Grant McDonald – BMC Software | Blogs https://s7280.pcdn.co Fri, 20 Oct 2023 10:05:13 +0000 en-US hourly 1 https://s7280.pcdn.co/wp-content/uploads/2016/04/bmc_favicon-300x300-36x36.png Grant McDonald – BMC Software | Blogs https://s7280.pcdn.co 32 32 Get 360-Degree Enterprise Visibility with BMC AMI Datastream for Ops and BMC AMI Ops https://s7280.pcdn.co/mainframe-operations-splunk-ami-datastream-for-ops/ Tue, 15 Feb 2022 14:11:21 +0000 https://www.bmc.com/blogs/?p=51716 Operations teams play a critical role in digital business success. By monitoring systems, identifying issues, and fixing problems, they help meet the expectations of both internal and external customers for the reliable performance, availability, and security of critical applications and services. To do this effectively, ops teams need visibility to what’s happening in the technology […]]]>

Operations teams play a critical role in digital business success. By monitoring systems, identifying issues, and fixing problems, they help meet the expectations of both internal and external customers for the reliable performance, availability, and security of critical applications and services. To do this effectively, ops teams need visibility to what’s happening in the technology environment—something that today’s complex, interdependent systems make more challenging every day.

BMC AMI Ops solutions provide AI-powered observability and actionable insights to help mainframe teams find and fix problems, solve complex issues, respond to potential security incidents, and increase operational resiliency across mainframe systems. However, the mainframe doesn’t operate in isolation from the rest of the IT environment. A common challenge faced by mainframe organizations is integrating mainframe data into the enterprise in a way that is useful for all stakeholders. To help BMC AMI Ops customers accomplish this, BMC has released a new data connector specific for BMC AMI Ops and Splunk called BMC AMI Datastream for Ops.

The BMC AMI Datastream for Ops solution works with BMC AMI Ops to integrate operational data into a broader enterprise context—helping operations teams across both mainframe and distributed platforms keep services and applications running at optimal performance. Through integration with enterprise analytics platforms such as Splunk, organizations can ingest and analyze all critical operations data, including mainframe, in one place while leveraging their chosen analytics platform.

Breaking the mainframe out of its silo for enterprise-wide analytics

In recent years, enterprise analytics solutions have helped IT teams translate system data into actionable insights faster and more accurately than ever before. These tools can have transformative value, identifying and troubleshooting performance issues in real time—but they can only work with the data available to them. If your mainframe data is stuck in a silo, you’re leaving out a critical part of your digital environment. Now BMC AMI Datastream for Ops enables you to stream operational data from your mainframe to your analytics engine for 360-degree visibility and insight across all your systems through a single pane of glass.

Jumping from tool to tool for different platforms can slow troubleshooting and obscure understanding. By bringing the mainframe data captured by BMC AMI Ops into a central repository alongside distributed and cloud platform data, operations teams can take a unified approach to understand and fix performance problems. Operational data can be viewed in full context, while analysts can leverage rich dashboards, visualizations, ticketing, and alerting capabilities normally unavailable to mainframe data.

As the enterprise mainframe further demonstrates its role as the engine of digital business, the BMC AMI portfolio helps organizations deliver better services faster and with greater resilience and security. By adding BMC AMI Datastream for Ops to your existing BMC AMI Ops solution, you can leverage the full power of modern analytics for optimal performance and availability across the enterprise.

Get the full details on BMC AMI Datastream for Ops in our datasheet—and integrate your mainframe into your performance analytics environment.

]]>
The MITRE ATT&CK Framework Explained https://www.bmc.com/blogs/mitre-attack-framework/ Fri, 12 Mar 2021 13:25:45 +0000 https://www.bmc.com/blogs/?p=20410 The MITRE ATT&ACK framework is a free, globally-accessible resource that can help guide organizations through assumed security breach incidents—and it can shift the organizational culture around risk management. The MITRE ATT&CK framework is based on documented knowledge around: Adversary/attacker behaviors Threat models Techniques Mitigation tactics The idea is that by understanding the myriad ways that […]]]>

The MITRE ATT&ACK framework is a free, globally-accessible resource that can help guide organizations through assumed security breach incidents—and it can shift the organizational culture around risk management.

The MITRE ATT&CK framework is based on documented knowledge around:

  • Adversary/attacker behaviors
  • Threat models
  • Techniques
  • Mitigation tactics

The idea is that by understanding the myriad ways that attackers actually attack, organizations can better prepare for the risks.

In this article, we will discuss what the MITRE ATT&CK Framework is and how the framework can support your security initiatives.

What is the MITRE ATT&CK framework?

MITRE ATT&CKThe ATT&CK framework provides the attacker perspective on each stage of the cyberattack lifecycle, from end to end.

