Best Practices in File Integrity Monitoring. Ed Jowett, CISSP ITIL Practitioner Sr. Systems Engineer, Tripwire Inc.



Similar documents
TRIPWIRE NERC SOLUTION SUITE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

WHITE PAPER. Meeting the True Intent of File Integrity Monitoring

TRIPWIRE REMOTE OPERATIONS: STOP OPERATING, START ANALYZING

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

TRIPWIRE CUSTOMER SUCCESS STORIES: PCI PARTNERSHIPS FOR RAPID COMPLIANCE SUCCESS

Evolution Of Cyber Threats & Defense Approaches

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Ecom Infotech. Page 1 of 6

Enabling Security Operations with RSA envision. August, 2009

Active Response: Automated Risk Reduction or Manual Action?

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

How To Manage Log Management

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

3 rd InfoCom Security, Athens, 10 Arpil 2013

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Sourcefire Customer Case Study Nokia Siemens Networks: Creating Actionable Security Intelligence for Global IT Infrastructures

Time Is Not On Our Side!

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Overcoming PCI Compliance Challenges

Securing OS Legacy Systems Alexander Rau

Modern Approach to Incident Response: Automated Response Architecture

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Security Event Monitoring (SEM) Working Group

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

FIVE PRACTICAL STEPS

Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

Rashmi Knowles Chief Security Architect EMEA

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

IBM QRadar Security Intelligence April 2013

Continuous Network Monitoring

Metric Matters. Dain Perkins, CISSP

Intelligence Driven Security

Securing SharePoint 101. Rob Rachwald Imperva

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

End to End Security do Endpoint ao Datacenter

Best Practices for a BYOD World

Configuration Audit & Control

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Cybersecurity The role of Internal Audit

Discover & Investigate Advanced Threats. OVERVIEW

CyberArk Privileged Threat Analytics. Solution Brief

Feature. Log Management: A Pragmatic Approach to PCI DSS

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Detect & Investigate Threats. OVERVIEW

Increase insight. Reduce risk. Feel confident.

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Assuria from ZeroDayLab

Think like an MBA not a CISSP

Mucho Big Data y La Seguridad para cuándo?

Compliance Guide: PCI DSS

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

SIEM Implementation Approach Discussion. April 2012

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security


Integrating MSS, SEP and NGFW to catch targeted APTs

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

<Insert Picture Here> How to protect sensitive data, challenges & risks

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security

Compliance Management, made easy

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

RSA Security Anatomy of an Attack Lessons learned

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

Protect Root Abuse privilege on Hypervisor (Cloud Security)

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Making your web application. White paper - August secure

FILE INTEGRITY MONITORING

SOC ESSENTIALS What I Learned Building the St. Jude Medical. Russ Staiger, Sr. Information Security Analyst

CLOSING THE GAP ON BREACH READINESS INSIGHTS FROM THE SECURITY FOR BUSINESS INNOVATION COUNCIL

Planning for and implementing security logging

HIPAA Compliance Log Reporting

Information & Asset Protection with SIEM and DLP

Is your SIEM ready.???

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

QRadar SIEM and FireEye MPS Integration

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Average annual cost of security incidents

Transcription:

Best Practices in File Integrity Monitoring Ed Jowett, CISSP ITIL Practitioner Sr. Systems Engineer, Tripwire Inc.

Who is Ed Jowett 2

Agenda Best Practices in FIM The 3 Main Drivers of FIM Lessons Learned Integration Points SEM, SCM, CMS, VA, etc Best Practice Techniques Alerts / Reports Depth and Frequency General Discussion 3

The main drivers of FIM Three (3) main drivers that I see Compliance / Regulations Security / Risk Programs Operational Requirements What s drives FIM at your company? 4

PCI Compliance and Beyond Have you reviewed the PCI DSS? 5

Why File Integrity Monitoring? What do I have? What did it used to look like? What should it look like? How has it changed? Why should I care? Who needs to know?

7

The Physical vs. The Virtual What/Who do we need to monitor? System Admin or Virtual Admin What/Who can do more harm? 8

Security Programs need a Sandbox How often do you run a test? 9

Integration Points What other systems can use this type of data? Change Mgmt. System Security Config. Mgmt. Security Event Mgmt. Log Mgmt. Vulnerability Mgmt. and others. Do your organization maintain some sort of hardening guides? 10

11

Crawl Walk Run 12

Gain Situational Awareness Knowledge is Power Server Classification Documentation Determine Business Ownership and Risk Asset Location Physical Characteristics Node Classification is easy to implement High Severity means Mandatory Response Addition vs Removal of an object

Classification Techniques Needs alignment to the business Custom Properties / Tags Change Characteristics Severity and Risk Values System Classification is Critical Service Group vs. Business Group Re-Assessment is required

Automate the Response with Reports and Alerts " Reduce massive volume of data Correlate (bad) changes and other (suspicious) events " Distill intelligent information " Respond immediately Get the details to the right folks Make risk-based decision How do you gather feedback from the report users?

When The Inevitable Happens

Forensics Are Key To Understanding the Breach " If a hacker breaks into your infrastructure you need to not only understand the current state of the infrastructure but what it looked like five minutes before the breach " PCI Section 10.6 and 11.5 are written specifically to understand the breadth and depth of the breach " Good forensic information will dramatically reduce the cost of clean up and answer three critical questions you will be asked What happened? How badly was I exposed? How can I stop it from happening again? " Maintaining an accurate Baseline is KEY!

Depth of Monitoring 18

Frequency Matters to insure a Known, Good State KNOWN AND TRUSTED STATE CHANGE Confidence Time MEGASCAN required to reassess Continuous Monitoring Lowers MTTR Increases Security Reduces Risks Sustainable MANUAL ASSESSMENT TRADITIONAL ASSESSMENT CONTINUOUS ASSESSMENT

In Summary - Why File Integrity Monitoring? What do I have? Gain Situational Awareness What did it used to look like? Maintain an accurate Baseline What should it look like? - Enforce your hardening guidelines How has it changed? - Attributes, Content or HASH Why should I care? Node Classification Who needs to know? Proper and Accurate Reports and Alerts

Questions and General Discussion Ed Jowett ejowett@tripwire.com www.tripwire.com Tripwire Americas: 1.800.TRIPWIRE Tripwire EMEA: +44 (0) 20 7382 5440 Tripwire Japan: +812.53206.8610 Tripwire Singapore: +65 6733 5051 Tripwire Australia-New Zealand: +61 (0) 402 138 980

Integrated & Automated Security Intelligence VISIBILITY INTELLIGENCE AUTOMATION Iden%fy events of interest Correlate to Bad Changes SIEM Log Management Remediation Engine Policy Engine Continuous Monitoring Iden%fy changes of interest Correlate to Suspicious Events Correlate to Security Policy Iden%fy threats of interest 22