Are my systems alive secure?
|
|
|
- Beverley McCormick
- 9 years ago
- Views:
Transcription
1 Are my systems alive secure? Frank Migge, Manager Information Security Office
2 Agenda 1. Vulnerabilities Increasing Numbers Enabling Factors Focus on Operating Systems Mitigation and Elimination Strategies Vendor Response The Challenges of Patching 2. Improving Patch Management IT Infrastructure Vendor Review Patch Monitoring for Windows Patch Monitoring for AIX Unix Patch Monitoring for Linux Patch Monitoring for Cisco 3. Experience and Future
3 1. Vulnerabilities Definition: A weakness in system security procedures, system design, implementation, or internal controls that could be exploited impacting confidentiality, integrity or availability of the system. Vulnerable systems become exploitable for a malicious person or automated malware (virus) using a variety of techniques like script code injection, SQL injection, buffer overflow, etc.
4 Vulnerabilities: Increasing Numbers Steep increase in recent vulnerabilities Source: CERT*, the Computer Emergency Readiness Team, who coordinates communication during security emergencies and helps to prevent future incidents. *CERT is one of the oldest institutions in IT Security, not to confuse with the US CERT at cert.gov/ Reasons: increasing software complexity faster time to market (sell first update later) Network connectivity built into everything Internet everywhere on the planet, greater pool of smart people on the wrong side
5 Focus on Operating Systems Million lines OS became the largest piece of SW: Increased size due to progress in GUI design, device support, features, connectivity, integrated applications Increased required disk space But also increased vulnerability. complexity is the worst enemy of security Bruce Schneier, gram 0003.html#8 Network OS Vendor Cisco: Fighting with it s IOS complexity different IOS Images known to the Cisco Feature Navigator (June 2009) Source: Router Exploitation Felix FX Lindner, BlackHat 2009, P19: The IOS Image Hell CCO example: SOHO Router 1812 = 184 versions Reasons: HW, IOS is still a single, large ELF binary Which version is the latest? Which has bugs???
6 Each Operating System vendor has a different vulnerability and risk profile Common myth based on past experience: Windows has the highest risk. As a target, yes, but not anymore by total numbers of vulnerabilities. Why does Linux look so bad? Compared to a barebone OS, Linux distributions contain large numbers of applications in addition to the core OS Source: Secunia, established in 2002, is one of the leading vulnerability intelligence provider and distributors. It s freely available Security Advisories list is used by IT Security teams. Other risk criteria: Exposure, available exploits for vulnerabilities (virus) Available protection for OS (hardening, access control) Integration of additional HW and Devices Deployed applications Criticality for business
7 Vulnerability Mitigation and Elimination Strategies OS Vendors: Secure Configuration Defaults Secure Services disable insecure services enforce default password change using encryption and authentication Implementation of Mitigation Features system firewalls or access control enhanced privilege separation and definitions Patches, patches, patches IT SW Industry: Endpoint Security Configuration Control Add On Mitigation Software Virus Scanner (Client, Server and Storage side) Host Based IDS Host Based Firewall Device Control Wireless, USB System scanner, Integrity Checker
8 The OS vendor patch response New ways in patch provisioning, distribution, schedules and types: manual online patch download built in, automatic online patch service Microsoft: Windows Update Service and Windows Update Website (ActiveX) Linux: Novell Update Service (SLES), Redhat RHN Update Service IBM: Service Update Management Assistant (SUMA) Simple vendor download site distributed, policy based patch server architecture Microsoft: WSUS Novell: ZENworks Patch Management Server IBM: Tivoli Provisioning Manager New patch types: emergency (interim) patch, standard patch, service pack ad hoc patch releases periodic patch days Windows: monthly, first Tuesday in a month (Patch Tuesday, Black Tuesday) Cisco: bi annual, fourth Wednesday of March and September IBM: quarterly schedule for service packs
9 Challenges of Patching Why are systems unpatched? Patching costs resources (= money), real risk is difficult to quantify IT must balance operational costs vs. security risks IT operations cost is under high pressure (Outsourcing, SAS, HW consolidation) Patches need to be tested, any system change is a risk to current setup Too many vulnerabilities (while patching is scheduled, new patches are released) Vendors and security organizations announce ca 150 vulnerabilities/week Patch notification and distribution is not standardized Vulnerability and Patch management is central part of IT Security Programs IT Security teams constantly re evaluate IT risk level based on new vulnerabilities, exploits, current system and application patch level, estimate window between identification of vulnerabilities and creation of exploits (shrinking). Among the common security tasks: Execution of periodic Vulnerability Scans Vulnerability Monitoring (time consuming, manual process) Escalation of perceived high risk systems and situations
