Configuration Audit & Control



Similar documents
Dynamic Data Center Compliance with Tripwire and Microsoft

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CA Configuration Automation

File Integrity Monitoring:

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

Real-Time Database Protection and. Overview IBM Corporation

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Copyright 11/1/2010 BMC Software, Inc 1

IBM Tivoli Application Dependency Discovery Manager

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

FILE INTEGRITY MONITORING

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

List of Supported Systems & Devices

Enforcing IT Change Management Policy

Proving Control of the Infrastructure

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective:

Auditing Data Access Without Bringing Your Database To Its Knees

How To Use Ibm Tivoli Monitoring Software

QRadar SIEM 6.3 Datasheet

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Reining in the Effects of Uncontrolled Change

John Smith Prattville, AL

Implementing Managed Services in the Data Center and Cloud Space

SENTINEL MANAGEMENT & MONITORING

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

BMC Software s ITSM Solutions: Remedy ITSM & Service Desk Express SOLUTION WHITE PAPER

Allstream Cloud Replication. Turn-key business continuity and disaster recovery

CA Systems Performance for Infrastructure Managers

Enterprise Database Security & Monitoring: Guardium Overview

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

CA Automation Suite for Data Centers

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

Key Considerations for Vulnerability Management: Audit and Compliance

Privileged Identity Management for the HP Ecosystem

mbits Network Operations Centrec

CA Wily Introscope. CA Advantage. Benefits. Overview

ManageEngine Password Manager Pro Vs Thycotic Secret Server

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

How do I secure and manage an out-of-band connection to network devices?

Cisco Unified Communications Remote Management Services

CA Virtual Assurance for Infrastructure Managers

ONE PRODUCT, THREE SOLUTIONS

Oracle Desktop Virtualization

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

IBM Tivoli Compliance Insight Manager

Cisco Tidal Enterprise Scheduler

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Contents. BMC Atrium Core Compatibility Matrix

Alcatel-Lucent Services

The syslog-ng Store Box 3 F2

HP Server Automation Standard

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

HP Security Assessment Services

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006

The syslog-ng Store Box 3 LTS

IT Security & Compliance. On Time. On Budget. On Demand.

Altiris IT Management Suite 7.1 from Symantec

Shipping Products Chart. Contents

Symantec Server Management Suite 7.6 powered by Altiris technology

IBM Maximo Asset Management for IT

Peter Dulay, CISSP Senior Architect, Security BU

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Symantec IT Management Suite 7.5 powered by Altiris

HP SiteScope software

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Improving PCI Compliance with Network Configuration Automation

CA Configuration Management Database (CMDB)

Taming IT Management Chaos

Self-Service SOX Auditing With S3 Control

Altiris Server Management Suite 7.1 from Symantec

Guardium Change Auditing System (CAS)

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

Dynamic Service Desk. Unified IT Management. Solution Overview

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question

CA Wily Introscope. CA Advantage. Benefits. Overview

Enforcive / Enterprise Security

Align IT Operations with Business Priorities SOLUTION WHITE PAPER

CiscoWorks SIMS(Netforensics)

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

IBM Tivoli Endpoint Manager for Lifecycle Management

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):

Transcription:

The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009

Recognized leader in Configuration Audit & Control Pioneer in change detection Recognized market leader Worldwide strategic partners Thought leader in IT best practices Achieve & Maintain the integrity of all IT configurations Founded in 1997 Patented Technology Over 6,000 customers around the world Analyst leadership recognition Infrastructure: VMware, Cisco, Sun, IBM, Oracle.. IT Service Management: BMC, HP, CA.. Integration: BearingPoint, EDS, IBM.. ITIL v3 content contributors Co-author of The Visible Ops Handbook 2

3

4

Tripwire enables companies to achieve and maintain a known and trusted state across the data center Compliance Security IT Operations Achieve Known & Trusted State Configuration Assessment Maintain Known & Trusted State Change Auditing Automate controls & reporting to meet specific compliance requirements Active monitoring and risk management across the data center Enforce configuration and change controls to help obtain operational excellence 5

Configuration Audit & Control Assures Continuous Compliance Achieve Known, Trusted and Compliant State Proactively assess configuration settings using industry benchmarks Identify risks to ensure continuous compliance Maintain Known, Trusted and Compliant State Detect all changes across the datacenter Gain visibility through actionable reports, reconciliation and remediation 6

KNOWN AND TRUSTED STATE CHANGE Confidence Time MEGASCAN required to reassess Continuous Compliance Lowers Costs Increases Security Reduces Risks Sustainable MANUAL ASSESSMENT TRADITIONAL ASSESSMENT TRIPWIRE CONFIGURATION CONTROL 7

Requires Comprehensive Coverage Servers AIX HP-UX Red Hat Enterprise Linux SUSE Linux Virtual Environments VMware ESX Server Databases Oracle 9i & 10g SQL Server Network Devices Alcatel OmniSwitch Cisco IOS, CatOS & PIX OS Cisco VPN 3000 Series Cisco Catalyst 1900/2820 Check Point (Nokia IPSO) Extreme F5 BigIP Foundry Windows 2000 Server Windows 2003 Server Solaris (SPARC) Solaris (x86) Solaris Zones Directory Services Windows Active Directory Solaris Sun One Directory Novell edirectory HP ProCurve Series ISS (Nokia IPSO) Juniper M/T Series Marconi ForeThought NetScreen Nokia IPSO OS Nortel Alteon & Passport POSIX-compliant appliances 8 EMS Integrations HP Service Desk, Network Node Mgr. Remedy AR System, Atrium Open Web Services API

Baseline, Assess & Validate Configurations Across the Data Center 2 1 Tripwire detects all change Enterprise Risk Profile Achieve 25% Maintain 3 Are you within policy? Take Action Notification Reconciliation 9 Detect & Enforce Change Activity Reporting Are changes authorized? Are changes Compliant?

