The Evolving Role of the CISO all-round security governance, a noteworthy change. In an already volatile, uncertain, and complex world, executive management must be vigi- Whom does the CISO report to? lant, continuously reviewing cyber risks and preparedness measures. The effects of recent Our survey analysis gathered that a majority cyber breaches have landed at the doorways of (46%) of CISOs reported to the CIO; however, executive ownership. With leadership becoming 14% reported directly to the CEO, and 12% accountable for any cyber incident, the spot- reported to the COO, a sizable shift. Figure 29 light has turned to the role of the CISO, whose highlights the reporting structures of the CISO widening responsibilities are moving toward globally by sector. HLS 20% 40% 60% 80% 100% MFG BFSI COMMS ENU CBU TECH 0% CIO CEO COO Others FIGURE 29 [ CISO reporting by vertical ] No template for the CISO reporting structure exists for all organizations to leverage. Multiple factors, such as business goals, risks in the industry, organizational culture, and business unit diversity, need to be considered for CISO positioning. Most importantly, the evolving role should align enterprise risk priorities to business goals. WIPRO STATE OF CYBERSECURITY REPORT | 51
Ownership of Data Privacy work with regulatory authorities to report their compliance. In the earlier State of Attacks,Breaches,and Law section, our research covered the more-strin- Who is responsible for data privacy? gent laws concerning breach notifications and restrictions on international transfers. More Who in an organization is ultimately respon- and more, countries require data controllers to sible for data privacy varies depending on the act with due care on how they collect, process, laws and regulations enacted by countries and store, and destroy personally identifiable infor- regions, as shown in Figure 30 and Figure 31. mation. Many new regulations also include heavy Globally, 34% of respondents indicated that fines in the event of a significant data breach, data privacy was the responsibility of the CPO/ requiring organizations operating in multiple DPO, and 45% indicated that either the CIO or jurisdictions to adhere to various mandates and CISO was responsible. Others Chief Information Department/Business Officer Unit Leaders 5% 9% 11% Chief Financial Officer 1% Chief Risk Officer 4% 34% Chief Information Security Officer Chief Privacy Officer/ 34% Data Protection Officer Chief Operating Officer 2% FIGURE 30 [ Organizational responsibility for governance of data privacy – Global ] 52 | WIPRO STATE OF CYBERSECURITY REPORT
In Europe, organizations indicating that the CPO/DPO was responsible for data privacy was 57%, with 34% indicating that the CISO was responsible. Others 5% Department/Business Unit Leaders 2% Chief Risk Officer 2% 34% Chief Information Security Officer Chief Privacy Officer/ 57% Data Protection Officer FIGURE 31 [ Organizational responsibility for governance of data privacy – Europe ] Security Budgets 68% GLOBAL INSIGHT Worldwide, 68% of respon- Organizations are investing continuously in cy- dents stated that the CISO bersecurity to strengthen their security posture. or DPO/CPO is responsible The process of securing the requisite budget is for their organization’s data affected by various factors, including new reg- privacy. ulations, compliance mandates, board oversight on cybersecurity, and recent breaches. Security leadership must get their needs, based on risk evaluations across the enterprise’s processes, on the boardroom’s table. WIPRO STATE OF CYBERSECURITY REPORT | 53
Factors driving increased security budgets increment. However, an interesting observation was that 46% of organizations saw their secu- 60% of CISOs surveyed cited new regulations rity budgets increase after their industry peers as a significant factor behind increased budget experienced a breach (Figure 32). allocations. Also, 56% stated that their board’s oversight of cybersecurity had driven the budget 70% 60% 50% 40% 30% 20% 10% 0 A breach A breach/ CISO/CXO Board New New Pre or in your cyber leadership oversight of technology regulations Post organization incident change cybersecurity refresh/ M&A related to adoption competitors/ other enterprises FIGURE 32 [ Leading factors for increased budget allocation ] 60% GLOBAL INSIGHT 71% VERTICAL INSIGHT of surveyed organizations of surveyed HLS organizations consider new regulations to be consider a cyberattack on the driving factor for increased peers to be a driving factor for security budgets. increased security budget. 54 | WIPRO STATE OF CYBERSECURITY REPORT
One metric employed for comparing the avail- to evaluate the money’s use and effectiveness. ability of cybersecurity budgets across sectors When we asked security leaders what portion is to look at relative allocations compared of their IT budget went toward security, 14% to overall IT budgets. Because attackers are responded that they received more than 12%. unceasingly refining and intensifying their tech- An equal number of respondents indicated that niques, organizations need a thorough defense their security spend was less than 4% of their strategy, investments in advanced technology, total IT budget. Figure 33 highlights the security and skilled professionals. Regardless of the per- budget posture. centage of budget allocated, organizations need 15% 12% 9% 6% 3% 0% 4-6% 6-8% 8-10% 10-12% Greater 0-4% than 12% FIGURE 33 [ Range of percentage of IT budget allocated for security ] Security Investment Priorities An encouraging trend appears in Figure 34: 18% of organizations plan to invest in security We surveyed organizations about their invest- awareness and training. The post-COVID-19 ment priorities for the year ahead. 35% indi- world is expected to see escalating supply chain cated that they would be investing in security attacks, and a worrying indicator is that 53% of orchestration and automation. 20% considered organizations are not prioritizing investments in zero trust rollouts a priority, and 14% indicated supply chain security. hybrid cloud security. Along with investing in technologies, organizations have to invest in the human element to be more cyber resilient. WIPRO STATE OF CYBERSECURITY REPORT | 55
Security Orchestration 20% 40% 60% 80% 100% and Automation Zero Trust Architecture Cognitive-based Detection Secure OT/IoT Initiatives Hybrid Cloud Security Solutions Privacy Enhancing Technologies DevSecOps Supply Chain Security Security Awareness/ Training 0 12345 67 8 9 FIGURE 34 [ Ranking of top investment priorities ] Security Metrics management, operational, and technical cate- gories. 64% of respondents considered time to As organizations utilize their allocated budgets detect and remediate incidents the most critical on capital and operational expenditures, includ- management metric to track (Table 2). 62% ing the top investment areas indicated previ- stated that mean-time to mitigate vulnerabili- ously, the effectiveness of the spend needs to ties was the most important operational metric be measured and reported across the hierarchy. (Table 3), and 81% considered vulnerability scanning coverage an essential technical metric Measure it to change it (Table 4). In the survey, we asked organizations across industries about their metrics reporting in 56 | WIPRO STATE OF CYBERSECURITY REPORT
Management Metrics HLS MFG BFSI COMMS ENU CBU TECH Global Time to Detect and Remediate Incidents 83% 71% 72% 57% 33% 67% 67% 64% Cost of Detection 33% 43% 38% 7% 17% 33% 22% 28% Cost of Downtime 50% 49% 53% 29% 50% 48% 56% 48% Cost of Incidents 17% 62% 47% 21% 25% 33% 33% 34% Regulatory Compliance 50% 57% 73% 64% 50% 38% 78% 59% Security Spending as % of IT Budget 33% 59% 43% 21% 25% 33% 44% 37% Table 2 [ Management metrics reporting across industries ] Operational Metrics HLS MFG BFSI COMMS ENU CBU Global Mean-Time to Patch 67% 33% 67% 54% 55% 67% 55% Mean-Time to Incident Discovery 67% 67% 54% 62% 27% 43% 57% Mean-Time to Incident Recovery 50% 44% 60% 62% 64% 67% 59% Mean-Time to Mitigate Vulnerabilities 33% 67% 68% 69% 64% 76% 62% % of Changes with Security Exceptions 17% 22% 25% 23% 9% 33% 20% Table 3 [ Operational metrics reporting across industries ] Technical metrics HLS MFG BFSI COMMS ENU CBU Global Patch Management Coverage 78% 80% 82% 75% 67% 91% 80% Anti-Malware Compliance 83% 80% 65% 83% 58% 64% 68% Vulnerability Scanning Coverage 81% 70% 85% 83% 75% 86% 81% Configuration Management Coverage 47% 30% 53% 50% 33% 41% 43% % of Systems with Known Vulnerabilities 51% 40% 68% 67% 50% 45% 55% Table 4 [ Technical metrics reporting across industries ] Cybersecurity Talent Management 50% The skills gap is a concern faced by most orga- 40% nizations around the globe. Cybersecurity skills across industries appear to have a demand ver- 30% sus supply mismatch. For executive leadership within the cyber ecosystem, attracting, motivat- 20% ing, and retaining the best talent is essential but not always easy. 10% We asked organizations to provide the top reasons 0 Not enough Available for the existing cybersecurity skills gap. Figure 35 Difficulty in qualified recruits shows that 42% of the respondents found it chal- retaining applicants lenging to retain cyber talent, and 41% didn’t find talent need enough qualified applicants for the job. However, extensive 17% of organizations felt that applicants needed training to improve their cybersecurity expertise. FIGURE 35 [ Reasons for the existing skills gap ] WIPRO STATE OF CYBERSECURITY REPORT | 57
What factors motivate cyber talent? cross-functional training and defined career roadmaps as a critical motivating factor. A rela- As part of our research, we asked global cyber- tively lesser 33% of organizations indicated that security leaders what factors motivated their differentiated compensation structures helped teams. Figure 36 shows 68% responded that to motivate and retain talent. participation in external cybersecurity confer- ences and training (allowing for learning and growth) was the best motivator. 62% considered 70% Defined Cross- Funding for Participation Secondment 60% career functional in-house in external (e.g., temporary 50% roadmap labs or cybersecurity overseas 40% training research conferences posting) 30% 20% 10% 0 Differentiated compensation structures and trainings FIGURE 36 [ Cyber talent motivation factors ] 68% GLOBAL INSIGHT 42% VERTICAL INSIGHT of organizations consider of the BFSI organizations participation in external highlighted differentiated cybersecurity conferences compensation structures and training as the best way to for talent motivation and motivate teams. retention. 58 | WIPRO STATE OF CYBERSECURITY REPORT
