Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager



Similar documents
Best Prac*ces Enterprise Vulnerability Management. Jeff Buzzella, Technical Account Manager Grant Johnson, Technical Account Manager

Payment Card Industry (PCI) Data Security Standard

Vulnerability Management

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

THE TOP 4 CONTROLS.

IBM. Vulnerability scanning and best practices

Vulnerability management lifecycle: defining vulnerability management

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Automate PCI Compliance Monitoring, Investigation & Reporting

Consensus Policy Resource Community. Lab Security Policy

March

Extreme Networks Security Analytics G2 Vulnerability Manager

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Critical Controls for Cyber Security.

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

SANS Top 20 Critical Controls for Effective Cyber Defense

74% 96 Action Items. Compliance

Securing and Accelerating Databases In Minutes using GreenSQL

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Vulnerability Management

Domain 1 The Process of Auditing Information Systems

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

DEPLOYING VoIP SECURELY

Virtualization Journey Stages

Network Security Administrator

MANAGED SECURITY SERVICES

Sample Vulnerability Management Policy

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

Secret Server Qualys Integration Guide

The Value of Vulnerability Management*

McAfee Database Security. Dan Sarel, VP Database Security Products

A Decision Maker s Guide to Securing an IT Infrastructure

Fundamentals of Network Security - Theory and Practice-

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

IBM Security QRadar Vulnerability Manager

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Configuration Audit & Control

Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

MSP Service Matrix. Servers

Central Agency for Information Technology

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

Cisco Advanced Services for Network Security

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

AN OVERVIEW OF VULNERABILITY SCANNERS

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Payment Card Industry (PCI) Data Security Standard

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

Cyber Essentials. Test Specification

DATA CENTER IPS COMPARATIVE ANALYSIS

Concierge SIEM Reporting Overview

Goals. Understanding security testing

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Using Skybox Solutions to Achieve PCI Compliance

Security Management. Keeping the IT Security Administrator Busy

th Avenue Phone: Kenosha, WI Fax: NOC SERVICES OFFSITE, LLC of 8

CiscoWorks SIMS(Netforensics)

Netzwerkvirtualisierung? Aber mit Sicherheit!

PCI Security Scan Procedures. Version 1.0 December 2004

ON-DEMAND SECURITY AUDITS AND VULNERABILITY MANAGEMENT. A Proactive Approach to Network Security. Qualys, Inc. All Rights Reserved 1

White Paper The Dynamic Nature of Virtualization Security

Managed Services For Business FAQ Blue Saffron IT Resource Management

LogRhythm and PCI Compliance

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Cisco Unified Communications Remote Management Services

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CompTIA Security+ (Exam SY0-410)

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Breaking down silos of protection: An integrated approach to managing application security

NETWORK PENETRATION TESTING

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Voice Over IP (VoIP) Denial of Service (DoS)

PCI Requirements Coverage Summary Table

Chapter 9 Firewalls and Intrusion Prevention Systems

Securing Database Servers. Database security for enterprise information systems and security professionals

Symantec Security Information Manager Version 4.7

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Introduction to Network Discovery and Identity

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Transcription:

Audit and Control of Enterprise Vulnerability Management Grant Johnson, Technical Account Manager Phoenix May 14, 2014

Key Elements of EVM IT Asset Inventory and Control Risk-based Vulnerability Management & Strategy Scan Management and Strategy Vulnerability Tracking and Closure Scan Exclusion/Exception Process Some Best Practices Some Reference and Resources 2

Some quick thoughts Lifecycle of a Vulnerability Scan I added some key things to remember as you are planning the audit approach Verification Vulnerability life Cycle Identification & Reporting There are some suggested audit steps Patching & Configuration Ticketing A risk rating for context an ongoing continuous cycle 3

IT Asset Inventory & Control

IT Asset Inventory and Control CMDB- Configuration Management Database Or IT Asset Inventory You cannot manage that which you do not track 5

IT Asset Inventory and Control Things to Know: Inventories are VITAL to ensure vulnerability scan coverage is complete These inventories are difficult to maintain and are error prone Server Inventory should be tested or spot-checked for completeness Information could include, server, I.Ps, rack location, applications, owner, data risk, etc.. Maintenance for the inventories are usually a collective effort, don t shoot the messenger Audit Steps: List-to-Floor, Floor-to-List inventory check (accuracy & completeness) Inspect data center inventory for proper labeling on devices Map the environment [Tool based] and compare with inventory list 6 Risk Rating

Scan Management and Strategy

Scan Management & Strategy Scan Intervals - There should be a controlled process that determines scan frequency and reporting frequency. Be observant of possible gaps created by intervals Scan Metrics Vulnerability scanning can be affected by network outages, firewalls, traffic management, DNS Errors etc. Scans require administrative access that can affect scan completeness and accuracy. Good vulnerability management will have a method of tracking scan success Configuration Management The process by which management defines permissible services, settings and applications - e.g. Should FTP be allowed for servers within the DMZ? A solid hardening process will save hours of vulnerability management and reduce risk. 8 Risk Rating

