This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Anti-Ransomware Guide Project"

From OWASP
Jump to: navigation, search
(Project Leader)
 
(29 intermediate revisions by the same user not shown)
Line 7: Line 7:
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.
 
</span>
 
  
==The OWASP Security Principles==
 
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
+
==The OWASP Anti-Ransomware Guide==
<span style="color:#ff0000">
 
This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.
 
</span>
 
  
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.
 
  
For example, security design happens with perhaps a handful of principles:
+
Open up any newspaper or news site and an increasingly common headline is becoming “hospital held for ransom”.  While hospitals and other organizations often have downtime procedures that let them revert back to paper for dealing with power outages and other disasters, it is still a nightmare scenario to find your entire organization's IT infrastructure screeching to a halt all because someone clicked on a malicious link or opened a questionable email attachment.  Moreover, many organizations have a significant number of legacy systems that make security a challenge and beyond very basic security provisions often do not have a corporate culture that is heavily focused on information security.  This has left many organizations struggling with how to handle ransomware attacks.  The below is meant to serve as a comprehensive defense in depth based checklist and guide to preventing ransomware from taking a foothold in your organization as well as ensuring the proper procedures are in place to deal with an actual ransomware outbreak in your environment.  Given the prevalence of Windows systems as ransomware targets, the guide is geared towards a Windows environment but is designed to be product agnostic.  Please note that the list is designed to be comprehensive and as such not all controls may be applicable to all environments.
  
* Least Privilege
+
==Project Description==
* Perimeter Security
 
* Defence in Depth
 
  
However, we regularly see designs without '''separation of privilege'''!
+
A guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware.
 
 
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!
 
 
 
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.
 
 
 
==Description==
 
 
 
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible.
 
</span>
 
 
 
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]
 
'''
 
 
 
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.
 
 
 
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.
 
 
 
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.
 
  
 
==Licensing==
 
==Licensing==
Line 54: Line 23:
 
'' Additionally, we also encourage you to contribute back to the project.  
 
'' Additionally, we also encourage you to contribute back to the project.  
  
The OWASP Anti-Ransomware Guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
+
The OWASP Anti-Ransomware Guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  
 
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->
 
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 
== What is OWASP Security Principles Project? ==
 
 
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?
 
</span>
 
 
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.
 
 
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.
 
 
== Presentation ==
 
 
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
This is where you can link to slide presentations related to your project.
 
</span>
 
 
 
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]
 
  
 
== Project Leaders ==
 
== Project Leaders ==
Line 85: Line 33:
 
* Christian Diaz
 
* Christian Diaz
  
== Related Projects ==
+
== Download ==
 +
* [https://www.owasp.org/images/3/3f/Anti-RansomwareGuidev2.pdf Version 2.0]
 +
* [https://www.owasp.org/images/6/64/Anti-RansomwareGuidev1-7.pdf Version 1.7]
 +
* [https://www.owasp.org/images/c/ca/Anti-RansomwareGuidev1-6.pdf Version 1.6]
 +
* [https://www.owasp.org/images/4/4a/Anti-RansomwareGuidev1-5.pdf Version 1.5]
 +
* [https://www.owasp.org/images/9/98/Anti-RansomwareGuidev1-4.pdf Version 1.4]
 +
* [https://www.owasp.org/images/5/5f/Anti-RansomwareGuidev1-3.pdf Version 1.3]
 +
* [https://www.owasp.org/images/8/8b/Anti-RansomwareGuidev1-2.pdf Version 1.2]
 +
* [https://www.owasp.org/images/d/d3/Anti-RansomwareGuidev1-1.pdf Version 1.1]
 +
* [https://www.owasp.org/images/a/a8/Anti-RansomwareGuide.pdf Version 1.0]
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
+
== Spanish Translation ==
<span style="color:#ff0000">
+
* [https://www.owasp.org/images/3/39/Guia_Contra_Ransomware.pdf Spanish Version 1.4]
This is where you can link to other OWASP Projects that are similar to yours.  
 
</span>
 
  
* [[OWASP_CISO_Survey]]
+
== Presentation ==
 
+
* [https://youtu.be/bPyNzP7Gqig VMworld 2017]
== Openhub ==
+
* [https://www.slideshare.net/cfrenz/mockincidentsnymjcsc2016 NYMJCSC Presentation]
 
 
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]
 
 
 
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->
 
| valign="top"  style="padding-left:25px;width:200px;" |
 
 
 
== Quick Download ==
 
 
 
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
This is where you can link to your repository.
 
</span>
 
 
 
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.
 
