Skip to content

Commit

Permalink
Updated guidance for Honey Traps
Browse files Browse the repository at this point in the history
  • Loading branch information
DGovEnterprise authored Nov 26, 2024
1 parent 62be8e3 commit 828a91b
Showing 1 changed file with 27 additions and 1 deletion.
28 changes: 27 additions & 1 deletion docs/onboarding/honey-traps.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

The WASOC is looking to expand the monitoring capability of Western Australian Government entities to better detect for advanced persistent threats (APT) on ICT infrastrcture. The WASOC will assist entities with the deployment of honey pots and honey tokens in infrastrcture locations that are commonly traversed by Threat Actors prior to a cyber incident.

Honey Pots and Honey Tokens are decoy ICT services or data repositories that replicate the real ICT environment of organisations. These decoys are enticing targets for threat actors to attack and exploit. Once the actor has attacked the target, the Honey Pot or Honey Token will raise an alert due to unauthorised malipulation, thus allowing security teams to detect for broader threats to an entities ICT environments.
Honey Traps emcompass both Honey Pots and Honey Tokens. Honey Traps are decoy ICT services or data repositories that replicate the real ICT environment of organisations. These decoys are enticing targets for threat actors to attack and exploit. Once the actor has attacked the target, the Honey Pot or Honey Token will raise an alert due to unauthorised malipulation, thus allowing security teams to detect for broader threats to an entities ICT environments.

??? note "Pilot Participants Prerequisite"
The pilot has prerequisites that must be met to have the minimum technical & commitment requirements to onboard to the Honey Trap Program.
Expand All @@ -26,3 +26,29 @@ Honey Pots and Honey Tokens are decoy ICT services or data repositories that rep
## Onboarding Process

The WASOC has developed guidance to assist WA Government entities to integrate the Honey Trap platform into their exisiting Sentinel Workspaces. This can be found [here](https://github.com/wagov/wasoc-honeytraps).

## Honey Trap Guidance

The WASOC recommends that entities explore the following locations within their infrastructure to deploy Honey Traps effectively for each applicable honey technology.

### Honey Pots Deployment

Honey Pots are decoy and usually virtual servers/services that mimic the infrastructure in the network where they are placed. Ideally, dependant on the network, the honey pots deployed should appear to be a realistic server/service that would be expected at this location. This level of deception would make the honey pot a more ideal target for threat actors.

Ideal Network Location for Honey Pot deployment:

- [Demilitarized Zone (DMZ)](https://en.wikipedia.org/wiki/DMZ_(computing))
- [Network Segmentations](https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Network_Segmentation_Cheat_Sheet.md#introduction)
- [MiddleWare](https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Network_Segmentation_Cheat_Sheet.md#middleware)
- [Backend](https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Network_Segmentation_Cheat_Sheet.md#backend)

### Honey Token Deployment

Honey Pots are virtual decoy objects suchs as Files,API Tokens,etc that mimic repositories of information that could be leveraged by Threat Actor to escalates attacks on an organisation. Ideally, dependant on the object types and repositiory location, the honey files should appear to be a realistic object that would be expected at this location. This level of deception would make the honey file a more ideal target for threat actors.

Ideal object repository location for Honey Pot deployment:

- Internet Facing FileShares
- Internet Facing Servers
- Databases
- Code Repositories

0 comments on commit 828a91b

Please sign in to comment.