PDF

White Paper
Security in Financial Services: Protect Your Firm
from Zero-Day Threats
What You Will Learn
Acquiring effective tools and skilled workers to combat the ever-increasing number and sophistication of zero-day
threats and targeted attacks against financial services firms can add significant costs. This white paper provides an
overview of the threat landscape and the challenges faced by these firms as they seek to protect themselves from
®
cyber attacks. It then describes the features of Cisco Cloud Web Security Premium, the cloud-based security-asa-service solution available from Cisco that can help secure your organization from zero-day threats.
Overview
Banks and other financial institutions have long understood that cybercriminals are targeting them and have taken
steps to protect their data and systems. The New York State Department of Financial Services 2014 Report on
Cyber Security in the Banking Sector found that nearly 90 percent of the 154 institutions surveyed - from
community and regional institutions to large global ones - report having an information security framework in place.
The elements of the framework include policies, training and education, cyberrisk management and audits, incident
monitoring and reporting, and a combination of security tools.
Despite these efforts, cyber attacks on financial institutions are growing every day in strength and velocity across
the globe, and the ramifications are costly. The Carbanak attack discovered in early 2015, in which hackers
infiltrated more than 100 banks across 30 countries and stole as much as $1 billion over the course of two years, is
a recent and dramatic example. Just prior to that attack, another successful attack targeted 14 other financial firms.
According to the Ponemon 2014 Cost of Data Breach Study: Global Analysis, the financial services industry
bears one of the highest per capita data breach costs per company at $206 million - well over the mean value of
$145 million.
Financial services firms face a set of business dynamics that create significant security challenges. These include:
●
Mergers and acquisitions: With the 2008 recession now over, financial services firms are looking at
mergers and acquisitions with renewed focus as a way to expand their customer bases and respond to a
competitive and regulatory environment that favors scale. According to the KPMG 2015 M&A Outlook
Survey Report, the financial services industry is among those expected to dominate mergers and
acquisitions in 2015. Implementing standard security policies for the new integrated organization while
reducing the cost and time involved can be a challenge.
●
Roaming users: Though the financial industry has lagged behind other industries, it is quickly catching up
in allowing employees to work from home or in other remote locations. Providing employees with the option
to work remotely is sometimes a critical capability in attracting top talent. It is imperative to protect
employees and maintain security policies while they work out of the office.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 8
●
Complexity and fragmentation: The New York State Department of Financial Services 2014 Report
finds that a large majority of firms are using a combination of security tools. These include antivirus
software, spyware and malware detection, firewalls, server-based access control lists, intrusion detection
tools, intrusion prevention systems, vulnerability scanning tools, encryption for data in transit, encrypted
files, and data loss prevention tools. Costly and complex to integrate and manage, this patchwork of
solutions from too many vendors drives up management costs, or operational expenses (OpEx) and still
leaves security gaps.
●
Global talent shortage: An industrywide talent shortage compounds the challenge of maintaining a strong
security posture. For 2014, the worldwide shortage of security professionals is estimated at more than a
million, with 210,000 cybersecurity job openings in the United States alone, according to the 2015
Department of Labor. Chief information security officers (CISOs) struggle to attract and retain talent as the
competition for coveted security skill sets increases.
●
Advanced threat landscape: Today, the threat landscape is more dynamic and advanced than ever
before. According to the Cisco 2015 Annual Security Report, malware is becoming increasingly
sophisticated and elusive, and cybercriminals are launching attacks through a variety of attack vectors,
including tools that users trust or view as benign. Furthermore, targeted attacks are on the rise, creating a
persistent, hidden presence within an organization from which to execute their mission.
Financial Services Threat Landscape
Cybercriminals don’t discriminate when it comes to industry. Financial institutions around the world are subject to
malware, phishing, ATM skimming, and distributed-denial-of-service attacks, with the most serious information
losses coming from targeted attacks. Today’s threats change with time, evading detection by point-in-time
solutions. To combat today’s advanced attacks, financial firms need a threat-centric approach to security that
provides continuous protection not just before an attack happens but also during and after an attacker or malware
penetrates the network.
