CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO



Similar documents
Privileged Identity Management

Best Practices for Information Security and IT Governance. A Management Perspective

Privileged Identity Management for the HP Ecosystem

Enterprise Random Password Manager Training Guide

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Who Holds the Keys to Your IT Kingdom?

Privileged Identity Management. An Executive Overview

Secret Server Qualys Integration Guide

Oracle Identity Manager, Oracle Internet Directory

Securing Data in Oracle Database 12c

Free Multi-Factor Authentication. Using and SMS in Enterprise/Random Password Manager (E/RPM)

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) An Assessment of Cyber-Ark's Solutions

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

How To Manage A Privileged Account Management

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

FISMA / NIST REVISION 3 COMPLIANCE

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Take Control of Identities & Data Loss. Vipul Kumra

User Guide. Version R91. English

Trust but Verify: Best Practices for Monitoring Privileged Users

SonicWALL PCI 1.1 Implementation Guide

Seven Things To Consider When Evaluating Privileged Account Security Solutions

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

2013 AWS Worldwide Public Sector Summit Washington, D.C.

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Compliance and Industry Regulations

WhatsUp Gold v16.3 Installation and Configuration Guide

INCIDENT RESPONSE CHECKLIST

SafeNet DataSecure vs. Native Oracle Encryption

How to Achieve Operational Assurance in Your Private Cloud

Automate PCI Compliance Monitoring, Investigation & Reporting

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

Leveraging Privileged Identity Governance to Improve Security Posture

The Comprehensive Guide to PCI Security Standards Compliance

How to Test Out Backup & Replication 6.5 for Hyper-V

Supplier Information Security Addendum for GE Restricted Data

Detailed Analysis Achieving PCI Compliance with SkyView Partners Products for AIX

Securing Oracle E-Business Suite in the Cloud

Privileged Session Management Suite: Solution Overview

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

SOLUTION BRIEF THE CA TECHNOLOGIES SOLUTION FOR PCI COMPLIANCE. How Can the CA Security Solution Help Me With PCI Compliance?

Did you know your security solution can help with PCI compliance too?

Introduction. PCI DSS Overview

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

PCI Requirements Coverage Summary Table

Client Security Risk Assessment Questionnaire

Host Access Management and Security Server

privileged identities management best practices

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

What s New in Centrify DirectAudit 2.0

Auditing Data Access Without Bringing Your Database To Its Knees

CorreLog Alignment to PCI Security Standards Compliance

HP Client Automation Standard Fast Track guide

Complete Database Security. Thomas Kyte

2: Do not use vendor-supplied defaults for system passwords and other security parameters

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Request for Information RFI #15/ for Enterprise Password Management Software

Privileged - Super Users out of Control

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Secure Cloud Computing

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Payment Card Industry Data Security Standard

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Defining, building, and making use cases work

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

DHHS Information Technology (IT) Access Control Standard

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

PowerBroker for Windows

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

Windows Least Privilege Management and Beyond

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

End-user Security Analytics Strengthens Protection with ArcSight

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

How To Achieve Pca Compliance With Redhat Enterprise Linux

PCI Requirements Coverage Summary Table

Securing Remote Vendor Access with Privileged Account Security

Transcription:

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a

Identity Management Definitions Privileged Identity Management vs. User Identity Management or Keys to the Kingdom vs. User Provisioning 2009 by Lieberman Software Corporation. Rev 20090921a

Privileged Accounts What are they called? OS: Superuser, Root Database (DBA & Apps): SA, SYSADMIN, SYS Mainframe: UID=0, RACF SPECIAL Middleware: Proxies, Gateway Accounts Application: Setup, Admin, App local

Privileged Accounts Where are they used Servers & Workstations Every hardware platform Every operating system Datacenter Appliances Routers and switches Application accelerators Security appliances Applications Line-of-business Web services Database and middleware Backup services Identity and access management Systems management