Security Practices infrastructures, and mobile devices, coupled with stringent regulations, such as CCPA and A broad spectrum of research from our survey GDPR, forced organizations to implement robust focused on trends in security practices that data privacy and security measures. organizations were employing. The research identified significant trends over the past three The number and types of IT assets holding sen- years in selected domains, including data secu- sitive data expanded, and mapping the flow of rity, application security, edge security, endpoint data has been a challenge for enterprises. We security, DDoS prevention, security monitoring asked organizations which enterprise systems and analytics, cloud security, and IoT security. stored their data and whether they encrypted it. Figure 37 indicates that enterprise databases Data security held a large amount of sensitive information, but only 70% of those environments were encrypted. The enterprise perimeter has been expand- 80% of respondents indicated that their big data ing, and data has been steadily leaving the stores held sensitive information, but more than shores to foster collaboration and exchange. one-third of them were not encrypted. Data migrations to SaaS applications, cloud 100% 80% 60% 40% 20% 0 Desktops & Mobile Enterprise Big data Enterprise Cloud-native Third-party OT/IoT Containers Native environments database environments SaaS systems environments encryption laptops devices file shares (laas, PaaS, applications (Docker, etc.) (smartphones, systems from tablets) etc.) (Salesforce, storage Workday, etc.) (SAN) providers stores sensitive is encrypted information FIGURE 37 [ Data storage strategies and encryption priorities ] New data privacy regulations gave consumers leverage to seek compensation for the improper man- agement, use, and disclosure of their data. When we asked security leaders to rank the data security controls they implemented (Figure 38), 32% said automated data discovery and classification was the most efficient (a rise of 16% from last year). This is not surprising because IT teams must identify the dispersion of sensitive data before they can apply encryption or compensating control policies. 23% of WIPRO STATE OF CYBERSECURITY REPORT | 59
respondents ranked privileged access management (PAM) as a top data security control. Additionally, data leak prevention and encryption of data across the databases were among the top security controls implemented by organizations. 35% 30% 25% 20% 15% 10% 5% 0 Automated Encryption Data Encryption Information Monitoring Tokenization Privileged Data Leak Data of PII/NPI Activity of Backup Rights of Cloud Access Prevention Discovery & Data Monitoring PII/NPI Data Management Environments Classification across the for through Management for Critical Databases Production Files & Cloud Access Databases Email Security Brokers 2019 2018 2017 FIGURE 38 [ Data security control trends ] 32% GLOBAL INSIGHT 88% VERTICAL INSIGHT of respondents chose of BFSI enterprises that automated data discovery hold sensitive data in and classification as the most cloud-native environments effective data security control. encrypt them. Application security the advent of DevOps has been an opportunity for advancement because of the way DevOps Application security management in enterprises leverages automation. Integration of security has been a casualty of arduous enhancements checks in DevOps has been made possible by to the classic waterfall software development automating security code reviews or penetration lifecycles that had not been wholeheartedly accepted by development teams. However, 60 | WIPRO STATE OF CYBERSECURITY REPORT
tests seamlessly. This has triggered incremental carry out security assessments in every build movement toward improving application securi- cycle, an increasing trend over the past three ty posture over the past 2–3 years. years. We attribute the acute decrease in security assessments of applications post-launch (see During primary research, we asked organizations Figure 39) to the fact that organizations are mov- about their security assessment frequency for ing toward the adoption of DevSecOps practice. business-critical applications. 27% said that they 30% 25% 20% 15% 10% 5% 0 On audit/ Only Monthly Quarterly Half-yearly Annually Never For every compliance when the application applications request launched build/release cycle 2019 2018 2017 2016 FIGURE 39 [ Frequency of security assessment of business-critical applications, 2016–2019 ] 27% GLOBAL INSIGHT VERTICAL INSIGHT of respondents conduct security assessments in every Communications and BFSI verticals took the build cycle. top spot in conducting security assessments for every application in the build/release cycle, with 44% and 37%, respectively. Although applications and data can be protected from a confidentiality perspective to minimize the impact of cyberattacks, organizations may still have to deal with maintaining the availability of their services in the event that threat actors launch distributed denial of services (DDoS) attacks on their exposed asset base. In the next section, we explore trends in DDoS attacks. WIPRO STATE OF CYBERSECURITY REPORT | 61
DDoS attacks: shrinking in size, increasing in impact The rise of DDoS attacks in the wake of increased internet use during a global pandemic is no surprise. To avoid significant revenue loss, keeping services up as the world entered into lockdown was of prime importance. Wipro asked organizations about the average duration of the DDoS attacks they faced. Responses to the survey indicated that 27% of organizations that faced DDoS attacks saw durations of less than 60 minutes (Figure 40). 60% 50% 40% 30% 20% 10% 0 1-6 6 hours More than No DDoS Less than hours to 1 day 1 day attack 60 mins experienced FIGURE 40 [ Duration of DDoS attacks ] Analysis of worldwide DDoS attack patterns network, spanned more than 200 cities in more than 95 countries. Working with our global alliance partner, Cloudflare, we derived worldwide trends on Voluminous attacks with the potential to disrupt DDoS attacks from mid-2019 through the business operations persisted. Figure 41 from first two quarters of 2020. This data, based on analysis of patterns across Cloudflare’s global 62 | WIPRO STATE OF CYBERSECURITY REPORT
Cloudflare highlights the highest bit rate of network-layer DDoS attacks spanning 12 months. The highest bit rate observed, 550 Gbps, was in March 2020. 600 550.1 500 Peak Bit Rate 400 388.1 386 403.4 339.8 368.3 321.8 386.1 300 318.3 315.8 287.7 246.8 200 July Aug Sept Oct Nov Dec Jan Feb March April May June ’19 ’19 ’19 ’19 ’19 ’19 ’20 ’20 ’20 ’20 ’20 ’20 FIGURE 41 [ Peak bit rate by month ] While the peak bit rate per month gives us the extreme scenarios, the number of attacks by bit rate provides a more holistic perspective of the attacks’ distribution. Figure 42 shows that in Q1 2020, 92% of the attacks detected by Cloudflare’s network had a bit rate of less than 10 Gbps, compared to 84% in the previous quarter. 70% 100-200 200-300 300-400 400+ 60% Gbps Gbps Gbps Gbps 50% 40% 30% 20% 10% 0 Under 500 Mbps- 10-100 500 Mbps 10 Gbps Gbps FIGURE 42 [ Attacks by bit rate ] WIPRO STATE OF CYBERSECURITY REPORT | 63
With the availability of DDoS-as-a-service tools, amateur attackers are launching DDoS attacks econom- ically with limited bandwidth. Worth pondering is whether these small attacks are designed distractions for the security operation center (SOC) while threat actors are attempting other network penetrations and exfiltrations. 45% GLOBAL INSIGHT 73% VERTICAL INSIGHT of organizations experienced of manufacturing respondents a DDoS attack in 2019. didn’t experience a DDoS attack in 2019. Wipro’s partner, Cloudflare (cloudflare.com), contributed this subsection. Endpoint security A combination of BYOD, shipped desktops, and Compromised endpoints of remote privileged fully managed devices facilitated the explosion users lead to entryways for threat actors. We of remote work enablement for many employees asked CISOs to rank the vectors through which in numerous enterprises across geographies, threat actors were successfully compromising and security teams struggled to maintain end- endpoints. 73% ranked phishing emails as the point hygiene across assets. biggest culprit, while 18% ranked USBs as the second-most compromised vector (Figure 43). USBs 20% 40% 60% 80% 100% Phishing emails Malware hidden in websites Untrusted software download Malware from social media Instant messages/Chat 0 12345 6 FIGURE 43 [ Ranking of endpoint attack vectors by frequency, 2019 ] 64 | WIPRO STATE OF CYBERSECURITY REPORT
73% GLOBAL INSIGHT have their use, enterprises must be able to of organizations ranked detect and contain an intrusion early. SOCs phishing email attacks as need to be able to extract insights with con- the top vector of endpoint text across multiple layers of defense, deal compromise. with “alert deluge,” and winnow true positives from the rest of the noise. Are enterprise SOCs 50% VERTICAL INSIGHT today equipped to handle this deluge? What of surveyed ENU organizations kind of tooling will be required to improve responded that USBs were performance? the top vector for endpoint compromise. We asked organizations what key capabilities they needed in their SOC. Nearly 50% of survey The battle for endpoints cannot be won through respondents identified adding cognitive de- technology alone. The final line of defense is tection capabilities to tackle unknown attacks the employee. Recurring employee awareness and threat hunting as a critical capability. and training must complement any technical Other findings shown in Figure 44 include: measures in place. • Organizations struggle with all-round Security monitoring and analytics visibility of all IT assets across the data centers, cloud, mobile, and social envi- SOCs are a critical building block of an orga- ronments. 18% of respondents are plan- nization’s all-round cybersecurity risk miti- ning to widen the asset visibility from the gation capability. Although layered defenses conventional data center to the cloud, OT/ IoT, and connected devices. • SOC teams need continuous learning on new threat scenarios, detection use cases, and response procedures. A few respondents indicated that they needed to leverage cyber range capabilities to administer crisis simulation exercises to staff. WIPRO STATE OF CYBERSECURITY REPORT | 65
