Endpoint Security Techniques

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Endpoint Security

Techniques
Modern Techniques vs. Traditionnel Techniques
 Anti-Virus solutions have been around for a while and are proven to be very effective against known threats.
There are a variety of foundational techniques that traditional endpoint protection solutions have relied on.
However, as the threat landscape has shifted, unknown threats, such as malware that has never been seen
before, have become more and more common.
Foundational Capabilities
 Anti-malware/antivirus: Signature-based detection of known malware. Malware engines should have the ability to
inspect not just executables but also other code such as malicious JavaScript found on
websites.

 Application lockdown : Preventing malicious behaviors of applications, like a weaponized Office document that
installs another application and runs it.

 Behavioral monitoring/Host : This foundational technology protects computers from unidentified viruses and suspicious
Intrusion Prevention behavior. It should include both pre-execution and runtime behavior analysis.
Systems (HIPS):

 Web protection URL lookup and blocking of known malicious websites. Blocked sites should include those
that may run JavaScript to perform cryptomining, and sites that harvest user authentication
credentials and other sensitive data.
Endpoint web filtering allows administrators to define which file types a user can download
 Web control
from the internet.
If an adversary is able to go unnoticed, DLP capabilities would be able to detect and prevent
 Data loss prevention (DLP): the last stage of some attacks, when the attacker is attempting to exfiltrate data. This is
achieved by monitoring a variety of sensitive data types.
Modern Capabilities
 Machine learning: There are multiple types of machine learning methods, including deep learning neural
networks, random forest, bayesian, and clustering. Regardless of the methodology,
machine learning malware detection engines should be built to detect both known and
unknown malware without relying on signatures. The advantage of machine learning is
that it can detect malware that has never been seen before, ideally increasing the overall
malware detection rate. Organizations should evaluate the detection rate, the false
positive rate, and the performance impact of machine learning-based solutions

 Anti-exploit: Anti-exploit technology is designed to deny attackers by preventing the tools and
techniques they rely on in the attack chain. For example, exploits like EternalBlue and
DoublePulsar were used to execute the NotPetya and WannaCry ransomware. Anti-exploit
technology stops the relatively small collection of techniques used to spread malware and
conduct attacks, warding off many zero-day attacks without having seen them previously

 Ransomware-specific: Some solutions contain techniques specifically designed to prevent the malicious
encryption of data by ransomware. Often ransomware specific techniques will also
remediate any impacted files. Ransomware solutions should not only stop file
ransomware, but also disk ransomware used in destructive wiper attacks that tamper
with the master boot record.
Modern Capabilities-Contd’
 Credential theft protection Technology designed to prevent the theft of authentication passwords and hash
information from memory, registry, and off the hard disk.

 Process protection (privilege Protection built to determine when a process has a privileged authentication token
escalation) inserted into it to elevate privileges as part of an active adversary attack. This should be
effective regardless of what vulnerability, known or unknown, was used to steal the
authentication token in the first place

 Process protection (code Prevents use of techniques such as code cave and AtomBombing often used by
cave): adversaries looking to take advantage of the presence of legitimate applications.
Adversaries can abuse these calls to get another process to execute their code.

 Endpoint detection and EDR solutions should be able to provide detailed information when hunting down
response (EDR): evasive threats, keeping IT security operations hygiene in excellent health and analyzing
detected incidents. It is important to match the size and skillset of your team with the
complexity and ease of use of the tool being considered. For example, selecting a
solution that provides detailed threat intelligence and guidance, making it quick and
easy to respond to a threat..
Modern Capabilities-Contd’
 Incident Endpoint tools should at a minimum provide insight into what has occurred to help avoid
response/Synchronized future incidents. Ideally, they would automatically respond to incidents, without a need for
Security analyst intervention, to stop threats from spreading or causing more damage. It is
important that incident response tools communicate with other endpoint security tools as
well as network security tools.

 Managed Threat Response MTR delivers 24/7 threat hunting, detection and response delivered by a team of experts
(MTR) as a fully managed service. Analysts should be able to respond to potential threats, look
for indicators of compromise and provide detailed analysis on events that took place,
where, when, how and why.

The ”power of the plus”: combining multiple techniques for comprehensive endpoint security.

You might also like