PAKITI Patching Status System



Similar documents
IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

Security: Best Practice and Monitoring

Last Updated: July STATISTICA Enterprise Server Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

Reducing Application Vulnerabilities by Security Engineering

Easy configuration of NETCONF devices

Nixu SNS Security White Paper May 2007 Version 1.2

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Threat Modeling. 1. Some Common Definition (RFC 2828)

Juniper Networks Secure

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

RDS Building Centralized Monitoring and Control

Nipper Studio Beginner s Guide

GFI White Paper PCI-DSS compliance and GFI Software products

Using Nessus In Web Application Vulnerability Assessments

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Integrating Web Application Security into the IT Curriculum

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

Desktop Central Managing Windows Computers in WAN

RingStor User Manual. Version 2.1 Last Update on September 17th, RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ

Stephen Coty Director, Threat Research

Best Practices for Deploying and Managing Linux with Red Hat Network

Securing shared hosting using CageFS

Architecture and Mode of Operation

WordPress Security Scan Configuration

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

The current version installed on your server is el6.x86_64 and it's the latest available.

E-Commerce for IT Advanced. Louis Aguila & Matt Burt

Shellshock Security Patch for X86

Cybersecurity and internal audit. August 15, 2014

End-user Security Analytics Strengthens Protection with ArcSight

SEE-GRID-SCI. SEE-GRID-SCI USER FORUM 2009 Turkey, Istanbul December, 2009

ECE 4893: Internetwork Security Lab 12: Web Security

TEST AUTOMATION FRAMEWORK

Web Security School Final Exam

Maintaining Non-Stop Services with Multi Layer Monitoring

Virtualization System Security

Higher National Unit specification: general information

NSFOCUS Web Vulnerability Scanning System

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

How to Grow and Transform your Security Program into the Cloud

Cloud Security with Stackato

INFORMATION TECHNOLOGY

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

How To Monitor Mysql With Zabbix

Architecture and Mode of Operation

Service Manager and the Heartbleed Vulnerability (CVE )

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

Guardium Change Auditing System (CAS)

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Solutions to Trust. NEXThink V5 What is New?

Web application security

Managing your Red Hat Enterprise Linux guests with RHN Satellite

Nessus Agents. October 2015

A recipe using an Open Source monitoring tool for performance monitoring of a SaaS application.

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Critical Security Controls

ARDA Experiment Dashboard

Adobe Systems Incorporated

Take Control of Identities & Data Loss. Vipul Kumra

This document describes the methodology used for validating the model, analysis, comments and test results from the model s application.

PANDORA FMS OFFICIAL TRAINING

Desktop : Ubuntu Desktop, Ubuntu Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu Server, Ubuntu Server, CentOS 5, CentOS 6

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT

Linux VPS with cpanel. Getting Started Guide

Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1

Cloud Security:Threats & Mitgations

System Security Policy Management: Advanced Audit Tasks

Installation Manual for Grid Monitoring Tool

Directory and File Transfer Services. Chapter 7

Network Segmentation

Put a Firewall in Your JVM Securing Java Applications!

Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Windows Remote Access

Why is a good idea to use OpenNebula in your VMware Infrastructure?

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

THE OPEN UNIVERSITY OF TANZANIA

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet

CA Unified Infrastructure Management Server

Windows Operating Systems. Basic Security

Transcription:

PAKITI Patching Status System EGI-InSPIRE A Race for Security: Identifying Vulnerabilities on 50 000 Hosts Faster then Attackers Michal Procházka 1, Daniel Kouřil 1, Romain Wartel 2, Christos Kanellopoulos 3, Christos Triantafyllidis 3 1 CESNET, 2 CERN, 3 AUTH ISGC 2011, Taipei 03/23/11 1

Outline The problem Vulnerability Management Pakiti Statistics Future 03/23/11 2

The Problem Infrastructure is weak as its weakest point One hacked worker node is a big danger for the whole infrastructure Attackers usually exploits know vulnerabilities Number of attacks made by real hackers are very low Robot attacks botnes, script kiddies Software updates are essential How to check if a host is properly patched? It is easy on the desktop machine How to check this on EGI infrastructure? 03/23/11 3

