CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY



Similar documents
SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS

Patch Management Integration

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

IT Security & Compliance. On Time. On Budget. On Demand.

VULNERABILITY MANAGEMENT

WHITEPAPER. Nessus Exploit Integration

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

Vulnerability Assessment Using Nessus

PCI Compliance. Network Scanning. Getting Started Guide

Nessus Agents. October 2015

How To Achieve Pca Compliance With Redhat Enterprise Linux

PCI-DSS Penetration Testing

ASV Scan Report Attestation of Scan Compliance

Web Application Vulnerability Testing with Nessus

Managing your Red Hat Enterprise Linux guests with RHN Satellite

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Cyber Security RFP Template

SUSE Manager. A Comprehensive Linux Server Management the Linux Way. Name. Title

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

encription IT Security and Forensic Services

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

PCI Vulnerability Validation Report

Qualys PC/SCAP Auditor

Using Nessus In Web Application Vulnerability Assessments

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Zend and IBM: Bringing the power of PHP applications to the enterprise

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Red Hat Network Satellite (On System z) 18-JUNE CAVMEN Meeting

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

May 11, (Revision 10)

How To Use A Policy Auditor (Macafee) To Check For Security Issues

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PAYMENT CARD INDUSTRY (PCI) ANNUAL TRAINING DECEMBER 10, 2009 WESTERN ILLINOIS UNIVERSITY OFFICE OF THE CTSO & BUSINESS SERVICES

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Adobe Systems Incorporated

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Building and Managing a Standard Operating Environment

June 8, (Revision 1)

rating of 5 out 5 stars

Automatic vs. Manual Code Analysis

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

E-SPIN PCI Compliancy Solution

Open Source Datacenter Conference 2011 System Management with RHN Satellite. Dirk Herrmann, Solution Architect, Red Hat

Mitigating Information Security Risks of Virtualization Technologies

Federal Desktop Core Configuration (FDCC)

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

April 11, (Revision 2)

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Protecting Critical Infrastructure

Blended Security Assessments

Best Practices for Deploying and Managing Linux with Red Hat Network

Patch Management Marvin Christensen /CIAC

PCI Requirements Coverage Summary Table

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Achieving Compliance with the PCI Data Security Standard

Red Hat Network Satellite in a Nutshell...

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

Technical breakout session

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Integrated Threat & Security Management.

Mobile App Management:

Digi Device Cloud: Security You Can Trust

Using Free Tools To Test Web Application Security

NE T GENERATION CLOUD SECURITY PLATFORM

How To Use The Dcml Framework

SERENA SOFTWARE Serena Service Manager Security

CONTENTS. PCI DSS Compliance Guide

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

From Zero to Secure in 1 Minute

JBoss security: penetration, protection and patching. David Jorm

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

The Operating System Lock Down Solution for Linux

NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Using Red Hat network satellite to dynamically scale applications in a private cloud

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Using Skybox Solutions to Achieve PCI Compliance

The McAfee SECURE TM Standard

BMC Client Management - SCAP Implementation Statement. Version 12.0

HP Server Automation Standard

How To Install Linux Titan

How to scan/exploit a ssl based webserver. by xxradar. mailto:xxradar@radarhack.com. Version 1.

without the fixed perimeters of legacy security.

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS

Analysis of the Global Vulnerability Management Market Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology

Transcription:

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY Akash Chandrashekar - Solution Architect, Red Hat Renaud Deraison - Tenable Network Security, Inc. / Nessus.org

Compliance Issues Can Be a Growing Pain Each industry affected by its own compliance rules (FDCC, HIPPA, SOX, PCI, and many, many more) Executive summary of all the requirements: control your network, keep it tight and up to date, be able to prove it Not all requirements affect the entire network (ie: PCI)

Requirement 11: Regularly test security systems and processes Regular audits of the perimeter (or network) by 3rd parties (every quarter) Typical example: ecommerce site scanned by a PCI ASV ( Approved Scanning Vendor ) PCI ASVs scans use Nessus and other scanners to do their jobs

Issues with PCI ASVs (and auditors in general) False positives : Red Hat backports security patches. A site advertising Apache 2.2.4 may not be vulnerable to all flaws affecting Apache < 2.2.18. In doubt, most vendors prefer a false positive to a false negative Findings can now be disputed. However: This is expensive (charged per scan) This is time consuming (where to get the information)

Issues with PCI ASVs (and auditors in general) How to prepare for an audit and be ready to explain why some findings are false positives? How to prove that patches are applied regularly? What if your patch schedule does not fit the quarterly scans?

Red Hat Satellite PCI compliance features provided by Red Hat Satellite include: One-click software updates in an easy-to-use interface Role-based administration Flexible delivery architectures- Satellite, Proxy, Hosted Group systems together for easier administration Automate formerly manual tasks Manage the complete life-cycle of Linux infrastructure Track the performance of Linux systems WEB INTERFACE RHN Satellite API LAYER Reporting Compliant Systems Centralized management of configurations and policies enables enterprises to efficiently implement and monitor controls.

Red Hat Satellite (cont.) Red Hat Satellite is a great way to manage one s network in a compliant way. However we still need to: - Prove that every host scanned is indeed managed by Satellite - Prove that every host scanned is patched (regularly) - Prove that every host is configured properly from a security point of view

Red Hat Satellite (cont.) Systems audited for PCI Systems managed by Satellite Not every host related to PCI is managed by Satellite (yet :) Different views between Satellite and the scan results

Red Hat Satellite: Unlocking the Power of the API Connect to the Satellite server via XML-RPC library Authenticate Session Key Perform queries and operations of interest Logout (when Auth) * Normal Satellite server permissions/roles apply

Red Hat Satellite: Nessus Integration with RHN Satellite Satellite API Integration Software Distribution Account Management Channel Management Monitoring Provisioning API LAYER XML-RPC The API layer can be used to integrate with disparate systems by making remote procedure calls using XML over HTTP

Nessus + RHN Satellite Each time Nessus Scans a host, It can connect to the local RHN Satellite server and ask Do you manage it? AND How do you Manage it?

Nessus Popular vulnerability scanner with open source roots, since 1998 Over 40,000 vulnerability checks Used by most auditors/pci ASVs out there Scans a network for remote and local vulnerabilities and misconfigurations Least expensive commercial vulnerability scanner out there ($1200/year, unlimited targets, free for home use) Also includes web app auditing, local policy audits and more... - http://www.nessus.org for more information

How to use Nessus for PCI scanning? As a product, Nessus can NOT be certified by the PCI council (only services are) However, Nessus helps you prepare for a PCI scan: will report the results that most ASVs will report, so you are prepared Helps you to find all the justifications for false positives

Nessus + RHN Satellite What if the hosts scanned for PCI have not been updated yet? (outside of regular patch schedule) Launch the patch application process from your scan directly!

Nessus + RHN Satellite How to prove that patches are applied regularly? Nessus will do a per-host spacewalk report showing the history of applied patches

Nessus + RHN Satellite Reports contain both the results found remotely and information gathered from Satellite Arms you with all the facts you need to successfully pass your PCI audit: - Host is managed by Satellite - Host is up to date - Host is patched regularly

DEMO 21

QUESTIONS? http://www.redhat.com/red_hat_network/ http://www.nessus.org/ http://blog.tenable.com 31