Do you want to learn how to ‘Blue Team’​? Start with “Time Based Security”​.

Also available on LinkedIn

“We’ve been looking at security the wrong way […] Fortress Mentality insists that building tall electronic walls is how to keep the bad guys out. That method hasn’t worked for 5000 years of warfare, so why should it work for computer security? It can’t and it doesn’t.” — Winn Schwartau.

As much as I love to put my red hat on, as I always explain to my SANS students, pentesting or even red teaming, can become ‘boring’ over time (sorry guys), especially when you are brought into environments where all the organization wants is to have a green check for yearly compliance purposes, or simply to have one more report to ignore. And trust me, that happens more often than not.

That is why I am so happy to see how many security professionals, experienced or not, are making the shift, joining the blue team ranks to learn how to defend their crown jewels in a highly increasingly complex world where technology advances so fast, data is ubiquitous, networks become more opaque and endpoint devices are less trusted than ever.

If this is your goal, and you are willing to get into an exciting, high paced but also highly rewarding field, where learning never stops… welcome aboard! Now, where do you start? There are a plethora of resources out there on how to get started into pentesting, but it seems that it is not so easy to find good resources on how to become an effective cyber defender.

There are many resources I can recommend, but since dropping here a list of 100 links won’t probably help you much, let me recommend you a very easy and light reading to start with: “Time Based Security”. Though it was written in 1999, TBS is still one of the most relevant, effective and terribly simple security models you can apply today. The principles enumerated in this book are absolutely essential for any blue teamer, regardless of whether you are a CISO, a SOC analyst, a security architect or an incident responder. TBS provides a reproducible method to understand how much ‘security’ a product or technology provides, by answering:

  • How long are systems exposed?
  • How long before we detect a compromise?
  • How long before we respond?

While it is usually applied to auditing, TBS is a very practical model to assess and design security architectures too. The method proposed is very simple, but it provides you with the knowledge and the tools required to make systems more secure and resilient. Here’s the main idea:

“If it takes longer to detect and to respond to an intrusion than the amount of protection time afforded by the security measures, that is if P < D + R then effective security is impossible to achieve in this system. It should be becoming a little bit obvious that the choice of a good protection system is not the first thing you need to think about when designing a secure network environment. It’s the efficacy of the detection and reaction processes that really matters.”

If this wasn’t good enough, Winn allows you to download and read his book for free on his website, so please go and grab a free copy of “Time Based Security” now!

https://winnschwartau.com/wp-content/uploads/2019/06/TimeBasedSecurity.pdf

Want to learn more on #BlueTeam? If so, please let me know, and I will follow up this post with a series of articles on how to improve your cyber defense skills. In the meantime check out the series of webinars that Justin Henderson and I recorded here:

Defensible Security Architecture and Engineering – Part 1: How to become an All-Round Defender – the Secret Sauce

Defensible Security Architecture and Engineering – Part 2: Thinking Red, Acting Blue – Mindset & Actions

Defensible Security Architecture and Engineering – Part 3: Protect your Lunch Money – Keeping the Thieves at Bay

Getting SecOps Foundations Right with Techniques, Tactics, and Procedures Zero (TTP0)

TTP0 is a new community project created by SecOps (Security Operations) practitioners for SecOps practitioners. Just like a blueprint is required to design, build and operate any facility, TTP0 provides the starting point for building or assessing a security program from the ground up. It focuses on resetting the basics of a security program to ensure a solid foundation. SecOps requires a vision, strategy, and tactical abilities to guide the team and thought leadership to demonstrate effectiveness. Is this guidance a governance or regulation requirement, risks evaluation or leader preference? In this talk, Rob Gresham and Ismael Valenzuela will discuss how TTP0 provides the foundation from mission, vision and strategy to aid you in determining which technique is best for the organization, while focusing on individual tactical capabilities along with the procedures that synchronize operations with the business. Using a modular, Lego-based approach,  we will prove how TTP0 can provide the necessary building blocks to design, build and operate from a 2 man SOC team to a 1,000 person SOC entity!

Slides:


Intelligence Driven Defense: Successfully Embedding Cyber Threat Intel in Security Operations

“I thought all I had to do was show the data and people would understand. It doesn’t work. You have to tell a story” – Cliff Stoll.

Easier said than done, right? Being able to tell a compelling story that can answer key questions like: who is attacking us, what is their motivation, were they here before, how do they operate, what is the impact to our business, and will they come back, should be one of the ultimate goals of any effective blue team. However, being successful at embedding cyber threat intel in SecOps require something else: maintaining a solid understanding of the environment we are defending, as well as a systematic way to identify and prioritize applicable threats and assess impact, so we can respond appropriately to these attacks.

In this talk, Ismael Valenzuela, Certified SANS Instructor and GSE #132, will share lessons learned and practical tips on how blue teams can not only consume but also produce actionable and contextual threat intelligence using tools, processes, models and taxonomies that are available to the community.

Slides: