Critical System Protection

 View Only
  • 1.  Does SCSP prevent or detect Phising attack ???

    Posted Nov 11, 2011 05:59 AM

    Does SCSP prevents or detects phising attack ???

    Is there any configuration in policies that will prevent phising attack??



  • 2.  RE: Does SCSP prevent or detect Phising attack ???

    Posted Nov 11, 2011 01:32 PM

    The out-of-the-box Intrusion Prevention Policies (Windows Core/Limited Execution/Strict and Unix Protection policies) are excellent tools to prevent an attack.

    Phishing, or the attempt to gather credentials from an end user usually via carefully crafted emails that look legitimate - or via social engineering - are not easy to block.  So, while SCSP cannot block phishing attempts, it can provide protection in case of a credential compromise.

    With SCSP there are several means that you can use to prevent an attack, even if someone's credentials are compromised.  

    • You can de-escalate privileges by giving users - or groups of users - "Safe Privileges", so even a person with Administrator rights cannot access core system files, user-defined resource lists, or the SCSP files, preventing the system from being compromised.
    • SCSP out of the box Prevention Policies provide protection against Buffer Overflow (BO) and Thread Injection (TI) attacks of core OS Services and widely used applications like SQL and Exchange.  The vast majority of system attacks come from BO and TI attacks.
    • SCSP Blocks modification of OS Services and widely used applications' executable files. 
    • SCSP can also be configured to protect any application from BO or TI attacks.
    • SCSP can be configured to give users or groups of users custom rights to an endpoint, so they can be locked down to perform only certain tasks.
    • SCSP also locks down services, so even if an attacker were able to gain access to a service, if locked down, the service will not be able to change anything that is not specifically allowed.

    So, while SCSP cannot specifically block a phishing attack, it can prevent changes to a protected endpoint in case a user's credentials are compromised.



  • 3.  RE: Does SCSP prevent or detect Phising attack ???

    Posted Nov 12, 2011 02:22 AM

    I know what SCSP can do...

    But it is not showing when  user's credentials are compromised.

    Thank You for your reply..



  • 4.  RE: Does SCSP prevent or detect Phising attack ???

    Broadcom Employee
    Posted Nov 17, 2011 11:18 PM

    If the credentials are compromised outside of the protection of an SCSP agent, we will not immediately know this of course.  But SCSP does leverage extensive behavioral controls.  

    If desired, you could put decoys in place which SCSP would log any access to those decoys.  For example a user attempting to access customer data or another critical file could be logged.  You could do the same for an adminstrative or root user.  The behavioral controls built into SCSP pick up many suspicious activities without the need for decoys even.  A user attempting to edit the host file, someone attempting to install software, an administrator trying to access a database directly vs through the database services.

    These are all events that when combined with an event correlation system or workflow system, could easily be flagged and investigated (and exempted if identified as good behavior.)  This could even be done without enabling prevention, but just deploying an IPS policy in log only mode.

    Thanks.