Vulnerability Assessments, Penetra2on Studies, ediscovery Not All The Same



Similar documents
Where every interaction matters.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Payment Card Industry Data Security Standard (PCI DSS) v1.2

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Achieving PCI-Compliance through Cyberoam

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

March

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

74% 96 Action Items. Compliance

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Using Free Tools To Test Web Application Security

Payment Card Industry (PCI) Data Security Standard

GFI White Paper PCI-DSS compliance and GFI Software products

Sitefinity Security and Best Practices

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Barracuda Web Site Firewall Ensures PCI DSS Compliance

CS5008: Internet Computing

Firewalls and Intrusion Detection

05.0 Application Development

Network Segmentation

How to complete the Secure Internet Site Declaration (SISD) form

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Web App Security Audit Services

How To Protect A Web Application From Attack From A Trusted Environment

Guidelines for Web applications protection with dedicated Web Application Firewall

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Networking for Caribbean Development

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

OWASP AND APPLICATION SECURITY

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Magento Security and Vulnerabilities. Roman Stepanov

Achieving Compliance with the PCI Data Security Standard

Global Partner Management Notice

C13 - Establishing a Windows Baseline Mike Villegas

Passing PCI Compliance How to Address the Application Security Mandates

NSFOCUS Web Application Firewall White Paper

HOW SECURE IS YOUR PAYMENT CARD DATA?

Web Application Penetration Testing

Virtualization Impact on Compliance and Audit

A Decision Maker s Guide to Securing an IT Infrastructure

CYBERTRON NETWORK SOLUTIONS

Achieving PCI Compliance Using F5 Products

locuz.com Professional Services Security Audit Services

Payment Card Industry (PCI) Data Security Standard

PCI Compliance. Top 10 Questions & Answers

Best Practices for PCI DSS V3.0 Network Security Compliance

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

PCI Compliance Top 10 Questions and Answers

Secure Software Programming and Vulnerability Analysis

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Client logo placeholder XXX REPORT. Page 1 of 37

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

DMZ Gateways: Secret Weapons for Data Security

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE

Learn Ethical Hacking, Become a Pentester

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP


IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

The Top Web Application Attacks: Are you vulnerable?

Payment Card Industry (PCI) Compliance. Management Guidelines

Firewalls, Tunnels, and Network Intrusion Detection

Adobe Systems Incorporated

April 11, (Revision 2)

OWASP Top Ten Tools and Tactics

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

SonicWALL PCI 1.1 Implementation Guide

PCI Security Scan Procedures. Version 1.0 December 2004

Thick Client Application Security

Application Security Best Practices. Wally LEE Principal Consultant

Vulnerability Scans Remote Support 15.1

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

PCI DSS 3.0 Compliance

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

INFORMATION SECURITY TRAINING CATALOG (2015)

Transcription:

Vulnerability Assessments, Penetra2on Studies, ediscovery Not All The Same Core Competencies C21 Miguel (Mike) O. Villegas CISA, CISSP, GSEC, CEH, PCI QSA, PA- QSA, ASV Vice President- K3DES LLC October 14, 2014 1

Abstract We all may have seen and performed vulnerability scanning tools, penetramon studies and e- discovery scans but possibly not all three. This session will discuss the difference in nature and use of each. They each have a dismnct purpose and are used for security monitoring and compliance. However, they each have their limitamons. Another area for discussion is which product solumon to implement. There are commercial and open- source solumons that can samsfy a company s needs. We will discuss how to import, align, and score assets from each type vulnerability scanning tools using a common, shared repository (Log Manager) and triage scoring methodology. We will also discuss workflow and remediamons of idenmfied and priorimzed vulnerabilimes. The products presented in this session are for informamonal purposes only and does not reflect an endorsement or recommendamon on the part of the presenter. AZendees are advised to perform their own due diligence in selecmng the right solumon for their insmtumons. 2

Table of Contents v Security Monitoring v Vulnerability Scanners v Penetra2on Tests v ediscovery Scanners v Workflow Management v Con2nuous Monitoring Op2ons 3

