continuous monitoring with the 20 critical security controls

46
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO

Upload: lynde

Post on 25-Feb-2016

38 views

Category:

Documents


2 download

DESCRIPTION

Continuous Monitoring with the 20 Critical Security Controls . SPO1-W02. Wolfgang Kandek CTO. We called 2013 the year of the data breach…. …but 2014 started in much the same spirit…. Background. Open System Administration Channels Default and Weak Passwords End-user has Admin Privileges - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Continuous Monitoring with the 20 Critical Security Controls

SESSION ID:

Continuous Monitoring with the 20 Critical Security Controls

SPO1-W02

Wolfgang KandekCTO

Page 2: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

2

We called 2013 the year of the data breach…

Page 3: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

3

…but 2014 started in much the same spirit…

Page 4: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Background

Open System Administration Channels Default and Weak Passwords End-user has Admin Privileges Outdated Software Versions

4

Page 5: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Outdated Software Versions

5

EDB+MSP

Metasploit

Exploit DB

CVSS 10

Random

0% 5% 10% 15% 20% 25% 30% 35%

Vulnerability Breach Use Probability

Page 6: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Background

Open System Administration Channels Default and Weak Passwords End-user has Admin Privileges Outdated Software Versions Non-Hardened Configurations

=> Flaws in System Administration

6

Page 7: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security?

7

Page 8: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input

8

Page 9: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industryexpert input

9

Page 10: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

10

Page 11: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

11

Page 12: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industryexpert input International Participation

12

Page 13: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industryexpert input International Participation

13

Page 14: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

5 Tenets

14

Page 15: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

5 Tenets 20 CSC

Offense informs Defense Prioritization Metrics Continuous Diagnostics and Mitigation Automation

15

Page 16: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

5 Tenets 20 CSC

Offense informs Defense Prioritization Metrics Continuous Diagnostics and Mitigation Automation

16

Page 17: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

5 Tenets Prioritized

17

Page 18: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

5 Tenets Prioritized

18

Page 19: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

5 Tenets Prioritized Implementation Guidelines

19

Page 20: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls What works in Security? Owned by the Council on Cybersecurity

With widespread industry expert input International Participation

5 Tenets Prioritized Implementation Guidelines = Quick Wins, Visibility/Attribution,

Configuration/Hygiene, Advanced20

Page 21: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementation Guidelines

21

Page 22: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementation Guidelines

Quick Win 1 - Control 1 – HW Inventory Implement an automated discovery engine (active/passive)

Quick Win 3 – Control 2 – SW Inventory Scan for Deviations from Approved List

Quick Win 3 – Control 3 – Secure Configurations Limit Admin privileges

Quick Win 10 – Control 4 – Vulnerability Scanning Risk rate by groups

22

Page 23: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementation Guidelines

Measure Success Control 1: Detect new machines in 24 hours Control 1: How many unauthorized machines on network? Control 2: How many unauthorized software packages installed? Control 3: Percentage of machines that do not run an approved image ? Control 4: Percentage of machines not scanned recently (3d)?

23

Page 24: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

QualysGuard, API, PERL, Splunk Daily Authenticated Scan of Network Scripted API Access and Load

24

Page 25: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

25

Page 26: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

Logins - user, date, type Scans - user, date, type, target, duration Reports - user, date, type, duration, size Hosts – machine, date, active, fixed, severity counts, scores Vulnerabilities – id, severity, cvss, age Software – name, publisher Certificates – subject, validdate, signer, self-signed Ports – date, ports

26

Page 27: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

Logins - user, date, type Scans - user, date, type, target, duration Reports - user, date, type, duration, size Hosts – machine, date, active, fixed, severity counts, scores Vulnerabilities – id, severity, cvss, age Software – name, publisher Certificates – subject, validdate, signer, self-signed Ports – date, ports

27

Page 28: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

QualysGuard, API, PERL, Splunk Daily Authenticated Scan of Network Scripted API Access and Load Data Transformation in Scripts

Scoring – Dept. State CVSS based Data Promotion

Software, Patches, MAC address

Splunk for Reports and Graphing

28

Page 29: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC1 – HW Inventory - Quick Win 1

Deploy Asset Inventory Discovery Tool (active/passive) Goal: Discover new machines within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for new Machines

~ where the earliest scandate is within the last day

29

Page 30: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC1 – HW Inventory - Quick Win 1

Asset Inventory Discovery Tool (active/passive) Discover new machines within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for new Machines

30

Page 31: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for new Server Ports

~ where the earliest scandate is within the last day

31

Page 32: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software Goal: Within 24 hours Daily Active Scan of the Network -> Splunk

32

Page 33: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for new Software

~ where the earliest scandate is within the last day

33

Page 34: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for new Server Ports

~ where the earliest scandate is within the last day Query Splunk for new Software

34

Page 35: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for new Software

~ where the earliest scandate is within the last day Can be Alerted On

35

Page 36: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC3 – Secure Configuration

Automation: Discover Non Standard Setups Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for certain SoftwareMarker

Here: “Qualys Desktop Build” – which is a custom SW packagethat identifies our IT standard builds

36

Page 37: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC3 – Secure Configuration

Automation: Discover Non Standard Setups Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for certain SoftwareMarker

Here: “Qualys Desktop Build” – which is a custom SW packagthat identifies out IT standard builds

37

Page 38: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC3 – Secure Configuration

Automation: Discover Non Standard Setups Goal: Within 24 hours Daily Active Scan of the Network -> Splunk Query Splunk for certain Software Marker

Here: “Qualys Desktop Build” – which is a custom SW package that identifies out IT standard builds

Can be Alerted On

38

Page 39: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

39

Page 40: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

40

Page 41: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine Plot Progress for a Network

41

Page 42: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

42

Page 43: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Other Operational Reports

Usage Reporting User Logins API Logins Reports Anomaly Detection

GeoIP

43

Page 44: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Other Operational Reports

Usage Reporting User Logins API Logins Reports Anomaly Detection

GeoIP

44

Page 45: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Beyond Prototyping

Continuous Monitoring Alert on Additions & Changes

Machines Vulnerabilities Ports Certificates

Simple Configuration

45

Page 46: Continuous Monitoring with the 20 Critical Security Controls

Questions?

[email protected]@wkandekhttp://laws.qualys.com