Tackling Unknown 20% 40% 60% 80% 100% Attacks & Threat Hunting: Add Cognitive Detection Capabilities Asset Visibility: Expand beyond Data Center to Cloud, OT/IoT/Connected Devices Team Skills: Inversion of Skills Pyramid with Deeper Expertise Blindspot Detection: Continuous Monitoring of New Entry Points Identity Enablement: Bringing User Behavior/ Identity Contexts Simulation Capacity: Crisis Simulation & Cyber Range Capabilities Autonomous Deception (Next Generation Honeypots) 0 1234 56 7 FIGURE 44 [ Needed security operation center capabilities ] 49% GLOBAL INSIGHT 36% VERTICAL INSIGHT of organizations are of manufacturing organiza- prioritizing cognitive detection tions are expanding asset capabilities to enhance their visibility of the SOC to OT/IoT SOC. and cloud environments. 66 | WIPRO STATE OF CYBERSECURITY REPORT
Cloud security respondents stated they would continue to scale up secure cloud migrations after the COVID-19 With the growing adoption of cloud-based crisis (refer to Figure 21 and Figure 23). services, we see organizations increasingly willing to manage sensitive information in cloud To enable data mobility and enhance cost environments, such as Software-as-a-Service efficiency, 74% (Figure 45) of responding orga- (SaaS), Infrastructure-as-a-Service (IaaS), and nizations are migrating employee information to Platform-as-a-Service (PaaS). 72% of organiza- cloud environments. The migration of business tions that responded are storing sensitive data finance records has also seen growth from on cloud environments (refer to Figure 37). last year’s 41% to 54% this year. Organizations are now considering migrating payment card With the COVID-19 situation in the background, information (PCI) to cloud systems, with 25% of we asked a few questions about current and responding organizations preferring it compared future data migration priorities. 52% of respon- to 19% last year. dents prioritized scaling up secure cloud migra- tions during the COVID-19 crisis, while 87% of 80% Business Intellectual Health Customer Customer 70% Finance Property Records PII PCI 60% Records 50% (Personally (Payment Card 40% Identifiable Information) 30% Information) 20% 10% 0 Employee Information (HR, Salary, etc.) 2019 2018 FIGURE 45 [ Data migrating to the cloud ] Also, a rising 23% of responding organizations considered privilege escalations on cloud infrastructure to be among the top IT security challenges experienced during the pandemic. The difficulties around privilege management and authorization governance in multi-cloud deployments are complex because of the permissions layers buried deep within. Our partner, CloudKnox, conducted some interesting research on the extent of the permissions problem, which is presented in the next section. WIPRO STATE OF CYBERSECURITY REPORT | 67
Risks of Over-provisioned Permissions in Cloud Environments As organizations modernize IT and adopt hybrid resources from accidental misuse and inten- and multi-cloud infrastructure and support tional exploitation across their environments. more distributed business processes involving human and non-human identities, the tradi- As a result, the problem of cloud infrastructure tional security perimeter becomes outdated. permissions management has become very Identities today are the new security perimeter critical. At publication, over 40,000 permissions and have become the new attack vector to exfil- could be granted to identities across the key trate business-critical data. Moreover, with the cloud infrastructure platforms (AWS, Azure, GCP, accelerated adoption of public cloud workloads, and VMware vSphere), and nearly 50% of these the number of identities with privileged access permissions can be classified as high-risk with to infrastructure is increasing exponentially. the ability to cause catastrophic damage if used This trend has rendered high-risk identity per- improperly (Figure 46). High-risk permissions missions to be one of the most menacing threat are defined as any action that can cause service vectors to cloud infrastructure for years to come. disruption, service degradation, or data exfiltra- This emerging threat will force enterprises of all tion, as was in the case of a large banking breach sizes to rethink how they grant, manage, and recently. monitor permissions and secure their cloud vSphere, 4,000 40,000+ GCP, 10% 8,000 20% permissions across clouds 45% AWS, 18,000 >50% 25% permissions could Azure, destroy infrastructure 10,000 FIGURE 46 [ Cloud infrastructure permissions ] 68 | WIPRO STATE OF CYBERSECURITY REPORT
We collected data from over 125 risk assess- private cloud infrastructure and proving to be ments, and what we discovered is that over 95% fertile ground for both accidental and malicious of all identities are grossly over-provisioned permissions misuse and exploitation. As more (i.e., granted a substantial number of high-risk identities (human and non-human) leverage the permissions). What was even more alarming cloud infrastructure and deploy exponentially was the fact that these identities used less than more workloads, the cloud permissions gap is 10% of the permissions granted to perform their growing wider and is exposing global enterpris- daily tasks (Figure 47). This leaves a significant es to higher risk. The inability to properly grant, permissions gap, exposing enterprises glob- manage, and monitor these permissions across ally to high risk that malicious attackers can a multi-cloud environment is accelerating the exploit or can be inadvertently misused. The permissions creep, which in turn has resulted in dangerous delta between permissions granted over-permissioned, privileged identities becom- and permissions used is what we refer to as ing the number one security risk for public and the cloud permissions gap. This gap has quickly hybrid cloud infrastructures. emerged as the number one risk to public and >95% Permissions (across clouds) Permissions gr Cloud anted Permissions of identities have Gap high-risk permissions Permissions used ! Time <10% of permissions granted are used FIGURE 47 [ Cloud permissions gap ] Security and infrastructure operations teams are being asked to do the impossible and are finding it increasingly difficult to manage and secure the dynamic nature of multi-cloud infrastructure platforms (Figure 48) while keeping up with the explosion of new over-permissioned machine and human identities, accounts, resources, and services. WIPRO STATE OF CYBERSECURITY REPORT | 69
Multiple complex, $ 0 1 0 $0 0$ 1 Disparate convoluted 1 authentication systems 00 1 $ 1 $ and dissimilar (e.g., local, federated) authorization 10 models Never-ending Exponential permutations of growth of policies, permissions, resources and identities non-human identities FIGURE 48 [ Managing complexity across clouds ] The risk management strategy around cloud Containing Risks in Containers hosting will have a gaping hole if security and risk teams do not evolve a clear strategy to Many enterprises that are adopting a cloud-first handle this problem as they plan to increase the strategy are embracing container technologies pace of digitalization and cloud migration. to build, deploy, and roll out new applications. Container platforms are thus becoming the new Wipro’s partner, CloudKnox (cloudknox.io), contributed this extended attack surface for most organizations. subsection. Attackers are targeting docker engines as a host for launching attacks and for installing 48% of responding organizations still consider rootkits on host systems. Exposed logs from cloud hosting risks among one of the top cyber insecure docker hosts can reveal critical data risks. like infrastructure configuration and application credentials. Business IT and Security teams are The next research-based point of view from grappling with understanding the risks posed by Wipro’s partner, Palo Alto Networks, draws out insecure containers and in developing an effec- the risks of unsecured container environments tive strategy to mitigate the threats. in the cloud. 70 | WIPRO STATE OF CYBERSECURITY REPORT
We collaborated with Wipro to present a con- 1400 docker hosts, 8600+ active containers, temporary analysis of the tools and techniques and 17900+ docker images that were publically that attackers are using to compromise docker visible. environments. A docker daemon is a process that runs in the background, which communi- The metadata collected from the compromised cates with REST API to manage objects such as docker engines revealed some malicious containers, networks, images, and other dae- activities, attacker’s tools, techniques, and mons through a single host system. The research procedures (TTP), exposed docker versions, and spanned across publically exposed insecure locations. Figure 49 shows how the exposed docker hosts across the Americas, EMEA, and docker hosts were spread across different geo- APAC regions during late last year. This included graphical regions. US 48% 41% APAC ME 2% 8% INDIA 1% EU FIGURE 49 [ Insecure docker environments by region ] The observations from malicious activities were classified into four categories that followed a typical pattern. Figure 50 shows the category and the technique, along with potential mitigation strategies. WIPRO STATE OF CYBERSECURITY REPORT | 71
