Getting Started with the iscan Online Data Breach Risk Intelligence Platform
2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing A Deployment Methodology... 5 Perform A Data Breach Risk Scan... 6 1. Click on Scan Computers... 6 2. Choose the Organization to Scan... 7 3. Choose a Data Breach Risk Scan Type... 7 A Note About the Data Breach Risk Scan... 7 A Note About Scan Short Codes... 8 4. Choose Scan Delivery Method... 8 5. CLI Scanner Command Line Arguments... 9 6. Running The Scan... 10 Monitoring Progress... 11 Generating Reports... 14 Generate Data Breach Risk Report... 14 1. Navigate To Reports... 14 2. Run Data Breach Risk Report... 15 3. View Report... 16 4. Report Sharing... 17 Enable Sharing... 17 Copy URL... 18 Generate Security Threat Report... 19 1. Navigate to Reports... 19 2. Run Vulnerable Hosts Report... 20 3. View Report... 21 Summary... 22 Conclusions... 22
3 Overview Data Breach Risk Intelligence In today's world of cyber attacks and data breaches, it's important to understand the goals and motivations of attackers as well as how attacks happen. Everyday businesses are at risk to becoming the next victim of a data breach. These breaches continue to happen because organizations never had the ability to visualize the combined intelligence exposing security threats, unprotected data at rest and insider access to unprotected data. iscan Online provides a powerful patented data breach risk intelligence platform that delivers the combined intelligence necessary for organizations to understand, and act upon their risk exposure of a data breach attack. Data Breach Prevention Lifecycle Defined
4 The security of corporate sensitive data is now under relentless attack. Fighting the war on digital data loss has reached the status of a global epidemic. The vast majority of data breaches are caused by unprotected data at rest residing on vulnerable endpoints resulting in an easy entry point for attackers. iscan Online recognizes today's cyber security challenges and enables organizations to protect themselves by continuously assessing their environments using proven technology that follows the Data Breach Prevention Lifecycle. Discover - Unprotected sensitive data at rest and the insiders that have access to the data Detect - Security threats providing vulnerable entry points for attackers to access your data Prioritize - At risk assets by leveraging the combined intelligence of security threat and data intelligence Remediate - Security threats by applying patches, mitigating solutions and encrypting or removing unprotected data Manage - The entire lifecycle process through a single scalable cloud deployed console In this getting started guide, we will walk through implementing the iscan Online Data Breach Prevention Lifecycle using the iscan Online Data Breach Risk Intelligence Platform. We will cover how to effectively deploy the solution to discover data and vulnerabilities as well as generating data breach risk reports to help prioritize activities for remediation. We will conclude with a reflection on the entire process and how it can help prevent a data breach in your organization before it occurs.
5 Choosing A Deployment Methodology The iscan Online Data Breach Risk Intelligence Platform utilizes a host based scanning methodology to discover unprotected data at rest as well as discover the security threats and vulnerabilities that exist on the endpoints where data is stored. The host based scans can be delivered in various ways depending upon the target user-base, network topologies involved and device types. Currently iscan Online supports three primary scan delivery methods described below. Browser Plugin The iscan Online Browser Plugin for Mac and Windows provides a simple way for users to self assess their own devices. It can be integrated into network access points with captive portals, offered as a self service scan option on intranets or public facing web pages and even integrated into web single sign on providers. This powerful and flexible solution can help solve one of the biggest challenges for enterprises by providing opportunistic assessment of devices which typically go undetected by traditional scan methodologies. CLI (Command Line) Scan The iscan Online CLI Scanner for Mac, Windows and Linux is the most versatile scan delivery method. Its non persistant design allows scans to be launched from the command line, or integrated with a variety of systems management tools such as McAfee epo, LanDesk, Dell Kace, Microsoft Active Directory or System Center as well as other script capable endpoint management solutions. Other common deployment scenarios include scanning remote users via VPN using the on connect script functionality. The cli scanner does not require installation on the endpoint and can be launched from a network share. Mobile Apps For scanning Android and Apple ios devices, iscan Online provides native mobile apps available via the Google Play store or from the itunes App Store. These native mobile apps provide data discovery and vulnerability scanning and also provides lite MDM (Mobile Device Management) functionality such as locate, lock and wipe. Summary As you plan your production deployment strategy consider each of the scan deployment methods above as each provides valuable ways to scan devices. For the purpose of this getting started guide, we will
6 focus primarily on the CLI scan and deploying using common systems management tools. Perform A Data Breach Risk Scan As described in the Data Breach Prevention Lifecycle, the first steps are to discover unprotected sensitive data at rest, the insiders that have access to the data and detect the security threats that can lead to compromise of the endpoints. The iscan Online Data Breach Risk Intelligence Platform provides the Data Breach Risk Scan to assess endpoints for this critical intelligence. In this getting started guide, we will walk through how to perform a Data Breach Risk Scan on various endpoints using the CLI scanner. 1. Click on Scan Computers After logging onto the iscan Online Console, click on Scan Computers from the Side Nav menu.
7 2. Choose the Organization to Scan In the iscan Online Console, "Organizations" are used to group devices and results by terms familiar to your company. For example an Organization might be defined as an office location, particular type of devices (servers vs workstations) or whatever is meaningful to you. To change from the currently displayed organization to a different, click the Change button then select the desired organization. 3. Choose a Data Breach Risk Scan Type A Note About the Data Breach Risk Scan The Data Breach Risk Scan is pre configured to discover the following types of sensitive data: Credit Cards Social Security Numbers Drivers License Date of Birth Drivers License
8 A Note About Scan Short Codes In the screen shot above notice the column titled Short Code. A scan Short Code defines a particular scan type and configuration for the organization. These short codes are created automatically by the system when accounts and organizations are created. Short Codes can be used as command line arguments to the CLI scanner as described in the next step. 4. Choose Scan Delivery Method In this getting started guide we will be using the CLI scanner to perform data breach risk scans. From the Choose Scan Delivery Method combo box select Command Line Executable This displays the various methods of deployment for the CLI scanner and the appropriate platforms.
