively
compete. Lost in that process is the traditional review, the clear definition of trust, and the
loyalty that once drove behavior. Trust implies some level of stability or consistency. It is
time to face realitythat era is gone.
...Economic conditions
have forced consolidation,
driven outsourcing of
traditionally internal
services, commoditized
our data, pushed new
services into production,
and increased our tolerance
for risk to allow us to
effectively compete.
Trust as a static concept overlaying the dynamic enterprise is a security illusion. The world
is moving too fast for that. Security must adapt to all the transient states that are part of
enterprise IT environments today. The jury is in. Static security has failed too many times
and organizations are looking to respond to threats and adapt security policies in the time
frames that actually deliver a defense. We now have to ask, where are your applications,
users, data, and access points? What devices are being used to access your data?
The organizations that thrive in the future will be dynamic across all of IT; why would
anyone think that security will be exempt? This will push CISO/CIO leaders to innovate their
approach beyond compliance checklists and accountant views of security. The critical
question remains: How can an enterprise operate securely in this dynamic world, without
the traditional trust model? The answer lies in security automation and visibility, allowing
organizations to respond to change in the timeframes that their changes are happening
versus days, weeks, or even later when it is too late. That means replacing the trust
environment and its static reporting, operational blindness, and manual policy controls,
with a trust nothing approach using realtime visibility and security automation.
The tired trust approach looks like this picture. All is beautiful until you let the snow melt,
see what really is there, and then want to look in the other direction.
Agile Security Manifesto principle #3 states: There is no such thing as a trusted network
or device. Moving forward organizations must adjust their past practices to the reality that
nothing truly should be trustednot devices, files, computers, users, or content. The only
sustainable approach is a dynamic defense that is instrumented to your unique environment,
always learning from the change and adapting security controls to be constantly relevant.
4
...What is the better
business investment,
hunting for the bugs that
might be used in 1% of
the cases or investing in
defensive technologies that
more effectively deal with
the 99%?
handle these types of armaments? Defenders should be focusing on finding better ways
to deal with complex file types, locating better ways to dissect them for inspecting, and
finding faster ways to quickly determine if something is malicious. While bug hunting for
the next Zero-Day may protect a network against one new threat, it doesnt produce any
actionable information for defenders to use to effectively deal with the next set of application
specific obfuscations and file type complexities. At the end of finding that one new bug, the
investment is complete, and it only produced one small piece of actionable datathat the
bug exists. It didnt produce a better way to defend against the next one.
With the threat landscape as it is, we should focus our investments on finding the better
way to defend against the next bug. A dollar for dollar investment in reverse engineering
a file format trying to understand how it works, will pay out far higher dividends than
spending those same dollars looking for one bug. Locating better ways to break files down,
identify areas for obfuscation and evasion, and building agile defense technologies that
allow defenders to quickly build detections for next threat has a much higher ROI than
finding one individual bug. Stomping out one bug might help right now, but building a better
defensive understanding and framework for dealing with complex bugs pays out every time
a new bug shows up.
5
...The need for visibility in
network security is centered
around the cornerstone
of network security
accuracy.
quickly in a network of any material size. Automated vulnerability scanners, asset tracking
tools, or passive traffic monitoring to determine the networks assets allows technology to
do what technology does bestautomating menial tasks.
Gathering information is the first step in any well designed, decision-making process. Only
when we have ongoing visibility into the networks devices, operating systems, applications,
files and vulnerabilities, can we make informed decisions regarding whether traffic and
files are valid or malicious. This visibility can also be used to reduce unnecessary alerting
by correlating attacks to assets. For example, detecting attacks against resources that
do not exist or are not vulnerable to that specific attack is irrelevant and can easily be
eliminated from alert logs. Taken a step further, a thorough inventory of network assets can
allow for automation of security policy. Here, a completely customized policy evolves as
devices enter and exit the network.
The benefits of security with automated visibility are clear: reduced administrative
workload, improved accuracy, a reduction in alert logs, and more accurate reporting for
internal decisions and for compliance. The drawbacks of security without visibility are
real and will keep security solutions at least one step behind the well-organized and welleducated hacking groups threatening networks today.