12 Container images Corrupt host with contaminated malicious payloads with malicious code How: Corrupting core by How: This code usually mounting the whole hijacks the memory, CPU host file system to or networking resources without host the container and accessing the OS from Docker Container that particular container Threat Categories Runtime injection of Log scrapping malicious payloads How: Command through benign containers characteristically How: Bad actors inject store sensitive information malicious payloads into like application passwords, benign containers at runtime which expedite lateral movement by exploiting vulnerabilities thus aiding in scaling the attack 34 MITIGATION STRATEGIES 12 34 56 Enable mutual Allow only Whitelist IP/hosts Allow pulling Periodic Enable runtime authentication- SSH-based that can connect of only signed vulnerability monitoring access to images from assessment based Docker daemon to the Docker of container and protection TLS for Docker ecosystem Docker hub of containers daemon sockets remotely images FIGURE 50 [ Container threat categories and mitigation strategies ] Wipro’s partner, Palo Alto Networks (paloaltonetworks.com), contributed this subsection. IoT security The early rollout of Industry 4.0 use cases and target for threat actors who seek to disrupt op- the continued fusing of OT and IT environments erations or steal confidential information. have brought many benefits around visibility, intelligence, proactive interventions, and oper- Although there has been a universal increase ational efficiency in the manufacturing, oil and in the deployment of all core organizational gas, utilities, and pharmaceutical sectors. The control areas, this should not be mistaken for specialized hardware and software components a significant increase in the maturity of organi- of integrated OT environments are now a ripe zational capability. Indeed, based on our client interactions over the past 12 months, we see 72 | WIPRO STATE OF CYBERSECURITY REPORT
this increase in organizational control deployment as representative of the first step on a long journey for many organizations as they consider the needs of the new cybersecurity landscape, a journey that is often 2–3 years in fulfillment and aligned to wider industry digital transformation programs. The organi- zational control deployment is shown in Figure 51. 70% 60% 50% 40% 30% 20% 10% 0 Physical Password to PKI/ Security/log Network Security Others Agentless security secure IoT Certificate- monitoring segmentation assessment network /tamper of devices of IoT devices of IoT devices protection devices based threat detection authentication for IoT devices & encryption FIGURE 51 [ Controls planned to mitigate IoT risks ] The traditional gaps between Enterprise IT provide a proportional and pragmatic response and OT/IoT landscapes are fast eroding, and to industrial security is essential to ensure that convergence is the key challenge for CIOs and organizations benefit from targeted investment CISOs as they transition to delivering digital in the deployment of technology solutions to transformation and cyber resilience across deliver enhanced organizational controls to their operations. This assessment is backed by manage OT/IoT risk. CIOs and CISOs, therefore, 78% of organizations recognizing that sensitive should ensure that when making buying deci- information, often business-critical, is stored sions, they remain focused on the core business within their OT/IoT systems. Yet, only 19% of needs delivered by the OT/IoT environment and businesses have adopted the asset detection avoid slavish alignment to traditional Enterprise and monitoring capabilities central to an effec- IT cybersecurity approaches. tive, holistic, industrial security capability. Edge security The vendor ecosystem in industrial security is significantly changing with the consolidation SOCR 2019 covered the emerging challenges of vendors when IT-focused providers acquire in security as the 5G ecosystem evolved. traditional OT/IoT security vendors. While this Consumption of edge computing is expected to consolidation should deliver an accelerated and grow exponentially in tandem with worldwide 5G enhanced solution capability in the medium rollouts. With the expected growth of field devic- term, client organizations must focus on the es, edge computing will help mitigate bandwidth critical differences between the security man- constraints associated with a traditional cen- agement of Enterprise IT and OT/IoT landscapes. tralized computing environment. Edge comput- Partnering with specialist providers who can ing with 5G will help remove latency constraints WIPRO STATE OF CYBERSECURITY REPORT | 73
by placing resources close to the edge devices provide security controls for edge devices and and increasing resiliency with alternate data avoid routing of traffic back to traditional data routing capabilities. However, this highly frag- centers. Integration with the edge devices or mented system might pose a risk for the security cloud endpoints is usually done with agents to of the systems, data, and applications. carry secure traffic to cloud provider environ- ments with strong authentication and encryp- For edge computing to work effectively, sufficient tion of data. Future edge-security services will bandwidth would be required to access and need to follow a zero-trust security approach to manage the devices or endpoints. Cybersecurity ensure access validation and identity verifica- controls near the user or edge devices could then tion. The zero trust model should allow complete leverage SaaS security services to secure data and visibility and insight into the activities, isolate identities. Many applications used by edge devic- legitimate or malicious activities, and enforce es or cloud endpoints currently leverage APIs that security controls automatically to contain any are usually neither authenticated nor encrypted attack or breach. and might leak confidential data. Securing these access points with proper controls and strong Figure 52 depicts a conceptual edge security authentication mechanisms is a critical enabler framework showing the different security ser- for the success of edge computing. vices available on the cloud, such as secure web access, identity security, and data security. As Network edge devices provide access using cloud migration and 5G induced edge computing SD-WAN, CDN, Network-as-a-Service offerings, volumes increase, organizations will have to bandwidth aggregators, and networking ven- start factoring edge security into their security dor services. Each of these components can strategies. integrate with SaaS-based security services to Corporate Applications–Hosted in Datacenter or SaaS/PaaS or Private Cloud Security Services WAF, UEBA DLP Secure DNS Cloud App Data discovery Network & Threat prevention Obfuscation Threat isolation security & security WiFi security Secure Access Secure Server Edge Access (SASE) Network Edge VPN or SDP based access API based access Secure web access Network Layer & Backbone SD WAN Carriers CDN Network as Bandwidth Networking a service aggregation vendors Edge Devices & Aggregators User desktops User laptops Mobile devices IoT devices FIGURE 52 [ Edge security framework ] 74 | WIPRO STATE OF CYBERSECURITY REPORT
Zero Trust: A paradigm shift APTs are particularly dangerous for three main reasons: Many enterprises have enabled the process of allowing their data and applications to flow 1. Organizations aren’t aware that perimeter into multi-cloud environments, satellite offices, firewalls inspect at most 25% of overall and traditional remote endpoints. OT and IoT traffic. environments are fusing to harness real-time data, derive analytics, and orchestrate business 2. Many common security implementations actions. In many ways, the old perimeter has assume that internal network traffic is broken down into smaller perimeters. However, trustworthy. the implicit trust that existed once you were inside the perimeter has become a millstone 3. Even organizations that do scrutinize around the neck for most enterprises. Advanced internal network traffic may be relying on persistent threats can lurk within the perimeter outdated security tools. and move laterally with abandon once an en- trance path is achieved. Zero trust is a paradigm It shouldn’t come as a surprise, then, that APTs shift that challenges the traditional perimeter are inflicting severe damage to organizations model and demands changes in engagement around the globe. Clearly, organizations need to rules. change the way they defend against APTs. In zero trust-centric approaches, the trust zone What is micro-segmentation? is compressed to narrow segments where con- tinuous decision-making occurs. This approach Micro-segmentation, a key pillar of the zero works under the assumption that the threat trust security framework, is a security practice actor is already present in the environment. The that divides the network into granular and NIST 800-207 draft specification suggests that mostly isolated segments. Inter- and intra-seg- zero trust can roll out using different approach- ment traffic can then be more easily monitored es. A few examples of zero trust-based models and controlled. In the process, organizations include zero trust through identity governance, proactively remove built-in trust assumptions zero trust through micro-segmentation, and by evaluating and authorizing every network zero trust through SDN. communication – a highly effective strategy to thwart APTs. The next section from Wipro’s partner, ColorTokens, discusses how organizations can Other key benefits of micro-segmentation embark on the zero trust journey leveraging the include: micro-segmentation approach. • Protection for business-critical applica- Zero Trust with micro-segmentation tions: Reduce the attack surface for your most vital applications and sensitive data. The recent rise in security incidents can be largely attributed to the emergence of advanced • Compliance assurance: Simplify compli- persistent threats (APTs). In an APT-style attack, ance – and cut costs and time – by reducing a bad actor can infiltrate the network, remain the scope of an audit. undetected for an extended period, and inflict large-scale damage. • Environment separation: Ensure hygiene of your production environment by segregat- ing environments in shared infrastructure. WIPRO STATE OF CYBERSECURITY REPORT | 75
• Breach containment and future-proofing: deal with not only VM-based workloads but Stop breaches from spreading laterally and also container and serverless workloads protect your business from future attacks. across multiple public cloud platforms. Most micro-segmentation implementations fall In addition to the support for the spectrum of into one of two categories: workloads as described above, organizations should also evaluate their micro-segmentation • Hybrid data center implementation: Where solution for these critical attributes: the organization’s infrastructure is in one or more data centers or distributed between • Deep visibility: You can’t protect what you their data center and public cloud. can’t see. Hence, it’s critical to gain deep visibility into assets and lateral traffic, • Cloud-native implementation: Where the along with contextual data that helps make organization has zero data center footprint policy decisions (see Figure 53). and runs all infrastructure on one or more public clouds. In such scenarios, one must Sales CRM Segment Sales Apps Segment UnCsoannncetciotinoend pcrmapp01 pcrmapp02 DB (2) APP (2) DB (2) APP (2) Web (1) Web (1) Sales CRM (3) Human Resources (3) Expected and allowed traffic Unauthorized or possibly malicious traffic FIGURE 53 [ Internal traffic visualization – Crucial for micro-segmentation ] 76 | WIPRO STATE OF CYBERSECURITY REPORT
