bestprac*ces...

30
Jeff Buzzella, Technical Account Manager Grant Johnson, Technical Account Manager Salt Lake City September 26, 2013 Best Prac*ces Enterprise Vulnerability Management

Upload: others

Post on 11-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Jeff  Buzzella,  Technical  Account  Manager  Grant  Johnson,  Technical  Account  Manager  

Salt Lake City September 26, 2013 �

Best  Prac*ces  Enterprise  Vulnerability  Management  

Page 2: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Key Elements of EVM �  

§  IT  Asset  Inventory  and  Control    

§  Risk-­‐based  Vulnerability  Management  &  Strategy  

§  Scan  Management  and  Strategy  

§  Vulnerability  Tracking  and  Closure  

§  Scan  Exclusion/ExcepIon  Process  

§  Some  Closing  Thoughts  

§  Some  Reference  and  Resources  

2  

Page 3: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Lifecycle of a Vulnerability�

3  

Scan �

Identification &

Reporting

Ticketing Patching

& Configuration

Verification

Some key things to remember as you are

planning your approach

There are some things to check

Vulnerability life Cycle

Some quick thoughts �

…an ongoing continuous cycle

Page 4: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

IT  Asset  Inventory  &  Control  

Page 5: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

IT Asset Inventory and Control �

5  

CMDB- Configuration Management Database Or IT Asset Inventory

“You cannot manage that which you do not track”

Page 6: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

IT Asset Inventory and Control �

6  

Things to Know:

Some things to Check: ü  List-to-Floor, Floor-to-List inventory check (accuracy & completeness) ü  Inspect data center inventory for proper labeling on devices ü  Map the environment –[Tool based] and compare with inventory list

q  Inventories are VITAL to ensure vulnerability scan coverage is complete q  These inventories are difficult to maintain and are error prone q  Server Inventory should be tested or spot-checked for completeness q  Information could include, server, I.Ps, rack location, applications, owner,

data risk, etc.. q Maintenance for the inventories are usually a collective effort, don’t shoot

the messenger

Page 7: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Some  Ideas  on  Scan  Management  and  Strategy  

Page 8: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Scan Management & Strategy �

8  

Scan Intervals - There should be a controlled process that determines scan frequency and reporting frequency. Be observant of possible gaps created by intervals

Scan Metrics – Vulnerability scanning can be affected by network outages, firewalls, traffic management, DNS Errors etc. Scans require administrative access that can affect scan completeness and accuracy. Good vulnerability management will have a method of tracking scan success

Page 9: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Scan Management & Strategy �

9  

What to scan… Pretty much everything. Here is the short list:

ü Web Servers: Apache, Microsoft ISS; iPlanet; Lotus Domino; IpSwitch; Zeus; full support for virtual hosting.

ü SMTP/POP Servers: Sendmail; Microsoft Exchange; LotusDomino; Netscape Messaging Server;

QMail. ü FTP Servers: IIS FTP Server; WuFTPd; WarFTPd. ü Firewalls: Check Point Firewall-1/VPN-1 and NG; Cisco PIX; Juniper NetScreen; Gauntlet;

CyberGuard; Raptor. ü Databases: Oracle; Sybase; MS SQL; PostgreSQL; MySQL.

ü eCommerce: Icat; EZShopper; Shopping Cart; PDGSoft; Hassan Consulting Shopping; Perishop.

ü LDAP Servers: Netscape; IIS; Domino; Open LDAP.

ü Load Balancing Servers: Cisco CSS, Alteon, F5 BIG IP; IBM Network Dispatcher; Intel Routers; Administrable.

ü Switches and Hubs: Cisco; 3Com; Nortel Networks; Cabletron; Lucent; Alcatel.