Vulnerability Management Common Vulnerability and Exposures (CVE) Each vulnerability has assigned an unique number Open Vulnerability and Assessment Language (OVAL) Defines conditions under which the vulnerability is applicable OS and application vendor software repositories Usually provides at least two repositories, for security updates, for other updates (features,...) Patches shouldn't be applied automatically 03/23/11 4

Pakiti Originally developed by Steve Traylen Current version uses different model for getting and processing the data Tool for monitoring patching status on not only distributed infrastructure Provides overview of the software versions on the monitored hosts Client-server architecture with lightweight client Correlates installed packages with the vulnerability definitions 03/23/11 5

Pakiti Client Bash script running under the user rights In compare to the original version, which requires root privileges Gathers the list of installed packages, kernel version and hostname Using generic OS tools to get these data Sends data over HTTPs to the Pakiti server(s) Supports server or mutual authentication No processing is done on the client 03/23/11 6

Pakiti Vulnerability Sources Pakiti regularly synchronizes its database with the vulnerability sources OVAL definitions (RedHat) vendor's repositories (SL, SLC, CentOS,...) Sources can be configured using web GUI 03/23/11 7

Pakiti Data Processing Each host report is stored in the DB Each package version is compared with the version from the vendor's repository and OVAL definitions The results are also stored in the DB Synchronous and asynchronous processing Synchronous mode provides results in realtime Asynchronous mode is suitable for large deployments Data are processed on regular basis (e.g. once a day) 03/23/11 8

Pakiti GUI Web based GUI which provides List of hosts List of domains List of sites (EGI case) List of installed packages for each host Required version and list of CVEs for each package if applicable Searching hosts by package CVE Configuration: sources settings, ACLs 03/23/11 9

Pakiti GUI List of Hosts 03/23/11 10

Pakiti GUI Host's details 03/23/11 11

Pakiti CVE Tags Tag can be assigned to each CVE Used for further categorization EGI CSIRT uses two tags EGI-Critical the problem must be removed ASAP (7 day deadline) EGI-High the problem is there, but it is hard to exploit or the software is not installed by default Hosts can be categorized by these tags Quick view on the security status of the infrastructure EGI CSIRT receives every day an email with list of sites vulnerable to the CVEs tagged as EGI-Criticial 03/23/11 12

Pakiti CVE Exceptions Vulnerabilities can be fixed by the local patch Added unique string to the package version Pakiti is then unable to detect these local changes Pakiti provides list of all installed package versions for each CVE Pakiti administrator can add an exceptions for particular package versions These package versions will be omitted 03/23/11 13

Pakiti Authorization Pakiti recognizes three roles: Administrator, Viewer and Anonymous viewer Administrator can view all results and can change the configuration Viewer can only see the results for his/her site(s) Anonymous viewer can view only results defined by the anonymous link Generated link with limited scope and validity 03/23/11 14

Statistics EGI Pakiti monitors around 1600 hosts from 306 sites with average 865 installed packages every day EGEE First incident, it takes more than month to patch the systems - unacceptable Second incident, more than 14 days still unacceptable EGI Several incidents less then 7 days to patch the whole infrastructure Continuous monitoring which catches anomalies 03/23/11 15

CVE-2010-4170 Number of Vulnerable Hosts 03/23/11 16

Number of Vulnerable Hosts in Days

Pakiti Proxy Client Pakiti can be integrated into the existing monitoring infrastructure (e.g. Nagios) Pakiti client prints results to the stdout and then monitoring system transfers them using its own mechanisms to the central monitoring server Data are then presented to the Pakiti Proxy Client which then sends them on behalf of the monitored host to the Pakiti server Each Pakiti Proxy Client has to be authorized 03/23/11 18

Pakiti Technology Pakiti is written in PHP, so it can be easily changed in order to fit the administrator's needs Uses MySQL in non-transactional mode Users are autheticated by the Apache web server, Pakiti does only authorization 03/23/11 19

Pakiti v3 Reworked from scratch Improved performance Modular design Simplified configuration Unified import system for the OVALs and package repositories Additional access channels: RPC and CLI Additional output formats: CSV, XML 03/23/11 20

Thank you. Questions? michalp@ics.muni.cz http://pakiti.sf.net https://pakiti.egi.eu 03/23/11 21