Back to Resources

Profiling organisation - FAIR Analysis - post by Denny Wan, Chair of the Sydney Local Chapter

Video with Slides

uc4xle6cbg97

Profiling organisation - FAIR Analysis
By Denny Wan, peer reviewed by Gabriel Bassett and Wade Baker
*Download the original document at the bottom.

The Open Group FAIR cyber risk quantification framework aims to create a common risk language that all can understand across an organisation. A common understanding is essential for targeting cyber security investments. This article explains how to use real-world breach data from the VERIS Community database and Verizon Data Breach Investigations Report (DBIR) to model organisation risk profile to be used in the FAIR analysis.

The six-phase FAIR analysis process begins with a realistic modelling of the risk scenario:

fm9o2mfb647c

Figure 1: 6 phases of the FAIR analysis process. Source: The FAIR book

The Verizon Data Breach Investigations Report (DBIR) provides a fact-based analysis of attack patterns based on a review of the reported data breaches. Unlike other risk analysis reports drawing on insights from surveys of business executives or cyber risk professionals and experts from vendors who claim to have a crystal ball of the future, the DBIR tracks the year-on-year trend in historical cyber attacks.

InfoSec Golf course

DBIR used the analogy of a golfer navigating a golf course to explain how an adversary launches their attacks. The course creator builds sand traps and water hazards along the way to make life difficult. Additional steps, such as the length of grass in the rough and even the pin placement on the green can raise the stroke average for a given hole. These defences and mitigations are put in place to deter, detect, and defend. And just like on the golf course, the attackers reach into their bag, pull out their iron, in the form of a threat action, and do everything they can to land on the fairway. But this is where the similarity ends. The report observed that:

"The first thing to know is that unlike a golfer who graciously paces all the way back to the tees to take his or her first shot, your attackers won’t be anywhere near as courteous. In Figure 29 we see that attack paths are much more likely to be short than long. And why not, if you’re not following the rules (and which attackers do?) why hit from the tees unless you absolutely have to? Just place your ball right there on the green and tap it in for a birdie or a double eagle, as the case may be."
(DBIR 2019)

This is an unfair advantage when an attacker does not need to play by the rules. Figure 2 shows the number of attacks steps in the data breaches investigated in the DBIR 2019 report.

jf1oton6qlhk

Figure 2: Number of steps per incident (n=1,285) Short attack paths are much more common than long attack paths. Source: DBIR 2019 report.

The composition of these steps, the attack chains, were extracted and plotted in the form of colour-coded trails shown in figure 3. It displays the number of events and threat actions in the attack chains, by the last attribute affected.

77ol6qzcwm88

Figure 3: Attack chain by final attribute compromised (n=941) Source: DBIR 2019 report

Know your enemy

Identifying the threat communities and threat actors are foundational steps in the FAIR scenario development phase. It is to inform the analysis on:
1. Who might launch the attack - cyber-criminals, national-states, insiders?
2. The motivation for the attack - financial gain, espionage, innocent mistakes?

Table 1 is a sample analysis of these FAIR factors from the FAIR Book:

dmojx53no8jn

Table 1: Quantified threat factors for the risk associated with the reduction in authentication strength for external website X. Source: FAIR Book

Figure 4 displays a high-level summary from the DBIR 2019 report on the identity of the threat actors and their motives. It shows a worrying trend of the rise in state-sponsored espionage which is difficult to defend give their massive available resources and sophisticated attack methods.

5xv3pihcju6r

Figure 4: Summary of threat actors and motives in DBIR 2019. Source: DBIR 2019 report

The approach to use fact-based analysis to profile organisation risk underpinned Wade Baker's PhD dissertation "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains". Table 2 is the risk profile of the organisations modelled in his research based on this approach. It shows the distribution of breach types against five industry types based on an in-depth investigation of nearly 1000 real-world data breaches occurring over a ten-year period.

vvee2te9f2yr

Table 2 - Summary of breach types by industry. Source: Wade Baker PhD dissertation

Wade created and led Verizon's annual Data Breach Investigations Report effort while he was the Managing Director and CTO of Verizon Enterprise Solutions. Chapter 5 in Wade's PhD dissertation explained the rationale and development of the A4 data incident recording model (Actors, Actions, Assets and Attributes) expressed in the A4 Grid model format underpinning the VERIS schema.

VERIS - a community effort

VERIS is the vocabulary for event recording and incident sharing created by the DBIR team which underpins the analysis and publication of DBIR. The VERIS community database contains 8000+ incidents and is increasing daily thanks to an effort by the Verizon Security Research team members such as Gabriel Bassett and other volunteers:

24b3dcj9v1wj

It is a far cry from the DBIR 2019 corpus covering 41,686 security incidents, of which 2,013 were confirmed data breaches. But it is a very useful resource to learn the VERIS schema and understand the analysis methodology behind DBIR. The verisr toolchain, maintained by Gabriel is designed specifically to perform R analysis against the VERIS schema.

To put the DBIR 2019 report in the Australian context, Gabriel has kindly extracted VERIS attributes related to confidentiality, integrity and availability for Australian victim organisations. The results are summarised in figure 5:
1. 1905 incidents attributed to Australian victim organisations
2. Credentials and payment records were the prime attack targets
3. Malware and phishing attacks were most common
4. Ransomware was the most common cause of loss of availability

17ej41pv7ypa

Figure 5: DBIR 2019 data set for Australian victim organisations. Source: DBIR 2019 data set

The best way to understand the DBIR analysis is to contribute to the VERIS community database by encoding data breach incidents using the VERIS webapp. VERIS schema definition for attributes (http://veriscommunity.net/enums.html#section-attributes). Gabrial is running weekly VCDB coding sessions on the VERIS webapp tool via his twitch TV channel and republishes the lessons through his YouTube channel. It is a community effort!

In summary, the DBIR is a good source of information to model an organisation cyber risk profile when developing a scenario for FAIR analysis. It identifies the profile of the attackers and their motives targeting an industry sector. Practising risk analysis using the VERIS community (VCDB) database deepens this understanding.

Download Now