## Is Digital Forensics Good enough? * Many of the traditional Digital Forensics artifacts are not specifically designed for our needs. * For example: * Prefetch files * Evidence of execution * Jumplists * Evidence of user actions * USB device insertion * Various registry keys --- ## Other challenges * Use of TRIM in physical drives make slack analysis useless! * Operating systems are becoming hardened! * MacOS System Integrity Protections means we can not access some files. * Chromebooks anyone? * Ipads? --- ## Sometimes Digital Forensics is unsatisfying! * Much of the time we arrive at the "crime scene" after the fact * Try to reconstruct what happened from incidental information * Forensics by its nature is **Making the best of a bad hand!** ---
## If we rely on Digital Forensics, we have already lost! ### Digital Forensics is reactive in nature * In a perfect world we would not need Digital Forensics! --- ## What if we could prepare for forensics? * Sometimes we go into an incident unprepared, but a lot of the time we can prepare in advance! * In a corporate setting we can actually prepare for forensic investigation and incident response * Similar but orthogonal to system hardening > Taking steps in advance to increase our chances of successfully > investigating an incident! --- ## Forensic Readiness 1. Maximizing an environment's ability to collect credible digital evidence 2. Minimizing the cost of forensics in an incident response. [Forensic Readiness John Tan @Stake (2001)](https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.480.6094&rep=rep1&type=pdf) --- ## Levels of preparedness * Information security is a continuum and a tradeoff between resourcing and usability * What can we do to improve our forensic readiness? * Simple things can be done cheaply! * Set configuration parameters in the environment. * More sophisticated things may involve more efforts * Install an agent, EDR etc. * Consider how likely a forensic investigation will occur? * Tradeoff between cost and completeness * Table top exercises! --- ## What types of interventions can we employ? * Configuration change * Increases the system's ability to support forensic analysis * Installation of EDR/Agents/Endpoint visibility software * Increases resilience against malicious anti-forensics. --- ## Reimagine the forensic process * Let's re-examine the digital forensic process critically * Identify the things that can go wrong, the gaps and improvements * Can we increase our chances of success? * Passive target: No deliberate interference with the DFIR process * Active Adversary: Employing Anti-Forensics to frustrate investigation