Shared or Privileged Accounts Behavior and Technology Limitations: What actually is going on High Privilege Accounts: Spread throughout your enterprise Widely known / Shared indiscriminately Not changed when staff turns over Difficult to update due to lost knowledge and complexity Result: Failed Audit Findings Inability to Mitigate Risks Fines or Worse Competent technology can permanently correct some or all the problems in less than 7 days (more later)

Doesn t Active Directory, or Already Manage Privileged Identities? User Identity & Access Management (IAM) Microsoft Active Directory, Tivoli Identity Manager, Oracle Access Manager, etc. Controls user-level access to computers & applications Provisions and de-provisions ordinary users (hire/fire) Credentials used by everyone in organization every day. Privileged Identity Management (PIM) Special case and limited access administrative-level access to computers, applications, services & everything Required: No retained credential knowledge or persistent access to sensitive systems Access in concert with IAM software & workflow approvals (need to know only limited time only)

Why Auditors and Regulators Care About Privileged Identity Management 2009 by Lieberman Software Corporation. Rev 20090921a

Preparing for an IT Audit What is supposed to happen IT staff must show that: 1. Administrator passwords are changed every 90 days. 2. There are no group, shared, or generic privileged accounts or passwords. 3. Access rights are restricted to least privileges required. 4. Inactive privileged accounts are removed or disabled every 90 days. 5. Privileged access is immediately revoked for all terminated users. 6. All system components are covered by password security policies. 7. Vendors remote maintenance accounts are enabled only during time periods needed. 8. All vendor-supplied passwords are changed before systems are deployed. 9. Automated audit trails are implemented for all system components.

PCI DSS Ready PCI DSS Requirement 2.1 "Always change vendor-supplied passwords before installing a system on the network Lieberman Software Solution Auto-discover and change all privileged account passwords on all hardware and software. 6.3.6 Removal of custom application accounts, user IDs, and passwords before applications become active " Continuously identify undocumented service accounts and back doors on packaged and custom applications. 7.7.1 "Restriction of access rights to privileged user IDs to least privileges " 7.2.1 "Coverage of all system components." 8.5.4 "Immediately revoke access for all terminated users." Enforce role-based control of access to all privileged identities. Discover and manage all privileged accounts on all IT assets not just the documented ones. Randomize credentials upon check-out to prevent access by terminated users. 8.5.5 8.5.6 8.5.8 "Remove/disable inactive user accounts at least every 90 days." "Enable accounts used by vendors for remote maintenance only during the time periods needed." "Do not use group, shared, or generic accounts or passwords." Audit, flag, and disable inactive accounts. Enforce time-based vendor access. Auto-detect and segregate shared privileged accounts. 8.5.9 "Change user passwords at least every 90 days." Enforce password change frequency requirements on all privileged accounts. 10.2 "Implement automated audit trails for all system components " Audit privileged account access requests on servers, network appliances, desktops, and applications.

FISMA Requirement AC Access Control AU CA CM IA FISMA: FIPS Publication 200 Minimum Security Requirements for Federal Information & Information Systems Audit and Accountability Certification, Accreditation, and Security Assessments Configuration Management Identification and Authentication PS Personnel Security Lieberman Software Solution Auto-detect and segregate shared privileged accounts; Enforce rolebased control of access to all privileged identities Audit privileged account access requests on servers, network appliances, desktops, and applications; Audit, flag, and disable inactive accounts; Audit and alert by user, IP, system, application, account, and purpose of each requested access. Continuously identify undocumented service accounts and back doors on packaged and custom applications; Enforce time-based vendor access; Create comprehensive reports of each requested privileged access request by user, IP address, system, account, length of access, stated purpose and result. Auto-discover and change all privileged account passwords on all hardware and software; Enforce password change frequency requirements on all privileged accounts Discover and manage all privileged accounts on all IT assets not just the documented ones; Segregate privileged user accounts and allow only access that is identifiable by user and purpose. Randomize credentials upon check-out to prevent access by terminated users; Extend the power of your identity management systems to eliminate terminated employees privileged access and revoke any password secrets.

