How to Grow and Transform your Security Program into the Cloud



Similar documents
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Proactively Secure Your Cloud Computing Platform

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Keyword: Cloud computing, service model, deployment model, network layer security.

Elastic Detector on Amazon Web Services (AWS) User Guide v5

Chapter 11 Cloud Application Development

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM. Vulnerability scanning and best practices

Overview and Deployment Guide. Sophos UTM on AWS

Concierge SIEM Reporting Overview

Secret Server Qualys Integration Guide

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

RETHINK SECURITY FOR UNKNOWN ATTACKS

Complete Patch Management

Critical Security Controls

Penetration Testing Report Client: Business Solutions June 15 th 2015

Web Application Firewall

The Cloud App Visibility Blindspot

Software Vulnerability Assessment

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Cloud Computing. Adam Barker

Xerox Mobile Print Cloud

NCTA Cloud Architecture

Assignment # 1 (Cloud Computing Security)

Vulnerability Management

Alfresco Enterprise on AWS: Reference Architecture

WHITEPAPER. Nessus Exploit Integration

Security Issues in Cloud Computing

Addressing Security for Hybrid Cloud

System Administration Training Guide. S100 Installation and Site Management

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Obtaining Enterprise Cybersituational

Certified Cloud Computing Professional VS-1067

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

Stephen Coty Director, Threat Research

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

74% 96 Action Items. Compliance

Cloud-Security: Show-Stopper or Enabling Technology?

From 0 to Secure in 1 Minute APPSEC IL Moshe Ferber CCSK, CCSP

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Ovation Security Center Data Sheet

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Installing and Administering VMware vsphere Update Manager

RSA Security Anatomy of an Attack Lessons learned

Customer Service Description Next Generation Network Firewall

CloudPassage Halo Technical Overview

How To Manage Security On A Networked Computer System

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Deploy Remote Desktop Gateway on the AWS Cloud

McAfee Public Cloud Server Security Suite

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Cloud Computing. Technologies and Types

Data In The Cloud: Who Owns It, and How Do You Get it Back?

From Zero to Secure in 1 Minute

rating of 5 out 5 stars

Next Generation Network Firewall

IBM Security QRadar Vulnerability Manager Version User Guide IBM

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

AN OVERVIEW OF VULNERABILITY SCANNERS

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

Netzwerkvirtualisierung? Aber mit Sicherheit!

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

IBM Managed Security Services Vulnerability Scanning:

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

UTILIZING CLOUDCHECKR FOR SECURITY

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Cloud Security:Threats & Mitgations

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Safeguarding the cloud with IBM Dynamic Cloud Security

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Logentries Insights: The State of Log Management & Analytics for AWS

Challenges in Deploying Public Clouds

GFI Product Manual. Administration and Configuration Manual


BYOD Guidance: BlackBerry Secure Work Space

April 11, (Revision 2)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Introduction What is the cloud

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Transcription:

How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate

Agenda Introduction Fundamentals of Vulnerability Management Differences in Cloud Computing Scanning in the Public Cloud IaaS Looking Ahead Questions 2

Security Program Vulnerability Management Impact on Security Program Asset Discovery Software Inventory Secure Configurations Continuous Assessment and Remediation 3

Security Program Vulnerability Management Impact on Security Program Asset Discovery Software Inventory Secure Configurations Continuous Assessment and Remediation 4

Security Program 5

Security Program 6

Security Program 7

Security Program 8

Security Program 9

Security Program Dsd.gov.au: 85 % of Incidents prevented Application Patching Operating System Patching Non-Admin for Users Whitelisting 10

Fundamentals of Vulnerability Management 11

Terminology Vulnerability Inability to withstand the effects of a hostile environment Vulnerabilities are flaws that can be exploited by a malicious entity to gain greater access or privileges than it is authorized to have on a computer system. Threat: Any circumstance or event, deliberate or unintentional, with the potential to cause harm to a system. Exploit: Code that takes advantage of a vulnerability to gain greater access or privileges on a computer system. Risk: The probability that a particular threat will exploit a particular vulnerability. 12

