SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS



Similar documents
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

Patch Management Integration

VULNERABILITY MANAGEMENT

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

WHITEPAPER. Nessus Exploit Integration

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Agents. October 2015

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Managing your Red Hat Enterprise Linux guests with RHN Satellite

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

PCI-DSS Penetration Testing

Open Source Datacenter Conference 2011 System Management with RHN Satellite. Dirk Herrmann, Solution Architect, Red Hat

IT Security & Compliance. On Time. On Budget. On Demand.

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

ASV Scan Report Attestation of Scan Compliance

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

May 11, (Revision 10)

Building and Managing a Standard Operating Environment

Protecting Critical Infrastructure

Tenable for CyberArk

Best Practices for Deploying and Managing Linux with Red Hat Network

Digi Device Cloud: Security You Can Trust

June 8, (Revision 1)

Unified Security Monitoring Best Practices

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

April 11, (Revision 2)

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Nessus Cloud User Registration

Using Nessus In Web Application Vulnerability Assessments

PCI Compliance. Network Scanning. Getting Started Guide

February 22, (Revision 2)

Tenable Enterprise Product Training

Enterprise Cloud Use Cases and Security Considerations

JBoss security: penetration, protection and patching. David Jorm

Red Hat Network Satellite (On System z) 18-JUNE CAVMEN Meeting

Web Application Vulnerability Testing with Nessus

Virtualizare sub Linux: avantaje si pericole. Dragos Manac

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

How To Protect Your Data From Being Stolen

Tenable Addendum to VMware Product Applicability Guide. for. Payment Card Industry Data Security Standard (PCI DSS) version 3.0

Automatic vs. Manual Code Analysis

Adobe Systems Incorporated

encription IT Security and Forensic Services

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Technical Proposal. In collaboration with Main Contractor. 24 th April 2012 (VER. 1.0) E-SPIN SDN BHD

PCI Vulnerability Validation Report

Qualys PC/SCAP Auditor

PAYMENT CARD INDUSTRY (PCI) ANNUAL TRAINING DECEMBER 10, 2009 WESTERN ILLINOIS UNIVERSITY OFFICE OF THE CTSO & BUSINESS SERVICES

E-SPIN PCI Compliancy Solution

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

3D Tool 2.0 Quick Start Guide

Blended Security Assessments

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Delivering IT Security and Compliance as a Service

PCI Compliance Updates

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Vulnerability Management

How To Use A Policy Auditor (Macafee) To Check For Security Issues

The Top Web Application Attacks: Are you vulnerable?

Cyber Security RFP Template

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

PHP in RPM distribution

Red Hat Enterprise Linux and management bundle for HP BladeSystem TM

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Keeping your data yours

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat twitter: thomasdcameron IRC: choirboy on Freenode

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Speed Up Incident Response with Actionable Forensic Analytics

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

How To Manage A Vulnerability Management Program

Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide. July 16, 2014 (Revision 2)

IT HEALTHCHECK TOP TIPS WHITEPAPER

SecurityCenter 5.1 with Nessus Agent Support. October 22, 2015

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Managing Vulnerability Assessment

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review

The Red Hat Enterprise Linux advantages over Oracle Linux

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Keeping your data yours.

Cybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge

Managing Business Risk

without the fixed perimeters of legacy security.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Transcription:

SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS Akash Chandrashekar Senior Solution Architect, Red Hat Lee Kinser Solution Architect, Red Hat Jack Daniel Technical Product Manager, Tenable Network Security

Compliance Issues Can Be a Growing Pain Each industry affected by its own compliance rules (FDCC, HIPPA, SOX, PCI, and many, many more) Executive summary of all the requirements: Control your network, keep it tight and up to date, be able to prove it

REQUIREMENT PROPOSED SOLUTIONS

REQUIREMENT PROPOSED SOLUTIONS

Requirement 11: Regularly Test Security Systems and Processes Regular audits of the perimeter (or network) by 3rd parties (every quarter) Very typical of many audits Typical example: ecommerce site scanned by a PCI ASV ( Approved Scanning Vendor ) PCI ASV scans use Nessus and other scanners to do their jobs Note: Tenable Network Security is now a PCI ASV

Issues with Auditors in General False positives : Red Hat backports security patches. A site advertising Apache 2.2.4 may not be vulnerable to all flaws affecting Apache < 2.2.18. No doubt, most vendors prefer a false positive to a false negative. Findings can now be disputed. However: This is costly (charged per scan) and time consuming (where to get the information).

