Linux and Open Source for (Almost) Zero Cost PCI Compliance. Rafeeq Rehman



Similar documents
Open Source Security Tool Overview

Reduce Security Compliance Costs Using Open Source

Introduction Open Source Security Tools for Information Technology Professionals

Open Source Security: Opportunity or Oxymoron?

PCI Requirements Coverage Summary Table

INFORMATION SECURITY TRAINING CATALOG (2015)

Network Monitoring. Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste

IDS and Penetration Testing Lab ISA656 (Attacker)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Course Title: Penetration Testing: Security Analysis

ANTI-HACKER TOOL KIT. ourth Edition

IDS and Penetration Testing Lab ISA 674

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

PCI Requirements Coverage Summary Table

Virtual Learning Tools in Cyber Security Education

June 2014 WMLUG Meeting Kali Linux

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Free Network Monitoring Software for Small Networks

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

2016 TÜBİTAK BİLGEM Cyber Security Institute

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

INFORMATION SECURITY TRAINING CATALOG (2016)

!!!!!!!!!!!!!!!!!!!!!!

Best Practices For Department Server and Enterprise System Checklist

Open Source Security Tools

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

FISMA / NIST REVISION 3 COMPLIANCE

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

VULNERABILITY MANAGEMENT

Chapter 1 The Principles of Auditing 1

Open Source Security Tools for Information Technology Professionals

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Certified Ethical Hacker (CEH)

Vendor Questionnaire

Best Practices for PCI DSS V3.0 Network Security Compliance

Client Security Risk Assessment Questionnaire

Hosts HARDENING WINDOWS NETWORKS TRAINING

Threat Intelligence: STIX and Stones Will Break Your Foes

CRYPTUS DIPLOMA IN IT SECURITY

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Fighting Advanced Persistent Threats (APT) with Open Source Tools

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

INTRUSION DETECTION SYSTEM

Build Your Own Security Lab

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

COUNTERSNIPE

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

CLOUD GUARD UNIFIED ENTERPRISE

CTS2134 Introduction to Networking. Module Network Security

HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004

Turn-key Vulnerability Management

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Vulnerability Assessment Using Nessus

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

By Jascha Wanger

Linux Operating System Security

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Snare System Version Release Notes

Snare System Version Release Notes

Security Event Management. February 7, 2007 (Revision 5)

CYBERTRON NETWORK SOLUTIONS

OWASP Logging Project - Roadmap

Network Attacks and Defenses

EC-Council Certified Security Analyst (ECSA)

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Tk20 Network Infrastructure

Achieving and Exceeding Compliance Through Open Source Solutions

Some Tools for Computer Security Incident Response Team (CSIRT)

How To Manage Sourcefire From A Command Console

4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook

Kevin Cardwell. Toolkits: All-in-One Approach to Security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Vulnerability Assessment Lab

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Trustkeeper PCI Compliance Guide for Merchants

Transcription:

Linux and Open Source for (Almost) Zero Cost PCI Compliance Rafeeq Rehman

2 Some Introductory Notes Payment Card Industry (PCI) standard is not a government regulacon. Who needs to comply with PCI? Twelve major requirements covering policy, processes, and technology to protect Credit Card Data. What is Credit Card Data? Few ClarificaCons Payment Card Industry (PCI) requires some tasks to be performed by external vendors depending upon merchant level. There is no other way around, unfortunately. Open Source solucons do need people. That is why it is almost free but not totally free.

3 What the Auditors Look For? Is PCI just a checklist? Are auditors genuinely interested in securing the PCI data? Does it maper if you use an open source or commercial product to meet PCI requirements? What if you meet PCI requirements while improving security and spending less money?

4 Is it viable to use Open Source for PCI Compliance? Is there a real company who uses Open Source soqware to achieve PCI compliance? Is it even possible? PCI 2.0 focuses more on Risk based approach. PCI (or any compliance) is boring! Make it interescng by using Open Source.

