eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Similar documents
eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success

Whitepaper. Advanced Threat Hunting with Carbon Black

Trend Micro. Advanced Security Built for the Cloud

Securing OS Legacy Systems Alexander Rau

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Avoiding the Top 5 Vulnerability Management Mistakes

Cloud and Data Center Security

Why should I care about PDF application security?

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Virtual Patching: a Proven Cost Savings Strategy

Protecting Your Organisation from Targeted Cyber Intrusion

PCI DSS Reporting WHITEPAPER

Windows Server 2003 End of Support. What does it mean? What are my options?

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

How To Test For Security On A Network Without Being Hacked

How To Protect Your Network From Attack From A Network Security Threat

PCI Data Security Standards (DSS)

Integrated Threat & Security Management.

Payment Card Industry Data Security Standard

IT Security & Compliance. On Time. On Budget. On Demand.

Virtual Patching: a Compelling Cost Savings Strategy

Compliance Management, made easy

eguide: Designing a Continuous Response Architecture Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

McAfee Server Security

Extreme Networks Security Analytics G2 Vulnerability Manager

Altiris IT Management Suite 7.1 from Symantec

End-user Security Analytics Strengthens Protection with ArcSight

Devising a Server Protection Strategy with Trend Micro

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Lumension Endpoint Management and Security Suite

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Devising a Server Protection Strategy with Trend Micro

Proven LANDesk Solutions

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Are You Ready for PCI 3.1?

Need to be PCI DSS compliant and reduce the risk of fraud?

Trend Micro Cloud Security for Citrix CloudPlatform

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Security Information Lifecycle

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

IBM Security QRadar Vulnerability Manager

PCI Compliance. Top 10 Questions & Answers

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015

October Application Control: The PowerBroker for Windows Difference

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Meeting the Challenges of Virtualization Security

Preemptive security solutions for healthcare

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Verve Security Center

Cyber Security Management

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Three Ways to Secure Virtual Applications

Invincea Advanced Endpoint Protection

Reining in the Effects of Uncontrolled Change

Average annual cost of security incidents

Vulnerability Management

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

PCI Compliance for Cloud Applications

Boosting enterprise security with integrated log management

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Caretower s SIEM Managed Security Services

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

PCI DSS Top 10 Reports March 2011

PCI Compliance Top 10 Questions and Answers

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Bringing Continuous Security to the Global Enterprise

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

Reducing the cost and complexity of endpoint management

McAfee Database Security. Dan Sarel, VP Database Security Products

Symantec Control Compliance Suite Standards Manager

Enterprise Security Solutions

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Virtualization Essentials

Transcription:

Executive s Guide to Windows Server 2003 End of Life

Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows XP, Windows Server 2003 continues to be used and relied upon by organizations worldwide with as many 10 million Windows Server 2003 systems still in production. July 14, 2015, is the end-of-life date for Windows Server 2003. There will be NO MORE security updates and critical patches available after July 14, 2014 unless you pay Microsoft for custom support. Custom supports provides: Critical patches only. Important patches are available at an additional price. Historically, Microsoft labeled many patches as important that, in our opinion, should have been labeled as critical. No support for moderate or low-priority security updates. Antivirus solutions will be ineffective on machines running Windows Server 2003 after EOL. Many antivirus products will not be supported and will not have necessary signature updates for new vulnerabilities. Many legacy applications built on Windows Server 2003 will no longer be supported after end of life. Without compensating controls, Windows Server 2003 will no longer meet regulatory compliance standards. $$$ $200,000, the estimated average amount for custom support. 2

What Organizations Are Affected? Originally launched in 2003, Windows Server 2003 [WS2K3] and its 2005 update Windows Server 2003 R2 is are relied upon by thousands of organizations for critical production workloads. On July 14, 2015, Microsoft will stop security updates for Windows Server 2003, leaving organizations across a multitude of industries vulnerable to malware attacks. If your organization is driven by compliance requirements, such as SOX, HIPAA, PCI, NERC, Gramm-Leach-Bliley, etc, you will have even greater challenges. In addition to security concerns, your organization also will be noncompliant. According to HP, there are more than 10 million systems still running Windows Server 2003. So chances are your organization has or is going to need to put a Windows Server 2003 EOL plan in place. The Status of and Barriers to Upgrading According to AppZero s 2013 State of Readiness report on Windows Server 2003 End of Life, less than a quarter of organizations have a proper upgrade plan in place and nearly 40 percent are unsure of how they would upgrade existing systems. With the average migration project taking 200 days to implement, if you are only now starting a WS2K3 migration, it is unlikely that you will finish before support stops in July 2015. A surprising number of client organizations will be operating those unsupported systems next year and beyond, they range from medium scale up to the largest enterprise IT organizations. - Managing the Risks of Running Windows Server 2003 After July 2015 Carl Claunch, April 1, 2014 3

