Security: Best Practice and Monitoring



Similar documents
Centralizing Syslog with Syslog-ng and Logmuncher. Russell Adams

PAKITI Patching Status System

USM IT Security Council Guide for Security Event Logging. Version 1.1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Guideline on Auditing and Log Management

Developing Network Security Strategies

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

The Open Cyber Challenge Platform *

Use of Exchange Mail and Diary Service Code of Practice

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

How To Manage Web Content Management System (Wcm)

CISCO IOS NETWORK SECURITY (IINS)

74% 96 Action Items. Compliance

THE OPEN UNIVERSITY OF TANZANIA

SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

WHITEPAPER. Nessus Exploit Integration

SANS Top 20 Critical Controls for Effective Cyber Defense

SITECATALYST SECURITY

Centralized Logging With syslog ng. Ryan Ma6eson h6p://prefetch.net

Nixu SNS Security White Paper May 2007 Version 1.2

PROFESSIONAL SECURITY SYSTEMS

SonicWALL PCI 1.1 Implementation Guide

Architecture Overview

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Integrigy Corporate Overview

HP A-IMC Firewall Manager

syslog-ng 3.0 Monitoring logs with Nagios

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Red Condor Syslog Server Configurations

Building Energy Security Framework

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Reducing Application Vulnerabilities by Security Engineering

HP SiteScope 11.x Essentials

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

CTS2134 Introduction to Networking. Module Network Security

CiscoWorks Resource Manager Essentials 4.3

Goals. Understanding security testing

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

LogRhythm and PCI Compliance

STABLE & SECURE BANK lab writeup. Page 1 of 21

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Passing PCI Compliance How to Address the Application Security Mandates

IBM. Vulnerability scanning and best practices

Setting Up Sharp MX-Color Imagers To Scan To

HP IMC Firewall Manager

McAfee Security Information Event Management (SIEM) Administration Course 101

DJRA1.6 FINAL RELEASE OF NEW GRID MIDDLEWARE SERVICES

Log Audit Ensuring Behavior Compliance Secoway elog System

The Comprehensive Guide to PCI Security Standards Compliance

Integrating Juniper Netscreen (ScreenOS)

APPLICATION PROGRAMMING INTERFACE

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

TRIPWIRE NERC SOLUTION SUITE

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Report of Independent Auditors

Web Application Firewall

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

SolarWinds Log & Event Manager

CorreLog Alignment to PCI Security Standards Compliance

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

XpoLog Center Suite Data Sheet

Adobe Systems Incorporated

Managing Application Performance with JBoss Operations Network and OC Systems RTI

F-SECURE MESSAGING SECURITY GATEWAY

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

Managing Qualys Scanners

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

FISMA / NIST REVISION 3 COMPLIANCE

Building A Secure Microsoft Exchange Continuity Appliance

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

MTP. MTP AirWatch Integration Guide. Release 1.0

without the fixed perimeters of legacy security.

CloudPassage Halo Technical Overview

Railo Installation on CentOS Linux 6 Best Practices

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

A Decision Maker s Guide to Securing an IT Infrastructure

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

CiscoWorks Resource Manager Essentials 4.1

A Plan for the Continued Development of the DNS Statistics Collector

Sophos for Microsoft SharePoint startup guide

RemotelyAnywhere. Security Considerations

Salesforce Integration

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Transcription:

Security: Best Practice and Monitoring Romain Wartel

Contents Security Best Practice Why it is important How information can be spread Future Security monitoring Patching status monitoring with Yumit Monitoring open ports with Scanit Logging system events with syslog-ng

Security Best Practice

Why? Most sites have similar security issues Heterogeneous groups of systems administrators Experience from security incidents is extremely useful Good ideas should be spread amongst the community Guidelines & best practice should be advertised *BUT* Information must be kept up-to-date A single source of information is not enough Maintaining coherent information amongst many sites is difficult 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 4

System architecture feedback diffusion Guidelines & best practice repository e-science Centre 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 5

Authoring mechanism Web interface, currently using Serendipity Using Gridsite authentication (x509 certificates) Contributions centralized and published by trusted people 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 6

Publication mechanism Contributions Guidelines & best practice repository Web pages Mailing list The information is published via: Web pages email RSS feed 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 7

Getting the information on the Web 1/3 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 8

Getting the information on the Web 2/3 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 9

Getting the information on the Web 3/3 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 10

Getting the information via RSS 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 11

Getting the information by email 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 12