Tripwire Enterprise Server MySQL Pro MS SQL, Oracle File Systems/ Virtualization 10 Network Devices Databases Directory Servers POS / Registers Exchange; IIS; Applications

The Leader in Configuration Audit & Control Kelly Feagans, CISA & ITIL Certified Sr. Systems Engineer kfeagans@tripwire.com

12 Appendix

Web Browsers SSL Windows, Solaris, Linux SSL File Systems Windows, Solaris, AIX, HP-UX, Linux Agents Change Management System Look for RFC Match Promote Matches Create Exceptions Incident Server (LDAP) (JDBC) Directory Services Active Directory, Sun One, edirectory Database Integrity Oracle, MS SQL Modules Integration Points SOAP Command Line Relational Database Embedded (MySQL Pro), MS SQL, Oracle SSL Log File AAA TACACS+, RADIUS Network Devices Routers, Switches Firewalls, Unix Agentless Command Line Interface NMS SNMP 13

Enterprise-Wide Configuration Assessments Pre-configured, automated and proactive assessments of IT configurations CMDB Integrations Assures integrity and accelerates success: BMC Atrium 2.0, CA CMDB and HP Universal CMDB Virtualization Detect and control change in the dynamic datacenter: VMware & Solaris Real-time, Tunable Change Detection Flexibility to detect changes and assess configurations: event-driven and/or scan-based IT Service Management Integrations Compliment BMC Remedy integration with new CA Service Desk integration Configuration Rollbacks Network device baseline rollbacks & trigger remediation via integrations 14

Tripwire helps answer two fundamental, business-critical questions Is the change authorized? Is the change within policy? Tripwire enables 100% control of change/compliance Independent, verifiable proof of all changes to configuration settings Unmatched breadth & depth Provides enterprise-wide visibility and control for the dynamic datacenter 15 Process circumvention Unintended changes Tripwire ensures data integrity to help reduce risks and increase operational efficiencies

Achieve Continuous Compliance Stop IT process circumvention and achieve operational, regulatory and security compliance across the datacenter Out-of-the-Box Compliance Audit Proof Deliver holistic view of compliance for entire IT infrastructure Experts in Configuration Audit & Control Market-leading solution to close-the-loop on change Speed to Value Proactively determine unauthorized changes Increase performance on key metrics in 90 days or less Accelerate ROI of IT Service Management and ITIL projects In a recent survey, 73% of our clients reported that they must continually deal with unplanned infrastructure changes resulting in incidents and downtime. Forrester 16

Tens of thousands of configuration assessments and reports! Operational 17 Regulatory Payment Card Industry (PCI) Sarbanes-Oxley (SOX) COBIT BASEL-II FISMA JSOX GLBA HIPAA 21 CFR Part 11 NERC Ongoing Policy Installments Tripwire Top-20 Out-of-the-box templates Policy Manager - Create your own Change Process Policies Authorized vs. Unauthorized Change Variance Change Frequency Change Rate Change Severity Change Window Change Attributes Changed Nodes Changed Elements ITIL Policies Authorized vs. Unauthorized Change Window Inventory User Roles CMDB Policies Configuration Item History Schema Control CMDB-related Change Policies Alerts & Notifications Change History Visible Ops Configuration Compliance Profile Compliance History Detailed Test Results Policy Scorecard Security CIS DISA Microsoft Security Standards Windows Hardening Standards ISO 17799 Infrastructure Coverage Servers Databases Network Devices Switches Routers Firewalls Active Directories Operating Systems Middleware Storage Applications Desktops Virtualization

The problem: Over 45 million credit and debit card numbers stolen, dating back to 2003 Service impact: Come under widespread criticism negatively impacting company s brand Business impact: 20 class action lawsuits pending; Investigations pending in 30 states Shares down 6.3% ; Sales down $2M and profits down $1M in Q1/07 Security upgrade - $100,000,000 18 Over $1B+ for an undetected security breach

The problem: Occurred during loading of software to a critical component of the satellite broadcast system Service impact: Major 24 hour service outage to 8 million subscribers Business impact: Customers credited for 2 days worth of service outages $6,960,000 Shares down 1.4% - Market capitalization impact -$1,536,150 Middle of a merger with Sirius Satellite??? 19 Nearly $8.5M for a minor IT change

20 Automate proof of compliance Avoid audit findings and associated costs of remediation Spend less time preparing for audits and assessing configurations for policy conformance Avoid penalties & fines Avoid regulatory fines & SLA penalties Enhance security Reduce exposure to datacenter compromise and time spent resolving security incidents Increase revenues and productivity (increase availability) Minimize revenues & productivity lost due to outages or service degradations Increase staff capacity (reduce unplanned work) Spend less time troubleshooting service incidents and restore service faster Reduce rework caused by failed changes

Tripwire Datacenter Compliance Operational Compliance Regulatory Compliance Security Compliance Maximize The Effectiveness of IT Tools and Processes With Tripwire s Configuration Audit and Control Solution Assess configurations to ensure conformance with policy and industry guidelines Detect process, policy and tool circumvention Provide comprehensive change history and actionable reporting 21