AUTOMATING THE 20 CRITICAL SECURITY CONTROLS



Similar documents
How to Grow and Transform your Security Program into the Cloud

Pragmatic Metrics for Building Security Dashboards

GFI White Paper PCI-DSS compliance and GFI Software products

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

"Advanced Vulnerability Management new approach to solve critical controls. Andrzej Kleśnicki Technical Account Manager Central Eastern Europe

Patch and Vulnerability Management Program

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Critical Security Controls

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Symantec Control Compliance Suite Standards Manager

THE TOP 4 CONTROLS.

Manage Vulnerabilities (VULN) Capability Data Sheet

Management (CSM) Capability

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Cybersecurity Health Check At A Glance

SANS Top 20 Critical Controls for Effective Cyber Defense

Top 20 Critical Security Controls

Introduction. PCI DSS Overview

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

IT Security & Compliance. On Time. On Budget. On Demand.

How To Protect Your Data From Being Stolen

Critical Controls for Cyber Security.

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

How To Manage Security On A Networked Computer System

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

How To Use Qqsguard At The University Of Minneapolis

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

AHS Flaw Remediation Standard

PCI Compliance for Cloud Applications

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

Obtaining Enterprise Cybersituational

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

SANS Institute First Five Quick Wins

Check Point and Security Best Practices. December 2013 Presented by David Rawle

A Rackspace White Paper Spring 2010

Vulnerability Management

TRIPWIRE NERC SOLUTION SUITE

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Leveraging SANS and NIST to Evaluate New Security Tools

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Miami University. Payment Card Data Security Policy

Software Asset Management (SWAM) Capability Data Sheet

Secret Server Qualys Integration Guide

Bringing Continuous Security to the Global Enterprise

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

The Value of Vulnerability Management*

FISMA / NIST REVISION 3 COMPLIANCE

Standard CIP Cyber Security Systems Security Management

CDM Vulnerability Management (VUL) Capability

How To Monitor Your Entire It Environment

Security Issues in Cloud Computing

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

CloudCheck Compliance Certification Program

End-user Security Analytics Strengthens Protection with ArcSight

Closing Wireless Loopholes for PCI Compliance and Security

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Standard CIP 007 3a Cyber Security Systems Security Management

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

WHITEPAPER. Nessus Exploit Integration

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Database Security & Auditing

Security Management. Keeping the IT Security Administrator Busy

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

THE BLUENOSE SECURITY FRAMEWORK

PCI Data Security Standards (DSS)

Automate PCI Compliance Monitoring, Investigation & Reporting

Sample Vulnerability Management Policy

74% 96 Action Items. Compliance

How To Manage A System Vulnerability Management Program

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

NE T GENERATION CLOUD SECURITY PLATFORM

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Qualys Scanning for PCI Devices University of Minnesota

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Taking Information Security Risk Management Beyond Smoke & Mirrors

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Current IBAT Endorsed Services

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Attachment A. Identification of Risks/Cybersecurity Governance

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Transcription:

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS Wolfgang Kandek, CTO Qualys Session ID: Session Classification: SPO-T07 Intermediate

2012 the Year of Data Breaches

2013 continued in a similar Way

Background Open System Administration Channels Default and Weak Passwords End-user has Administrator Privileges Outdated Software Versions Non-hardened Configurations Flaws in System Administration

Solution 20 Critical Controls Owned by SANS with widespread industry expert input

Solution 20 Critical Controls Owned by SANS with widespread industry input

Solution 20 Critical Controls Owned by SANS with widespread industry expert input International participation

Solution 20 Critical Controls Owned by SANS with widespread industry input International participation

Solution 20 Critical Controls Owned by SANS with widespread industry input International participation

Solution 20 Critical Controls Owned by SANS with widespread industry input International participation Prioritized

Solution 20 Critical Controls Owned by SANS with widespread industry input International participation

Solution 20 Critical Controls Owned by SANS With widespread industry expert input International participation Prioritized Automation is critical to success