For an attacker, privileged account access is the proverbial payload. Account access provides powerful controls to
IT administrators and restricted user groups. According to the top global threat investigation firms that contributed
to a Federal Bureau of Investigation report, at least 80 percent of all serious security incidents investigated include
compromises and misused privileged accounts at some point in the attack lifecycle. With privileged access,
attackers can move laterally to other systems faster and easier and with little risk of detection, persisting for months
or even years.
Gaining access to privileged accounts can be accomplished in a number of ways, including malvertising, watering
holes, and phishing.
●
In malvertising, online advertising is used to spread malware. Victims are infected with malware in the
course of their normal Internet browsing: for example, reading a trusted news source online. Malware can
be downloaded without the user even clicking the advertisement.
●
In the case of watering hole attacks, attackers use specific industry-related websites to deliver malware. For
financial services firms these could be websites that employees check frequently for financial or regulatory
data.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 2 of 8
●
Phishing attacks combine spam and social engineering to create emails that appear to be legitimate in an
attempt to gather personal or financial information from the recipient. An example of a phishing attack could
involve an executive who delivers a keynote address at a conference. A savvy attacker sends the executive
an email claiming to have a video of the address and to click the link to view it. When the link doesn’t work,
it directs the executive to update a driver that appears to be benign but in reality contains malware.
Other examples of attacks targeting the financial services industry are shown in Table 1.
Table 1.
Attacks Common to the Financial Services Industry
Attack
Description
Cisco Talos Threat Research Analysis
Zeus
Steals passwords from privileged access users by hijacking
web browsers.
Reported in CNET article on Zeus Trojan
String of Paerls
Exploits a feature within Microsoft Word email attachments
in order to download malware from Dropbox.
Cisco Security blog post: “Threat Spotlight: A String of
‘Paerls,’ Part One”
Regin
Highly sophisticated malware with a multistage architecture
that, once fully installed, contacts a command-and-control
server and exfiltrates user data, such as keystrokes and
screen shots.
Cisco Talos blog post: “Cisco Coverage for ‘Regin’
Campaign”
Dridex
Email campaigns that trick users into installing malicious
software on their systems. It disguises itself as a Microsoft
Office macro and then steals online banking credentials
when the user accesses her banking site.
Cisco Talos blog post: “Dridex Is Back, Then It’s Gone
Again”
Depository Trust & Clearing Corporation (DTCC) for the third quarter of 2014 found that 84 percent of financial
firms ranked cyberrisk as one of their top five concerns, up from 59 percent in the first quarter. Close to 40 percent
of financial firms say the probability of a “high-impact event” on the global financial system has intensified in the
past six months and more than 75 percent have added more resources to detecting and mitigating “systemic risks”
over the past year.
Finance Network Infrastructure and Security Challenges
CISOs are chartered with making security a business enabler. However, a global talent shortage, a complex and
fragmented set of security tools, and a network infrastructure that can contribute to security gaps can make this a
difficult challenge.
Here are just a few aspects of the typical financial services industry network infrastructure that can present security
challenges:
●
Many times, for branch office networks, the security and access policies for user groups are extended to
mirror the policies in headquarters. All traffic is then sent back, or “backhauled” to headquarters. This drives
up latency and bandwidth costs.
●
Large amounts of M&A activities bring new locations into the corporate infrastructure. In the case of rightsizing, when organizations undergo organizational changes (which are common in the case of M&A)
networks and user groups needs to be adjusted to account for the changing user base. At the same time,
policies need to remain consistent. This constant atmosphere of churn in network provisioning creates
additional complexity and requires additional management, taking critical resources away from threat
identification activities.
●
Data privacy requirements vary by geography and global financial institutions must be able to set global
security policies that can be adapted by region. Further, organizations must be able to anonymize data used
in security reporting.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 3 of 8
●
Many financial services firms are underserved by point-in-time security solutions that lack the network
visibility and integration necessary to detect complex zero-day threats. Security professionals, already
understaffed, are stretched too thin as they must manage a myriad of disparate solutions.
Cisco Cloud Web Security: Low Maintenance and Zero-Day Advanced Threat Protection
Cisco has developed a cloud solution that administers and controls network usage in ways that can prevent threats
and block malicious activities. Furthermore, Cisco can block zero-day threats and identify breaches that have
already occurred, while at the same time lowering the amount of management and maintenance required.