The complaint alleges the vulnerabilimes in the Target system were "either undetected or ignored by Trustwave," allowing hackers access to millions of card account and personal records. The suit esmmates that the banks will spend about $172 million reissuing credit and debit cards. Their total losses, including fraudulent charges, could hit $18 billion, according to the lawsuit. 4 4

Target did not face a basic azack. They faced a carefully planned azack which was executed in a very calculated manner. The azack was designed to evade basic controls. Target was using advanced techniques which successfully idenmfied hosmle acmvity in their network. By Target s own admission, this was a failure in fully using available security capabilimes and controls; without the operamonal security foundamon in place, Target was unprepared to act when presented with advanced informamon. NTT Group 2014 Global Threat Intelligence Report 5

Informa2on Security InformaMon Security is the process of maintaining an acceptable level of perceived risk. There are no silver bullets to guarantee absolute security but it remains a goal worthy of our azenmon. This process revolves around four steps: 1 Assessment Response ProtecMon DetecMon 1 The Tao of Network Security Monitoring 6

Assessment Assessment is preparamon for the other three components. It deals with: v Policies v Procedures v Laws v RegulaMons v BudgeMng v Technical evaluamon of a company s security posture. All of these MUST be based on perceived (or AKA residual) risk. 1 The Tao of Network Security Monitoring 7

Protec2on Protec2on is the applicamon of countermeasures to reduce the likelihood of compromise. Another word for this would be Preven7on. ProtecMon measures should ALWAYS be based on RISK. Risk is dependent on: v Laws and regulamons v Value of Asset v Cost of Recovery v Likelihood of Incidents v ReputaMon Impact v Business Impact 1 The Tao of Network Security Monitoring 8

2014 SF ISACA Fall Conference 9

Detec2on Detec2on is the process of idenmfying intrusions. v Intrusions are the policy violamons or computer incidents. v Event is any acmon that involves a computer system or network. v Incident is any unlawful, unauthorized, or unacceptable acmon that involves a computer system or network. 1 The Tao of Network Security Monitoring 10

Response Response is the process of validamng the fruits of detecmon and taking steps to remediate intrusions. Response acmvimes include: v Patching v Proceeding v Pursuing v Prosecute The first two are focused on restoring to original state prior to incident. The lazer two are to take legal acmon against the perpetrator. 1 The Tao of Network Security Monitoring 11

PCI DSS 12 Requirements Build and Maintain a Secure Network v Requirement 1: Install and maintain a firewall configuration to protect cardholder data v Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data v Requirement 3: Protect stored cardholder data v Requirement 4: Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program v Requirement 5: Use and regularly update anti-virus software v Requirement 6: Develop and maintain secure systems and applications Implement Strong Access Control Measures v Requirement 7: Restrict access to cardholder data by business need-to-know v Requirement 8: Assign a unique ID to each person with computer access v Requirement 9: Restrict physical access to cardholder data Regularly Monitor and Test Networks v Requirement 10: Track and monitor all access to network resources and cardholder data v Requirement 11: Regularly test security systems and processes Maintain an Information Security Policy v Requirement 12: Maintain a policy that addresses information security 12

Security Monitoring (PCI) v2.0 Vulnerability Scans PenetraMon Tests Web ApplicaMon Vulnerability Scan 11.2 Run internal and external network vulnerability scans at least quarterly and aler any significant change in the network 11.3 Perform external and internal penetramon tesmng at least once a year and aler any significant infrastructure or applicamon upgrade or modificamon 6.6 For public- facing web applicamons, either Reviewing public- facing web applicamons via manual or automated applicamon vulnerability security assessment tools or methods, at least annually and aler any changes, OR Note: This assessment is not the same as the vulnerability scans performed for Requirement 11.2. a web- applicamon firewall Discovery 1 The Tao of Network Security Monitoring 3.2 Do not store sensimve authenmcamon data aler authorizamon (even if encrypted). 13

