Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page212/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   208   209   210   211   212   213   214   215   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 255 of 425

of data analytics tools. This should be addressed by acquiring the necessary technological solution to maximise the use of NetFlow information.
736. With the necessary analytical tools, NetFlow can provide anomaly detection and investigative capabilities that can be used in incident response, for example, to uncover behaviour that may have been occurring over along period. When a security incident is being investigated, the flow database can be used to determine what IP addresses accessed a system, the times the system was accessed, as well as quantifying the impact on related systems that the host conversed with on the network, before and after the incident. Without automated analytics, trawling through huge volumes of flow-data would be nigh impossible to determine the actions of along term threat actor residing within a network, who may have been dribbling out stolen data over a prolonged period. Vivek emphasises that NetFlow alone is insufficient – in the context of traffic leaving the network perimeter, he stated that analytical intelligence needs to be applied to help determine if the outbound traffic is suspicious, and to determine if the data is indicative of beaconing by malware. Without this analytical ability,
NetFlow alone would result in an information overload.
737. However, it must be noted that NetFlow itself does not contain any content of the observed traffic. The Committee was informed that IHiS has begun efforts to enable NetFlow at routers and switches to collect traffic information for traffic profiling and intrusion detection, in particular, those relating to traffic moving laterally from server to server.
37.3 Effectiveness of current endpoint security measures must be
reviewed to fill gaps exploited by the attacker
738. Endpoint security protects desktops, laptops, servers etc. from malicious internal and external threats. As security technology becomes more sophisticated, so do attackers tools, tactics, and methods. Attackers are now adept at discovering the weak points in enterprise security strategy – and increasingly, endpoints are being targeted. However, asset classification is often still used as the means by which to prioritise risk, resulting in endpoints (assets of low priority



Download 5.91 Mb.

Share with your friends:
1   ...   208   209   210   211   212   213   214   215   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page