5 PCI Biggest Expenses 1. Log Management (Storage and archiving, Monitoring and AlerCng) 2. Vulnerability Scanning 3. Network Firewalls and Network SegmentaCon 4. Intrusion DetecCon System 5. EncrypCon for data- at- rest 6. File Integrity Monitoring 7. IdenCty Management (Password controls, Two factor for remote access, Role based access)

6 AddiConal PCI Needs Using secure protocols for a number of things (remote access, web traffic, etc.) Secure destruccon of Storage Use of Network Time Protocol Pen TesCng Web ApplicaCon TesCng Web ApplicaCon Firewalls

7 PCI Compliance is Expensive A large number of commercial solucons needed to meet specific requirements

8 Affordable InformaCon Security

9 Why Open Source is Not Used Much? IntegraCon ReporCng Compliance needs evidence!

10 Strategy Get rid of what you don t need Network segment Reduces scope and a good security praccce Build processes and train people Only technology is not sufficient Focus on risk

11 Log Management Requirement Keep logs for one year minimum Ensure there is no log tempering Control/manage access to logs Use standards (Syslog) - Centralized Log Management using rsyslog or Syslog- NG Snare for Windows to Syslog Log Analysis using OSSEC Octopussy Open Source Log Management OSSEC for file integrity monitoring of log files Logstash for searching, queries

12 Log Management Tools

13 Event Management/CorrelaCon Pandora (hpp://pandorafms.org/) SEC Simple Event Correlator ( hpp://simple- evcorr.sourceforge.net/) ZENOS Open Source system monitoring and management (hpp://community.zenoss.org/) ZABIX Open source monitoring ( hpp://www.zabbix.com/) Nagios System monitoring (hpp://www.nagios.org/)

14 AnCvirus For non- commercial home use, Avast is a free soqware and available at hpp://www.avast.com/ ClamAV is free and available on mulcple plakorms ( hpp://www.clamav.net/) Integrate AV into other solucons like web servers

15 IdenCty Management OpenLDAP is open source and free LDAP system available on mulcple plakorms (hpp://www.openldap.org/) 389 Server SourceID supports mulcple protocols including SAML, Cardspace, Liberty, WS- FederaCon etc ( hpp://www.sourceid.org/) OpenSAML libraries (hpp://www.opensaml.org)

16 Firewalls Network Smoothwall (hpp://www.smoothwall.org/) Nekilter/iptables (hpp://www.nekilter.org/). Included in Linux distribucons as well. IPCop (www.ipcop.org) Hostbased Nekilter/iptables (hpp://www.nekilter.org/). Included in Linux distribucons as well. Web applicacon firewalls Mod security (hpp://www.modsecurity.org/)

17 IDS/IPS Snort IDS (hpp://www.snort.org) OSSEC Host Based IDS (hpp://www.ossec.net) SAMHAIN Host Based IDS ( hpp://www.la- samhna.de/samhain/) Snort Rules Emerging Threats ( hpp://rules.emergingthreats.net/open- nogpl/)

18 EncrypCon and PKI Full Disk Encryp:on and USB Drive Encryp:on TrueCrypt (hpp://www.truecrypt.org/) PKI and Cer:ficate Server Fedora Linux Dogtag (hpp://pki.fedoraproject.org/) OpenSSL (hpp://www.openssl.org/) Email and File Encryp:on GnuPG (hpp://gnupg.org/) GPG4Win (hpp://www.gpg4win.org/)

19 Vulnerability Management Nessus (hpp://www.nessus.org) Nmap (hpp://www.nmap.org) Kismet Wireless deteccon and sniffing ( hpp://www.kismetwireless.net/) Backtrack (hpp://www.remote- exploit.org/backtrack.html) Web ApplicaCon TesCng with w3af OpenVAS Vulnerability Scanner (hpp://www.openvas.org/) is like Nessus client/server SSL crypto verificacon and cercficate checking SSLscan, available on Linux. Use yum to download

20 Pen TesCng Metasploit (hpp://www.metasploit.com/) Backtrack (hpp://www.remote- exploit.org/backtrack.html) Wireshark packet capture and analysis (hpp://www.wireshark.org/)

21 Conclusions PCI Compliance is a result of good security It is an end result, not a mean Focus on Good Security PracCces You will achieve both security and compliance More money beper security Auditors are really interested in security! For each requirement in PCI, open source soqware is available (except where PCI requires third party involvement)

22 QuesCons and Contact Info rafeeq.rehman@gmail.com Affordable InformaCon Security at hpp://www.rafeeqrehman.com