Controlling and Managing Security with Performance Tools
|
|
|
- Ruby Carter
- 10 years ago
- Views:
Transcription
1 Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by
2 Co ntrolling and Managing Security with Performance Tools... 1 Why Performance Tools?... 1 How Do I Configure Security with These Tools?... 3 How Do I Audit With These Tools?... 4 Summary... 5 i
3 Copyright Statement 2010 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at [email protected]. ii
4 Controlling and Managing Security with Performance Tools There are as many facets of computer security as there are attackers trying to get through your firewall today. And that s a lot. Each system that you re responsible for needs to be protected individually and as part of the whole. For example, to comply with many government and industry regulations, you can t just lock down the network perimeter or the desktop computer. Holistic systems to implement, manage, and monitor the system security and configuration must be put in place and then regularly audited with the collection, storage, and analysis of system logs. Records must also be kept and regularly reviewed that track changes to systems to ensure continuous compliance with corporate and industry policy. In the previous article, you read about using network inventories and maps to identify the resources on your network. That article also called out a technique for gathering the necessary data using an existing performance management infrastructure. In this article, I ll show you how to extend that technique beyond enumeration into the realm of systems management. You ll see why this is a valuable approach to consider, especially in smaller businesses and companies whose IT budgets are tightening daily. Why Performance Tools? It doesn t seem intuitive, at first glance, to consider performance management tools as useful for security management tasks. After all, performance management is all about measuring memory use and CPU cycles, restricting disk use, starting and stopping virtual machines, and so forth. That s the common perception. In fact, many administrators knowledge of performance management is limited to the built in Windows Task Manager (see Figure 1) or the free Process Monitor tool from Microsoft. But these are not true performance management solutions. 1
5 Figure 1: Task Manager is not a performance management solution. The reality is that performance management solutions are software suites that are deeply integrated within an entire infrastructure. These solutions tie in to core pieces of every system and component. The tight integration enables rich data reporting from across a workgroup, a data center, or a worldwide enterprise. And most performance management solutions have reporting tools that can give both instant summaries and detailed reports of what s happening on all systems. You can probably already surmise that, when the solution is configured to retrieve security data as well as performance data, the solution s functionality is extended to become a great security dashboard and reporting tool. That s the case with most performance suites today. Many IT professionals want centralized security analysis and reporting across an enterprise, so most software vendors in this space have enabled their systems to provide this feature either through simple customization or right out of the box. 2
6 How Do I Configure Security with These Tools? The feature that enables these solutions to work for security may already be obvious to you. The tools that you use for performance management don t just report on performance. They enable you to control it. Most performance management solutions have technology that enables, for example, restriction of virtual machine memory use per virtual machine. As an administrator, you first define the memory utilization parameters for a group of systems. Then the performance management tools configure the target systems to conform to your definition. The performance management system then verifies that the parameters have been applied, and reports success back to the reporting console. Finally, the settings are monitored over time to ensure compliance. When a situation occurs where the settings are not applied or adhered to, or a defined threshold is reached, the system takes action often in the form of an administrative alert. Alerts, monitoring, configuration management this sounds very much like a security management solution. So why can t we use this same technique to configure security settings? Well, we can! As I mentioned earlier, most performance management tools are already being extended to configure any part of a network operating systems (OSs), routers, switches, and so on. For example, one common tool in the industry is largely billed as an enterprise wide performance monitoring and management suite. Its marketing material mostly illustrates examples with virtual machine, OS, and switch management, with various plug in modules to extend functionality. But a brief look at the interface shows that the solution is much more of a generic configuration framework for configuring and monitoring heterogeneous systems. This same solution allows you to load configurations, execute custom scripts, and even back up, restore, apply, report on, and enforce configuration sets. On top of all that, the suite still does a great job of performance management (even providing a Web based version of the Task Manager that Figure 1 shows). This is exactly what you want in a security solution. The one facet that makes these solutions work is that most technology today can be managed through automated processes and controls. This automation spans the range of devices, OSs, applications, and even data. Virtually anything within the IT domain is subject to some level of automated management. And because a great deal of the management interfaces and techniques are almost identical, the tools allow some overlap and extension. Let s consider a very common example: disabling automatic logon for Windows computers. Most organizations have a standard for servers that disables automation logon to ensure that only administrators log on to the system. The user centric control for this setting is within Control Panel. But all this control does is change a registry value: Location: \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Name: AutoAdminLogon Value: 0=disable, 1=enable 3
7 This type of configuration change and enforcement is what performance management tools already do. They can usually be configured to set registry values like this and monitor for unauthorized changes. That last point is actually a big differentiator. There are a number of solutions in the IT space that enable server configuration automation. But many of them have limited reporting and monitoring capabilities. Although these configuration monitoring techniques may not be central to performance management (performance monitoring is far more important than configuration monitoring in that space), security management absolutely relies on auditing including configuration monitoring, reporting, and change control alerting. How Do I Audit With These Tools? Audit reports are critical to any organization impacted by government or industry compliance regulations. Most likely, your industry is impacted by one or more regulations, no matter where you work. And in the regulatory compliance space, proving consistent compliance with policy is often more important to an auditor than the policy itself. This is where performance management tools really shine. They are spectacular at monitoring system configuration over time and providing reports of virtually any detail level. This is a result of the deep integration mentioned earlier, and the flexible reporting framework that the tools provide. Auditing Without Configuration Management You should remember that using a performance management solution for system auditing can be done without using the same system for configuration. So if you use, for example, Group Policy to configure your Windows systems, you can still use these tools to audit that configuration. It is often easier to use the same tool for both tasks, but you re not restricted to that approach. There are typically two ways to audit security with performance management tools. The preferred method is to use built in security analysis functionality or a vendor supplied addon to report on security compliance. Many vendors supply a combination of customizable configurations and audit reports that validate the settings you choose. These can be changed to suit your specific security requirements and then deployed simply and reliably. The other method is to use custom scripts to apply and validate configurations. These scripts are often written in configuration oriented languages such as PowerShell. Many can be found on the Internet as samples or nearly complete examples. If your performance management solution doesn t have security management available as a vendor supplied option, you can almost certainly extend it to this task with custom scripting that applies and verifies the security configuration. 4
8 Summary Performance management and monitoring tools are amazingly flexible pieces of engineering. They perform their intended tasks very well, usually with little overhead and simplified administration. These powerful tools can also be repurposed to apply and report on security configurations. And using an existing technology in a new way like this can help many organizations get more bang for their existing IT buck. When you consider your IT security needs, remember that auditing is a key requirement for most organizations. If your performance management solution can be extended to report on, and enforce, audit requirements, your annual audit process will be far less painful. 5
Auditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Virtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Realizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
Account Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
The Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
Desktop Authority vs. Group Policy Preferences
Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 2: Monitoring Active Directory... 14 Monitoring Goals... 14 Event Logs... 15 System
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
Organized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books
Go beyond basic up/down monitoring
Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Dell Spotlight on Active Directory 6.8.4. Deployment Guide
Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Top 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
The Shortcut Guide To
tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns
Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide
Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