Security Monitoring (PCI) v3.0 Vulnerability Scans PenetraMon Tests Web ApplicaMon Vulnerability Scan 11.2 Run internal and external network vulnerability scans at least quarterly and aler any significant change in the network (such as new system component installamons, changes in network topology, firewall rule modificamons, product upgrades). 11.3.1 Perform external penetramon tesmng at least annually and aler any significant infrastructure or applicamon upgrade or modificamon (such as an operamng system upgrade, a sub- network added to the environment, or a web server added to the environment). 6.6 For public- facing web applicamons, either Reviewing public- facing web applicamons via manual or automated applicamon vulnerability security assessment tools or methods, at least annually and aler any changes, OR Note: This assessment is not the same as the vulnerability scans performed for Requirement 11.2. a web- applicamon firewall Discovery 1 The Tao of Network Security Monitoring 3.2 Do not store sensimve authenmcamon data aler authorizamon (even if encrypted). If sensimve authenmcamon data is received, render all data unrecoverable upon complemon of the authorizamon process. 14

v CollecMon v Analysis v AlerMng v EscalaMon Security Monitoring For incidents to detect and respond to intrusions, Intrusion DetecMon Systems (IDS or IPS) systems provide this level of monitoring. IDS/IPS systems can be at the network level or at the host level (HIDS/HIPS). But IDS s are reacmonary in nature. We need to detect before it happens. 1 The Tao of Network Security Monitoring 15

Common Types of Network AUacks v v v v Eavesdropping - the majority of network communicamons occur in an unsecured or "cleartext" format, which allows an azacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. Data Modifica2on - An azacker can modify the data in the packet without the knowledge of the sender or receiver. Iden2ty Spoofing (IP Address Spoofing) - An azacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet. Aler gaining access to the network with a valid IP address, the azacker can modify, reroute, or delete your data. Password- Based AUacks - This means your access rights to a computer and network resources are determined by who you are, that is, your user name and your password. 16

Common Types of Network AUacks v v v v v Denial- of- Service AUack - prevents normal use of your computer or network by valid users. Man- in- the- Middle AUack - azacker makes independent connecmons with the vicmms and relays messages between them, making them believe that they are talking directly to each other over a private connecmon Compromised- Key AUack - azacker uses the compromised key to gain access to a secured communicamon without the sender or receiver being aware of the azack Sniffer AUack - applicamon or device to read, monitor, and capture network data exchanges and read network packets. Applica2on- Layer AUack - targets applicamon servers by deliberately causing a fault in a server's operamng system or applicamons. 17

DDoS v v v v v v Distributed Denial of Service (DDoS) is a denial of service originating from many different source hosts. Historically, there are four different DDoS programs: v Trinoo v Tribe Flood Network (TFN) v TNF2K v Stacheldraht (German for barbed wire) In a DDoS attack, many different hostile hosts enlist and direct their attack to a target site. Extremely difficult to trace to a source. Stopping DDoS depends greatly on the updated configuration of firewall and gateway equipment They steal large amounts of bandwidth and crash systems with outside connections 18

NTT Group 2014 Global Threat Intelligence Report 19

Vulnerability Scanning Scanning Event Host Discovery Port Scanning OS DetecMon Service Discovery AuthenMcaMon Vulnerability Assessment Descrip2on TCP and UDP probes are sent to default ports for common services on each host, such as DNS, TELNET, SMTP, HTTP and SNMP. At least one response, the host is considered "alive." All open TCP and UDP ports on target host, configurable. OS installed through TCP/IP stack fingerprinmng, OS fingerprinmng on redirected ports Uses several discovery methods to idenmfy which service is running on the port OpMonal, ensure that each host on the network is in compliance with internal security policies Vulnerability tests that are applicable to each target host based on the informamon gathered for the host 20

hzp://cve.mitre.org/cve/index.html 21

DoS for FTP sessions, primarily Linux 22

Networking Monitoring Ø A detailed analysis of vulnerabili2es found within your IP addresses or domain, classified by High, Medium or Low severity Ø Step- by- step instruc2ons on how to remediate threats, so you can immediately address the most serious vulnerabilimes 23 23

