Securing OS Legacy Systems Alexander Rau



Similar documents
End to End Security do Endpoint ao Datacenter

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Host-based Protection for ATM's

Best Practices in Virtualization & Cloud Security with Symantec DCS

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

1518 Best Practices in Virtualization & Cloud Security with Symantec

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Protecting Your Organisation from Targeted Cyber Intrusion

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Secure Your Mobile Workplace

Payment Card Industry Data Security Standard

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

PCI DSS Reporting WHITEPAPER

Critical Security Controls

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Backup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes

Defending Against Data Beaches: Internal Controls for Cybersecurity

5 Steps to Advanced Threat Protection

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

The Business Case for Security Information Management

Countering Insider Threats Jeremy Ho

Additional Security Considerations and Controls for Virtual Private Networks

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

How To Secure Your System From Cyber Attacks

IBM Security re-defines enterprise endpoint protection against advanced malware

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

PCI Data Security Standards (DSS)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Total Protection for Compliance: Unified IT Policy Auditing

Advanced Threats: The New World Order

Evolving Threat Landscape

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Defending the Database Techniques and best practices

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success

Overcoming PCI Compliance Challenges

March

Windows Server 2003 End of Support. What does it mean? What are my options?

Passing PCI Compliance How to Address the Application Security Mandates

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

IBM Security Strategy

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Information Security and Risk Management

PCI DSS Top 10 Reports March 2011

Best Practices for a BYOD World

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

IT Security & Compliance. On Time. On Budget. On Demand.

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Seven Strategies to Defend ICSs

Devising a Server Protection Strategy with Trend Micro

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.

Proven LANDesk Solutions

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Best Practices for PCI DSS V3.0 Network Security Compliance

Software that provides secure access to technology, everywhere.

Unified Security, ATP and more

Devising a Server Protection Strategy with Trend Micro

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Integrating MSS, SEP and NGFW to catch targeted APTs

IBM Security QRadar Vulnerability Manager

Perspectives on Cybersecurity in Healthcare June 2015

Symantec Critical System Protection (SCSP) Overview. February 2010

1 Introduction Product Description Strengths and Challenges Copyright... 5

Understanding Vulnerability Management Life Cycle Functions

PCI DSS 3.1 and the Impact on Wi-Fi Security

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

PICO Compliance Audit - A Quick Guide to Virtualization

Protecting the Infrastructure: Symantec Web Gateway

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

VMware Integrated Partner Solutions for Networking and Security

A Decision Maker s Guide to Securing an IT Infrastructure

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Security Management. Keeping the IT Security Administrator Busy

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Transcription:

Securing OS Legacy Systems Alexander Rau National Information Security Strategist

Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems 4 Q&A Copyright 2014 Symantec Corporation 2

Today s IT Challenges Copyright 2014 Symantec Corporation

Examining Security Breaches What poses the greatest security risk to servers? Copyright 2014 Symantec Corporation 4

Servers are the Target: Endpoints simply provide an initial foothold Variety of compromised assets across 47,000+ security incidents of stolen data is from servers Verizon 2013 Data Breach Investigations Report: When you consider the methods used by attackers to gain a foothold in organizations Brute Force, stolen creds, phishing, tampering It s really not all that surprising that none receive the high difficulty rating Copyright 2014 Symantec Corporation 5

Compromising Servers Most breaches are caused by: Unpatched systems Operating systems Applications Careless mistakes System configuration Zero day vulnerabilities Targeted malware Malicious employees Stolen credentials Untrusted applications 6

Popular OS End of Support & Challenges for IT Copyright 2014 Symantec Corporation

Legacy Operating Systems Mainstream support ended on June 30, 2005 Extended support ended on July 13, 2010 Mainstream support ended on April 14, 2009 Extended support ended on April 8, 2014 Mainstream support ended on July 13, 2010 Extended support until July 14, 2015 Copyright 2014 Symantec Corporation 8

Challenges Time (too many servers) and cost (licenses, time & resources) to upgrade Business Critical Legacy Applications that run on EOL OS and are too costly to port over or are no longer supported themselves 9

End of Support does not equal unsecure The EOL OS might no longer be in compliance with Security Policies or Compliance Frameworks (ie. PCI, ISO 27002, COBIT, ) Usually servers should be patched in accordance with a patch policy ie. critical/asap, High/30 days, Medium/60 days and low/90 days PCI is throwing a life line of compensating controls which could also be applied to other frameworks Compensating control definition: "Compensating controls may be considered when an entity cannot meet a requirement explicitly as stated, due to legitimate technical or documented business constraints, but has sufficiently mitigated the risk associated with the requirement through implementation of other controls. Compensating controls must: 1) Meet the intent and rigor of the original stated PCI DSS requirement; 2) Provide a similar level of defense as the original PCI DSS requirement; 3) Be "above and beyond" other PCI DSS requirements (not simply in compliance with other PCI DSS requirements); and 4) Be commensurate with the additional risk imposed by not adhering to the PCI DSS requirement." 10

How to protect Legacy OS systems

What do Hackers Target on Systems? Legacy OS protection Enforce Registry Integrity Registry Config Files Enforce File Integrity Portable Storage Devices Enforce device controls Applications Memory Operating System Enforce application activity Enforce Memory Protection Enforce network controls 12

Legacy OS protection Intrusion Detection (IDS) Behavior Control System Controls Network Protection Auditing & Alerting Intrusion Prevention (IPS) Whitelisting Prevent zero-day attacks Restrict OS behavior Buffer overflow protection Exploit Prevention Lockdown config. settings Enforce security policy De-escalate privileges Restrict device access vsphere Protection Close back doors Limit connectivity by application Restrict traffic flow Monitor, consolidate, and forward logs for storing and reporting Monitor file integrity in real-time Alert/notify for early response. (Agent-less) Antimalware (AV) 13

Legacy OS protection Detection + Prevention + (Agentless) Antimalware Protection FEATURES Policy based protection System lock down Application Whitelisting Privilege de-escalation Exploit/malware prevention Remediation automation Compliance enforcement Real-time file integrity monitoring User Monitoring Broad OS and platform coverage Agentless AV Protection* VALUE Complete protection across physical and virtual servers High performance and reduced downtime Lower cost management and administration 14

More Strict new Protection Strategy Workflow Protected Whitelisting Hardened Basic Application-centric Security Model- Simplify server hardening by introducing an intuitive policy wizard and protection strategy, transitioning from a policy-by-technology approach Protected Application White Listing- Enhance traditional white listing or strict default-deny controls by providing pre-built application profiles and additional OS level protections Sandboxing and Process Access Control Apply additional controls over running processes to protect against new classes of threats. Out-ofbox policies are available for Web, Email, Database, and Domain Controller servers 15

Granular Approach vs. holistic approach Detection Prevention Agentless VALUE Behavior Control Point Solution A Point Solution B System Controls Point Solution C Point Solution (Agent)less Antimalware (AV) E File Integrity Monitoring Network Protection Point Auditing Solution D & Alerting Point Solution F White Listing / Application Control Complete protection across physical and virtual servers Point Solution G High performance and reduced downtime Lower cost management and Virtual Protection administration 16 16

Q&A Copyright 2014 Symantec Corporation

Thank you! Alexander Rau Alexander_Rau@symantec.com Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.