ü Wireless Access Points: Cisco; 3Com; Symbol; Linksys; D-Link; Netgear; Avaya; Apple Airport; Nokia; Siemens

Page 10: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Scan Management & Strategy �

10  

Things to Know:

Some things to check: ü  Select a sample of high-risk servers and determine the last-scanned date and is it

within the stated goals of the scan strategy ü  Does the scan interval meet regulatory requirements? ü  Review the process for updating the scan signature and scan completeness –

Manual updates should be fully justified and tested. ü  Determine if any critical tests are excluded from review - Management should justify ü  Determine if Scan success and results are tracked ü  Are hardening guidelines published and followed – How?

q  Scan frequency should match the risk of loss associated with the data and system or patch cycles

q  Frequency can range from monthly/bi monthly to continuous q  Vulnerabilities garner differing levels of Risk . E.g. – associated with malware, remotely executable

etc..

q  Scan signature should be VERY current – Auto-update is recommended q  Approach needs to comply with local and national laws

Page 11: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Configura*on  Management  &  Hardening  Guidelines  

Page 12: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Configuration & Hardening �

12  

What is Configuration Management? The process by which management defines permissible services, settings and applications.

•  Should FTP be allowed for servers within the DMZ? •  Password Length and Age •  Port & Services •  Account Permissions Review

CIS Hardening Guidelines are a good place to start A solid hardening process will save hours of vulnerability management and reduce risk.

Page 13: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Configuration & Hardening �

13  

✓Monitor a larger range of transactions, controls, and systems than a person could ever assess using a manual process. ✓Provide a level of consistency that eliminates the subjectivity of human review. ✓Run metrics and reports that ultimately help you manage the quality of both your compliance program and operations overall ✓Reduce the number of found vulnerabilities and ensure a more secure platform

Benefits of Configuration Management

Page 14: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Configuration & Hardening �

14  

Best Practice #1: Remember the Big Picture Best Practice #2: Align IT Policy Compliance and Security with the Business Best Practice #3: IT Compliance Starts with Policy Best Practice #4: Establish Accountability Best Practice #5: Conduct a Pre-Audit or Readiness Assessment Best Practice #6: Centralize IT Policy Program Management Best Practice #7: Prioritize Remediation Activities Best Practice #8: Regularly Monitor the Whole Compliance Program

Page 15: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Developing  a    Risk  Based  Vulnerability  Strategy  

Page 16: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Risk Based Vulnerability Strategy�Three Broad Risks to consider.. �

16  

Public Network

Management should have a Defined data classification scheme There should be a concise inventory of systems that host, store and process sensitive data

Outward and Customer- Facing systems need to be prioritized These systems should be clearly identifiable

Page 17: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Risk Based Vulnerability Strategy�How do you priorities which high severity findings to fix first? �

17  

In Summary: Start with -High exposure systems – Public facing - Systems that hold or use High risk data - Fix the High probably/High severity, patchable vulnerabilities

Prioritize vulnerabilities when known exploits are published by third party vendors and/or publicly available sources. Good VM tools constantly correlate exploitability information from real-time feeds to provide up to date references to exploits and related security resources.

Look for malware associated vulnerabilities. Vulnerability scanners correlate malware information with vulnerabilities when malware threats for vulnerabilities are published within the Trend Micro Threat Encyclopedia or other authoritative sources

Prioritize the vulnerability can be detected using remote (unauthenticated) scanning.

Begin with vulnerabilities that are fixable with a patch that is currently available from the vendor.

Page 18: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Risk Based Vulnerability Strategy�

18  

The VM solution needs to provide the capability to scan for and fix vulnerabilities in a broad range of categories, including: q  Back Doors and Trojan Horses (bypass authentication systems).

q  Brute force attacks (defies cryptography by systematically trying different keys).

q  CGI (exploits the Common Gateway Interface).

q  Databases.

q  DNS and Bind (exploits Domain Name Services).

q  E-commerce applications.

q  File sharing.

q  File Transfer Protocol.

q  Firewalls.