The False Positive Issue Condition: Exists Condition: Does Not Exist Detected Valid: True Positive Invalid: False Positive Not Detected Invalid: False Negative Valid: True Negative

Issues with Some Auditors How to prepare for an audit and be ready to explain why some findings are false positives? How to prove that patches are applied regularly? What if your patch schedule does not fit the quarterly scans? Explaining how Red Hat backporting works

Red Hat Satellite

Strategies to Manage Content RHEL 5 5.1 5.2 5.x Clients Custom 5.0-dev Clone Custom 5.0-prod 1)Client is built via kickstart from Red Hat channel kickstart tree 2)Activation key reconfigures client (dev or prod?) 3)Sat Admin creates 2 custom channels for dev & production clients 4)Sat Admin regularly compares custom dev channel vs. Red Hat and merges selected security updates, fixes, feature enablements 5)Dev systems do QA validation 6)Sat Admin merges dev to prod at reduced intervals after QA certifies dev channel 7)Sat Admin schedules updates for prod clients

Red Hat Satellite (cont.) Red Hat Satellite is a great way to manage one s network in a compliant way. However, we still need to: - Prove that every host scanned is indeed managed by Satellite - Prove that every host scanned is patched (regularly) - Prove that every host is configured properly from a security point of view

Red Hat Satellite (cont.) Systems audited Not every host related to audits is managed by Satellite (yet) Systems managed by Satellite Different views between Satellite and the scan results

Red Hat Satellite: Unlocking the Power of the API Connect to the Satellite server via XML-RPC library Authenticate Session Key * Normal Satellite server permissions/roles apply Perform queries and operations of interest Logout (when Auth)

Red Hat Satellite: Nessus Integration with RHN Satellite Satellite API Integration Software Distribution Account Management Channel Management Monitoring Provisioning API LAYER XML-RPC The API layer can be used to integrate with disparate systems by making remote procedure calls using XML over HTTP

Nessus + RHN Satellite Each time Nessus scans a host, it can connect to the local RHN Satellite server and ask Do you manage it? AND How do you manage it?

Nessus Widely-deployed vulnerability scanner with open source roots, since 1998 Nearly 50,000 vulnerability and configuration plugins Used by many auditors Scans a network for remote and local vulnerabilities and misconfigurations Least-expensive commercial vulnerability scanner ($1500/year, unlimited targets; still free for home, non-commercial use) Also includes web app scanning, local policy audits, and more... - http://www.nessus.org for more information For organizations with multiple Nessus scanners, Tenable SecurityCenter for centralized management and reporting

How to Use Nessus for Scanning? Products can NOT be certified Only service providers can be certified as Approved Scanning Vendors (ASVs) Nessus prepares you for a scan: It provides the results that most ASVs will report Helps you detect false positives and document resolution

Nessus + RHN Satellite What if the hosts scanned have not been updated yet? (outside of regular patch schedule) Report on missing patches Correlation is the key!

Nessus + RHN Satellite How to prove that patches are applied regularly? Nessus will do a per-host Satellite report showing the history of applied patches Accurate reporting is key!

Nessus + RHN Satellite Reports contain both the results found remotely and information gathered from Satellite Arms you with all the facts you need to successfully pass your audit: - Host is managed by Satellite - Host is up to date - Host is patched regularly

DEMO

Tenable SecurityCenter + RHN Satellite

QUESTIONS? http://www.redhat.com/red_hat_network/ http://www.nessus.org/ http://blog.tenable.com 2 9