• Adaptability: The approach should adapt APTs will likely only continue to grow in efficacy to infrastructure changes with little to no and complexity, but the right micro-segmen- human intervention to keep operational tation solution provides powerful capabilities costs down. to identify and thwart potentially damaging attacks. Micro-segmentation is also a key com- • Time to value: Organizations should plan ponent of a strong zero trust architecture be- to deploy micro-segmentation in a hybrid cause it applies a “never trust, always verify” model with co-existing perimeter defenses approach to evaluating and authorizing network as the transition happens. communication. • Non-disruptiveness: The approach should Wipro’s partner, ColorTokens (colortokens.com), contributed be minimally invasive to your users. this subsection. Security governance is a complex endeavor that needs to be driven top-down in an organization with roles and responsibilities defined down the chain of command, with relevant and timely metrics to measure its effectiveness. The flavor of the governance framework that was outlined at the beginning of the section needs to be implemented within organizations with underlying processes, procedures, and supporting functions. In addition to the governance framework, organizations need to pay attention to improving their technical controls’ effectiveness as a continuous process. With ongoing governance and effective implementation of controls, organizations can elevate themselves to become more resilient to adversarial actions. While internal enablement is supreme and needs the maximum focus, organizations cannot build up the defenses in isolation. The next section explores collaboration in the field of cyber with the external ecosystem. WIPRO STATE OF CYBERSECURITY REPORT | 77
“If I have seen further, it is by standing on the shoulders of giants.” —Isaac Newton 78 | WIPRO STATE OF CYBERSECURITY REPORT
4 STATE OF COLLABORATION Strong collaboration between the public and private sectors is a necessary enabler for identify- ing new threats in cyberspace and evolving strategies to counter them. Collaboration becomes even more pertinent when it comes to protecting national, critical infrastructure operated by the private sector. Governments worldwide are attempting to facilitate this collaboration through legal and quasi-legal constructs, including sharing networks. Given various factors, such as reputational risks and reservations around working with competitors, the private sector has been cautious in their participation. As cyber threats emanate more and more from nation-state actors, the home government’s role and military doctrine around cyberattack response is coming under increasing pressure. This section examines the sources of effective threat intelligence in enterprises and barriers in information sharing between organizations. Further on, we discuss aspects of collaboration from a supply chain standpoint and the confidence that organizations have in dealing with them. Lastly, we preview trends in cyber insurance as a risk-transfer mechanism. To dissect the policy imperatives around attack response, we collaborated with the Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel Aviv University for this perspective on the role of governments in active defense against external cyber aggression directed at the private sector. Recalibrating the Shared Responsibility to Secure, Protect, and Defend A foreign adversary contemplating an cyberspace, the offense has the upper attack on a developed nation’s home- hand” has taken over. land faces definite state-grade military defenses on land, sea, and air. A foreign Tel Aviv University’s Blavatnik Interdisci- adversary launching a direct cyberattack plinary Cyber Research Center conducted on a non-military homeland target will major research on cyberdefense, drawing meet none. No wonder the dictum, “In on fundamental and applied social and management science, and unique ties WIPRO STATE OF CYBERSECURITY REPORT | 79
with practitioners. Our findings highlight that states hold a monopoly on using force and cybersecurity requires radical, structural in- forbid their citizens from violating another novation. Some of the insights are below. nation’s sovereignty. Developed nations have long-established and deployed state-grade The world’s major powers are failing to protect defenses on land, sea, and air. When deter- their societies and economies from cyberat- rence fails, a country’s armed forces combat tacks. Recently, ransomware campaigns hit the attackers and shield the citizens at home. Japanese, European, and Indian firms and even entire American cities. Ransomware is osten- However, states have yet to deliver on cyberde- sibly a criminal for-profit phenomenon, below fense. Little suggests that India’s forthcoming the national security threshold. However, the 2020 cybersecurity strategy will include de- damage is real, its operators tend to reside fense. The UK’s 2016 National Cyber Security in adversarial jurisdictions, and their target Strategy, and the £1.9 billion of investment that selection and timing often resembles coercive came with it, reaches its conclusion in 2021. bargaining. Commercial cybersecurity can al- Media speculation about drawing together ways do better. The crux of the problem is the GCHQ and Ministry of Defense offensive cyber lack of state-grade cyber defenses that un- capability aside, British future cyberdefense dermines the “shared responsibility” strategy. posture outside the critical national infra- structure sectors is vague. The heightened We must accept the complex coalitions of threat perception may affect Australia’s forth- criminal and political threat actors behind coming 2020 strategy; its 2016 version does cyberattacks and innovate our defenses not mention whether, or how, its defenders will accordingly. act. The US and Israel suggest some military cyberdefenses. The March 2018 “Achieve and Toward sovereign cyberdefense Maintain Cyberspace Superiority” US Cyber Command vision statement declares for the Israel’s cybersecurity strategy, as well as the first time that the American military will “de- US Cyber Command, usefully distinguish three fend forward.” The commander of US Cyber related tiers: secure, protect, and defend. Command claims, “We must take this fight to the enemy, just as we do in other aspects of SECURE PROTECT DEFEND conflict.” American “persistent engagement” Threat-agnostic Threat-specific Pro-active may mean that foreign adversaries contem- counter-adversary plating a direct cyberattack on a non-military but passive strategy and homeland target no longer will have it so easy. capability Israel’s cyber defense posture has been similar for much longer: intelligence-driven pre-emp- The five functions of the NIST Cybersecurity tion and disruption of adversarial capabilities Framework are Identify, Protect, Detect, underpin whole-of-society cybersecurity. Respond, and Recover. The NIST Cybersecurity Framework does not include defense, and for We should not confuse cyberdefense with a good reason: no functioning state expects militarization. Cognizant of the serious obsta- its citizens to defend themselves. Universally, cles precluding military cyberdefense, several countries opt for establishing civilian cyberse- curity organizations. 80 | WIPRO STATE OF CYBERSECURITY REPORT
The short term goal: Join forces and huge datasets from various entities to en- scale up hance situational awareness across sectors or geographies, automate security operations The “In cyberspace, the offense has the upper at scale, and support temporary surges in hand” dictum is accepted. It does not have demand. to be. While the private sector will continue to perform the lion’s share of the secure and Threat intelligence and incident response protect tasks, nation-states must accept their populate the higher-end of the services. These share of responsibility: active defense. Once threat and capability-focused services resem- governments deliver active cyberdefense, the ble defense but fall short of defense in scope, civilian cyber burden will dwindle, liberating capability, and authority. Private cyberde- human, managerial, and fiscal resources to fenders do not operate to disrupt adversaries boost your core business. in “red space” persistently; neither can they realistically compete with state-grade adver- Business leaders should press their relevant saries. Even though the best private-sector governments – but cannot afford to wait. efforts fall short of defense, global MSSPs, Joining forces and pooling resources is a with their superior scale and know-how, promising strategy for cost-effective business are the toughest opponent for threat actors security. Some not-for-profit initiatives offer conducting offensive cyberspace operations tangible business value. American Information (OCO) against private corporations. Sharing and Analysis Centers (ISACs) offer threat and mitigation information to their Shared responsibility is the foundational prin- respective members. Israel’s National Cyber ciple in cybersecurity. Your security journey Directorate has developed the CyberNet infor- will be smoother with a global MSSP. However, mation sharing network and stood up sectoral the sooner governments take a larger respon- SOCs that offer superior situational aware- sibility for their respective citizens’ cyberse- ness and incident management capabilities. curity, the brighter our common future will be. Moreover, large managed security service providers (MSSP) are already at the frontlines Authored by Dr. Lior Tabansky, Blavatnik ICRC, Tel Aviv of civilian cybersecurity. MSSPs can correlate University. WIPRO STATE OF CYBERSECURITY REPORT | 81