Solution 20 Critical Controls Owned by SANS with widespread industry input International participation Prioritized Automation is critical to success

Solution 20 Critical Controls Owned by SANS with widespread industry input International participation Prioritized Automation is critical to success 90 % Risk Reduction at US DoS 85 % Incident Reduction at DSD Australia

Solution

Qualys QualysGuard Vulnerability Management Policy Compliance Web Application Scanning PCI Malware Detection SaaS Solution Browser-based, Multi-tenant Public and Private Cloud Scanning, Reporting, Ticketing Extensive API

CC1: Hardware Inventory Asset Visibility Size of Network Machine Types Location

CC1: Hardware Inventory Asset Visibility Size of Network Machine Types Location

CC1: Hardware Inventory Asset Visibility Size of Network Machine Types Location

CC1: Hardware Inventory Asset Visibility Size of Network Machine Types Location New Equipment Detection Authorized Unauthorized

CC1: Hardware Inventory Asset Visibility Size of Network Machine Types Location New Equipment Detection Authorized Unauthorized

CC1: Hardware Inventory Automation Scans are scheduled Delta Reports are scheduled Reports can be e-mailed Alerting on newly discovered hosts Via API Integration into Asset Management Systems Via API Coming: ticket generation on newly discovered hosts

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels Blacklisting

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels Blacklisting Whitelisting

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels Blacklisting Whitelisting

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels Blacklisting Whitelisting Interactive Search

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels Blacklisting Whitelisting Interactive Search

CC2: Software Inventory Asset Visibility Operating Systems Applications Versions Patch Levels Blacklisting Whitelisting Interactive Search

CC2: Software Inventory Automation Scans are scheduled Reports are scheduled Reports can be emailed Alerting on Exceptions Via API Integration into Asset Management Systems Via API Coming: Ticket generation on Exceptions

CC3: Secure Base Configurations Configuration Validation SCAP/FDCC

CC3: Secure Base Configurations Configuration Validation SCAP

CC3: Secure Base Configurations Configuration Validation SCAP/FDCC Cyberscope Reporting CIS

CC3: Secure Base Configurations Configuration Validation SCAP Cyberscope Reporting CIS

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning Verify Patching

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning Verify Patching

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning Verify Patching Report on Unauthorized Services

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning Verify Patching Report on Unauthorized Services

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning Verify Patching Report on Unauthorized Services

CC4: Continuous Vulnerability Assessment/Remediation Weekly/Daily Scheduled Vulnerability Scanning Authenticated Scanning Verify Patching Report on Unauthorized Services

CC4: Continuous Vulnerability Assessment/Remediation Automation Scans are scheduled Reports are scheduled Reports are emailed Alerting on Vulnerabilities Tickets for Vulnerabilities, Remediation SLA and Confirmation Integration into Asset Management Systems Via API

Other Critical Controls CC6: Application Software Security Automated Web Application Scans CC7: Wireless Device Controls Wireside Detection CC11: Control of Network Ports Scans and Reports for authorized and unauthorized Ports and Services CC16: Account Monitoring Controls for Admin accounts, password policies, account lockout settings

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 (Sep/12)/KB2794220 (Dec/12) Mitigated by use of EMET

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 (Sep/12)/KB2794220 (Dec/12) Mitigated by use of EMET

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 (Sep/12)/KB2794220 (Dec/12) Mitigated by use of EMET

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 (Sep/12)/KB2794220 (Dec/12) Mitigated by use of EMET

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 (Sep/12)/KB2794220 (Dec/12) Mitigated by use of EMET Audit the Deployment

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 Mitigated by use of EMET Audit the Deployment

Policy Dynamics Ability to add tactical controls Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969 (Sep/12)/KB2794220 (Dec/12) Mitigated by use of EMET Audit the Deployment User Defined Registry Check

Summary Functionality to assess Controls exist Automation available, but frequently API integrations is needed Offerings are improving with better workflow coming

Thank You Wolfgang Kandek wkandek@qualys.com @wkandek http://laws.qualys.com