Best Prac*ces Enterprise Vulnerability Management. Jeff Buzzella, Technical Account Manager Grant Johnson, Technical Account Manager



Similar documents
Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

Payment Card Industry (PCI) Data Security Standard

Vulnerability Management

IBM. Vulnerability scanning and best practices

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

March

AN OVERVIEW OF VULNERABILITY SCANNERS

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Vulnerability management lifecycle: defining vulnerability management

THE TOP 4 CONTROLS.

Automate PCI Compliance Monitoring, Investigation & Reporting

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

DEPLOYING VoIP SECURELY

Consensus Policy Resource Community. Lab Security Policy

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Critical Controls for Cyber Security.

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Understanding Security Testing

A Decision Maker s Guide to Securing an IT Infrastructure

Extreme Networks Security Analytics G2 Vulnerability Manager

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

SANS Top 20 Critical Controls for Effective Cyber Defense

74% 96 Action Items. Compliance

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Payment Card Industry (PCI) Data Security Standard

Configuration Audit & Control

Secret Server Qualys Integration Guide

Tk20 Network Infrastructure

Sample Vulnerability Management Policy

The Value of Vulnerability Management*

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Voice Over IP (VoIP) Denial of Service (DoS)

An Introduction to Network Vulnerability Testing

Using Skybox Solutions to Achieve PCI Compliance

PCI Security Scan Procedures. Version 1.0 December 2004

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

IBM Security QRadar Vulnerability Manager

Network and Host-based Vulnerability Assessment

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Fundamentals of Network Security - Theory and Practice-

Security Management. Keeping the IT Security Administrator Busy

Cisco Advanced Services for Network Security

Cyber Essentials. Test Specification

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Best Practices for PCI DSS V3.0 Network Security Compliance

Cisco Unified Communications Remote Management Services

Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

NETWORK PENETRATION TESTING

SCP - Strategic Infrastructure Security

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

MANAGED SECURITY SERVICES

Guardian365. Managed IT Support Services Suite

McAfee Database Security. Dan Sarel, VP Database Security Products

CompTIA Security+ (Exam SY0-410)

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services

Vulnerability Management

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

LogRhythm and PCI Compliance

Securing Database Servers. Database security for enterprise information systems and security professionals

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Securing and Accelerating Databases In Minutes using GreenSQL

Virtualization Journey Stages

Microsoft Baseline Security Analyzer (MBSA)

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

Concierge SIEM Reporting Overview

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

th Avenue Phone: Kenosha, WI Fax: NOC SERVICES OFFSITE, LLC of 8

ON-DEMAND SECURITY AUDITS AND VULNERABILITY MANAGEMENT. A Proactive Approach to Network Security. Qualys, Inc. All Rights Reserved 1

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

CEH Version8 Course Outline

CiscoWorks SIMS(Netforensics)

Network Security Administrator

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

MSP Service Matrix. Servers

Central Agency for Information Technology

Domain 1 The Process of Auditing Information Systems

Managed Service Plans

Penetration Testing Report Client: Business Solutions June 15 th 2015

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Protecting Your Organisation from Targeted Cyber Intrusion

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Security and Compliance Suite Evaluator s Guide. August 11, 2015

Transcription:

Best Prac*ces Enterprise Vulnerability Management Jeff Buzzella, Technical Account Manager Grant Johnson, Technical Account Manager Salt Lake City September 26, 2013

Key Elements of EVM IT Asset Inventory and Control Risk- based Vulnerability Management & Strategy Scan Management and Strategy Vulnerability Tracking and Closure Scan Exclusion/ExcepIon Process Some Closing Thoughts Some Reference and Resources 2

Some quick thoughts Lifecycle of a Vulnerability Scan Some key things to remember as you are planning your approach Verification Vulnerability life Cycle Identification & Reporting Patching & Configuration Ticketing There are some things to check an ongoing continuous cycle 3

IT Asset Inventory & Control

IT Asset Inventory and Control CMDB- Configuration Management Database Or IT Asset Inventory You cannot manage that which you do not track 5

IT Asset Inventory and Control Things to Know: q Inventories are VITAL to ensure vulnerability scan coverage is complete q These inventories are difficult to maintain and are error prone q Server Inventory should be tested or spot-checked for completeness q Information could include, server, I.Ps, rack location, applications, owner, data risk, etc.. q Maintenance for the inventories are usually a collective effort, don t shoot the messenger Some things to Check: ü List-to-Floor, Floor-to-List inventory check (accuracy & completeness) ü Inspect data center inventory for proper labeling on devices ü Map the environment [Tool based] and compare with inventory list 6