24

25

26

27

28

False Posi2ves v False PosiMve - The erroneous idenmficamon of a threat or dangerous condimon that turns out to be harmless. False posimves olen occur in IDS and vulnerability scans. v False NegaMve - The erroneous idenmficamon of a benign condimon that turns out to be harmful. 29

Penetra2on Tes2ng PCI DSS v2.0 30

Penetra2on Tes2ng PCI DSS v2.0 Penetra2on Tes2ng PCI DSS V3.0 REQUIREMENT AFTER JUNE 30, 2015 31

Penetra2on Tes2ng PCI DSS v2.0 32

Penetra2on Tes2ng Big Issue: This means a penetramon test of the CDE must include the analysis of card data flow in electronic form on any system within the CDE and any connected systems. PCI DSS v3.0 33

External Network & Applica2on Penetra2on Test External Network and ApplicaMon PenetraMon Tests are conducted to help idenmfy vulnerabilimes throughout <company s> environment. Assessments are conducted using a Full- disclosure / Non- evasive approach. They include: 1. Discovery Phase Performed host discovery umlizing ping sweeps and limited port scans. 2. Target Profiling Phase Enumerated, grouped, and priorimzed services running on acmve hosts. 3. Examina2on Phase Performed vulnerability tesmng umlizing automated and manual techniques. 4. Risk Valida2on Phase Confirmed vulnerabilimes through authorized exploitamon azempts. 34

35

OWASP Top 10-2013 Top 10 2013 A1 InjecMon A2 - Broken AuthenMcaMon and Session Management A3 Cross Site ScripMng (XSS) A4 Insecure Direct Object References A5 Security ModificaMon A6 SensiMve Data Exposure A7 Missing FuncMon Level Access Control A8 Cross- Site Request Forgery (CSRF) A9 - Using Components with Known VulnerabiliMes A10 Unvalidated Redirects and Forwards InjecMon flaws, such as SQL, OS, and LDAP injecmon occur when untrusted data is sent to an interpreter as part of a command or query. applicamon funcmons related to authenmcamon and session management are olen not implemented correctly, allowing azackers to compromise passwords, keys, or session tokens XSS allows azackers to execute scripts in the vicmm s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. developer exposes a reference to an internal implementamon object, such as a file, directory, or database key, azackers can manipulate these references to access unauthorized data. for the applicamon, frameworks, applicamon server, web server, database server, and plaworm. web applicamons do not properly protect sensimve data, such as credit cards, tax IDs, and authenmcamon credenmals. access unauthorized or AdministraMve funcmons without authenmcamon forces a logged- on vicmm s browser to send a forged HTTP request, including the vicmm s session cookie and any other automamcally included authenmcamon informamon, to a vulnerable web applicamon. applicamons using components with known vulnerabilimes may undermine applicamon defenses and enable a range of possible azacks and impacts. web applicamons frequently redirect and forward users to other pages and websites, and use untrusted data to determine the desmnamon pages. hzps://www.owasp.org/index.php/category:owasp_top_ten_project hzp://www.owasp.org/index.php/top_10_2007 36

Input ValidaMon (Encoding) How many ways can you say v hzp://www.yahoo.com è ir1.fp.vip.sp2.yahoo.com v hzp://206.190.36.45 (IP address. Everyone knows it ) v hzp://0xcebe242d Hex representamon) v hzp://3468567597/ (Decimal representamon) v hzp://0316.0276.044.055 (Octal representamon) v hzp://206.0xbe.044.055 (You can mix them too!) what about one? hzp://www.google.com/search?hl=en&q=yahoo+page&btni= Source: Cassio Goldschmidt, Symantec 37

Penetra2on Tes2ng Key Concepts v Industry- Based Methodology v Scope ReducMon Controls v ApplicaMon Layer PenetraMon TesMng v Threats and VulnerabiliMes Experience Last 12 Months v RetenMon of PenetraMon Tests and RemediaMon Results v Internal PenetraMon Test v External PenetraMon Test v Qualified Internal Resource v Qualified External Resource v Exploitable Vulnerability Remediated and Retested v SegmentaMon Controls 38