10 2. Improving IT Patch Management with Nagios OS patch and version monitoring plug in s for Windows, AIX, Linux and Cisco Frank Migge, Manager Information Security Office Plugin descriptions and links also available via Articles
11 2. Improving IT Patch Management Implementation of a vendor neutral patch status monitoring on all systems Implementation of immediate, standardized patch notification for all systems Leveraging existing systems inventory and monitoring escalation setup Real time view into the current systems patch status and software versions Patch status becomes just another indicator for system health. A task for Benefits: Faster, direct and standardized notification to the support engineers Reduction of human error missed systems / forgotten patches Fast identification of vulnerable systems Enforce and monitor patch policy compliance Highly visible patch accountability
12 Today's typical IT Infrastructure and Vendors: Windows Servers Office Backend GroupWare App Servers Traditional UNIX Servers Database Application Web Servers Linux Servers Database Application Web Servers Network Equipment Switches Routers Firewalls Appliances Storage VOIP VMware hosts Microsoft IBM, HP, SUN RedHat, SuSE Cisco Others Few network and server vendors, but each has it s own distinctive patch management By implementing Nagios patch checks, we can cover almost all critical IT areas OS distribution in IT Infrastructure: We have a gap of 67 systems = 7.41%. Not covered systems are appliances, i.e. PBX and storage.
13 Nagios patch monitoring for Windows prerequisites: Windows update service SNMPtrapgen, [proxy] data source Windows update service via Windows Scripting Host plugin script plugin execution win_update_trapsend.vbs (client) send_trap_data.pl (Nagios server) passive, scheduled once a day SNMP trap send to Nagios host Leverages Microsoft built in scripting engine VBS for data collection requires extra binary for sending SNMPtraps to minimize footprint no monitoring daemon installation Works well if update service is configured for Microsoft Less efficient with WSUS systems due to limited patch visibility
14 Patch monitoring: Microsoft Windows Configure The Monitored System 1. Install, configure and test the programs trapgen.exe and win_update_trapsend.vbs C:\update-monitor > cscript.exe -NoLogo C:\update-monitor\win_update_trapsend.vbs > C:\updatemonitor\ win_update_trapsend.log 2. Create batch file and schedule daily execution job through Windows Scheduler C:\update-monitor > edit win_update_trapsend.bat cscript.exe -NoLogo C:\update-monitor\win_update_trapsend.vbs > C:\updatemonitor\win_update_trapsend.log The batch needs local administrative rights to execute.
15 Patch monitoring: Microsoft Windows NagiosSetup 1. Configure the SNMPtrap service and install/update the traphandler send_trap_data.pl nagios ~ # cat /etc/snmp/snmptrapd.conf ############################################################################### # snmptrapd.conf: # configuration file for configuring the ucd-snmp snmptrapd agent. ############################################################################### # first, we define the access control authcommunity log,execute,net SECtrap # Win update traphandler: SNMPv2-MIB::snmpTrapOID.0 = RFC1155-SMI::enterprises traphandle RFC1155-SMI::enterprises /srv/app/nagios/libexec/send_trap_data.pl 2. Verify passive data submission into Nagios through the named pipe nagios.cfg # grep EXTERNAL /srv/app/nagios/var/nagios.log [ ] EXTERNAL COMMAND: PROCESS_SERVICE_CHECK_RESULT;jpnhoap016;check_trap_winpatch;0;No critical updates. Windows Version: Microsoft Windows Server , Update Service: WU nagios ~ # vi /srv/app/nagios/etc/objects/patch-services-windows.cfg ############################################################################### # Receive SNMP traps for Windows update status ############################################################################### define service { use generic-patch-win hostgroup 2-windows-servers name check_trap_winpatch service_description check_trap_winpatch service_groups patch-checks-win, patch-compliance } 3. Configure the new patch monitoring service Using external commands in Nagios
16 Patch monitoring: Microsoft Windows Nagios Views Service View and E Mail Notification
17 Nagios patch monitoring for IBM AIX 5.3 prerequisites: IBM update service SSH Service, [proxy] data source SUMA plugin script plugin execution check rug update.pl (client) check_snmp_extend.sh (svr) active, scheduled once a day Passive, scheduled once a day The most conservatively patched systems Least experienced staff needs the most help AIX is more secure in terms of less SW vulnerabilities AIX is weak in configuration due to the OS being quite old