Security isnt easy, and set it and forget it simply doesnt apply. Commitment and vigilance
is essential for continued success. The problem is that there is no finish line, just another
chance to see whats out there, learn the threats, adapt our defenses and act. During this
cyclical process we need to ensure we have all the information we need to be effective,
and understand that what we know now will be different by the end of this sentence.
In some industries, opacity doesnt matter as much. Understanding the detailed inner
workings of a washing machine is not critical to washing clothesunwashed clothes
and detergent go in; washed clothes come out. If the inputs and outputs of a system are
well understood, its not absolutely necessary to understand its inner workings in order to
determine whether its effective.
But in security, the inputs are not well understood. Security administrators dont know
every attack that could infect their files and traverse their networks; they dont know every
vulnerability in their systems. On their own, they have little idea which attacks might have
succeeded in spite of their security products.
Because of this lack of knowledge, its easy for a black box vendor to deceive the end
user. Black box vendors can assert nearly anything they want to about the extent of their
protection, because it is unverifiable. Vendors can claim coverage for every vulnerability
but in reality detect only a few exploits or nothing at all. Some black box solutions are the
security equivalent of patent medicinedubious remedies, supported by pseudoscientific
evidence, with exaggerated marketing. Like a magical elixir salesperson might claim
cures for cancer, arthritis, and sore throat, black box vendors give unrealistic hope to those
who are less informed about security.
Skeptical security administrators turn to third-party testing organizations, which test systems
with particular attack sets. The results can be informative, but some vendors write to the
test, adapting their solutions to block the narrow sets of attacks tested by particular tools
while ignoring the far larger threat space.
But a solution is available: the open security architecture. Security engines can be made
transparent so that their claims can be inspected. With a community of security users
and researchers inspecting the detection code, false detection claims will be called out.
Coverage will be verified and broadened by the community. Sourcefires Next-Generation
IPS and antivirus engines, Snort and ClamAV, are open and freely inspectable, along with
the rules used to perform their detection. Many other vendors reuse them in their security
products. The community can directly verify our detection and coverage for any attack.
Open architectures also mean interoperability and reuse. Many other vendors products
interoperate with ours through the use of the open eStreamer, Remediation, or Host Input
APIs. The Snort rules language is the standard IPS language, created by Sourcefire and
used throughout industry, government, and education.
Embracing openness requires moving up the maturity curve and trusting a process that
is open to scrutiny. Which leads to principle #7 of Sourcefires Agile Security Manifesto:
Beware of the black box. It is closed and hidden. Any system that does not give you full
visibility into how it works should be suspect.
We must adapt security technologies to match the current environment they protect. In
fact, if you are still forced to configure things manually and cant leverage automation to do
this for you, stop reading this now and go get started.
Before you think this is just another glass-ishalf-empty view of security today, consider the
successes adversaries are having targeting highly
controlled systems like satellites and military drone
aircraft. We can no longer argue that the socalled state-of-the-art security is good enough. However, the world today is even more
fundamentally challenged.
The real challenge springs from the belief that an ever-expanding and complicated set of
policies evolving on their own functional paths with the glue of compliance and event
management integrations will lead to better security. The reality is that enterprises can
make all of these investments in controls and still succumb to a targeted threat despite
their many policies. The adversary is well-versed in the tactics of enterprises and their
propensity towards the status quo.
Organizations today are struggling to reduce risk and maximize protection. They have a
firewall access policy, a Web Filtering policy, a DLP policy, a system/endpoint policy, etc.
All of these policies help to reduce the surface area for potential attacks, but they dont
stop attacks. The bad guys will find a way to get around policy controls (or, perhaps, already
have!).
Todays attackers are like antsno matter what you do, they will find a way in.
Enterprises and the security industry together need to adopt an agile frame of Enterprises
and the security industry together need to adopt an agile frame of mind. Security is not a
firewall; it is not policy; it is not checking the box. It is not one thing and cant be made to
be one thing. Its a suite of coordinated capabilities that are leveraged to minimize risk and
maximize protection while remaining responsive to the dynamic environment they serve.
Sourcefire has been focused on a holistic, agile approach to security for many years. By
delivering the worlds most flexible detection engine paired with innovations in awareness
10
technologies and centralized management Sourcefire security solutions let you see, in
real time, beyond mere policies and understand and adapt to what is truly going on in the
real world.
Principle #9 of the Sourcefire Agile Security Manifesto challenges us to ask: How do we
respond to changes? Are we relying only on policies to keep the ants out? How do we know
that we are really minimizing risk and maximizing protection beyond our policies?