Scan Management & Strategy What to scan Pretty much everything. Here is the short list: Web Servers: Apache, Microsoft ISS; iplanet; Lotus Domino; IpSwitch; Zeus; full support for virtual hosting. SMTP/POP Servers: Sendmail; Microsoft Exchange; LotusDomino; Netscape Messaging Server; QMail. FTP Servers: IIS FTP Server; WuFTPd; WarFTPd. Firewalls: Check Point Firewall-1/VPN-1 and NG; Cisco PIX; Juniper NetScreen; Gauntlet; CyberGuard; Raptor. Databases: Oracle; Sybase; MS SQL; PostgreSQL; MySQL. ecommerce: Icat; EZShopper; Shopping Cart; PDGSoft; Hassan Consulting Shopping; Perishop. LDAP Servers: Netscape; IIS; Domino; Open LDAP. Load Balancing Servers: Cisco CSS, Alteon, F5 BIG IP; IBM Network Dispatcher; Intel Routers; Administrable. Switches and Hubs: Cisco; 3Com; Nortel Networks; Cabletron; Lucent; Alcatel. Wireless Access Points: Cisco; 3Com; Symbol; Linksys; D-Link; Netgear; Avaya; Apple Airport; Nokia; Siemens.d 9

Scan Management & Strategy Things to Know: Scan frequency should match the risk of loss associated with the data and system Frequency can range from monthly/bi monthly to continuous Vulnerabilities garner differing levels of Risk. e.g. associated with malware, remotely executable etc.. Scan signature should be VERY current Auto-update is recommended Approach needs to comply with local and national laws Audit Steps: Select a sample of high-risk servers and determine the last-scanned date and is it within the stated goals of the scan strategy Does the scan interval meet regulatory requirements? Review the process for updating the scan signature and scan completeness Manual updates should be fully justified and tested. Determine if any critical tests are excluded from review - Management should justify Determine if Scan success and results are tracked Are hardening guidelines published and followed How? 10 Risk Rating

Risk Based Vulnerability Strategy

Risk Based Vulnerability Strategy Three Broad Risks to consider.. Outward and Customer- Facing systems need to be prioritized Public Network These systems should be clearly identifiable Management should have a Defined data classification scheme There should be a concise inventory of systems that host, store and process sensitive data 12

Risk Based Vulnerability Strategy How do you priorities which high severity findings to fix first? Prioritize vulnerabilities when known exploits are published by third party vendors and/or publicly available sources. Good VM tools constantly correlate exploitability information from real-time feeds to provide up to date references to exploits and related security resources. Look for malware associated vulnerabilities. Vulnerability scanners correlate malware information with vulnerabilities when malware threats for vulnerabilities are published within the Trend Micro Threat Encyclopedia or other authoritative sources Prioritize the vulnerability can be detected using remote (unauthenticated) scanning. Begin with vulnerabilities that are fixable with a patch that is currently available from the vendor. In Summary: Start with -High exposure systems Public facing - Systems that hold or use High risk data - Fix the High probably/high severity, patchable vulnerabilities 13

Risk Based Vulnerability Strategy The VM solution needs to provide the capability to scan for and fix vulnerabilities in a broad range of categories, including: Back Doors and Trojan Horses (bypass authentication systems). Brute force attacks (defies cryptography by systematically trying different keys). CGI (exploits the Common Gateway Interface). Databases. DNS and Bind (exploits Domain Name Services). E-commerce applications. File sharing. File Transfer Protocol. Firewalls. 14

Risk Based Vulnerability Strategy Things to Know: Management needs to have a plan to identify and priorities the systems that are subject to vulnerability management. It is very difficult if not impossible to fix all or All Sev 4s and 5s Risk differs from server to server depending on Host data, internet facing, etc. Vulnerabilities garner differing levels of threat and should match the patch cycles Start with the fixable vulnerabilities Audit Steps: Review system risk assessment used to identify HIGH risk systems based on Data sensitivity Review network diagrams used to track externally facing systems Ensure HIGH risk systems are scanned in accordance with policy guidelines Review action plans associated with high severity vulnerabilities 15 Risk Rating

Vulnerability Tracking and Closure

Vulnerability Tracking and Closure Things to Know: There needs to be a manageable, measurable process to track Vulnerabilities Many companies use ticketing systems There will ALWAYS be exceptions to a policy Need to ensure that exceptions are approved and reviewed at a regular interval Vulnerability ageing is a commonly applied metric Audit Steps: Ensure system ownership is properly documented lines of responsibility for security are properly assigned Is there a process in place to escalate overdue or unpatched systems outside of policy- Test by reviewing scan results Does management monitor aging of vulnerabilities of a system 17 Risk Rating

Scan Exclusions and Exception Process

Scan Exclusions & Exceptions Some systems maybe appropriately excluded from vulnerability scanning!! Possible Scenarios Process networks Air-Gaped networks Low risk, untrusted systems Be VERY wary of this justification Smart Equipment (oops..) System is being DE installed System cannot tolerated a scan without interruption 19 Risk Rating

Scan Exclusion/Exceptions Things to Know: High risk in that these are permanent blind spots for vulnerabilities to hide There are some systems that should be excluded the need for security scanning does not outweigh business use. Scan-caused crashed can be an indication of a misconfigured system Exceptions to scanning should be documented/approved and subject to regular review Audit Steps: Is there a formal, documented process to exclude a system from scanning? Are scanning exceptions reviewed at a regular interval? Select a sample of excluded hosts and determine if the hosts Determine if there are action plans in place to remediate older systems and subject them to future vulnerability scans 20 Risk Rating

Some Best Practices

Some Best Practices Vulnerability Management is best driven at the CISO level Metrics should be designed to give C level management something to manage to number of days to close vulnerabilities scan coverage as a % authentication % Patch Metrics and Configuration Management dashboards have been found to be more effective that voluminous reports of high severity vulnerabilities Be cautious when recommending automatic ticketing for new vulnerabilities 22 Risk Rating

Some Good References- free 23 www.qualys.com/enterprises/qualysguard/resources/

Free Services at your Fingertips www.qualys.com/secure 24

Thank You gjohnson@qualys.com