Internal Organizational Supply Chain Security Collaboration Businesses that depend on their supply chain Before embarking on collaboration between for core business sustenance will need to un- the firm and external entities, the house must derstand and mitigate risks associated with the be in order internally. The applicability of a chain. Additionally, supply chains are essential cyber-resilience framework was discussed when businesses enter new markets and need in the previous section, and the significance local partners to increase the speed of access. of communication protocols through the hierarchy, including reporting of cyber risks Recently, cyberthreats have been moving up the and actions into the board of directors, was index of general supply chain risks, as demon- highlighted. The changing role of the CISO into strated by multiple incidents. Supply chain a governance function with higher visibility cyber risks can impact the cyber posture of the into executive management was also a note- host company itself (cyberattacks through the worthy trend. These changing dynamics have chain), but a destabilizing cyber incident on a increased the stakes on the need for collab- critical partner (cyberattacks on the chain) can oration with other functions, such as Human impact the enterprise’s business continuity as Resources, Legal, CTO, CFO, Risk Management, well. Organizations need to extend the threat Corporate Communications, and the CIO. intelligence they gather to their supply chain partners and conduct regular risk assessments Collaboration with HR is increasing across across their chain. Supply chain access and data policy definitions, employee awareness, and flows need to be segmented and monitored for disciplinary actions. The Legal/General Counsel anomalous activities. Organizations also need to office is integral to driving regulatory compliance, be prepared with a response plan for an adverse post-breach response mechanisms, and the scenario. safeguarding of certain actions under attor- ney-client privilege. Corporate Communications We asked respondents about their confidence in is increasingly playing a critical role in customer preventing attacks from within their supply chain awareness of security practices, targeted fraudu- elements. Figure 54 shows that 94% of organi- lent schemes, and post-breach communications zations indicated some confidence in preventing to affected parties. Above all, collaboration attacks through their technology providers (man- between business units and the CISO office is on aged services, cloud service providers, SaaS, etc.). an upward trend due to the growing instances of shadow IT and the need for security enablement for new business opportunities in the digital era. 82 | WIPRO STATE OF CYBERSECURITY REPORT
70% 60% 50% 40% 30% 20% 10% 0 Recent Outsourced Other Service or Third-party Technology Providers Integrations Business Product Suppliers Consultants (Managed Services, & Acquisitions Processes (Facility Management, and Contractors Cloud Service Physical Security, etc.) Providers, SaaS, etc.) Highly Confident Not Confident Confident FIGURE 54 [ Confidence level in preventing cyberattacks ] Many enterprises are beginning to offer the Threat Intelligence Feeds supply chains some basic security capabilities, including subscribing to security services as-a- Enterprise security teams and the monitoring Service to reduce risks and improve availability. systems they operate need continuous real-time Organizations need to move from treating supply data streams to retrieve information on poten- chain risks as a third-party issue to dealing with tial threats. Knowledge about attackers’ tactics, them collaboratively in a holistic manner. techniques, and procedures helps mitigate risks and serves as a healthy prescription for the 45% GLOBAL INSIGHT cyber immune systems to scale up their defense of respondents are highly mechanisms. Increasingly, security defense confident in mitigating risks mechanisms have automation capabilities. coming from their technology Feeding real-time data into security systems, providers.. such as SIEM, to block blacklisted entities helps increase response speed and accuracy. Threat intelligence feeds serve organizations with vigilance and help narrow the window of opportunity for attackers. An organizational threat-intelligence strategy should include an array of sources and a balance of general and contextual threat intelligence. WIPRO STATE OF CYBERSECURITY REPORT | 83
What are the sources of threat intelligence? 41% GLOBAL INSIGHT of respondents consider In our primary research, we asked organizations commercial, third-party to rank threat intelligence sources in order of threat intelligence suppliers their reliability. Gaining their lost momentum as the top source of threat of 2018, commercial, third-party threat intel- intelligence feeds. ligence suppliers topped the charts with 41% while intelligence provided by SIEM vendors ranked second with 23% (Figure 55). 15% of respondents still rely on the National CERT Association (NCA) or a similar organization for their threat intelligence feeds. Commercial third-party 20% 40% 60% 80% 100% threat intelligence supplier Open Source third-party threat intelligence supplier Internal sandboxing and forensic analysis SIEM Vendor provides Intelligence Security analytics team carries out manual reviews (besides automated SIEM correlation) National CERT or similar organization 0% 12345 6 FIGURE 55 [ Sources of threat intelligence for organizations ] 84 | WIPRO STATE OF CYBERSECURITY REPORT
Information Sharing 43% GLOBAL INSIGHT of responding organizations Information sharing between organizations in are comfortable in sharing the private sector directly or through govern- the tactics, techniques, and ment intermediaries is critical to stay abreast procedures of attackers. of threat actor actions. The sharing process becomes enriched and valuable to all only when previous year. Interestingly, 57% of respondents consumers become producers of intelligence, are comfortable sharing only indicators of com- and sharing becomes bidirectional. We asked promise (IoC) compared to 67% in 2018. organizations about the nature of threat intelli- gence information they are willing to share over common forums. Figure 56 shows an encour- aging trend, where 43% of respondents were comfortable sharing the tactics, techniques, and procedures employed by threat actors in their environments – a 10% increase from the Attacker's Tactics, Techniques & Procedures (TTPs) Only indicators of compromise (IoC) - Malicious IPs, URLs & Domains 0 10% 20% 30% 40% 50% 60% 70% 2018 2019 FIGURE 56 [ Information organizations are willing to share ] WIPRO STATE OF CYBERSECURITY REPORT | 85
Barriers to sharing 64% GLOBAL INSIGHT of responding organizations The above research highlights reluctance among consider reputational risk organizations to share attack information with the most significant barrier peers or a sharing network. We asked organiza- against the sharing of tions what barriers to information sharing exist. threat information. Figure 57 shows that 64% of survey respondents considered reputational risks the most signif- icant obstacle to sharing threat information. 43% responded that legal barriers to public sharing existed, while 41% stated that the lack of a standard format for information exchange is critical. 70% Market No clear Legal Concerns Not enough Already Lack of 60% rivalry benefits barriers surrounding resources for sharing common 50% participant threat standards 40% generating information format for 30% vetting & sharing interchange 20% intelligence with 10% industry peers 0 Reputational risks 2019 2018 2017 2016 FIGURE 57 [ Challenges related to sharing threat information in peer networks, 2016–2019 ] Cyberattack Simulations designed to imitate real-world scenarios with the intent of organizations to learn from the out- Cyberattack simulation exercises gauge an comes and recalibrate their defense strategies. organization’s preparedness against real-life attack scenarios. Simulations that involve Industry simulation exercises on the multiple players in the economy across industry rise sectors can also test the preparedness against dovetail effects and assess collective resilience. Wipro’s research on organizational participation Cyberattack simulation exercises are usually in simulation exercises globally revealed that 82% of the surveyed organizations participated 86 | WIPRO STATE OF CYBERSECURITY REPORT
in cyber simulation exercises to test their defense strategies’ robustness. However, 60% of respondents participated in simulation exercises coordinated by third-party service providers. Cyberattack exer- cises coordinated by NCA/CSIRT saw 39% participation, nearly a 10% increase from the previous year. Participation in attack simulation exercises organized by industry regulators has dipped from 28% last year to 20% currently, as shown in Figure 58. 60% 50% 40% 30% 20% 10% 0 Cyberattack exercises Cyberattack Cyberattack exercises Cyberattack Never participated by geography-specific exercises coordinated exercises in any simulation industry/sector coordinated by by any defense regulators (SEC, National CERT/CSIRT /intelligence coordinated by Federal Reserve, agencies third-party NERC, EBA, etc.) service provider 2019 2018 FIGURE 58 [ Organizational participation in cyberattack simulation ] 39% GLOBAL INSIGHT 86% VERTICAL INSIGHT of responding organizations of HLS respondents, 70% of participated in simulation CBU respondents, and 58% of exercises coordinated by their MFG respondents participated in simulation National CERT/CSIRT. exercises coordinated by third-party service providers. WIPRO STATE OF CYBERSECURITY REPORT | 87