Current architecture summary XML based, recognized standard Widespread technology: many clients and APIs Enables injecting security information within existing Websites Enables filtering of the information Any webmaster can use the feed Coherent, up-to-date information is available Design up to Webmasters, but some layout can be pushed However: RSS requires a server-side mechanism Webmasters need to trust the authors or perform manual updates 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 13

Future We need to: Provide better, more targeted content Provide a second layer of information, via external Web pages Receive contributions from the community Deploy the mechanism amongst more sites Improve the way the information is sorted 18:40 3rd EGEE Conference, 18-22 April 2005, Athens, Greece 14

Security Monitoring

Yumit 1/6 Most attacks are using known software vulnerabilities Enables monitoring of patching status for a large farm Originally developed by Steve Traylen Deployment status RAL escience has 350+ systems registered RAL Tier1a has 600+ systems registered Deployment started at CERN and within UK NGS Packages and documentation available from: http://www-staff.esc.rl.ac.uk/romain/yumit/

Yumit 2/6

Yumit 3/6

Yumit 4/6

Yumit 5/6

Future work and plans The Yumit server needs more documentation Deployment mechanisms are needed: To get the latest version To use the red security flag Perhaps a Grid version through EGEE OSCT?

Scanit 1/6 Scanit detects changes in the list of open ports Useful to detect a system compromise Deployment status: Used with RAL-esc Deployment in progress within RAL Tier1a

Scanit 2/6

Scanit 3/6

Scanit 4/6

Scanit 5/6

Future work and plans Used in production at RAL Packaging in progress A few display bugs need to be fixed Documentation and Web page in progress Volunteers are more than welcomed

Central syslog server Extremely useful, especially during a security incident: Detailed information are needed about system events Information should be as reliable as possible The attacker cannot change the logs on the server

Preparing syslog server Network services on the server should be limited as much as possible! Installation of syslog-ng: http://www.balabit.com/products/syslog_ng/ Good FAQ available from: http://www.campin.net/syslog-ng/faq.html

Syslog-ng configuration Main config file is: /etc/syslog-ng/syslog-ng.conf Syslog-ng uses the following template: source filter log destination Defining several log objects can be useful

Logging all to files All the logs are sent to disc: log { source(src); destination(std); }; destination std { file("/var/log/hosts/$host/$year/$month/$day/$facility" owner(root) group(root) perm(0600) dir_perm(0700) create_dirs(yes) ); };

SSH entries to a DB Several solutions exists log { source(src); filter(f_ssh_login_attempt); destination(d_mysql); }; filter f_ssh_login_attempt { program("sshd.*") and match("(failed Accepted authenticated failed Password FAILED ACCEPTED)") ; }; pipe("/tmp/mysql.pipe" template("insert INTO logs (host, facility, priority, level, tag, date, time, program, msg) VALUES ( '$HOST', '$FACILITY', '$PRIORITY', '$LEVEL', '$TAG','$YEAR-$MONTH-$DAY', '$HOUR:$MIN:$SEC', '$PROGRAM', '$MSG' );\n") template-escape(yes)); };

Raising alerts log { source(src); filter(f_network_denied); destination(d_mysql); destination(contact_sec); }; filter f_network_denied { program("kernel.*") and match("denied") ; }; destination contact_sec { file("/var/log/contact_sec" owner(root) group(root) perm(0600) dir_perm(0700) create_dirs(yes)); }; A cron job then simply checks the log file every 10 min If the file exists, its content is sent to the security team

Dynamic alerts Alerts can be generated for a temporary event log { source(src); filter(f_suspect); destination(mail-alert); suspicious pattern }; filter f_suspect { match("rw45"); }; destination mail-alert { program("/usr/local/bin/syslog-mail-perl"); }; Then the script simply send the entry to the security team

Results All logs are archived and stored securely Ability to search for user logins, IP addresses, etc. Suspicious patterns are escalated As a result: Intrusion detection is improved Incident response is more efficient

syslog-ng Web GUI The DB is available from the Web to the security team:

Searching for entries Searching for any login for rw45 amongst the farm

Tracking network scans Tracking network scans romain@romain:~$ telnet fougeres.esc.rl.ac.uk 24 Trying 130.246.140.144...

Tracking network scans Network scan alerts

Tracking user logins Tracking user logins romain@romain:~$ ssh rw45@fougeres.esc.rl.ac.uk rw45@fougeres.esc.rl.ac.uk's password: Permission denied, please try again.

Tracking user logins User logins alert:

Q&A