Page 19: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Risk Based Vulnerability Strategy�

19  

Things to Know:

Things to Check: ü  Review system risk assessment used to identify HIGH risk systems based

on Data sensitivity ü  Review network diagrams used to track externally facing systems ü  Ensure HIGH risk systems are scanned in accordance with policy

guidelines ü  Review action plans associated with high severity vulnerabilities

q Management needs to have a plan to identify and priorities the systems that are subject to vulnerability management. It is very difficult if not impossible to “fix all” or “All Sev 4s and 5s”

q Risk differs from server to server depending on Host data, internet facing

q Vulnerabilities garner differing levels of threat q Start with the fixable vulnerabilities

Page 20: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Ideas  on  Vulnerability  Tracking  and  Closure  

Page 21: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Vulnerability Tracking and Closure �

21  

5 Stages of Greif in Vulnerability Management

1.  Denial

2.  Anger

3.  Bargaining

4.  Depression

5.  Acceptance

Stage Server Team Says… Security Says… “You need a new crack pipe, my servers are not vulnerable!” Who the heck gave you permission to scan my servers!?!” “This system is going away…” “It is impossible to fix all of these!” “Okay… I guess I will patch these”

“I am afraid they are and here is the proof…” “We need to scan everything on the network …” “It sill introduces an unacceptable risk and needs to be fixed” “A single patch will eliminate many of these” “Thank you for working with us. Let us know when you are ready for a rescan”

Page 22: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Vulnerability Tracking and Closure �

22  

Things to Know:

Things to Check: ü  Ensure system ownership is properly documented – lines of responsibility

for security are properly assigned ü  Is there a process in place to escalate overdue or unpatched systems

outside of policy- Test by reviewing scan results ü  Does management monitor aging of vulnerabilities of a system

q There needs to be a manageable, measurable process to track Vulnerabilities

q Many companies use ticketing systems q There will ALWAYS be exceptions to a policy – q Need to ensure that exceptions are approved

and reviewed at a regular interval q Vulnerability ageing is a commonly applied

metric

Page 23: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Scan  Exclusions    and    

Excep*on  Process  

Page 24: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Scan Exclusions & Exceptions �

24  

Some systems maybe appropriately excluded from vulnerability scanning!!

Possible Scenarios

ü  Process networks ü  Air-Gaped networks ü  Low risk, untrusted

systems – Be VERY wary of this justification

ü  Smart Equipment ü  System cannot tolerated

a scan without interruption

Page 25: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Scan Exclusion/Exceptions �

25  

Things to Know:

Things to Check: ü  Is there a formal, documented process to exclude a system from scanning? ü  Are scanning exceptions reviewed at a regular interval? ü  Select a sample of excluded hosts and trace to authorizing documents ü  Determine if there are action plans in place to remediate older systems and

subject them to future vulnerability scans

q High risk in that these are permanent blind spots for vulnerabilities to hide

q There are some systems that should be excluded – the need for security scanning does not outweigh business use.

q Scan-caused crashed can be an indication of a misconfigured system

q Exceptions to scanning should be documented/approved and subject to regular review

Page 26: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Some  Closing  Thoughts  

Page 27: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Other thoughts.... �

27  

q Vulnerability Management is best driven at the CISO level – Metrics should be designed to give “C” level management something to “manage to” q  number of days to close vulnerabilities q  number of days from identification to notification q  scan coverage as a % q  authentication %

q Patch Metrics and Configuration Management dashboards have been found to be more effective that voluminous reports of high severity vulnerabilities

q Be cautious when recommending automatic ticketing for

new vulnerabilities

Page 28: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Some  Good  References-­‐  free  

28  www.qualys.com/enterprises/qualysguard/resources/  

Page 29: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Free  Services  at  your  FingerIps  

29  

www.qualys.com/secure  

Page 30: BestPrac*ces Enterprise%Vulnerability%Management%issa-utah.org/blog/wp-content/uploads/2013/08/2013-Fall_Enterprise... · # Back Doors and Trojan Horses (bypass authentication systems)

Thank You [email protected]