Some Ideas on Scan Management and Strategy

Scan Management & Strategy Scan Intervals - There should be a controlled process that determines scan frequency and reporting frequency. Be observant of possible gaps created by intervals Scan Metrics Vulnerability scanning can be affected by network outages, firewalls, traffic management, DNS Errors etc. Scans require administrative access that can affect scan completeness and accuracy. Good vulnerability management will have a method of tracking scan success 8

Scan Management & Strategy What to scan Pretty much everything. Here is the short list: ü Web Servers: Apache, Microsoft ISS; iplanet; Lotus Domino; IpSwitch; Zeus; full support for virtual hosting. ü SMTP/POP Servers: Sendmail; Microsoft Exchange; LotusDomino; Netscape Messaging Server; QMail. ü FTP Servers: IIS FTP Server; WuFTPd; WarFTPd. ü Firewalls: Check Point Firewall-1/VPN-1 and NG; Cisco PIX; Juniper NetScreen; Gauntlet; CyberGuard; Raptor. ü Databases: Oracle; Sybase; MS SQL; PostgreSQL; MySQL. ü ecommerce: Icat; EZShopper; Shopping Cart; PDGSoft; Hassan Consulting Shopping; Perishop. ü LDAP Servers: Netscape; IIS; Domino; Open LDAP. ü Load Balancing Servers: Cisco CSS, Alteon, F5 BIG IP; IBM Network Dispatcher; Intel Routers; Administrable. ü Switches and Hubs: Cisco; 3Com; Nortel Networks; Cabletron; Lucent; Alcatel. 9 ü Wireless Access Points: Cisco; 3Com; Symbol; Linksys; D-Link; Netgear; Avaya; Apple Airport; Nokia; Siemens

Scan Management & Strategy Things to Know: q Scan frequency should match the risk of loss associated with the data and system or patch cycles q Frequency can range from monthly/bi monthly to continuous q Vulnerabilities garner differing levels of Risk. E.g. associated with malware, remotely executable etc.. q Scan signature should be VERY current Auto-update is recommended q Approach needs to comply with local and national laws Some things to check: ü Select a sample of high-risk servers and determine the last-scanned date and is it within the stated goals of the scan strategy ü Does the scan interval meet regulatory requirements? ü Review the process for updating the scan signature and scan completeness Manual updates should be fully justified and tested. ü Determine if any critical tests are excluded from review - Management should justify ü Determine if Scan success and results are tracked ü Are hardening guidelines published and followed How? 10

Configura*on Management & Hardening Guidelines

Configuration & Hardening What is Configuration Management? The process by which management defines permissible services, settings and applications. Should FTP be allowed for servers within the DMZ? Password Length and Age Port & Services Account Permissions Review CIS Hardening Guidelines are a good place to start A solid hardening process will save hours of vulnerability management and reduce risk. 12

Configuration & Hardening Benefits of Configuration Management Monitor a larger range of transactions, controls, and systems than a person could ever assess using a manual process. Provide a level of consistency that eliminates the subjectivity of human review. Run metrics and reports that ultimately help you manage the quality of both your compliance program and operations overall Reduce the number of found vulnerabilities and ensure a more secure platform 13

Configuration & Hardening Best Practice #1: Remember the Big Picture Best Practice #2: Align IT Policy Compliance and Security with the Business Best Practice #3: IT Compliance Starts with Policy Best Practice #4: Establish Accountability Best Practice #5: Conduct a Pre-Audit or Readiness Assessment Best Practice #6: Centralize IT Policy Program Management Best Practice #7: Prioritize Remediation Activities Best Practice #8: Regularly Monitor the Whole Compliance Program 14

Developing a Risk Based Vulnerability Strategy

Risk Based Vulnerability Strategy Three Broad Risks to consider.. Outward and CustomerFacing systems need to be prioritized Public Network These systems should be clearly identifiable Management should have a Defined data classification scheme There should be a concise inventory of systems that host, store and process sensitive data 16