Five specific features work together to combat zero-day threats, on top of Cisco Cloud Web Security (CWS) web
filtering and application control features. They include:
●
Talos Security Intelligence and Research Group
●
Outbreak intelligence
●
Application Visibility and Control
●
Cisco Advanced Malware Protection (AMP)
●
Cognitive Threat Analytics (CTA)
Outbreak intelligence is a CWS feature that scans the different components of a website for those components that
behave in a way that might indicate the existence of malware. If an object does not conform to a known or
expected behavior, CWS runs the component through a real-time heuristic analysis to see how it behaves in a
controlled environment. From this analysis, outbreak intelligence identifies malicious behavior before the
information is served to the user. If the webpage component is identified as malicious, the user is still served the
web page - minus the part that contained the malware. Figure 1 shows an example of a webpage where individual
malicious components have been blocked and the harmless parts of the page have been allowed.
Figure 1.
How Outbreak Intelligence Blocks Malicious Components of a Webpage
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 4 of 8
Outbreak intelligence complements Application Visibility and Control (AVC), which allows for setting policies as
specific as which applications or which parts of social media sites users can access. Activities and actions on web
applications can also be controlled based on policies.
Cisco AMP is the industry’s only retrospective security solution, and it can help stop a zero-day threat once it has
breached the network. The AMP File Retrospection feature tracks the spread of any file within the environment and
monitors the disposition of the file over time. If AMP File Sandboxing or Talos determines a file to be malicious, file
retrospection can instantly identify every instance of the file within the environment. File retrospection addresses
the problem of malicious files passing through perimeter defenses that are later deemed to be a threat, providing a
way to detect and defeat them. It combats polymorphism, obfuscation, sleep timers, and other highly effective
tactics that avoid initial detection.
Figure 2.
Cisco Cloud Web Security Features
Extending the capabilities of AMP, CTA identifies security breaches by using behavior analysis, machine learning,
and anomaly detection. Once this capability is engaged, it discovers threats on its own. CTA excels where other
zero-day threat detection methods might fail because it uses analysis over time to figure out what an abnormal
event might actually look like in a network. Its big data capabilities also allow it to identify smaller incidents from
discrete attacks that can add up to inflict big damage on an organization. CTA takes advantage of the incredible
processing power of the cloud to input and analyze data continuously, from all traffic, and from all users. It
processes 7.5 million requests every minute from around the world.
Both outbreak intelligence and CTA use the cloud to add an element of computation through smart and resourceheavy engines. However, just because CWS Premium boosts processing power, this does not mean that it has to
displace appliances already in place within an organization. As shown in Figure 2, CWS Premium can be deployed
with multiple products, like the Cisco Adaptive Security Appliance (ASA) firewalls, Cisco Web Security Appliance
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 5 of 8
®
(WSA), Cisco Integrated Services Routers Generation 2 (ISR G2) or the Cisco AnyConnect client. It can also be
deployed through a standalone traffic redirection method.
Talos is Cisco’s threat detection network, administering 4.2 billion web filtering blocks per day across the Cisco
security portfolio. It automatically updates CWS Premium with real-time threat information. Talos provides a
24-hour view into global traffic activity, helping Cisco to analyze anomalies, uncover new threats, and track traffic
trends. It monitors 35 percent of the world’s email traffic and gathers information and context from 1.6 million
sensors and 150 million endpoints. With all of this data collection, Talos processes 100 TB of data on a daily basis.
In addition to helping financial services firms effectively deal with advanced attacks, CWS helps institutions
overcome many of the security challenges that business dynamics create. For example:
●
By redirecting traffic through AnyConnect, CWS Premium offers endpoint protection for roaming users.
●
Redirecting traffic to CWS Premium provides a simple solution to overcome the challenges associated with
backhauling traffic. Instead of traffic going to headquarters for security analysis, it goes directly to the cloud
and CWS Premium.
●
CWS Premium can decrease the number of security personnel required during the deployment and
management of the solution through a singular management and reporting capability. The administrator can
set policies and gather reports from one interface. Policies can be set to anonymize user information
displayed in reports, addressing data privacy requirements.
●
For right-sizing and M&A situations, policies can be set once and applied across multiple locations. Policies
and reporting can even be synchronized between CWS and Cisco WSA, allowing for easy policy control
and reporting.
