Security compliance automation with Red Hat Satellite



Similar documents
BMC Client Management - SCAP Implementation Statement. Version 12.0

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Qualys PC/SCAP Auditor

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

Federal Desktop Core Configuration (FDCC)

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

Continuous Monitoring

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

CDM Vulnerability Management (VUL) Capability

Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

Manage Vulnerabilities (VULN) Capability Data Sheet

Automating Compliance with Security Content Automation Protocol

How To Monitor Your Entire It Environment

DoD Secure Configuration Management (SCM) Operational Use Cases

D. Best Practices D.2. Administration The 6 th A

Secstate: Flexible Lockdown, Auditing, and Remediation

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Software Vulnerability Assessment

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

VRDA Vulnerability Response Decision Assistance

Symantec Control Compliance Suite Standards Manager

Guide to Enterprise Patch Management Technologies

Towards security management in the cloud utilizing SECaaS

Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data. Craig Merchant. Senior Security Architect, Oracle

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Secunia Vulnerability Intelligence Manager (VIM) 4.0

An Enterprise Continuous Monitoring Technical Reference Architecture

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

AppSentry Application and Database Security Auditing

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

AHS Flaw Remediation Standard

How To Get The Nist Report And Other Products For Free

McAfee Policy Auditor software

NAVAL POSTGRADUATE SCHOOL THESIS

Management (CSM) Capability

Pragmatic Metrics for Building Security Dashboards

System Management with Spacewalk

STIGs,, SCAP and Data Metrics

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

PCI Vulnerability Validation Report

Information Security Office

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

CONTINUOUS MONITORING

SCAP Compliance Checker Version 3.1 for Windows February 12, 2012

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Database Security & Auditing

JBoss security: penetration, protection and patching. David Jorm

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

GFI White Paper PCI-DSS compliance and GFI Software products

Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

Best IT Security Tools & Software. rewind< & past database.com

Network Security and Vulnerability Assessment Solutions

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Analytics and Continuous monitoring Engine (ACE) for Enterprise Risk and Compliance Management

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Building and Managing a Standard Operating Environment

White Paper. Understanding NIST FISMA Requirements

IBM InfoSphere Guardium

Security Control Standard

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Top Secret KVM, Lessons Learned from an ICD 503 Deployment

Turn-key Vulnerability Management

WordPress Security Scan Configuration

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

April 11, (Revision 2)

Penetration Testing Report Client: Business Solutions June 15 th 2015

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Secunia Vulnerability Intelligence Manager

Sample Vulnerability Management Policy

Vulnerability Management with the Splunk App for Enterprise Security

Cyber Security RFP Template

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

ECS 235A Project - NVD Visualization Using TreeMaps

Top 20 critical security controls

CloudPassage Halo Technical Overview

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

IT Risk Management: Guide to Software Risk Assessments and Audits

The Emergence of Security Business Intelligence: Risk

Nipper Studio Beginner s Guide

2011 Cloud Security Alliance, Inc. All rights reserved.

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Vulnerability Management

Transcription:

Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin

Created with http://wordle.net

Compliance is a major problem About half of the CVEs exploited in 2014 went from publish to pwn in less than a month. - Verizon Breach Investigations Report, 2015 We found that 99.9% of the exploited vulnerabilities had been compromised more than a year after the associated CVE was published. - Verizon Breach Investigations Report, 2015 Patch management and associated vulnerability management processes represent the biggest problem areas, because they re rarely well documented and automated. Anton Chuvakin [http://blogs.gartner.com/anton-chuvakin/2014/02/13/highlights-from-verizon-pci-report 2014/]

YourApp from MyCO poised to revolutionize the industry MyCo CEO

Meet Simon, MyCo Lead System Engineer

YourApp

Regulations, Catalogs, Guidelines

Advanced Persistent Marketing Poster created by Ken Westin, 2015, used with permission of author. Hi Ken!

Meet Sarah, MyCo CISO

Sarah's initial SWAG Need local values for 50 controls (password lengths, C2S Profile = 250 controls login timeouts, etc) YourApp Env = 35 systems Only YourApp new systems in scope Project team bringing Security in late

Simon's back of the napkin Number of Controls Time per Control Number of Hosts Minutes per Hour 250 1 min 35 60 min 145 hours or ~18 Days

SCAP SECURITY STREET Brought to you by the letters NVD and CVE!