18 Patch monitoring: IBM AIX 5.3 Configuring the Monitored System 1. Configure and verify the Service Update Management Assistant" SUMA $ sudo suma -c -a HTTP_PROXY= $ sudo suma -c -a DL_TIMEOUT_SEC=10 $ sudo suma -c grep HTTP_PROXY HTTP_PROXY= $ sudo suma -c 2. Install the plugin script check aix update.pl or aix_update_trapsend.pl $ sudo /scripts/check-aix-update.pl WARNING update(s) available: X11.Dt.lib Version X11.Dt.rte Version X11.apps.rte Version X11.base.lib Version X11.base.rte Version bos.64bit Version bos.acct Version bos.adt.base Version bos.adt.debug Version bos.adt.include Version bos.adt.insttools Version perfagent.tools Version printers.rte Version OS Version , Proxy Update-URL www14.software.ibm.com/webapp/set2/fixget SLES10 3. Decide the how to call and return the check result: SSH SNMPtrap check aix update.pl ssh user@aixhost "sudo /scripts/checkaix update.pl" aix_update_trapsend.pl cron scheduled once a day
19 Patch monitoring: IBM AIX 5.3 Nagios Views Service Views and E Mail Notification
20 Patch monitoring: Novell Linux SLES10 Overview prerequisites: Novell update service SNMP service, [proxy] data source ZENworkszmdservice via rug plugin script plugin execution check rug update.pl (client) check_snmp_extend.sh (svr) active, scheduled once a day SNMP request to SNMP extend Depends on rug and novell zmd service zmd service zombies experienced due to commit issues in sqlite backend Due to high frequency of Linux patch releases (weekly), big benefit
21 Patch monitoring: Novell Linux SLES10 Configuring the Monitored System 1. Configure and verify the SLES Zenworks update service, using the 'rug' command # rug lu S Catalog Bundle Name Version Arch SLES10-SP2-Online Spident noarch #./check-rug-update.pl WARNING - 1 update(s) available: SPident Version Install and test the plugin script check rug update.pl #./check-rug-update.pl --run-rug OK - system is up to date # cat./test S Catalog Bundle Name Version Arch SLES10-SP2-Online Spident noarch #./check-rug-update.pl --file=test WARNING - 1 update(s) available: SPident Version SLES10 3. Configure and test the remote plugin access through the UCD Net SNMP service # echo "extend nagiosupdate /srv/app/nagios/libexec/check-rug-update.pl --run-rug >> /etc/snmp/snmpd.conf # /etc/init.d/snmpd restart Shutting down snmpd: done Starting snmpd # snmpget -v 2c -c myread NET-SNMP-EXTEND-MIB::nsExtendOutputFull. nagiosupdate" NET-SNMP-EXTEND-MIB::nsExtendOutputFull. nagiosupdate" = STRING: No updates are available.
22 Patch monitoring: Novell Linux SLES10 NagiosSetup 1. Get, install and test the check_snmp_extend.sh script as a plugin /srv/app/nagios/libexec # cp /tmp/check_snmp_extend.sh. /srv/app/nagios/libexec # ls -l check_snmp_extend.sh -rwxr-x--- 1 nagios nagios :50 check_snmp_extend.sh /srv/app/nagios/libexec #./check_snmp_extend.sh Syntax: check_snmp_extend.sh ipaddr community /srv/app/nagios/libexec #./check_snmp_extend.sh myread nagiosupdate OK - system is up to date 2. Configure the new plugin in the Nagios command.cfg section /srv/app/nagios/etc/objects # vi commands.cfg # 'check_snmp_extend' command definition # syntax: check_snmp_extend.sh host-ip snmp-community extend-name define command{ command_name check_snmp_extend command_line $USER1$/check_snmp_extend.sh $HOSTADDRESS$ $ARG1$ $ARG2$ } Nagios /srv/app/nagios/etc/objects # vi sles10-patch-services.cfg ############################################################################### # SLES10 OS Patch Update Check via SNMP extend scripts ############################################################################### define service { use generic-patch host_name ml08460 name check_snmp_extend service_description check_patch_sles10 check_command check_snmp_extend!myread!nagiosupdate } 3. Configure the new patch monitoring service
23 Patch monitoring: Novell Linux SLES10 Nagios Views Service View and E Mail Notification (HTML formatted e mail body with embedded service links, send through /usr/bin/mutt)
24 Nagios patch monitoring for Cisco IOS, ASA, PIX prerequisites: SNMP service access Cisco CCO account data source SNMPv2 MIB "sysdescr" plugin script plugin execution check_snmp_patchlevel.pl check_snmp_patchlevel.cfg active, scheduled once a day SNMP request to SNMP MIB Cisco is conservatively patched due to risk and effort (reboot, cumbersome rollback) Big benefit for standardizing OS versions and identifying rogue devices Network device numbers greatly surpass server numbers
25 Patch monitoring: Cisco IOS, ASA, PIX Cisco Setup 1. Cisco SNMP service configuration eample Router # conf t Router(config)# snmp-server community SECro ro Router(config)# snmp-server host SECtrap Router(config)# snmp-server enable traps snmp linkdown linkup coldstart warmstart 2. Test SNMP access to the Cisco device # snmpget -v 1 -c SECro SNMPv2-MIB::sysDescr.0 SNMPv2-MIB::sysDescr.0 = STRING: Cisco Internetwork Operating System Software IOS (tm) C2950 Software (C2950-I6Q4L2-M), Version 12.1(22)EA9, RELEASE SOFTWARE (fc1) Copyright (c) by cisco Systems, Inc. Compiled Fri 01-Dec-06 18:02 by weiliu Cisco: Router Switches FW s Network devices are usually the best/most monitored systems for uptime/performance They are already set up in Nagios, aren t they?