●
CWS Premium has features that protect an organization before, during, and after an attack. Point-in-time
solutions can protect only before an attack, and they become useless if a large number of discrete zero-day
attacks successfully penetrate the network.
How Cisco CWS Can Help a Financial Services Firm
This real-world example shows how Cisco CWS can protect a financial services firm from today’s threat landscape.
Laurent, a CISO for a large financial services company in France, is disconcerted by the recent news regarding
security breaches in the retail industry. His company is looking to make a significant, strategic acquisition of a
company in England, and Laurent expects that his network will eventually be compromised. He has a small
security team, and labor laws make it difficult for Laurent to scale his team up or down in a short period of time. He
also does not have the budget to hire more help, but he needs a larger team in order to complete the network
integration in good time. With the support of the CEO, he decides to use the acquisition as an opportunity to create
an innovative security strategy.
After working with his Cisco account representative, Laurent decides to purchase the following Cisco solutions:
●
Cisco Migration Services
●
Cisco Identity Services Engine
●
Cisco Cloud Web Security Premium
●
Cisco AnyConnect (for the branch office only)
He currently has the following Cisco products installed at headquarters:
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 6 of 8
●
Cisco Web Security Appliance
●
Cisco AnyConnect
Cisco Migration Services provide the CISO with the focused support and guidance needed to implement the new
architecture. This means planning and building the right capabilities at headquarters to manage the employees
coming onto the network from the acquisition. Cisco Services professionals develop and implement a plan,
incorporating both Cisco and third-party products.
Cisco Migration Services are especially important in the implementation of the Cisco Identity Services Engine
(ISE), helping to extend highly secure access to the new employees and see that the right people have access to
the right data within the organization. Since Cisco ISE supports multiple Active Directory forests, it can designate
and safeguard access based on Active Directory groups.
At headquarters, content security is already provided by the Cisco WSA, and AnyConnect is the VPN client. The
CISO decides to purchase AnyConnect for the new branch office. He uses AnyConnect as the primary redirection
method for Cisco CWS Premium, which he will deploy both at headquarters and branch offices. Through CWS
Premium in both locations, he can protect roaming users and extend CTA coverage. Knowing that his organization
will eventually be compromised, Laurent is willing to move heavy processing to the cloud in order to be better
equipped to detect zero-day threats. Redirecting traffic to CWS through AnyConnect protects browsing traffic for
roaming users through an SSL tunnel to the cloud proxy, relieving the organization of the need for a full tunnel VPN
on roaming user browser traffic. Together, AnyConnect and Cisco ISE also allow for posture checks on endpoints,
providing even more detailed visibility into users on the network.
CWS Premium brings the CISO a “postbreach” view on existing web traffic data, of which he previously would not
have visibility. Furthermore, he gains this visibility with no extra effort on the IT operations side. As shown in the
CTA portal in Figure 3, within one month of the new security installation, CTA provides a report of a zero-day
breach affecting eight current users. The CISO’s team shows him that more than 100 users in more than 50
companies have been affected by this attack, so the threat is industrywide. Thanks to the early detection, he
immediately remediates the issue on the eight users within his company affected in the last forty-five days by
reimaging their devices. The Cisco Migration team has already fulfilled its purpose and the CISO’s own security
team is now handling day-to-day security policy management and reporting. Meanwhile, Cisco ISE is delivering
visibility, context, and dynamic control of network access policy as the organization continues to grow through new
acquisitions.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 7 of 8
Figure 3.
Cisco CTA Portal
Expanding his current deployment of Cisco products with additional Cisco security products and services, the CISO
is able to address the challenges of delivering consistent security as the organization expands to include the newly
acquired firm, providing highly secure access for remote workers, and protecting against zero-day threats, all
without hiring additional staff.
Conclusion
Financial services firms can combat zero-day threats with the powerful cloud-operated big data analysis available
with Cisco CWS Premium. Furthermore, they can lower operating expenses while overcoming business challenges
like supporting roaming users, mergers and acquisitions, branch office bandwidth requirements, policy consistency,
and reporting mandates. Acknowledged as a leader in the network security market by Gartner, Cisco CWS offers a
smart way not only to provide the highest quality of security but to make security a business enabler with low
operating and management costs as well.
For More Information
For more information, visit http://cisco.com/go/cws.
Printed in USA
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
C11-734318-02
3/16
Page 8 of 8