Origin of Vulnerabilities Programming mistakes 5-20 bugs per 1,000 lines of code note: not all bugs result in vulnerabilities. 13

Origin of Vulnerabilities Programming mistake example VLC - CVE-2008-4654 Stack overflow 14

Origin of Vulnerabilities Programming mistakes 5-20 bugs per 1,000 lines of code note: not all bugs result in vulnerabilities. Configuration errors Default passwords Sample program Configuration directives 15

Origin of Vulnerabilities Configuration error example Apache mod_proxy - CVE-2011-4317 missing trailing slash information disclosure 16

How Many Vulnerabilities? Source: Microsoft Security Intelligence Report Volume 12, July December, 2011 17

How many Vulnerabilities? 1000s of CVEs every 6 months Many CVEs are bundled in 1 Patch 18

How many Vulnerabilities? 1000s of CVEs every 6 months Many CVEs are bundled in 1 Patch Microsoft 50 / 6 months Oracle 70 / 6 months Apple 15 / 6 months Wordpress 10 / 6 months 19

Vulnerability Management Basics Track inventory and categorize assets Scan systems for vulnerabilities Verify vulnerabilities against inventory Classify and rank risks Identify patches, fixes and workarounds Apply patches, fixes and workarounds Rescan to validate remediation 20

Scanning and Asset Inventory Vulnerability scanners validate asset management inventory systems through network discovery scans. Discovery scans use IP network blocks to discover assets. Administrators use the results of discovery scans to group and classify assets for detailed vulnerability scans. 21

External vs. Internal Scanning External Scanning: Also known as Perimeter Scanning. Vulnerability scanning from the Internet. Scans must pass though perimeter firewalls and security appliances Used to identify vulnerabilities on perimeter systems. Internal Scanning: Vulnerability scanning from inside the Enterprise (behind the Firewall) Used to identify vulnerabilities on internal systems and to discover detailed system information. 22

Trusted Scanning Trusted scanning uses credentials to log into the Target System Increased Accuracy Detailed Software Inventory Client Side Vulnerabilities Browsers, PDF Readers, Databases Eliminates the requirement for permanent resident software agents on every system. Maintains Ease of Installation 23

Differences in Cloud Computing 24

Cloud Computing SaaS Software as a Service E-mail: Gmail, Exchange Online Productivity: Google Apps, Office365 Business: Salesforce, Netsuite PaaS Platform as a Service Google App Engine Java, Python Microsoft Azure C# and SQL DB IaaS Infrastructure as a Service Amazon AWS EC2 Rackspace 25

Differences with the Cloud - IaaS Very Dynamic Usage Based Price Model Instances Machine Images IP Address variable Asset Discovery Access Control (Firewalling) Permission to Scan (AUP) Management Introspection 26

Cloud IaaS is Dynamic Instances can be created, and torn down, very rapidly. Impact: Asset management systems may not be accurate. Is IT part of the process, or are they excluded? Instances may not be always powered on because of the cost model (usage based). Impact: Potentially challenging to scan all systems. 27

Usage Based Cost Model Varies by IaaS provider but: You pay for each hour/fraction thereof the instance is powered on. Different instance types have different rates. You pay for Internet data transfer. Typically transfer rates are measured in GB/month. Some providers don t charge for inbound (from Internet) traffic. You pay for Storage Typically storage rates are measured in GB/month AND million I/O requests 28

Instance An individual system in a cloud IaaS is known as an instance. Instances can be powered on or powered off. 29

Machine Images Systems in a Cloud IaaS environment are typically built from predefined software Images. IaaS subscribers can use publicly available images, or build and upload their own images. Possible advantage of scanning images before deployment into production, allowing for more secure images. Some IaaS providers allow for the import and export of images to/from a variety of formats. 30

Cloud IaaS IP Addressing Varies somewhat with IaaS provider however: Typically, instances have a private internal address, and a public address. NAT is used to map public address to private addresses. Addresses are typically assigned by the IaaS provider; networks and contiguous addresses are not typically provided. Both private and public addresses are released when an instance is stopped or terminated. 31