How many Windows Server 2003 devices are you still running? - 33% 13% 24% 7% 10% 6% 1-25 26-100 101-500 501-1000 1001-5000 5000 There are several reasons why your organization may still be running Windows Server 2003 and not be able to upgrade to a supported OS such as Windows Server 2008 R2 or 2012 R2. You may need new hardware to support the new operating system. Your organizations mission-critical applications are not upgrade-compatible. You do not have sufficient budget for migration. You do not have the IT resources to execute a migration and maintain day-to-day operations. App Zero 2013 State of Readiness for Windows Server 2003 End of Support 4

Application Compatibility For many organizations, application compatibility is the biggest barrier for upgrading. If you have 32-bit legacy applications running on WS2K3, these applications will not run or cannot easily be upgraded to run on modern 64-bit operating systems such as Windows Server 2012. Additionally, developers of 2003-certified legacy applications or in-house custom applications may not have the budgets or motivation to recompile software for newer releases. What types of applications cause you the most concern? Financials Customer Relationship Management Enterprise Resource Planning Business Process Management Other 7% 33% 19% 14% 29% You also may have a challenge dealing with third-party applications from vendors such as Oracle, Adobe, etc., which, like Microsoft, are encouraging you to upgrade. It also is unclear whether third-party antivirus and scanning software which may be part of your current security stack will be supported. App Zero 2013 State of Readiness for Windows Server 2003 End of Support 5

23% 12% 12% 54% eguide What risks of running an unsupported OS are of primary concern? Increased Cost & Downtime 23% Security & Vulnerability Management Regulatory Compliance 12% 54% Other 12% App Zero 2013 State of Readiness for Windows Server 2003 End of Support The Consequences Unpatched WS2K3 systems will lead to zero-day forever scenarios - that is, there will be no patches for zero-day attacks so new vulnerabilities will never be remediated. And since Windows Server 2003 lacks more advanced memory protection features found in later Windows operating systems, the lack of support can make your situation worse. Without updates and patches, you may be cited for noncompliance and/or failure to pass assessment and regulatory audits. Here is Microsoft s official position on the topic: Unsupported and unpatched environments are vulnerable to security risks. This may result in an officially recognized control failure by an internal or external audit body, leading to suspension of certifications, and/or public notification of the organization s inability to maintain its systems and customer information. This statement is absolutely true but with proper planning ahead of time there are compensating controls you can put in place to ensure the security and continued compliance of these systems. Once you have an operating system that can t be patched and new malware is discovered, your organization will definitely be out of compliance and the effects can be devastating: Breach and data compromise: Malware authors can get access to highly confidential information such as your critical research and development plans, core business databases, consumers credit card/financial data or patient information. Financial penalties: Your organization can be fined for failure to pass compliance audits by being in a noncompliant state. Loss of privileges: Your organization can realize lose the right to process major credit card transactions and access to business-critical data you need to conduct business. Damage to your corporate brand: This is often the most devastating consequence and can be difficult to remediate. In fact, according to the Nation Cyber Security Alliance, 60 percent of small and medium businesses that suffer a breach go out of business within six months. With Microsoft custom support estimated to cost $200,000 per year on average, IT managers would be wise to look into other compensating control options, such as application whitelisting, to ensure continued security and compliance of these systems. 6