Risk Based Vulnerability Strategy How do you priorities which high severity findings to fix first? Prioritize vulnerabilities when known exploits are published by third party vendors and/or publicly available sources. Good VM tools constantly correlate exploitability information from real-time feeds to provide up to date references to exploits and related security resources. Look for malware associated vulnerabilities. Vulnerability scanners correlate malware information with vulnerabilities when malware threats for vulnerabilities are published within the Trend Micro Threat Encyclopedia or other authoritative sources Prioritize the vulnerability can be detected using remote (unauthenticated) scanning. Begin with vulnerabilities that are fixable with a patch that is currently available from the vendor. In Summary: Start with -High exposure systems Public facing - Systems that hold or use High risk data - Fix the High probably/high severity, patchable vulnerabilities 17

Risk Based Vulnerability Strategy The VM solution needs to provide the capability to scan for and fix vulnerabilities in a broad range of categories, including: q q q q q q q q q Back Doors and Trojan Horses (bypass authentication systems). Brute force attacks (defies cryptography by systematically trying different keys). CGI (exploits the Common Gateway Interface). Databases. DNS and Bind (exploits Domain Name Services). E-commerce applications. File sharing. File Transfer Protocol. Firewalls. 18

Risk Based Vulnerability Strategy Things to Know: q Management needs to have a plan to identify and priorities the systems that are subject to vulnerability management. It is very difficult if not impossible to fix all or All Sev 4s and 5s q Risk differs from server to server depending on Host data, internet facing q Vulnerabilities garner differing levels of threat q Start with the fixable vulnerabilities Things to Check: ü Review system risk assessment used to identify HIGH risk systems based on Data sensitivity ü Review network diagrams used to track externally facing systems ü Ensure HIGH risk systems are scanned in accordance with policy guidelines ü Review action plans associated with high severity vulnerabilities 19

Ideas on Vulnerability Tracking and Closure

Vulnerability Tracking and Closure 5 Stages of Greif in Vulnerability Management Stage Server Team Says Security Says 1. Denial 2. Anger 3. Bargaining 4. Depression 5. Acceptance You need a new crack pipe, my servers are not vulnerable! Who the heck gave you permission to scan my servers!?! This system is going away It is impossible to fix all of these! Okay I guess I will patch these I am afraid they are and here is the proof We need to scan everything on the network It sill introduces an unacceptable risk and needs to be fixed A single patch will eliminate many of these Thank you for working with us. Let us know when you are ready for a rescan 21

Vulnerability Tracking and Closure Things to Know: q There needs to be a manageable, measurable process to track Vulnerabilities q Many companies use ticketing systems q There will ALWAYS be exceptions to a policy q Need to ensure that exceptions are approved and reviewed at a regular interval q Vulnerability ageing is a commonly applied metric Things to Check: ü Ensure system ownership is properly documented lines of responsibility for security are properly assigned ü Is there a process in place to escalate overdue or unpatched systems outside of policy- Test by reviewing scan results ü Does management monitor aging of vulnerabilities of a system 22

Scan Exclusions and Excep*on Process

Scan Exclusions & Exceptions Some systems maybe appropriately excluded from vulnerability scanning!! Possible Scenarios ü Process networks ü Air-Gaped networks ü Low risk, untrusted systems Be VERY wary of this justification ü Smart Equipment ü System cannot tolerated a scan without interruption 24

Scan Exclusion/Exceptions Things to Know: q High risk in that these are permanent blind spots for vulnerabilities to hide q There are some systems that should be excluded the need for security scanning does not outweigh business use. q Scan-caused crashed can be an indication of a misconfigured system q Exceptions to scanning should be documented/approved and subject to regular review Things to Check: ü Is there a formal, documented process to exclude a system from scanning? ü Are scanning exceptions reviewed at a regular interval? ü Select a sample of excluded hosts and trace to authorizing documents ü Determine if there are action plans in place to remediate older systems and subject them to future vulnerability scans 25

Some Closing Thoughts

Other thoughts... q Vulnerability Management is best driven at the CISO level Metrics should be designed to give C level management something to manage to q number of days to close vulnerabilities q number of days from identification to notification q scan coverage as a % q authentication % q Patch Metrics and Configuration Management dashboards have been found to be more effective that voluminous reports of high severity vulnerabilities q Be cautious when recommending automatic ticketing for new vulnerabilities 27

Some Good References- free 28 www.qualys.com/enterprises/qualysguard/resources/

Free Services at your FingerIps www.qualys.com/secure 29

Thank You gjohnson@qualys.com