26 Patch monitoring: Cisco IOS, ASA, PIX NagiosSetup 1. Cisco plugin version compliance check categories Nagios /srv/app/nagios/etc/objects # vi check_snmp_patchlevel.cfg # Below are the 'approved' versions we explicitly endorse for usage: # ###################################################################### approved ios 12.2(13)ZH2 not OK, but currently being actively upgraded # Below are the 'obsolete' versions we explicitly disapprove of: # ###################################################################### obsolete pix 7.2(2) end-of-maintenance obsolete ios 12.2(25)SEE4 end-of-maintenance date # Below are the 'med-vuln' versions with low to medium criticality # ###################################################################### med-vuln ios 12.4(6)T8 multiple DOS confirmed (Voice, Stack) ###################################################################### 2. Cisco plugin compliance check configuration file
27 Patch monitoring: Cisco IOS, ASA, PIX NagiosSetup 1. Get, install and test the check_snmp_patchlevel.pl script as a plugin /srv/app/nagios/libexec #./snmp_patchlevel.pl -H g ios -C SECro IOS Version: 12.1(22)EA9 Cisco Internetwork Operating System Software IOS (tm) C2950 Software (C2950-I6Q4L2-M), Version 12.1(22)EA9, RELEASE SOFTWARE (fc1) Copyright (c) by cisco Systems, Inc. Compiled Fri 01-Dec-06 18:02 by weiliu 2. Configure the new plugin in the Nagios command.cfg section /srv/app/nagios/etc/objects # vi commands.cfg define command{ command_name check_snmp_cisco_ios command_line $USER1$/check_snmp_patchlevel.pl -H $HOSTADDRESS$ -g ios -C $ARG1$ } define command{ command_name check_snmp_cisco_asa command_line $USER1$/check_snmp_patchlevel.pl -H $HOSTADDRESS$ -g asa -C $ARG1$ } Nagios /srv/app/nagios/etc/objects # vi sles10-patch-services.cfg ############################################################################### # Check Cisco Router IOS version against a config file ############################################################################### define service { use generic-patch hostgroup cisco-routers name check_snmp_ios_router service_description check_snmp_ios_router check_command check_snmp_cisco_ios!secro } 3. Configure the new patch monitoring service
28 Patch monitoring: Cisco IOS, ASA, PIX Nagios Views Service View and E Mail Notification
29 3. Experience and Future Frank Migge, Manager Information Security Office
30 Central patch status view in Nagios Monitoring Patch Policy Compliance: open, outstanding patches time periods until patched current OS versions and patch update settings
31 Patch monitoring Issues and Improvements Windows: Improving patch identification for WSUS managed systems Can we switch safely from WSUS to Windows Online and back to WSUS Cisco: Automate the manual process to identify available updates Investigate the Cisco IOS Auto Upgrade Manager, parse the Cisco Website with CCO credentials? Expand patch and version monitoring into the applications space: First target major DB vendors: IBM, Oracle, Microsoft Combine the DB up check with a DB real login and return the DB version using JAVA thinclients Thank you for listening. Time for Questions?
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios deployment
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...
Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
How to configure Microsoft System Center Operations Manager (SCOM) 2012 R2 as SNMP trap receiver for VMware vcenter on MS Windows?