Tools for Pen Tes2ng v BackTrack Linux 5 R2/R3 azacker machine v Nmap Network Scanner used to idenmfy ports and services on target system v Metasploit Framework used for exploimng, generamng the payload, establishing a session with target system v Others 39

Segmenta2on 40 2014 SF ISACA Fall Conference Network Diagram Sample (Redacted) 40

Segmenta2on Issues 41 v v v Cardholder Data (CHD) must exclusively be stored, processed or transmized through the Cardholder Environment (CDE) You have to prove this by: v Clearly defining the In- Scope Segments v Demonstrate that CHD does not exist in Not- In- Scope segments v Prove that the use of firewalls, ACLs and proxies segment CDE from untrusted segments v All communicamon lines to CDE is protected or encrypted using dedicated leased lines, SSLv3, VPN w/ipsec, strong encrypmon (AES- 256), and/or 2- factor authenmcamon Biggest issue is PCI DSS v3.0 is that now it needs to be pen tested 41

ediscovery v ediscovery tools are used for several reasons: v v v v Legal e- discovery HIPAA/PCI/PII e- discovery Digital Forensics Security Monitoring v Lawyers and e- discovery pracmmoners, in parmcular, struggle with the rights, restricmons and reality involved in employees use of social media 42

Magic Quadrant on ediscovery Upper Right Quadrant Kroll Ontrack FTI Technology kcura AccessData HP Autonomy Symantec Recommind Exterro Guidance Solware 43

Data Discovery Tools v Used to scan for Cardholder Data (CHD) v Examples: v Card Recon v iscan v ICVERIFY v Spider Crawlers 44

Sample Spider Scan 45

Data Loss Preven2on Ø Detect, block or control the usage of (for example, saving, prinmng or forwarding) specific content based on established rules or policies. Ø Monitor network traffic for, at a minimum, e- mail traffic and other channels/ protocols (HTTP, IM, FTP) and analyze across mulmple channels, in a single product and using a single management interface. Ø End- Point / Network / Discovery 46 46

Workflow Management PREVENTIVE DETECTIVE CORRECTIVE Vulnerability Management IDS/IPS/Firewalls ConfiguraMon Management Patch Management Access AuthenMcaMon AnM- Virus/Malware SIEM Monitoring Database Monitoring AnM- Virus Host Alerts Network Alerts WAF Alerts DLP Alerts CSIRT Legal AcMons AdministraMve AcMons Forensics AnM- Virus RemediaMons & QuaranMne BCP (DR/BC) CriMcal Asset Threat Complexity 47

NIST Interagency Report 7670 (NIST IR- 7670) - Proposed Open SpecificaMons for An Enterprise RemediaMon AutomaMon Framework 48

NIST IR- 7670 Workflow RemediaMon Policy Source RemediaMon Policy RemediaMon Management Tool RemediaMon Data Source RemediaMon Tool RemediaMon Details Assessment Results RemediaMon Tasks RemediaMon Results Public or private repository for remediamon policy documents Set of remediamon policy direcmves for compumng assets. These direcmves may specify target plaworms, parameter values, and a reference to a common remediamon idenmfier. RemediaMon policies may define configuramon se~ngs that are to be applied, vulnerabilimes to be remedied, and patches that must be applied. Such policies can be established at the enterprise level and may be tailored to meet the local operamonal needs of organizamonal elements or business units. Tool responsible for evaluamng assessment results, remediamon policy, and remediamon details to produce specific remediamon tasking instrucmons for remediamon tools. Public or private repository for detailed remediamon informamon Tool responsible for apply individual remediamons to specified assets. Publicly or privately held data that idenmfies the vulnerability or misconfiguramon a remediamon addresses, any prerequisites for performing the remediamon and post- applicamon instrucmons. Describes the vulnerabilimes or misconfiguramons discovered by an assessment or scanning tool and the metadata regarding how and when the assessment was performed (e.g., date & Mme of the scan, tool used, scan operator). RemediaMon instrucmons specifying which remediamons are to be applied, when they are to be applied, and under what condimons. The outcome of azempted remediamon tasks on parmcular assets. 49