Cyber Insurance policies cover costs incurred in investigations, legal processes, lawsuits, and IT recovery. Enterprises are adopting cyber insurance as a risk transfer mechanism to hedge against the Our survey results (Figure 59) showed promising losses that unexpectedly arise from cyberat- trends in this area. 79% of responding organiza- tacks. With the advent of cloud and IoT and the tions indicated that they have cyber insurance in resultant increase in attack surfaces, organiza- place, which is a 14% increase from the previous tions are becoming more susceptible to cyberat- year. In this year’s research, 43% of respondents tacks. While a cyberattack can lead to erosion of indicated they carry a dedicated cyber insurance trust and negative publicity resulting in broader policy, which is a 4% year-over-year growth. business losses, organizations can leverage Organizations buying multiple cyber insurance cyber insurance policies to cover some portions policies are trending upward, with 18% opting of legal and recovery expenses. Depending on for this compared to 7% in 2018. the severity of the breach, insurers have vari- ous coverage policies. Typical cyber insurance 60% 50% 40% 30% 20% 10% 0 Yes, through Yes, through Yes, cyber Yes, No cyber a dedicated multiple insurance insured insurance single cyber cyber coverage through a coverage insurance policy insurance through other captive policies insurance policies insurance subsidiary 2019 2018 2017 2016 FIGURE 59 [ Cyber insurance policy adoption, 2016–2019 ] 88 | WIPRO STATE OF CYBERSECURITY REPORT
A word of caution the finer details of the coverage, including exceptions, which vary based on geographical Cyber insurance policies should complement jurisdiction and credibility of third-party ven- the overall risk management plan. Regard them dors, is of utmost importance. as a fallback strategy, not a primary risk man- agement strategy. Thoroughly understanding 79% GLOBAL INSIGHT 52% VERTICAL INSIGHT of organizations indicated that of consumer business they possess cyber insurance. organizations and 50% of manufacturing organizations have dedicated cyber insurance policies. WIPRO STATE OF CYBERSECURITY REPORT | 89
“You cannot cross the sea merely by standing and staring at the water.” —Rabindranath Tagore 90 | WIPRO STATE OF CYBERSECURITY REPORT
4 FUTURE OF CYBERSECURITY The previous sections looked at the macro, meso, and micro views of cybersecurity, largely deriving trends from the last year. This section lays out a future perspective on cybersecurity by analyzing leading indicators derived from trends in academic research and venture capital investments in this space. Additionally, a point of view on the potential for decentralized trustware-based col- laboration for sharing skilled resources across critical infrastructure providers during disasters is presented – based on a joint research effort between Wipro and IIT Bombay. In closing, we lay out a few cybersecurity predictions for the year ahead. Patent Trends in Cybersecurity or potential use of emerging technologies in addressing problems faced by cybersecurity One mechanism of identifying technol- ecosystems. ogy insights and market adoption in the cybersecurity space is to analyze the Our cyber patent research methodology patent landscape and derive trends and and scope have changed from the SOCR insights. These insights highlight research 2019 approach; hence, the findings are not activities, growth, and adoption of relevant directly comparable. In this year’s research, technologies by different entities, such as we examined six emerging technologies: corporations, governments, and academia. artificial intelligence (AI)/machine learning Additionally, insights from cross-sections (ML), blockchain, internet of things (IoT), of cybersecurity provide evidence of the use WIPRO STATE OF CYBERSECURITY REPORT | 91
5G, quantum computing, and digital twin across Cybersecurity patent filings security practice areas, such as data security, application security, network security, cloud Since 2015, we found 9000+ cybersecurity-re- security, and endpoint security. We scanned lated patent family (technology inventions) patents filed in the past five years covering all filings, and each year saw an increase in pat- geographies and focused our trend analysis on ent filings compared to the prior year (based 20 countries: Australia, Brazil, Canada, China, on standard scope of filings). A nearly 350% France, Germany, India, Israel, Italy, Japan, increase in patent filings from 2015 to 2018 Korea, Mexico, Norway, Russia, Singapore, South indicates a rapid increase in cybersecurity Africa, Sweden, Switzerland, UK, and the USA. research, technology growth, and adoption. Figure 60 depicts the yearly cybersecurity pat- ent filing trends. Numbers of Patents 3,500 3,000 2,500 2015 2016 2017 2018 2019 2,000 1,500 1,000 500 0 FIGURE 60 [ Yearly cybersecurity patent filings* ] * Due to procedural delays in publishing patent filings across the world, the data for 2019 is incomplete. 92 | WIPRO STATE OF CYBERSECURITY REPORT
Cybersecurity patent filings by geography Cybersecurity patent filing analysis indicates that China has, by far, surpassed all other countries in the number of patentable inventions (Figure 61). 2,500 2,000 Numbers of Patents 1,500 1,000 500 0 China USA Korea India Japan Canada Australia UK Germany Singapore 2019 2018 2017 2016 2015 FIGURE 61 [ Cybersecurity patent counts by country ] Country 2019 2018 2017 2016 2015 China 2027 2108 1080 698 397 USA 42 688 617 571 346 Korea 47 114 181 134 63 India 39 63 87 80 39 Japan 2 33 71 97 45 Canada 7 41 61 69 50 Australia 3 18 43 57 29 UK 0 41 39 40 Germany 1 36 29 35 8 Singapore 6 14 25 23 6 13 WIPRO STATE OF CYBERSECURITY REPORT | 93
China and the US accelerated patent filings in majority of patents filed were in the AI/ML space. 2018 and 2019, which is likely to continue in Additional findings included 2020. Six corporations and five universities of Chinese origin filed a majority of the patents • Patent filings in the data security area in China, indicating collaboration in developing further broken down by emerging technol- unique technology solutions for industry prob- ogies were as follows: blockchain (1813), lems in the cybersecurity space. Figure 61 shows AI/ML (1519), IoT (441), 5G (196), quantum analysis for the top 10 countries, as the patent computing (40), and digital twin (36). count was significantly less for the rest. The remaining countries appear to have stabilized • Patent filings in the device security area or slightly reduced cybersecurity patent filing broken down by emerging technologies rates. Although the quality of these patents was were as follows: AI/ML (1502), IoT (616), not within the scope of our study, the trend in blockchain (603), 5G (243), quantum com- patent filings shows the growing importance of puting (28), and digital twin (16). cybersecurity research. • In the network security area, the splits were Cybersecurity practice areas and AI/ML (1130) followed by IoT (376), block- emerging technologies chain (343), 5G (198), quantum computing (21), and digital twin (6). We further dissected the patent filing data by cross-sectioning cybersecurity practice areas • Cybersecurity patent filings involving quan- and emerging technology areas, laying out a cy- tum computing, 5G, blockchain, and AI/ML bersecurity practice area as one dimension and were 1%, 7%, 25%, and 49%, respectively. selecting an emerging technology as the second dimension (Figure 62). From a technology implementation point of view, AI/ML topped all cybersecurity practice areas, The data indicated a significantly high number followed by blockchain. Among selected emerg- of patents filed in the data security and device ing technologies in cybersecurity, adoption of security areas followed by network security. AI/ML, blockchain, and the intersection with IoT When cross-sectioning cybersecurity patents witnessed significant growth. with emerging technologies, we found that the 94 | WIPRO STATE OF CYBERSECURITY REPORT
Numbers of Patents 2,000 1,500 1,000 500 0 Data Application Network Endpoint Cloud API Device Threat Security Security Security Security Security Security Security Security Intelligence Monitoring & Analytics Digital Quantum 5G IoT Blockchain AI/ML Twin Computing FIGURE 62 [ Patents by cross-sections of cybersecurity practice areas and emerging technologies ] Functional Areas / Digital Twin Quantum 5G IoT Blockchain AI / ML Technology 36 Computing Data Security 196 441 1813 1519 40 104 Application 5 9 167 194 569 Security 198 21 76 Network Security 6 8 51 376 343 1130 16 8 140 177 307 Endpoint Security 14 4 243 151 139 354 28 10 36 39 85 Cloud Security 6 8 113 616 603 1502 5 56 31 440 API Security 1 290 115 764 Device Security 16 Threat Intelligence 21 Security Monitoring 4 & Analytics WIPRO STATE OF CYBERSECURITY REPORT | 95
Patent filings in the Al/ML domain indicate such as Seed, Early Stage, Expansion, and their usage for different functions, such as Pre-Public. Although many ventures fail for risk scoring, compliance management, data various reasons, clusters of investments in discovery, threat detection, threat intelligence, similar technologies indicate market potential, threat hunting, user behavior analytics, anom- and such areas need to be on cybersecurity aly detection, DDoS mitigation, and adaptive teams’ radars when laying out their roadmaps, authentication. Cybersecurity is witnessing a with necessary caution. Within cybersecurity, rapid increase in technology research, devel- disruption is quick, and acquisitions occur opment, and adoption because of collaborative frequently. Many enterprise security teams participation among governments, industry, are willing to dabble with emerging tools and and academia to devise unique solutions that technologies to mitigate new threats. The address emerging threats. last section presented an analysis of where cybersecurity research and resultant patent The proliferative growth of AI/ML- and block- filings worldwide were focused. This section chain-related research seems to reflect the identifies patterns related to seed investments need to solve problems in new and innovative in cybersecurity. ways. Although technology areas like AI/ML, blockchain, and IoT will continue to drive inno- For this research, we partnered with Tracxn vation, areas such as 5G, quantum computing, to gather data around cybersecurity-related and digital twin will probably see an uptick in seed investments during the past three years. research focus in the coming years. API secu- The Wipro SOCR team classified companies rity and threat intelligence could also see more into various domains based on technology and research output in the future. focus areas and examined the top 50 start-ups that received maximum funding. Although our Seed Investment Trends in coverage is not exhaustive, the research aimed Cybersecurity Start-ups to identify macro investment trends. Figure 63 depicts the security domain categories in Start-up funding patterns by venture capitalists which companies received seed funding. around the world indicate trends in promising areas that could produce disproportionate eco- nomic returns. Start-ups typically go through different stages of capital accumulation, 96 | WIPRO STATE OF CYBERSECURITY REPORT
