Compensating Security Controls for Windows Server 2003 Security



Similar documents
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Windows Server 2003 End of Support. What does it mean? What are my options?

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

White. Paper. Rethinking Endpoint Security. February 2015

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

An Analytics-based Approach to Cybersecurity

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

White. Paper. Information Security, Virtualization, and the Journey to the Cloud. August, 2010

Cybersecurity Skills Shortage: A State of Emergency

Virtual Patching: a Compelling Cost Savings Strategy

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

The ESG Cybersecurity Maturity Model

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Cloud and Data Center Security

Virtual Patching: a Proven Cost Savings Strategy

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

INTRODUCING isheriff CLOUD SECURITY

VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

McAfee Server Security

Research Perspectives

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Trend Micro. Advanced Security Built for the Cloud

The Network Application Security Architecture Requirement

Online File Sharing and Collaboration: Deployment Model Trends

The Challenge of Securing and Managing Data While Meeting Compliance

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

How To Protect Your Cloud From Attack

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Securing the Intelligent Network

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Server and Application Migration made easy. Ask us how!

Securing the Physical, Virtual, Cloud Continuum

Deep Security Vulnerability Protection Summary

Devising a Server Protection Strategy with Trend Micro

Trends in Private Cloud Infrastructure

Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters

Devising a Server Protection Strategy with Trend Micro

IBM Security Intrusion Prevention Solutions

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

How To Integrate Identity And Security With A Network-Based Business Process

Safeguarding the cloud with IBM Dynamic Cloud Security

Security Virtual Infrastructure - Cloud

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

Guideline on Safe BYOD Management

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts

End-user Security Analytics Strengthens Protection with ArcSight

How To Protect A Virtual Desktop From Attack

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Vulnerability Management

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Solution Brief. Introduction

How To Monitor Your Entire It Environment

Protecting Your Organisation from Targeted Cyber Intrusion

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Combating a new generation of cybercriminal with in-depth security monitoring

White Paper The Dynamic Nature of Virtualization Security

Transcription:

ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft will end-of-life Windows Server 2003 as of July 14, 2015 and no longer provide software maintenance or support. In other words, Microsoft will stop issuing software updates for patching software vulnerabilities discovered. Unfortunately, this is a cause of great concern for many organizations that are still running Win2K3 servers and may take some time before they can migrate these workloads to alternative operating systems. Organizations planning on continued use of Windows Server 2003 must implement compensating controls to add defense-indepth protection and enhanced security monitoring capabilities. Trend Micro s Deep Security product can be helpful here by providing network, system and anti-malware security controls across physical, virtual, and cloud systems running W2K3. Overview July 14, 2015 marks an important day in the annals of Information Technology. On that day, Microsoft Corporation will officially end-of-life its venerable Windows 2003 Server product, offering no further maintenance, software patches, or support. From a software perspective, the retirement of Windows Server 2003 makes a lot of sense. After all, Win2K3 was first introduced in April 2003 and its successor, Windows 2008, has been around since February 2008. Based upon normal software product lifecycles then, Windows Server 2003 s departure was long overdue. In spite of Microsoft s operating system progress however, many organizations continue to cling to Windows Server 2003 on the eve of its retirement. In fact, ESG research indicates that 35% of organizations report that more than 30% of their Windows server portfolio is still made up of Windows Server 2003 today (see Figure 1). 1 1 Source: ESG Brief, Microsoft Windows Server 2003: The End is Nigh, February 2015. All ESG research references and charts in this solution showcase have been taken from this research report, unless otherwise noted. This ESG Solution Showcase was commissioned by Trend Micro and is distributed under license from ESG.

Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 2 FIGURE 1. Windows Server 2003 Remains Widely Deployed 20% 18% 16% 14% 12% 10% 8% 6% 4% 2% 0% Approximately what percentage of your organization s total Windows server environment is comprised of Windows Server 2003? (Percent of respondents, N=601) 17% 19% 0% 1% to 10% 12% 11% to 20% 15% 21% to 30% 10% 10% 31% to 40% 41% to 50% 5% 51% to 60% 3% 3% 61% to 70% 71% to 80% 2% 2% 81% to 90% 91% to 100% 1% Don t know Source: Enterprise Strategy Group, 2015 What Are Organizations Planning to Do? CIOs have seen this movie before. For example, Microsoft ceased supporting its PC operating system, Windows XP, in April 2014, and other software vendors have similarly put older software versions out-to-pasture after years of useful service. In anticipation of Windows Server 2003 s retirement, many organizations are already planning their next moves. For example, ESG research indicates that 73% of organizations plan to upgrade to Windows Server 2012 and reinstall applications, 35% want to move Win2K3 servers to public cloud infrastructure, and 32% are intent on retiring servers, operating systems, and resident applications (see Figure 2). These legitimate options provide an upgrade path off of Windows Server 2003, but migration processes can be time consuming and resource intensive. This may be why industry research indicates that 15% to 20% of PCs are still running Windows XP, more than a year after its official end-of-life deadline. Server operating system migrations may be even more onerous, since these upgrades can be impacted by: Regulators and auditors. In some cases, regulatory bodies need to certify specific application/operating system configurations. This is not unusual in the health care industry where it can take months before government agencies complete their certification process and approve new application/os combinations. While IT and compliance auditors may not need official operating system certification, they may ask for several months to familiarize themselves with new application/os combinations before they are willing to consider them as in compliance. Packaged application vendors. Certain packaged application vendors may also need some lag time before they are willing to support the migration of their applications to OS versions beyond Windows Server 2003. This is especially true for fixed-function applications such as industrial control systems, manufacturing equipment, and health care devices. System qualification and testing. Even organizations that plan on moving to Windows Server 2008, 2012, or public clouds will still be faced with projects to qualify their applications on new operating environments, test application functionality, modify IT and security operations, and deploy new servers on production IT networks. Yes, moving

Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 3 Windows Server 2003 workloads to the cloud may be slightly easier, but IT managers will still demand ample time for qualification, testing, and IT process re-engineering. Since this process can take months to accomplish, CIOs may also slow-roll operating system upgrades in favor of higher-priority projects that deliver more tangible business benefits. FIGURE 2. Upgrade and Migration Plans for Windows Server 2003 What are your organization s plans for upgrading from and/or migrating off of its Windows Server 2003 systems? (Percent of respondents, N=497, multiple responses accepted) Upgrade to Windows Server 2012 and reinstall application(s) 73% Reinstall/redeploy application(s) on public cloud infrastructure (e.g., MS Azure, Amazon Web Services, Google, etc.) 35% Retire server, operating system, and application(s) 32% Replace application(s) with a SaaS-based application(s) 31% Continue to run Windows Server 2003 without support and maintenance 25% 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Enterprise Strategy Group, 2015 Windows Server 2003 and IT Risk The ESG research indicates that 25% of organizations will continue to run Windows Server 2003 without support or maintenance while many others will need time to migrate to newer versions of Windows or cloud-based alternatives. In the meantime, continuing use of Windows Server 2003 can only increase IT risk. IT risk will be on the rise because hackers and cyber-criminals also understand that Windows Server 2003 will be hanging around for a while. Unfortunately, this means that cyber-adversaries are likely to accentuate their efforts to find 0-day vulnerabilities for exploitation and resale. Once discovered, black hat security researchers will sell them to the highest bidders who will then develop exploit kits and look for other buyers on cyber-crime websites. Others will pile on, offering malicious payloads for sale. It won t take long before this black market activity leads to real Windows Server 2003 cyberattacks and data breaches. Normally, Microsoft would usurp this process with an emergency response or a regular software update on patch Tuesday. After July 14 however, Microsoft will be out-of-the-loop, leaving organizations to defend against inevitable attacks on their own.

Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 4 Compensating Controls for Windows Server 2003 With no help from Redmond after mid-july, CISOs must take up the slack by employing compensating security controls to protect their Windows Server 2003 systems. These compensating controls should include things like: System hardening. Security professionals will want to lock down Windows Server 2003 with hardened configurations that can disable unnecessary services, set up ACLs for file access, and limit administrator actions. Hardening guidelines are available from Microsoft as well as organizations such as NSA, NIST, and others. Network security controls. CISOs may want to use the network to isolate traffic to-and-from remaining Windows Server 2003 systems. Network security controls can include firewall rules, ACLs, and network segmentation using IP subnets or Layer 2 VLANs. Host-based IDS/IPS, particularly when deployed at an affected host like Windows Server 2003, can also offer vulnerability-facing protection through the use of virtual patching. This is done by updating IDS/IPS signatures with specific rules for blocking exploits aimed at newly discovered software vulnerabilities. As such, virtual patching may be very effective in protecting exposed Windows Server 2003 systems after July 14. System security controls. Security teams can also take action on the server itself in several ways. Existing host-based security software should be configured for maximum protection by enabling features for real-time malware detection/prevention. In some cases, the security operations team may want to install file integrity monitoring software (FIM) on servers with configurations that rarely change (i.e., single or fixed-function servers). CISOs may also want to explore whether they can utilize trusted hardware such as the Trusted Platform Module (TPM) to improve system integrity and attestation. Finally, Windows Server 2003 instances can be run as VMs so they can take advantage of security functionality at the hypervisor level. Organizations may also want to increase their monitoring activities related to all instances of Windows Server 2003. This can include frequent reviews of log activity and network flows for anomalous/suspicious activities like network communications with esoteric server processes and services. CISOs may also want to create specific rules and dashboards in security analytics tools to make Windows Server 2003 monitoring easier for the SOC team. Trend Micro Can Help Protect Windows Server 2003 While CISOs recognize the impending security issues around Windows Server 2003, they may not have the time, resources, or skills to piece together a security strategy on their own. Organizations that fall into this category should look instead for security technologies delivering strong Windows Server 2003 security in a comprehensive and easy-to-use package. Security leader Trend Micro can help here as its Deep Security product offers virtual patching, system integrity controls/monitoring, and anti-malware capabilities. Furthermore, Deep Security supports physical, virtual, and cloud-based servers, giving IT and security managers the ability to balance IT flexibility with strong security. Finally, Deep Security provides central management across all security controls, helping to streamline server security operations. Given these capabilities, organizations running Windows Server 2003 after mid-july 2015 may want to contact Trend Micro and explore how Deep Security can help them maintain strong security in an operationally efficient way. Trend Micro is committed to helping organizations smoothly transition from Windows Server 2003, and has extended support for Deep Security until 2020 to provide enough runway for migration.

The Bigger Truth Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 5 The Windows Server 2003 situation represents a fragile balancing act for organizations. Real business, regulatory, and/or IT issues are forcing IT managers to hang onto Win2K3 beyond its end-of-life date in July, but this means living with obsolete and unprotected software residing on production networks. This certainly presents a real challenge for CISOs as they must figure out how to support business realities while addressing the foreseeable increase in IT risk. Smart security professionals will implement layers of compensating controls for Windows Server 2003 across the network and the systems, thus creating a specific defense-in-depth architecture for these vulnerable servers. The SOC team will also pitch in by increasing server monitoring and developing triggers, alerts, and rule sets to focus on incident detection and response for Win2K3 servers. Of course, security professionals are already quite busy with daily activities and may be overwhelmed by additional tasks for Windows Server 2003 security. In these instances, CISOs should look for turnkey security tools, like Trend Micro s Deep Security, that can help them reinforce Win2K3 server security in an effective and efficient manner, and also provide security to the new platforms, whether in the data center or in the cloud. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188. Enterprise Strategy Group is an integrated IT research, analysis, and strategy firm that is world renowned for providing actionable insight and intelligence to the global IT community. www.esg-global.com 2015 by The Enterprise contact@esg-global.com Strategy Group, Inc. All Rights Reserved. P. 508.482.0188