Achieving and Exceeding Compliance Through Open Source Solutions



Similar documents
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Project Title slide Project: PCI. Are You At Risk?

The Comprehensive Guide to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance

Achieving PCI-Compliance through Cyberoam

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Introduction. PCI DSS Overview

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Best Practices For Department Server and Enterprise System Checklist

SecurityMetrics Vision whitepaper

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Critical Security Controls

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Catapult PCI Compliance

A Rackspace White Paper Spring 2010

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

CloudCheck Compliance Certification Program

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

PCI DSS 3.0 Compliance

PCI Compliance Updates

A Guide to New Features in Propalms OneGate 4.0

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

That Point of Sale is a PoS

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

PCI Compliance for Cloud Applications

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI DSS Compliance What Texas BUC$ Need to Know! Ron King CampusGuard

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

PCI Requirements Coverage Summary Table

PCI Compliance Training

SecurityMetrics Introduction to PCI Compliance

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

PCI Data Security Standards (DSS)

74% 96 Action Items. Compliance

MITIGATING LARGE MERCHANT DATA BREACHES

PCI DSS Requirements - Security Controls and Processes

Two Approaches to PCI-DSS Compliance

Client Security Risk Assessment Questionnaire

How To Protect Your Data From Being Stolen

PCI Compliance for Large Computer Systems

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

The PCI Compliant Database. Christophe Pettus PostgreSQL Experts, Inc. PGConf Silicon Valley 2015

Overcoming PCI Compliance Challenges

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Requirements Coverage Summary Table

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Secret Server Qualys Integration Guide

A Decision Maker s Guide to Securing an IT Infrastructure

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Introduction to Cyber Security / Information Security

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Xerox Mobile Print Cloud

The PCI DSS Compliance Guide For Small Business

Passing PCI Compliance How to Address the Application Security Mandates

Automate PCI Compliance Monitoring, Investigation & Reporting

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

FileCloud Security FAQ

OWASP Logging Project - Roadmap

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Payment Card Industry (PCI) Compliance. Management Guidelines

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

GFI White Paper PCI-DSS compliance and GFI Software products

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Secure Compute Research Environment Data Security Plan (DSP)

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Compliance Guide: PCI DSS

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

PCI Data Security Standards

HOW SECURE IS YOUR PAYMENT CARD DATA?

paypoint implementation guide

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Becoming PCI Compliant

CONTENTS. PCI DSS Compliance Guide

Transcription:

Achieving and Exceeding Compliance Through Open Source Solutions SESSION ID: GRC-T09 Zack Fasel Managing Partner Urbane Security @zfasel Erin Jacobs Managing Partner Urbane Security @SecBarbie

RED FLAG Did somebody say compliance? NERC/CIP 2

. But what about security? 3

It s not getting fixed or even significantly better Weak or stolen credentials account for 76% of network intrusions, and over 50% use some form of hacking. Source: Verizon 2013 Data Breach Investigations The average cost of a single, successful cyber-attack is $300K, and companies are attacked an average of 2 million times per week. Source: IBM X-Force Trend and Risk Report 66% of breaches analyzed in 2013 took months to years to discover Source: Verizon 2013 Data Breach Investigations 4

Stick around, this is going to be fun! Focusing on PCI-DSS as a starting model, but are present in multiple compliance requirements and controls Open Source vs. Free vs. Commercial Solutions Most common security control deficiencies that can be addressed Leveraging these controls to actually improve overall security (yay) Compliance strategies and quick wins Questions & Answers, beyond just this talk Technical and actionable recommendations 5

THE PCI DISCLAIMER: While we're a QSAC/QSAs, we're not YOUR QSA. Your mileage may vary based upon numerous factors, including environment, resources, controls, and QSA's intelligence level. The following information is based on our professional opinions and guidance. We make no claim that it is directly or indirectly endorsed by the PCI SSC or any other QSAs. @AttiBull III, ESQUIRE Chief Legal Council U.S. WILL PREPARE OPINIONS FOR BACON 6