Identity Verification 10 20 30 40 50 Data Privacy Total Funding ($ Million) Cloud Infrastructure Security Online Toxicity Serverless Security Container Security Data Security Threat Detection Payment Fraud IoT Device Security 0 FIGURE 63 [ Seed funding by category, 2016-2019 ] Although the graph gives a numerical representation of the top-funded technology areas, we can high- light some patterns: ML-BASED IDENTITY VERIFICATION SERVERLESS SECURITY Remote identity verification is critical Serverless risks remain poorly understood. for the digital economy. Computer vision Serverless security solutions with function and ML-based solutions continue to firewalling, code execution monitoring, evolve for identity verification. and vaults can address the gaps. DECENTRALIZED IDENTITY VERIFICATION CONTAINER SECURITY Where trust relationships do not exist, solutions that provide guardrails for community-based vetting can help. DevOps processes and runtime security Decentralized, consensus-based identity continue to attract funding. verification solutions are emerging. ONLINE TOXICITY IOT DEVICE SECURITY is a substantial problem for gaming Key management for IoT devices becomes platforms and other services consumed challenging at scale. IoT device security by children. Solutions that can track and solutions using quantum driven key report online toxicity will be complementary. management look promising. Wipro produced this research in collaboration with Tracxn (tracxn.com). WIPRO STATE OF CYBERSECURITY REPORT | 97
Decentralized Trustware-based access. As organizations deploy resources (IoT) Collaboration with a constrained scope of computation and storage, traditional access control models fall Pandemics and natural disasters cause abrupt short of efficiently enforcing access control. restrictions on people’s movement and resourc- There is a need for an internet-scale trust man- es, thus creating roadblocks in addressing agement service. The paradigm of zero trust is a cybersecurity incidents. The availability of ser- step in this direction. vices from sectors like healthcare, transporta- tion, communication, power, et al., is even more Trust-as-a-service using blockchain important in such times. To ensure the avail- ability of critical services during exceptional The Linux Foundation has constituted the Trust times, there is a need of realigning sector-wise over IP initiative to deliver trust as a service by business processes toward a common minimum combining cryptographic trust at the machine standard such that an expert from one organi- layer and human trust at the business, legal, and zation can operate on the process of another social layers. These initiatives aim to abstract organization under a well-defined, constrained, out resources and users of independent organi- trusted, and auditable environment. zations into a consortia-supported overlay net- work such that a user from one organization on A different approach to conventional the network can act on a resource from the other; threat modeling provided, the users furnish their capabilities to the resource. Capability-based access control The current sensitive processes in critical in- models are well studied for their suitability in frastructure are typically role-based with strict a distributed environment, and it is known that separation-of-duty constraints. Maintaining the they lack in communicating the state-change availability of experts handling these processes of a user’s capability to resources. However, is a challenge. COVID-19 has forced us to rethink due to the advent of technology platforms like cybersecurity assurances by introducing a new blockchain, it is worth revisiting these models angle to the typical threat modeling. Threat with the help of a blockchain-based state-com- modeling usually considers the external factors munication channel. impacting a system or, at most, the internal malicious activities. An open governance model Blockchains are effective state-change com- where organizations allow a transparent, capa- munication platforms in distributed environ- bility-based (instead of role-based) access to ments for various applications that are either their business processes by entities verified on purpose-specific or general-purpose. Any client the trusted network can be a different approach. connected to a blockchain platform can be as- sured of the state-change in the most reliable Even before the pandemic hit us, there were ini- fashion known to us so far. tiatives to extend the monolithic access control model of an organization to a federated setup Capability based models using where more than one organization can collab- blockchain orate. Such extensions of traditional access control models are known as trust management With the gamut of new and old technological frameworks whose objective is to help the models available to us, it is possible to address participants of the framework manage their risk the impact of the COVID-19 scenario on prev- while opening up their resources for external alent threat models by realigning the existing business processes of an organization from 98 | WIPRO STATE OF CYBERSECURITY REPORT
role-based models to capability-based models • Protection of internal processes from net- with support from blockchain platforms. worked and non-networked entities Should there have been a wide-scale accep- • The anonymity of organizations affected by tance and deployment of DID (Distributed an incident Identity Network), it would have been possible to address the crunch on expert human resources • Reliability of patches developed by an by allowing them to participate in process exe- external expert cution beyond their routine scope of work. This assumes that there is a redesigning of business • Privacy of experts participating on the processes in such a modular way that the experts network familiar to a sector-specific business process in a host organization can operate upon a module • Escrow facility via contracts to capture of a process hosted in a foreign organization conditions of deliverables and payments while revealing only the data relevant to the operations assigned to the external expert. Trust Addressing the new normal plays a significant role in realizing this vision. Cybersecurity in the context of COVID-19 is a The key challenges in realizing this futuristic human-centric problem. Assuming that a con- vision of cybersecurity are: sortia-supported trust management network is in place, identification of the parts of a business • Formation of a platform: Motivating sec- process that can be automated as a smart con- tor-specific players to form a platform for tract and its execution that can be controlled by exchanging their requirements and avail- an entity verified by the network is an area that able expertise to others demands further investigation. • Identification of modular boundaries of In the post-COVID-19 era, cybersecurity im- sector-specific business processes (health, plementations will have to rely on trustware transport, power, etc.) – technologies and governing models that allow organizations to supplement their prevalent • Overlay network of segmented services: access control mechanism – to adapt to its Integration of service platforms like iden- collaborative needs and give assurances to the tity, event orchestration, escrow, payment trust it is placing on the external entities. Figure 64 depicts a trustware-assisted relationship be- • Zero Trust–based minimalistic access tween two organizations that allows each party enablement to rely upon technological and non-technologi- cal means to derive a level of trust to agree on a decision. WIPRO STATE OF CYBERSECURITY REPORT | 99
Collaboration MaRnTiarsugkestmeVnetrify Audit Regulator Channel Trustware Resources Users Common Standards Users Resources Blockchains Critical Infrastructure A Critical Infrastructure B Zero Trust Protocols Legal Contracts Open Governance FIGURE 64 [ Trustware-based collaboration mechanism ] The technological means may encompass various organizations start deploying trustware into their blockchain-based networks used for identity or business processes. attestation, for example; and the non-technologi- cal means, like legal contracts, help complement In a joint research collaboration,WiproTechnologies incomplete conditions (unforeseen) that cannot (a member of ToIP Foundation) and IIT Bombay are be effectively addressed by technological means. devising a framework to help system designers to The figure highlights a setup of collaborators juxtapose security properties for a new or re-engi- being observed by their regulator, implying that neered business process that rely on blockchains only need-to-know data is being exposed to the (a type of trustware) to derive digital trust amongst regulator. Trustware encapsulates a broad set of distributed entities. This is an important step in trust-enhancing technologies, frameworks, and assessing the security assurances of a newly standards. Trust-as-a-service will be a pressing composed business process and its effective demand, and organizations will have to realign governance with a clear understanding of the rami- their business processes to take advantage of this fications of each design decision. service.This brings us to a new challenge – guaran- teeing security and governance assurances once Authored by Professor R. K. Shyamasundar and Dr. Vishwas Patil,Department of Computer Science and Engineering, Cybersecurity Predictions Indian Institute of Technology, Bombay and Vinod Panicker, Sr Member, DMTS, CRS, Wipro. It is sometimes hard to carry out a post mortem analysis of cybersecurity-related events, given the chal- lenges in attribution, the availability of reliable data, and the secrecy surrounding this space due to legal challenges. Making predictions is an even more difficult task. The trends presented here are evident from emerging intelligence patterns and collective patterns of organizational behavior. 100 | WIPRO STATE OF CYBERSECURITY REPORT
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115