Discovery in a Cloud Discovery scanning is typically not possible in public IaaS cloud environments due to the IP Addressing assignment method. However, Cloud IaaS APIs typically provide a mechanism to discover detailed information about all instances in a given account, even those that are powered off. 32

Access Control for IaaS Public Cloud IaaS provide access control to permit/deny packets from reaching an instance. Implemented in the form of Security Groups Instances are members of one or more Security Groups No ability to filter outbound traffic. 33

Permission to Scan/AUP Currently, the Acceptable Use Policies for most public IaaS do not permit vulnerability scanning without prior approval. Impact: Extra step in your vulnerability management program. You must request permission/schedule vulnerability management scans in advance. http://aws.amazon.com/security/penetration-testing/ 34

Cloud Management IaaS Cloud providers have extensive management consoles Functions are are often accessible via APIs. API access allows for automation of many Cloud management tasks. APIs also allow for tight integration with other tools, including vulnerability management tools. Asset discovery can be automated through the API. 35

Introspection Visibility into the memory of a particular system provided through the hypervisor System under examination can be powered off Vulnerability assessment can be done entirely through introspection performance impact to the hypervisor Introspection in a public IaaS Cloud could be problematic due to Multi Tenancy 36

Scanning in the Public Cloud IaaS 37

Scanning Public IaaS Instances External Scanning from the Internet Internal Scanning through VPN tunnels. Internal Scanning from inside the IaaS. 38

External Public IaaS Scanning Cloud Platform Customer network QG Internet Scanners EC2 39

External Public IaaS Scanning Instance(s) must have a public IP address. Scan individual IaaS instance public IP address. Obtain permission to scan from IaaS provider. Modify security groups for scanner IP address. Network charge for scanning traffic. 40

Internal Scanning from inside IaaS Cloud Platform Customer network QG EC2 Scanners EC2 41

Internal Scanning from inside IaaS Deploy a scanning system into the IaaS environment. Can scan individual IaaS instance private IP addresses. Obtain permission to scan from IaaS provider. Security Group for scanner instance. Authenticated scans are possible and recommended. Network charges for data transfer. Instance charges for vulnerability scanner(s). 42

QualysGuard Virtual Scanner Appliance 43

Internal Scanning through VPN tunnel Cloud Platform Customer network QG-SA or QG-VS VPC Private customer subnet EC2 44

Internal Scanning through VPN Requires establishment of VPN tunnel between IaaS environment and Enterprise. VPN options vary. Can leverage scanner systems inside Enterprise. Can scan IaaS instance private IP addresses. Obtain permission to scan from IaaS provider. May need to modify security groups for scanner IP address. Authenticated scans are possible. Network charges for data transfer and VPN tunnel. 45

IaaS API Integration for Scanning Automatically scan new machines for vulnerabilities Do not scan if we have a fresh result (24 hours) Strategy: Use IaaS Asset API to detect new servers Amazon EC2 API: rich functionality API can be used to query for active machines API results can drive new scans through Scanning APIs Script integration necessary for small correlation DB Sample run: 46

IaaS API Integration for Scanning Automatically scan new machines for vulnerabilities Do not scan if we have a fresh result (24 hours) Strategy: Use IaaS Asset API to detect new servers Amazon EC2 API: rich functionality API can be used to query for active machines API results can drive new scans through Scanning APIs Script integration necessary for small correlation DB Sample run: 47

Do we use AWS already? Monitor for AWS use on the network level Firewall log rule for 71.21.194.168 48

Do we use AWS already? Monitor for AWS use on the network level Firewall log rule for 71.21.194.168 49

Do we use AWS already? Monitor for AWS use on the network level Firewall log rule for 71.21.194.168 May vary for your geo location DNS logs for console.aws.amazon.com Or amazonaws.com Web proxy logs 50

Apply Investigate your vulnerability management provider to see if scanning capabilities inside the Public IaaS clouds are available Integrate your scanning through the IaaS management APIs. Use data from scanning and IaaS provider management systems through their respective APIs to improve your Asset Management. 51

Thank you wkandek@qualys.com @wkandek http://laws.qualys.com 52