The Solution: Privileged Identity Management 2009 by Lieberman Software Corporation. Rev 20090921a

Privileged Identity Management Automation Process Automation Implements: Discovery of machines, process accounts, local & fire call accounts, services and tasks and everywhere those accounts are referenced (discovery and correlation technology) Password Change Process for randomizing privileged accounts and propagating those changes everywhere the accounts are used to avoid lock outs (propagation technology) Storage of complex, random passwords in an encrypted repository (encryption technology) Role Based Provisioning of password access and delegation Auditing of every password request, use and change

Privileged Identity Management Comprehensive Credential Management Process Scalable Highly Available Industry-Standard Architecture (non-proprietary data store) Proven Failover /DR Strategies Integrated Identity and Access Management Systems Security Information and Event Management (SIEM) Apps such as ArcSight and other Reporting Solutions Help Desk Ticketing Systems

Privileged Identity Management Comprehensive Credential Management Process Must control the entire life cycle of privileged accounts by: Always keeping up-to-date and accurate systems & account lists Immediately remove knowledge of shared credentials Provide access to credentials on a need to know basis for the shortest time possible Automatically change disclosed passwords Allow organizations to change sensitive passwords without fear from outages Automate as much as possible for low TCO and fast deployment

Two Scenarios: Unexpected Events and Datacenter Deployment 2009 by Lieberman Software Corporation. Rev 20090921a

Scenario: Dealing with Unexpected Events Mitigate Security Threats 2009 by Lieberman Software Corporation. Rev 20090921a

Customer Success Story Mitigating Security Threats at a Government Agency PROBLEM: Dozens of subcontractors being discharged and dozens more taking their place on a routine basis. RISK: With so many password secrets walking out the door, there is risk of a far-reaching security breach. SOLUTION: ERPM integrates with the agency s existing IDM solution, so they can immediately lock out contractors the moment their credentials are revoked, quickly give new personnel the access they need, and ensure all privileged password secrets are valid for a short time and then changed so contractors can do no harm once they walk out the door. RESULTS: The agency is more secure and saves significant time by eliminating the need to manually configure each new contractor for access to required IT resources.

Unexpected Events A defense contract abruptly changes hands to a different Federal Systems Integrator, and all of the existing contractors are pulled off the job. The next day your Information Assurance Manager tells you that one of the former contractors took a job with a foreign agency.

Unexpected Events Your IAM asks, Can we prove that he no longer has access to any of our computers, applications and network hardware? And what can you tell me about his privileged access to our IT resources, say, for the last 60 days?

Unexpected Events You launch Enterprise Random Password Manager

Unexpected Events and open the Accounts View to see a list of privileged passwords, sorted by age. You scan the list to verify that all privileged passwords have already been changed

Unexpected Events You then export the view to a report you ll send to your Information Assurance Manager.

Unexpected Events The report documents the date and time of every privileged password change.

Unexpected Events Next you return to ERPM and choose Compliance from the Actions menu.

Unexpected Events You click Activity Audit Report...

Unexpected Events and enter the former contractor s user name and the desired 60-day reporting period.

Unexpected Events A report appears in your Web browser, showing every privileged access request the former contractor made in the last 60 days. The report shows the day and time of each request, the systems involved, and the stated reason for each request.

Unexpected Events This report seems to show nothing unusual except for several requests for administrative access to a classified server in an external DMZ.

Unexpected Events The stated purpose for the repeated logins was to recover the server from a virus attack.

Unexpected Events You save the report and send it to your manager... with the recommendation that the security team examine the logs on the classified server for this time period.

ArcSight Integration ERPM provides the starting and ending point in time for ArcSight correlation Credential issuance details and attestation of identity fed into ArcSight Limited time validity of common administrator accounts means that ArcSight not only tracks what identity does, but by whom

Results Immediately access authoritative records of every privileged access request by user, system, and account Quickly answer questions of who, what, and why for each privileged access request Solid proof for audits, security reviews, and forensics

Scenario: Datacenter Deployment Protecting Classified Assets 2009 by Lieberman Software Corporation. Rev 20090921a

Datacenter Deployment New servers and applications have been deployed in a classified datacenter. The team must confirm that all local administrator accounts are randomized on these systems are as required by FISMA, PCI, NERC/FERC and others.