How compliance is failing security! This isn t new many talks have been given, but no progress made! Not a single compliance framework issue Cost + Difficulty / Resources More and more having to comply to numerous compliances 7

Let s spend smarter! Source: PWC The Global State of Information Security Survey 2014 8

Open Source vs. Free vs. Commercial

Open Source still has a stigma 10

Benefits of open source solutions? Invest in people, not products, man Cost of 1 solution can obliterate an IT budget (log collection and system management costs how much?) Only one PCI-DSS requirement can t be met using OSS External Vuln Scans Provides greater flexibility in design, customization, and growth Not locked in to a specific implementation.

Why not an open source solution? Support? Sometimes for a fee, sometimes non existent It doesn t usually just work Just shut-up and take my money! 12

The issues and solutions?

The community issues No clear configuration guidelines Theoretical application Freemium solutions Focused on one OS but not others.

OpenPCIProject.com 15

The goal of the OpenPCI Project Guidelines on how to implement PCI and other security controls Cross-Platform Tried and Tested Scalable but also Small Scale Beyond compliance Pros and Cons for each vs commercial alternative Specific walkthroughs on configuration of OSS Simple Deployments Ready to go Installs / VMs Manageable 16

Top issues facing organizations (and solutions!)

PCI DSS Control Areas 1. Implement Firewalls 2. Change Defaults 3. Protect CHD 4. Encrypt in Transit 5. Anti Virus 6. Secure System and Apps 7. Limit Access 8. Assign Unique IDs (+2FA) 9. Physical Controls 10. Logging 11. Penetration Testing / Scans 12. Policies 18

The Top PCI Issues Facing Most Organizations 1. Implement Firewalls 2. Change Defaults 3. Protect CHD 4. Encrypt in Transit 5. Anti Virus 6. Secure System and Apps 7. Limit Access 8. Assign Unique IDs (+2FA) 9. Physical Controls 10. Logging 11. Penetration Testing / Scans* 12. Policies* Which would you say is #1? 19

20

Logs Logs Logs PCI-DSS Requirement 10 The mother of all requirements Considerations for logging: Generation of events Shipping logs to central location Storage and processing of logs Monitoring of logs Thousands of ways to skin a cat 21

Generation of events Is more better? What at a minimum? Logins (Success and Failed) All admin actions Log access Initialization / Clearing of logs Addition / Deletion of users, databases, security policies, etc. 22

Shipping Logs to Central Location Linux / Mac / Network Gear / etc. Syslog all the things Agents? Depends on HIDS. Windows Windows Event? Ugh. Agents? Probably Why not integrate with a HIDS? 23

Storage and Processing of Logs Easy storage/parsing? Just a syslog server Advanced? Oh let me count the ways Fluentd Logstash Apache Flume Facebook s Scribe Graylog2 Which one s right for you? Ugh 24

Monitoring of Logs What events to look for? What defines an anomaly requiring action? 25

File Integrity Monitoring What do I monitor? How do I monitor It? OpenSource Tripwire OSSEC Samhain Weekly Script + Hash + Diff Built In Detection 26

Patch Management What has to be patched? Linux Cake Windows WSUS + Custom Packages / WPKG Mac Munki Puppet + Chef Definitely an area that needs more development. 27

2 Factor Authentication Certificate Based VPN Jump Box SMS Based Roll your Own OATH Based Hardware - Yubikey Software Lots Other Wikid or Authenticator - Radius or Custom Plugin? 28

Anti Virus PCI DSS Requirement 5.1: Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers). Depending on situation, Anti-Virus does not need to be signature detection based and can be application whitelisting based. Home grown solutions may also work (i.e. check for and kill rogue processes + FIM) Or, It can be ClamAV based 29

Cryptography Key Management Dual control + split knowledge Secure key generation Storage and protection of keys SSL certificates often overlooked Built-In database encryption 30

Summing It Up

Questions & Answers info [at] UrbaneSecurity.com Twitter: @UrbaneSec