MITRE ATT&CK was developed by the non-profit organization MITRE in 2013 as a community-led initiative. Its name derives from the acronym for Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK).

The concept—using an end-to-end cyberattack taxonomy as a reference to gain intruder perspective—is not new. (The Lockheed Martin Cyber Kill Chain is another popular framework to model and understand attacker behavior.)

Previously, such extensive information was only available in two ways:

  • Through expert cybersecurity incident responders with vast experience.
  • As classified documentation in large enterprises regularly addressing Advanced Persistent Threats (APTs) with a dedicated, internal security workforce.

But the ATT&CK framework is unique for the way it drills down into the various attack techniques and procedures used in specific examples, suggesting appropriate mitigation strategies and standardizing language. So, the value proposition of using the MITRE ATT&CK framework has three key points:

  1. In-depth real-life examples of relevant and appropriate adversary behaviors
  2. Environment-specific attack techniques and methods
  3. Standardized language for various attacker methodologies

The framework enables visibility and access, enabling cybersecurity personnel to identify and react to a variety of cybersecurity risks with the right risk management approach. The ATT&CK framework covers several cybersecurity disciplines, including:

  • Detection
  • Intelligence
  • Containment
  • Risk management
  • Security engineering

 

The MITRE ATT&CK framework covers mobile, enterprise (cloud), and pre-exploit stages for a variety of cybersecurity disciplines, including:

Who can use the ATT&CK framework?

In terms of who uses this framework, the knowledge can help guide any organization, be it private, non-profit, or government.

The MITRE ATT&CK framework has supports for both mobile and enterprise environments. The true separation, though, is by operating system. The currently supported operating systems are:

  • Enterprise: PRE, Windows, macOS, Linux, Cloud & Network
  • Mobile: Android & iOS

Other operating systems, including z/OS, aren’t available but may be added in the future.

The ATT&CK Matrix for Enterprise

The ATT&CK Matrix categorizes various tactics that adversaries use across different stages of the attack. Think of the matrix as a reference spreadsheet that describes how these techniques can accomplish a specific task or goal across the various stages of an attack.

What follows are the 14 categories of enterprise tactics across the attack lifecycle. We’ve included a few examples, though the full matrix categories offer comprehensive techniques.

MITRE ATT&CK matrix for enterprise

Reconnaissance (10 techniques)

The first step of the attacker lifecycle is collecting information to facilitate targeting. Example techniques the attackers might use here include:

  • Active scanning
  • Phishing
  • Gathering victim-related information

Resource Development (6 techniques)

In the resource development phase, the adversary establishes resources and capabilities necessary to execute a cyberattack. Some techniques here include:

  • Acquiring and/or compromising infrastructure
  • Compromising or establishing accounts
  • Developing capabilities

Initial Access (9 techniques)

This stage is about the adversary’s initial attempts to access an IT network. Common techniques to gain foothold within the network, such as:

  • Drive-by compromise
  • Spearphishing
  • Exploiting external remote services and weak passwords

Attackers can use these compromised accounts and vulnerabilities to execute wider attacks later.

Execution (10 techniques)

In the execution phase, adversaries run malicious code on the target network. They may do this by compromising built-in scripting environments and interpreters to run custom code for network exploration, stealing data and credentials.

Common target interpreters include:

  • PowerShell, Windows Command Shell and Unix Shell
  • Python and JavaScript installations

Persistence (18 techniques)

Here, the adversary tries to maintain a foothold and evade defense attempts.

Once a code script is executed, the adversaries can prevent defensive actions (from your organization) that would interrupt the attack lifecycle. These interruptions may be caused by system restarts, credential changes, and configuration resets.

Adversaries persist using techniques such as:

  • Manipulating accounts
  • Modifying SSH authentication keys, authentication packages, services, and registry weaknesses

Privilege Escalation (12 techniques)

Privilege escalation occurs when the attackers obtain access to elevated permissions in the network, such as root and admin access privileges. Techniques include:

  • Sudo caching
  • Bypassing user access controls
  • Port monitoring

Defense Evasion (37 techniques)

Now, the adversaries avoid detection by disabling or uninstalling security systems and scripts. They masquerade malicious activities under known and trusted processes that go under the radar, subverting potential defenses.

Common techniques in this phase include:

  • Abuse elevation control mechanism
  • Elevated execution
  • Token impersonation

Credential Access (15 techniques)

Credential access is the stage when attackers steal account credentials.

Attackers use techniques like keylogging, brute force, password cracking—even guessing—to access systems and approve rogue accounts within the network.

Discovery (25 techniques)

Adversaries discover the wider network and understand which entry points and corresponding network environments are most suitable for their objectives post-compromise.