Managed Services v When considering managed service providers it is crimcal to understand which of their service offerings have been validated as HIPAA, PCI DSS, GLBA, FISMA compliant. v Do not rely on an SSAE- 16 unless you know what the CPA auditors tested. Many Mmes they use the SSAE- 16 as validamon that they are regulamon or PCI compliant. v Obtain, in wrimng, whether they will provide or allow vulnerability scanning, penetramon tesmng or discovery services on behalf of client. v Ensure that the services they provide do not compromise security if your data is shared or housed in the same environment as other company data. 50 50

Cloud Compu2ng Security Role/Responsibility 51

Tools for Con2nuous Monitoring v Security Incident & Event Monitoring (SIEM) v File Integrity Monitoring (FIM) v Intrusion DetecMon and PrevenMon Systems (IDS/IPS) v Web ApplicaMon Firewalls (WAFs) v Firewalls (numerous) v Database Monitoring v Two- Factor AuthenMcaMon v EncrypMon 52

Security Informa2on & Event Monitor (SIEM) COMMERCIAL OPEN SOURCE Ø Cost Ø Scalability Ø Flexibility Ø Skill set requirements Ø Current signatures Ø Agent and/or Agentless 53 53

File Integrity Monitoring COMMERCIAL OPEN SOURCE TRIPWIRE (For End- User CompuMng Only) Ø Cost Ø Scalability Ø Flexibility Ø Skill set requirements Ø Current signatures 54 54

IDS/IPS COMMERCIAL OPEN SOURCE Ø Cost Ø Scalability Ø Flexibility Ø Skill set requirements Ø Current signatures 55 55

Web Applica2on Firewalls COMMERCIAL OPEN SOURCE ESAPI Web ApplicaMon Firewall (ESAPI WAF) Ø Cost Ø Scalability Ø Flexibility Ø Skill set requirements Ø Current azack vendors 56 56

Database Monitoring COMMERCIAL OPEN SOURCE Ø Cost Ø Scalability Ø Flexibility Ø Skill set requirements Ø Current signatures Ø Agent and/or Agentless 57 57

Two- Factor Authen2ca2on Ø MulM- factor authenmcamon (also Two- factor authenmcamon, TFA, T- FA or 2FA) is an approach to authenmcamon which requires the presentamon of two or more of the three authenmcamon factors Ø Something I know Ø Something I have Ø Something I am - RSA SecurID PhoneFactor offers instant integramon with a wide range of applicamons, including all leading remote access VPN solumons, single sign- on systems, cloud applicamons, online banking, and websites as well as custom applicamons. PhoneFactor also integrates with AcMve Directory and LDAP servers for centralized user management. 58 58

Summary v Security Monitoring v Vulnerability Scanners v Penetra2on Tests v ediscovery Scanners v Workflow Management v Con2nuous Monitoring Op2ons 59

BIO Miguel (Mike) O. Villegas is a Vice President for K3DES LLC. He performs and QA s PCI- DSS and PA- DSS assessments for K3DES clients. He also manages the K3DES ISO/ IEC 27001:2005 program. Mike was previously Director of InformaMon Security at Newegg, Inc. for five years. Mike has over 30 years of InformaMon Systems security and IT audit experience. Mike was previously Vice President & Technology Risk Manager for Wells Fargo Services responsible for IT Regulatory Compliance and was previously a partner at Arthur Andersen and Ernst & Young for their informamon systems security and IS audit groups over a span of nine years. Mike is a CISA, CISSP, GSEC and CEH. He is also a QSA, PA- QSA and ASV as VP for K3DES. Mike was president of the LA ISACA Chapter during 2010-2012 and president of the SF ISACA Chapter during 2005-2006. He was the SF Fall Conference Co- Chair from 2002 2007 and also served for two years as Vice President on the Board of Directors for ISACA InternaMonal. Mike has taught CISA review courses for over 18 years. 60