9 The simplest way to run a command line scan is to use the provided PowerShell script on Windows platforms or the curl script on Mac and Linux Platforms. These scripts are designed to automatically download the CLI executable if it doesn t exist or is outdated on the target and launch the selected scan on the device. 5. CLI Scanner Command Line Arguments Command Line Arguments for Scan Type If you ve chosen to download the CLI Scanner and not the Powershell or curl scripts, it will be named iscanruntime_xxxxxx_.exe Where XXXXXX is the short code for the scan type you selected. The file is named this as a matter of convenience so that command line switches are not required. However you could also rename the file to iscanruntime.exe and pass a command line argument with the desired short code. Example: C:>ren iscanruntime_xxxxxx.exe iscanruntime.exe Then C:> iscanruntime -k XXXXXX This allows you to store a single copy of the executable on a shared file path and pass the desired scan configuration short code. Command Line Arguments for Proxy If you will be scanning devices behind a proxy, iscan Online requires an internet connection and the ability to send HTTPS (443) traffic to https://app.iscanonline.com. The CLI scanner accepts as an argument the proxy server ip and port for authentication as shown below: C:> iscanruntime -k XXXXXX -x 192.168.1.2:8080
10 6. Running The Scan There are a variety of ways to distribute the CLI scan to endpoints in your organization. Since the CLI scanner does not require it to be installed on the actual device being scanned it can be located on a network share and then created as a scheduled task or a cron job on linux devices. Most common deployment scenarios leverage Microsoft Active Directory. iscan Online provides detailed step by step directions for running scans via active directory directly from the console. Simply choose Active Directory as the Scan Delivery Method and follow the steps. iscan Online also provides a McAfee epo distribution package that can be used to distribute scans. You can find details on the package download and instructions inside the iscan Online Cloud Console under the Resources menu option. The CLI scan can be run by any endpoint management tool that can execute a command on an endpoint including but not limited to: Microsoft System Center McAfee EPO Webroot Dell Kace cron jobs Login script VPN on connect script
11 Refer to your management solution documentation for instructions on how to execute a scheduled task on the desired endpoints. Monitoring Progress The iscan Online Cloud Console is designed to provide high level dashboards and detailed reporting across the entire enterprise. Several dashboard widgets are available the display top hosts by risk, most vulnerable hosts and various other statistics related to data discovered and trends. As hosts are being scanned you can monitor the progress of individual scans and view details of completed scan results by clicking on View and Manage then Scan Results.
12 The Scan Results view is a simple but very powerful user interface that allows filtering and sorting by any of the columns in the view. By double clicking on a host in the Scan Results view, it will display the detailed scan results.
13 Above is a sample Data Breach Risk scan report for a single host. It combines all of the intelligence of the data discovered, the vulnerabilities detected and which users have access to the data into a single view.
14 Generating Reports Generate Data Breach Risk Report Now that a data breach risk scan has been run on one or more devices it is possible to generate the Data Breach Risk Report 1. Navigate To Reports After logging into the iscan Online Cloud Console click on Reports from the left nav bar
15 2. Run Data Breach Risk Report Click on Data Breach Risk from the report grid
16 3. View Report The Data Breach risk report is displayed. Note that this is an active report view that allows filtering, grouping and analysis of data. Hovering over the graph data allows the viewing of details associated with the selected data point. Clicking on the graph legend allows the inclusion / exclusion of the data type from the graph In the column filters expressions can be included such as < > = to scope numeric filters. For example typing: > 200 in the credit card filter would show matches with greater than 200 credit card data found.
17 4. Report Sharing iscan Online has implemented a unique report sharing function that allows you to distribute reports without generating PDF files. This allows the report recipient to have the same powerful filtering and analytics capability but without requiring direct access to the iscan Online console. To share a report, click on the Share button found at the top right of the report. Enable Sharing Click on Share this Report
18 Copy URL Once shared, the dialog will display the public shared URL for the report. Copy this URL into an email and share it with the appropriate personnel in your organization.
19 Generate Security Threat Report The security scan report is valuable for performing analysis and prioritization of assets to be remediated for security threats. 1. Navigate to Reports After logging into the iscan Online Cloud Console click on Reports from the left nav bar
20 2. Run Vulnerable Hosts Report Click on Vulnerable Hosts from the report grid
21 3. View Report The vulnerability report is displayed. Note that this is an active report view that allows filtering, grouping and analysis of data. Hovering over the graph data allows the viewing of details associated with the selected data point. Clicking on the graph legend allows the inclusion / exclusion of the data type from the graph In the column filters expressions can be included such as < > = to scope numeric filters. For example typing: > 10 in the high severity filter would show hosts with greater than 10 high severity vulnerabilities.
22 Summary Conclusions In this walkthrough we defined the iscan Online Data Breach Prevention lifecycle and walked through how to apply the Data Breach Risk Intelligence Platform to fulfill the following requirements: Discover unprotected sensitive data and the insiders that have access Detect Security Threats Prioritize Remediation based on detected threats and liability amounts. We hope this guide was beneficial to guiding you in understanding the platform and hope you continue to explore the iscan Online Data Breach Risk Intelligence Platform