#
Threat Detection and Prevention2023.4
In order to preserve the integrity of data that Tuna stores, processes, or transmits for Customers, Tuna implements strong intrusion detection tools and policies to proactively track and retroactively investigate unauthorized access. This include threat detection and prevention at both the network and host level, as well as threat intelligence monitoring.
#
Policy StatementsTuna policy requires that:
(a) All critical systems, assets and environments must implement realtime threat detection or prevention.
#
Controls and Procedures#
System Malware ProtectionAll end-user workstations and production systems must have antivirus running.
All servers run linux OS. The default anti-malware solution used is rkhunter. The anti-malware solution will include protection against malicious mobile code. The malware scans occur at the time the images are built and additional runs are scheculed to run daily. None of the servers at Tuna ingest files nor has Tuna any email server. Once an image is generated the servers stay intact until a new image is deployed. The only files that should change are log files being written(and sent to our SIEM) all the time. AIDE is constantly scanning filesystem changes and logs will remain on our servers for as long as those servers exist, allowing for extense research in the event of a security breach. Any SO operation like privilege elevation or login has its logs captured by the auditlog agent and gets sent to our SIEM, where unusual behavior can be detected and alerted.
- Next generation endpoint protection agent may be used as an equivalent solution.
- Hosts are scanned continuously for any filesystem changes with AIDE.
- The malware signature database is kept up to date, changes are pushed continuously.
- Logs of AIDE and alerts are maintained according to the requirements outlined in System Auditing.
Detected malware is evaluated and removed following the established incident response process.
All systems are to only be used for Tuna business needs.
#
Firewall ProtectionFirewall protection is implemented at the following layers
Network - including Network ACL and Security Groups in AWS as well as on- premise firewalls between the office networks and the Internet.
Host - local firewalls are enabled on the user endpoints as well as servers (compute and database instances in AWS are protected by security groups)
Application - web application firewall (WAF) and content distribution are configured at the application layer to protect against common web application attacks such as cross site scripting, injection and denial-of-service attacks.
#
Network Intrusion Detection#
Intrusion Detection for On-Premise Internal Networks- Tuna leverages AWS GuardDuty for network security of its on-premise environments.
- AWS GuardDuty features stateful firewall inspection and intrusion detection/prevention (IDS/IPS) of applicable incoming and outgoing network traffic. Attacks and suspicious network activities are blocked automatically.
- Tuna IT manager is responsible for configuring the firewall and IDS/IPS rules and review the configuration as least quarterly.
#
Intrusion Detection in AWS Cloud EnvironmentsTuna implemented a real-time threat detection solution by monitoring AWS Cloudtrail events and/or VPC flow logs.
- Cloudtrail events are monitored by AWS GuardDuty
- VPC flow logs are sent to and analyzed by AWS GuardDuty.
Additional monitoring is provided by our infrastructure service provider AWS.
#
Host Intrusion DetectionHost based intrusion detection is supported via one of the following:
On Windows and macOS systems: AWS Inspector and Carbon Black PSC agents for malware detection and behavior-based endpoint threat detection.
On Linux servers: AWS Inspector and Carbon Black PSC agents for activity monitoring, vulnerability scanning, and threat detection. This includes all virtual instances running in the cloud environment.
#
Web Application Protectionleverages AWS Services to protect web applications against common attacks such as SQL injection, cross-site scripting, and denial-of-service (DoS/DDoS) attacks. The services used include AWS Shield, WAF, Cloudfront, and/or API Gateway.
#
Centralized Security Information and Event ManagementSecurity events and alerts are aggregated to and correlated by one or both of the following solutions:
- the infoSec team
- Internally developed security automation tooling
#
Threat Intelligence MonitoringNH-ISAC
Tuna is an active member of the National Health Information Sharing and Analysis Center (NH-ISAC).
Tuna Security team is subscribed to receive threat alerts from NH-ISAC.
Intelligence Feeds
Additional intelligence feeds are received automatically through some of the 3rd party security solutions that have been implemented on the networks and/or endpoints. The data gathered through these external intel feeds is automatically used by the security solutions to analyze events and generate alerts.
Regulatory Requirements Updates
The Security and Privacy Officer actively monitors the regulatory compliance landscape for updates to regulations such as HIPAA, PCI and GDPR.