Examples here include:

  • Accounts discovery
  • Infrastructure and cloud service discovery
  • Network sniffing
  • Policy and permission groups discovery

Lateral Movement (9 techniques)

In this stage, the adversaries move laterally across the network environment, pivoting between systems and accounts for stealthier operations. The process involves compromising more legitimate credentials as well as network and default OS tools.

Techniques include:

  • Internal spearphishing
  • Remote service exploitation
  • SSH hijacking

Collection (17 techniques)

Adversaries gather information and sources necessary to steal and exfiltrate data, including but certainly not limited to emails, keyboard input, databases, and archives.

Command & Control (16 techniques)

At this stage, the attackers control the network and systems with various levels of stealth. The systems act upon commands from the adversary and mimic normal network behavior to avoid possible detection.

The attackers communicate the commands using:

  • Existing application layer protocols
  • Data encoding
  • Data obfuscation
  • Multi-stage channels

Exfiltration (9 techniques)

In this phase, the attackers finally exfiltrate relevant data from the compromised network. The data is often compressed and encrypted before transferring it outside the network.

Common techniques in this phase include:

  • Automated exfiltration
  • Exfiltration over web services or physical medium

Impact (13 techniques)

The attack lifecycle ends with manipulating, disrupting, or destroying compromised systems, network components, accounts, and data. Techniques in this stage can include:

  • Account access removal
  • Data destruction
  • Data encryption and manipulation
  • Disk wipes
  • Denial of Service attacks on the network
  • Resource hijacking

MITRE ATT&CK and the mainframe

Although the ATT&CK matrix doesn’t yet include the mainframe, organizations can leverage the framework’s knowledge of behaviors. The mainframe is like any other system in your environment—it is susceptible to attacks from within and outside your perimeter. The behaviors and methods of attackers share many characteristics, no matter the system they are attempting to compromise.

By being aware of these behaviors and methods, you can harden your defenses and determine when a potential threat event should be rapidly investigated by your operations and security teams.

(Learn how a truly self-managing mainframe is possible.)

Related reading

]]>
The Silent Security Threat to Financial Services Companies https://www.bmc.com/blogs/the-silent-security-threat-to-financial-services-companies/ Mon, 18 May 2020 00:00:24 +0000 https://www.bmc.com/blogs/?p=17469 Some of the most security-minded people I’ve met are CIOs, CISOs, or Security Operations people in the Financial Services industry. Some even border on paranoia as the high-profile breaches and bad press banks receive drive their CEOs to put more pressure on their Security Operations Centers to report and demonstrate security and compliance. The sad […]]]>

Some of the most security-minded people I’ve met are CIOs, CISOs, or Security Operations people in the Financial Services industry. Some even border on paranoia as the high-profile breaches and bad press banks receive drive their CEOs to put more pressure on their Security Operations Centers to report and demonstrate security and compliance.

The sad reality is that there is a danger lurking in the back corners of many of these companies that is decades in the making – the mainframe. The supposedly inherently secure box that processes millions of bank transfers, ATM transactions, and payments every hour can be hacked in a few minutes with open-source tools. With just a few scripts an attacker can escalate their privileges to super user status and a motivated person will have complete control of the machine and can do pretty much whatever they want. While many think accessing the mainframe is limited, the reality is any threat actor inside the network can make their way to the mainframe and the mainframe is accessed remotely in financial transactions all the time. It happens at your local bank every day.

Hopefully by now you’re scratching your head and asking, “Okay, so if I believe what you’re saying, what is the answer? How do I secure the mainframe like all my other endpoints?” The answer is visibility, integration, and mainframe hardening. Real-time monitoring that is integrated with your existing SIEM allows you to set alerts when scenarios like those above happen. Someone’s privileges mysteriously changed? Someone suddenly accessed data they shouldn’t on the mainframe? Now you’ll know the minute it happens.

What if you’d rather lock down your mainframe before that happens? This is where mainframe hardening comes into play. The mainframe can (and should) be penetration-tested (pentested) like the rest of your environment. The results will tell you exactly where you are vulnerable and how to change your policies to harden the mainframe from those vulnerabilities. Don’t have the expertise in-house to do that? Consider leveraging a professional or managed service provider with the expertise to perform the pentest for you. But be aware that not all auditing and pentesting resources are the same. Some lack expertise specific to the risks Financial Services firms are facing while others are concerned only with helping you check a compliance box and not uncovering your risks. It’s a good idea to learn more about the types of customers they service and how extensive their testing is.

If you want to learn more about the mainframe security risks facing Financial Services organizations, take a look at this infographic “Why Mainframe Security Matters for Financial Services Firms

Related reading

]]>