10
The growth of available security-related data is far outpacing the number of security
analysts with the requisite skills to analyze it (not to mention the resourcing constraints a
security vendor may face). As a result, security analysts are drowning in data. There is
simply no way to examine this much data through manual methods.
We are seeing concrete evidence of this trend. For example, according to the latest Verizon
data breach report, organizations used their own event monitoring or log analysis tools
only 6% of the time to discover that they had been compromised. The report states: Many
smaller organizations do not have the awareness, aptitude, funding, or technical support to
[use these tools] with the sophistication of the threats they face even large businesses
seem to have a difficult time utilizing their investments for significant return.
11
Which leads us to principle #9 of the Agile Security Manifesto: Security is a Big Data
problem. The security industry, as a whole, needs automated tools that can analyze data
(including data generated by other tools) and provide actionable intelligence on the state of
threats to their customers information assets.
Fortunately, this demand for analyzing large security-related datasets has been met with
a supply of new readily available technologies that address these issues. For example,
Hadoop, an open source implementation of the Map Reduce framework for processing
massive amounts of data has been utilized in numerous industries such as social-media
analysis and targeted marketing. More recently, security was mentioned as a killer app
for Hadoop because it can use a divide and conquer strategy to automatically process
the growing amount of security data in an enterprise.
11
At the same time, it is important to keep in mind that Hadoop is only a tool and not a complete
solution in and of itself. In general, multiple tools and vendors are starting to emerge to form
an ecosystem. It is our hope that the IT security industry can contribute to forming a more
mature solution for security analysts to deal with their data deluge. Sourcefire is focusing
resources to this end.
Here is a typical example.. A sales employee has had issues with a company computer,
knew it was a virus (indicated by the endless browser pops), and chose to defer requesting
assistance because it would waste a day while the computer was being fixed. The sales
12
12
...Most often, the overriding
cause is that people just
want to do their job and
security stops them.
13
examine what it means to have an agile business organization? More importantly how can
we work to enable the agility of our business organization while continuing to ensure its
security posture?
Not too awfully long ago, it was generally accepted that to have a secure system one would
need to disconnect it from any type of network. Clearly thats not a practical approach, and
as the business world has become more and more dependent on network-based services,
the security community has had to adapt.
Another example is remote access. Early on, remote access was typically restricted to
IT personnel, giving them the ability to dial in and take care of any issue that may arise.
However, the business side saw an opportunity for productivity gains and the corporate
VPN was opened to the rest of the organization.
Lets face it, security is seen by the business as a cost center. In an effort to combat that
we often hear the stories of gloom and doom: It may seem like a lot now, but consider
what it will cost when XYZ happens. This approach just continues to add to animosity and
disconnect between business and security.
Imagine instead, taking the time to understand the business drivers of the company and
mapping value provided by good security, not just avoiding the cost of worst-case
scenarios.
We need to avoid the boogie man stories, and focus on how Agile Security can help
enable agile business.
14
CONCLUSION
2011 was one of the most damaging years in terms of security breaches. Information for
hundreds of millions of individuals may have been compromised. Most of todays security
approaches simply cant keep up with the continuous, rapid change in our IT environments
and threats we face. These approaches were designed for a different time when
environments were stable and slow to change.
The Sourcefire Agile Security Manifesto was developed to help provide a guidepost for
organizations and the security industry as we wrestle with the unprecedented security
challenges before us. These challenges are surmountable but will take a new approach,
one that is as dynamic as the real world it protects and the attackers it defends against.
These 12 principles form the foundation for a new way of thinking and addressing security,
not only protecting organizations but helping enable them to succeed in todays increasingly
competitive climate.
Authors: Jason Brvenik, Steve Kane, Jason Lamar, Dr. Zulfikar Ramzan, Martin Roesch,
Marc Solomon, Leon Ward
Sourcefire, the Sourcefire logo, Snort, the Snort and Pig logo, Agile Security and the Agile Security logo, ClamAV,
FireAMP, FirePOWER, FireSIGHT and certain other trademarks and logos are trademarks or registered trademarks
of Sourcefire, Inc. in the United States and other countries. Other company, product and service names may be
trademarks or service marks of others.
7.12 | REV1
15