Datacenter Deployment You launch Enterprise Random Password Manager and verify in the Systems View that ERPM has automatically discovered these servers.

Datacenter Deployment You switch to the Account Store View, expand a node for one of the new servers, and view all of the privileged accounts detected on the system. Discovered accounts include System Administrator Accounts and privileged accounts used by Services and Applications.

Datacenter Deployment You right-click a local Administrator account on the server and choose Properties from the context menu.

Datacenter Deployment The Properties window confirms that Enterprise Random Password Manager has already deployed new password credentials.

Datacenter Deployment Now authorized IT personnel can get privileged access to these servers from anywhere on the network by logging onto our secure Web interface. rwilson *********

Datacenter Deployment Privileged access is granted through permissions already configured in the agency s directory and when an IT staff member clicks Recover Password.

Datacenter Deployment he is prompted to type the reason for the password request so there s an audit trail.

Datacenter Deployment A password is then provided for one-time use. Immediately after use, the password will be randomized according to the agency s configured policy.

Results Randomize local admin accounts on new servers Get an authoritative list of privileged accounts on new servers Secure privileged account credentials and change according to a schedule policy Enable authorized IT staff to quickly access systems without taking approvers time Audit all requests for privileged access Meet your mandate to secure newly-deployed hardware

ArcSight Integration All ERPM password check-out/check-in & credential changes fed to ArcSight ESM Every succeeded /failed password verification fed to ArcSight ESM ArcSight completes the security picture by Starting with our password management events Follows the credential use (other event feeds) Confirms the removal of privilege (our rekey) Correlates credential use on all other systems

ArcSight Integration: ArcSight ESM Events Generated by ERPM

Partial List of Privileged Events Mapped To ArcSight ESM Console Operations: EVENT_ID_PASSWORD_RECOVERY_MAIL_ALERT EVENT_ID_JOB_FAILED_TO_LOCK EVENT_ID_JOB_RESET_FOR_RUN EVENT_ID_JOB_CONTINUE_PARTIAL_RUN EVENT_ID_JOB_CANCELING_RUN EVENT_ID_JOB_STARTING_TRUST_UPDATE EVENT_ID_JOB_TRUST_UPDATE_OPERATION EVENT_ID_JOB_STARTING_DYNAMIC_GROUP_UPDATE EVENT_ID_JOB_DYNAMIC_GROUP_UPDATE_OPERATION EVENT_ID_JOB_STARTING_ADMIN_ACTIVITY_REPORT EVENT_ID_JOB_ADMIN_ACTIVITY_REPORT_OPERATION EVENT_ID_JOB_PASSWORD_STATUS_REPORT_OPERATION EVENT_ID_SYSTEM_RESTRICTED EVENT_ID_JOB_LAUNCHING_THREADS EVENT_ID_JOB_COULD_NOT_CONNECT_TO_SYSTEM EVENT_ID_CONSOLE_STARTED EVENT_ID_JOB_COMPLIANCE_DATABASE_SNAPSHOT EVENT_ID_JOB_MISSED_RUN_RESCHEDULED EVENT_ID_JOB_MISSED_RUN_FINISHED Password Operations: EVENT_ID_PASSWORD_ACCESS_GRANTED EVENT_ID_PASSWORD_ACCESS_REFUSED EVENT_ID_PASSWORD_CHECKED_OUT EVENT_ID_PASSWORD_CHECKED_IN EVENT_ID_PASSWORD_CHECKOUT_EXPIRED EVENT_ID_PASSWORD_RETRIEVED EVENT_ID_PASSWORD_REQUESTED EVENT_ID_PASSWORD_REQUEST_GRANTED EVENT_ID_PASSWORD_REQUEST_DENIED EVENT_ID_PASSWORD_RECOVERED_FOR_RDP EVENT_ID_JOB_GENERATED_RANDOM_PASSWORD EVENT_ID_JOB_STARTING_PASSWORD_STATUS_REPORT EVENT_ID_JOB_FAILED_PASSWORD_STATUS_CHECK_FOR_ACCOUNT EVENT_ID_JOB_STARTING_PASSWORD_CHANGE_ON_SYSTEM EVENT_ID_JOB_FAILED_LINUX_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_LINUX_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_CISCO_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_CISCO_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_MYSQL_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_MYSQL_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_ORACLE_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_ORACLE_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_WINDOWS_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_WINDOWS_PASSWORD_UPDATE