What does Simon need? SCAP Content SCAP Scanner Centralization

The final controls!

Final policy Annual audits C2S Profile = 400 controls Requires 2 additional regular reviews YourApp Env = 100 systems Need local values for 100 controls (password lengths, login timeouts, etc) 15 current production systems added to scope DR site also required

Simon's new napkin Number of Controls Time per Control Number of Hosts Minutes per Hour 400 1 min 100 60 min ~666 hours or ~83 Days

SPOILER ALERT!

What Simon's compliance system can do C2S Run time = 73 seconds 400 5.5 s 100 60 min ~61 hours or ~8 Days

~8 Days * Mostly computer time, highly parallel Little administrator interaction required Still Oh, and 150 more checks (62.5% more work) ~75 Days saved Or 90.36 %

The Tool Chain that Simon Built

What does Simon need? SCAP Content SCAP Scanner Centralization

The Content SCAP Scanner Centralization

SCAP (Security Content Automation Protocol) 1.2 NIST SP 800-126 Rev. 2 CCE : Common Configuration Enumeration CPE : Common Platform Enumeration CVE : Common Vulnerabilities and Exposures CVSS: Common Vulnerability Scoring System CCSS: Common Configuration Scoring System XCCDF: The Extensible Configuration Checklist Description Format OVAL : Open Vulnerability and Assessment Language OCIL: Open Checklist Interactive Language AI: Asset Identification ARF: Asset Reporting Format

SCAP (Security Content Automation Protocol) 1.2 NIST SP 800-126 Rev. 2 CCE : Common Configuration Enumeration CPE : Common Platform Enumeration CVE : Common Vulnerabilities and Exposures CVSS: Common Vulnerability Scoring System CCSS: Common Configuration Scoring System XCCDF: The Extensible Configuration Checklist Description Format OVAL : Open Vulnerability and Assessment Language OCIL: Open Checklist Interactive Language AI: Asset Identification ARF: Asset Reporting Format

Great who makes it?

Red Hat provided feeds http://www.redhat.com/security/data/metrics/ http://www.redhat.com/security/data/metrics/com.redhat.rhsa-all.xccdf.xml

Building and modifying content

XCCDF PROFILE PROFILE RULES RULES CHECK CHECK VALUES VALUES CHECK CHECK

XCCDF Profile

XCCDF Profile

XCCDF Profile

XCCDF Rule

XCCDF Rule

XCCDF Rule

OVAL Entities DEFINITION DEFINITION TEST TEST OBJECT OBJECT TEST TEST STATE STATE OBJECT OBJECT STATE STATE

OVAL Definition

OVAL Walking back the cat

A plug for upstream Sane separation of files with XSLT to create valid content OVAL in single check file with human readable IDs XCCDF in descriptive structure Modify make file to include and build content or RPM

What about the analyst?

SCAP Tailoring file

The Scanner Centralization

OpenSCAP NIST validated SCAP scanner by Red Hat https://nvd.nist.gov/scapproducts.cfm

The Centralization

Workflow

SATELLITE 5 WORK FLOW

Use RPMs

Scanning hosts

Scan list

Scan detail

Diff results

Diff to any!

Change some defaults

Detailed Report

Scanning groups with SSM

Scanning groups with SSM

Advanced searches CVE-2014-6271

System built after scans

Automation Cron + Satellite API Use with a different change manager http:/ /github.com/nzwulfin/rhsummit15

SATELLITE 6 WORK FLOW

From Tailoring to Profile

Upload Datastream

Create scan profile

Create scan profile

Create scan profile

Create scan profile

Create scan profile

Create scan profile

Reporting

Reporting

Reporting

Reporting

Install tools on client

Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin

Resources John Boyd and the OODA Loop Satellite API scripts and RPM spec file OpenSCAP Github Organization Red Hat Security Data site Red Hat Security RHSA Checklist Anton Chuvakin: Highlights from '14 Verizon PCI Report NIST Validated SCAP tools