Compensating Controls If you are late to addressing a solution to WS2K3 end of life, don t panic. There are compensating controls you can consider to keep your Windows Server 2003 system secure after end of life, key among them are application whitelisting and network isolation. Network Isolation With network isolation, you isolate Windows 2003 servers so that these machines cannot access your central services. A 2003 server will interact with other systems on the isolated network, but cannot interact with any machines outside of the isolated network or connect to the Internet. With network isolation, you will protect your WS2K3 devices from malware attacks but this will only work in cases where your applications do not need Internet access and/or access to other systems outside of an isolated network. Seeing as most servers host critical applications that must be accessible to employees and connected to other corporate servers, this is likely not a viable option for most WS2K3 workloads. For isolated department- or team-specific legacy applications, this can be a viable option but for email, domain, Web and other corporate production servers, network isolation is unlikely to be a viable long-term option. Isolated Network Fixed Function Windows 2003 Servers Corporate Servers Firewall Internet Windows XE Terminal Application Whitelisting Application whitelisting is a security model focused on allowing known good applications rather than blocking known bad, and is widely regarded as the industry s best form for advanced threat prevention. While highly recommended as a standard security stack component for all devices, when implemented in default-deny mode application whitelisting is a highly effective compensating control to meet regulatory compliance standards and harden out-of-date systems, such as WS2K3. By ensuring only trusted software is allowed to run, application whitelisting will prevent zero-day exploits and advanced malware and also can negate or delay the need for software patching. While developing an application whitelist once required significant administrative effort, advanced application whitelisting solutions include features designed to greatly reduce that effort, such as cloud-driven software reputation ratings and integrations with leading configuration management solutions, such as Microsoft SCCM, to dynamically approve IT-driven and other trusted software. Given the relatively static nature of most servers, implementing application whitelisting is likely to be a relatively easy, highly attractive and affordable compensating control alternative to purchasing a custom support contract from Microsoft. 7

The Advantages of Bit9 as a Compensating Control Bit9 Carbon Black offers an advanced security solution that your organization can deploy as a compensating security control in lieu of regular patching and updates that are no longer available from Microsoft. Bit9 extends the security window and protects your WS2K3 devices from breach and data compromise past the end-of-life date. With Bit9, your WS2K3 systems will remain compliant because the solution provides: Complete visibility into everything that is happening on every in-scope server and endpoint so you can measure compliance and risk. Automated, real-time detection of zero-day and other advanced threats. A change history and full audit trail of all server and endpoint activity along with real-time compliance risk measurement and reporting of your in-scope systems, including those which are no longer supported. This reporting provides the actionable intelligence to monitor compliance, identify any unexpected activity or event, and proactively improve your security posture. Prevention to stop advanced threats and other forms of malware from executing, including targeted, customized attacks that are unique to your organization. Integration across the existing security infrastructure to understand enterprise-wide compliance risk and exposure. The Benefits of Bit9 as a Compensating Control Most important, get your WS2K3 systems into a compliant state BEFORE the July 14, 2015, deadline and eliminate financial penalties and brand damage associated with failed audits, data breaches, or noncompliance. Consolidate your enterprise security stack and eliminate the need for and costs associated with other security software. Bit9 is all you need to get visibility, detection and protection for all servers and endpoints across the enterprise. Lower the cost of obtaining compliance data because Bit9 uses an up-front trust policy to control change and filter data, enabling you to focus only on those events that are relevant to your business. Eliminate the high costs of WS2K3 custom support contracts and hardware upgrades. Bit9 is an affordable, cost-effective solution when compared to the costs associated with Microsoft s out-of-band support and/or replacing racks of aging servers and custom applications. ABOUT BIT9 CARBON BLACK The combination of Bit9 Carbon Black offers the most complete answer to the newer, more advanced threats and targeted attacks intent on breaching an organization s endpoints. This comprehensive approach makes it easier for organizations to see and immediately stop advanced threats. Our solution combines Carbon Black s lightweight endpoint sensor, which can be rapidly deployed with no configuration to deliver incident response in seconds, and Bit9 s industry-leading prevention technologies. Benefits include: Continuous, real-time visibility into what s happening on every computer Real-time threat detection, without relying on signatures Instant response by seeing the full kill chain of any attack Protection that is proactive and customizable Bit9 Carbon Black delivers a comprehensive solution for continuous endpoint threat security. This is why thousands of organizations worldwide from 25 Fortune 100 companies to small businesses use our proven solution. The result is increased security, reduced operational costs and improved compliance. 2014 Bit9 is a registered trademark of Bit9, Inc. All other company or product names may be the trademarks of their respective owners. 20141107 266 Second Avenue Waltham, MA 02451 USA P 617.393.7400 F 617.393.7499 www.bit9.com