Partial List of Privileged Events Mapped To ArcSight ESM EVENT_ID_JOB_FAILED_SQL_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_SQL_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_AS400_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_AS400_PASSWORD_UPDATE EVENT_ID_JOB_PROPAGATING_TO_SERVICES EVENT_ID_JOB_PROPAGATING_TO_TASKS EVENT_ID_JOB_PROPAGATING_TO_COMPLUS EVENT_ID_JOB_PROPAGATING_TO_DCOM EVENT_ID_JOB_PROPAGATING_TO_IIS EVENT_ID_JOB_PROPAGATING_TO_CUSTOM EVENT_ID_JOB_PROPAGATING EVENT_ID_PASSWORD_VAULT_OPENED EVENT_ID_JOB_FAILED_CUSTOM_ACCOUNT_STORE_PASSWORD _UPDATE EVENT_ID_JOB_SUCCESS_CUSTOM_ACCOUNT_STORE_PASSWORD _UPDATE EVENT_ID_JOB_STARTING_ACCOUNT_ELEVATION_JOB EVENT_ID_JOB_FAILED_LDAP_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_LDAP_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_SYBASE_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_SYBASE_PASSWORD_UPDATE EVENT_ID_PASSWORD_RECOVERED_BY_GRANT EVENT_ID_PASSWORD_RECOVERED_FOR_TERMINAL_SERVICES EVENT_ID_PASSWORD_RECOVERED_BY_CLIENT_AGENT EVENT_ID_JOB_FAILED_OS390_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_OS390_PASSWORD_UPDATE EVENT_ID_JOB_DISCOVERY Web Application Operations/Errors: EVENT_ID_WEBAPP_FAILED_PERMISSIONS_CHECK EVENT_ID_WEBAPP_INVALID_AUTH_TOKEN EVENT_ID_WEBAPP_PERMISSION_NOT_GRANTED EVENT_ID_WEBAPP_DATABASE_CONNECTION_FAILURE File Vault Operations: EVENT_ID_FILE_RETREIVAL_REFUSED Scheduler Service Operations: EVENT_ID_SCHEDULER_STARTED EVENT_ID_SCHEDULER_PROCESSOR_DISPATCH EVENT_ID_SCHEDULER_PROCESSOR_FINISHED EVENT_ID_SCHEDULER_FAILED_TO_RUN_JOB EVENT_ID_SCHEDULER_FAILED_LICENSING_ERROR EVENT_ID_SCHEDULER_JOB_COMPLETE_ALERTS EVENT_ID_SCHEDULER_JOB_COMPLETE_ALERTS_FAILED EVENT_ID_SCHEDULER_STOPPED YES, we do integrate with ArcSight!!!

About Lieberman Software The Problem: Unrestricted, Unaudited Access to Privileged IT Resources The Mandate: FISMA The Solution: Privileged Identity Management Two Scenarios: Unexpected Events and Datacenter Deployment Offer for Attendees About Lieberman Software Q&A 2009 by Lieberman Software Corporation. Rev 20090921a

About Lieberman Software Founded in 1978 Originators of Password Randomization & Recovery for Privileged Identity Management going back to 2001 USA-based, management-owned & profitable No FOREIGN interests, No off-shore development Los Angeles headquarters, Austin support office and sales offices throughout the USA Technical partnerships include:

900 Enterprise Customers

Questions