How to congure Microsoft System Center Operations Manager (SCOM) 2012 R2 as SNMP trap receiver for VMware vcenter on MS Windows? One of the most interesting and very often asked things is how do I congure
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
FUNCTIONAL OVERVIEW www.amdosoft.com
Business Process Protectors Business Service Management Active Error Identification Event Driven Automation Error Handling and Escalation Intelligent Notification Process Reporting IT Management Business
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
Ein Unternehmen stellt sich vor. Nagios in large environments
Ein Unternehmen stellt sich vor Nagios in large environments Agenda About ITdesign Introduction Customer environments and requirements Heterogenous environment How to get data from end systems? 350 Servers
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes Supported platforms... 2 What s new in version 2.1... 2 What s new in version 2.0.3... 2 What s new in version 2.0.2... 2 What
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
SOSFTP Managed File Transfer
Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP
Monitoring MySQL. Geert Vanderkelen MySQL Senior Support Engineer Sun Microsystems
Monitoring MySQL Geert Vanderkelen MySQL Senior Support Engineer Sun Microsystems Agenda Short intro into MySQL, the company Monitoring MySQL: some examples Nagios plugins for MySQL MySQL Enterprise Monitor
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
WhatsUp Gold 2016 Getting Started Guide
WhatsUp Gold 2016 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 5 STEP 1: Prepare
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
ENTERPRISE-CLASS MONITORING SOLUTION FOR EVERYONE ALL-IN-ONE OPEN-SOURCE DISTRIBUTED MONITORING
ENTERPRISE-CLASS MONITORING SOLUTION FOR EVERYONE ALL-IN-ONE OPEN-SOURCE DISTRIBUTED MONITORING 1 CONTENTS About Zabbix Software... 2 Main Functions... 3 Architecture... 4 Installation Requirements...
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
Monitoring a Linux Mail Server
Monitoring a Linux Mail Server Mike Weber [email protected]] Various Methods to Monitor Mail Server Public Ports SMTP on Port 25 POPS on Port 995 IMAPS on Port 993 SNMP Amavis on Port 10024 Reinjection
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide
IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5
GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA
Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
TECHNICAL VULNERABILITY & PATCH MANAGEMENT
INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Network Security and Vulnerability Assessment Solutions
Network Security and Vulnerability Assessment Solutions Unified Vulnerability Management It s a known fact that the exponential growth and successful exploitation of vulnerabilities create increasingly
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
Alert Logic Log Manager
whitepaper Alert Logic Log Manager Configuring Log Sources for Best Practice Reports CONTENTS Introduction 1 Best Practice Reports in Log Manager 2 Active Directory 2 Databases 2 Network Devices 2 Windows
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
VMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document
HP OpenView Patch Manager using Radia Version 3.0
HP OpenView Patch Manager using Radia Version 3.0 Summary of Changes in Support of Microsoft Update Wayne Dalesio and Ben Sweetser HP OpenView Configuration Management 2004 Hewlett-Packard Development
Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management
Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Article Reprint Endpoint Management Endpoint Management Article Introducing ZENworks 11 SP4 Addressing Key Usability
How To Get Started With Whatsup Gold
WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...
User Guide for VMware Adapter for SAP LVM VERSION 1.2
User Guide for VMware Adapter for SAP LVM VERSION 1.2 Table of Contents Introduction to VMware Adapter for SAP LVM... 3 Product Description... 3 Executive Summary... 3 Target Audience... 3 Prerequisites...
VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink [email protected]
VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink [email protected] Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions
Administering the Network Analysis Module. Cisco IOS Software. Logging In to the NAM with Cisco IOS Software CHAPTER
CHAPTER 4 How you administer the NAM on your Catalyst 6500 series switch or Cisco 7600 series router depends on whether you are using the Cisco IOS software or the Catalyst operating system software. Several
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Burst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN-001804-02
Update 1 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64 http://www.suse.com 1 Table of Contents Introduction...3 Hardware and
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Maintaining Non-Stop Services with Multi Layer Monitoring
Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems [email protected] www.emindsys.com The approach Non-stop applications can t leave on their
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org
The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Exam : IBM 000-851. : Iseries Linux Soluton Sales v5r3
Exam : IBM 000-851 Title : Iseries Linux Soluton Sales v5r3 Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865 NOVEMBER 25, 2013 SNMP SECURITY 2 ABSTRACT As a Network Monitoring System Administrator I have gained a substantial amount
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)
Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
SENTINEL MANAGEMENT & MONITORING
MANAGEMENT & MONITORING Network Monitoring Server Monitoring Database Monitoring Application Monitoring End User Response Time Monitoring Virtualisation Monitoring VOIP Monitoring SLA Monitoring Knowing
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