 
 
However, if you like you may also download the master repository from the following links:
 
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]
 
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]
 
  
 
== News and Events ==
 
== News and Events ==
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
+
* [http://nymjcsc.org/ 2016 NYMJCSC]
<span style="color:#ff0000">
+
* [https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/ IAPP Privacy Tech]
This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project.  
+
* [http://vmware.cioreview.com/cxoinsight/mitigating-malware-attacks-with-a-nsx-enabled-zero-trust-network-nid-24589-cid-71.html CIO Review]
</span>
+
* [http://www.laprensagrafica.com/2017/06/27/ataques-ciberneticos-solo-iran-en-aumento-a-menos-que-se-tomen-estas-medidas La Prensa Grafica]
 
 
* [20 Nov 2013] News 2
 
* [30 Sep 2013] News 1
 
 
 
== In Print ==
 
 
 
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
This is where you place links to where your project product can be downloaded or purchased, in the case of a book.
 
</span>
 
  
This project can be purchased as a print on demand book from Lulu.com
+
== Scripts ==
 +
* [https://www.owasp.org/images/b/b8/DomainSubs.zip Compute Phishing Domain Substitutions]
  
 
==Classifications==
 
==Classifications==
Line 139: Line 67:
 
   {| width="200" cellpadding="2"
 
   {| width="200" cellpadding="2"
 
   |-
 
   |-
   | align="center" valign="top" width="50%" rowspan="2"| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]
+
   | align="center" valign="top" width="50%" rowspan="2"| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]   
  | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]]   
 
 
   |-
 
   |-
 
   | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]]
 
   | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]]
Line 172: Line 99:
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
 +
 +
Road Map
 +
 +
Use the feedback received from version 1 of the document and use it to create an even more robust and comprehensive version 2 of the guide.
 +
 +
Get Involved
  
 
Involvement in the development and promotion of OWASP Anti-Ransomware Guide Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
 
Involvement in the development and promotion of OWASP Anti-Ransomware Guide Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
Line 182: Line 115:
 
=Project About=
 
=Project About=
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
+
{{Template:Project About
<span style="color:#ff0000">
+
| project_name =OWASP Anti-Ransomware Guide
This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says "OWASP_Example_Project". When in doubt, ask the OWASP Projects Manager.
+
| project_description =A guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware.  
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project
+
| project_license =Creative Commons Attribution-ShareAlike 3.0 license: [http://creativecommons.org/licenses/by-sa/3.0/
</span>
+
| leader_name1 = Christopher Frenz
 
+
| leader_username1 = cfrenz
{{:Projects/OWASP_Example_Project_About_Page}}  
+
}}  
  
  

Latest revision as of 16:22, 17 December 2019

OWASP Project Header.jpg


The OWASP Anti-Ransomware Guide

Open up any newspaper or news site and an increasingly common headline is becoming “hospital held for ransom”. While hospitals and other organizations often have downtime procedures that let them revert back to paper for dealing with power outages and other disasters, it is still a nightmare scenario to find your entire organization's IT infrastructure screeching to a halt all because someone clicked on a malicious link or opened a questionable email attachment. Moreover, many organizations have a significant number of legacy systems that make security a challenge and beyond very basic security provisions often do not have a corporate culture that is heavily focused on information security. This has left many organizations struggling with how to handle ransomware attacks. The below is meant to serve as a comprehensive defense in depth based checklist and guide to preventing ransomware from taking a foothold in your organization as well as ensuring the proper procedures are in place to deal with an actual ransomware outbreak in your environment. Given the prevalence of Windows systems as ransomware targets, the guide is geared towards a Windows environment but is designed to be product agnostic. Please note that the list is designed to be comprehensive and as such not all controls may be applicable to all environments.

Project Description

A guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware.

Licensing

The OWASP Anti-Ransomware guide is free to use. In fact it is encouraged!!! Additionally, we also encourage you to contribute back to the project.

The OWASP Anti-Ransomware Guide is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Project Leaders

Download

Spanish Translation

Presentation

News and Events

Scripts

Classifications

New projects.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg

How can I participate in your project?

All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.

If I am not a security expert can I participate in your project?

Yes, you can certainly participate in the project if you are not a security expert or technical. The project needs different skills and expertise and different times during its development.

Contributors

The OWASP Anti-Ransomware Guide project is developed by a worldwide team of volunteers.

The first contributors to the project were:

Road Map

Use the feedback received from version 1 of the document and use it to create an even more robust and comprehensive version 2 of the guide.

Get Involved

Involvement in the development and promotion of OWASP Anti-Ransomware Guide Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

   Suggest Additional Security Controls
   Proof Reading
   Graphic Design
   Educate local communities
PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Anti-Ransomware Guide
Purpose: A guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware.
License: Creative Commons Attribution-ShareAlike 3.0 license: [http://creativecommons.org/licenses/by-sa/3.0/
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: N/A
Project Roadmap: Not Yet Created
Key Contacts
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases