V1.3 1.

Slides:



Advertisements
Similar presentations
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Advertisements

HP Quality Center Overview.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Controls – What Works
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Vulnerability Assessments
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
[Name / Title] [Date] Effective Threat Protection Strategies.
»Vulnerability Management for the Real World » Successful Approaches » What is Vulnerability Management? » Challenges to Effective VM » The Problem Contents:
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Service Transition & Planning Service Validation & Testing
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Network security Product Group 2 McAfee Network Security Platform.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
GRC: Aligning Policy, Risk and Compliance
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities A brief research note for Info-Tech’s members.
Office 365 Security Assessment Workshop
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
CIM Modeling for E&U - (Short Version)
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
Hybrid Management and Security
Compliance with hardening standards
Leverage What’s Out There
Speaker’s Name, SAP Month 00, 2017
SAP Access Violation Management by Greenlight
Virtualization & Security real solutions
Transforming IT Management
I have many checklists: how do I get started with cyber security?
Making Information Security Manageable with GRC
Healthcare Cloud Security Stack for Microsoft Azure
Making Information Security Actionable with GRC
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Skybox Cyber Security Best Practices
National Cyber Security
Holistic Approach to Information Security
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Technical Capabilities
Viewtrust Continuous Security, Risk and Compliance Management
Managed Content Services
Third-party risk management (TPRM)
Features Overview.
Microsoft Data Insights Summit
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Microsoft Data Insights Summit
V1.1 1.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

v1.3 1

Vulnerability Management for the Real World Contents: The Problem What is Vulnerability Management? Challenges to Effective VM Successful Approaches 2

The Problem 3

Organizations are Feeling the Pain 1. What causes the damage? 95% of breaches target known vulnerabilities 2. How do you prevent the damage? What are your options? RISK= Assets x Vulnerabilities x Threats You can control vulnerabilities. 4. How do you make the best security decisions? Focus on the right assets, right threats, right measures. 3. How do you successfully deal with vulnerabilities? Vulnerabilities Business complexity Human resources Financial resources

What is Vulnerability Management?

What Is Vulnerability Management (VM) A process to determine whether to eliminate, mitigate or tolerate vulnerabilities based upon risk and the cost associated with fixing the vulnerability. Methodologies Available for VM: Vulnerability Analysis (VA) Penetration Tests (PT) DAST (Dynamic Application Security Test) SAST (Static Application Security Test)

What Is Vulnerability Management At a high level, the “intelligent confluence” of… Assessment What assets? Analysis What to fix first? Remediation Fix the problem + + As a component of Risk Management And balance the demands of business goals and processes

Difference between Vulnerability Assessment & Vulnerability Management One time project with defined start and end date. External IS Consultant studies network, prepares report and assessment ends. Report lists identified vulnerabilities and provide actionable recommendations for remediation. Vulnerability Management: Ongoing/continuous process that aims at managing an organization’s vulnerabilities in a holistic manner. Assessment is continuously done in a cyclic/scheduled manner of critical assets & vulnerabilities identified are reported for further action.

Challenges to Effective VM

Challenges – Assessment • Handling large networks • Scan distribution is cumbersome • Time consuming and resource intensive • Compliance challenges

Challenges – Analysis • Manual and resource intensive process to determine • What to fix • If you should fix • When to fix • Correlation between vulnerabilities, threats and assets • A way to prioritize what vulnerabilities should be addressed • What order • Avoiding Stale data • Making decisions on last quarter’s vulnerabilities • Creating credible metrics

Challenges – Remediation • Security resources are often decentralized • The security organization often doesn’t own the network or system • Multiple groups may own the asset • Presenting useful and meaningful information to relevant stakeholders • Determining if the fix was actually made

Asset Any equipment or device or end-point (identifiable using an IP) that has value to the organization or supports the ability of the organization to conduct business

Threat Any person, circumstance or event that has the potential to cause damage to an organizational asset or business function

Vulnerability Any flaw in the design, implementation or administration of a system that provides a mechanism for a threat to exploit the weakness of a system or process

Challenges – Time Threat Level Risk Threshold Asset Criticality Vulnerability discovered Exploit public Automated exploit Discovery Remediation Cost to ignore vulnerability is greater than the cost to repair Threat Level Risk Threshold

Challenges – Time Threat Level Risk Threshold Asset Criticality Vulnerability discovered Cost to ignore vulnerability is greater than the cost to repair Exploit public Automated exploit Discovery Remediation Goal = compress time from discovery to remediation Threat Level Asset Criticality Risk Threshold

Challenges – Time Threat Level Risk Threshold Asset Criticality Vulnerability discovered Cost to ignore vulnerability is greater than the cost to repair Exploit public Automated exploit Goal = compress time from discovery to remediation x 15 new vulnerabilities per day across many assets Discovery Remediation Threat Level Asset Criticality Risk Threshold

Vulnerability Management Lifecycle

Vulnerability Management Lifecycle

Successful Approaches: Implementing An Effective VM Strategy

Successful Approaches • Focus on four key areas: • Prioritize Assets • Determine Risk Level (assets, threats, vulnerabilities) • Remediate Vulnerabilities • Measure

Prioritize Assets

Asset Prioritization • Identify assets by: • Networks • Logical groupings of devices • Connectivity - None, LAN, broadband, wireless • Network Devices • Wireless access points, routers, switches • Operating System • Windows, Unix • Applications • IIS, Apache, SQL Server • Versions • IIS 5.0, Apache 1.3.12, SQL Server V.7

Asset Prioritization • Network-based discovery • Known and “unknown” devices • Determine network-based applications • Excellent scalability • Agent-based discovery • In-depth review of the applications and patch levels • Deployment disadvantages • Network- and agent-based discovery techniques are optimal • Agents - Cover what you already know in great detail • Network - Identify rogue or new devices • Frequency • Continuous, daily, weekly • Depends on the asset

Correlate Threats

Correlate Threats (with your critical assets) • Not all threat and vulnerability data have equal priority • Primary goal is to rapidly protect your most critical assets • Identify threats • Worms • Exploits • Wide-scale attacks • New vulnerabilities • Correlate with your most critical assets • Result = Prioritization of vulnerabilities within your environment

Determine Risk Level

Risk Calculation The Union of: Vulnerabilities Assets Threats Based upon the criticality of VAT Focus your resources on the true risk

Remediation

Remediation / Resolution Perfection is unrealistic (zero vulnerabilities) Think credit card fraud – will the banks ever eliminate credit card fraud? You have limited resources to address issues The question becomes: Do I address or not? Factor in the business impact costs + remediation costs If the risk outweighs the cost – eliminate or mitigate the vulnerability!

Remediation / Resolution Apply the Pareto Principle – the 80/20 rule Focus on the vital few not the trivial many 80% of your risk can be eliminated by addressing 20% of the issues The Risk Union will show you the way Right assets Relevant threats Critical vulnerabilities Patch or Mitigate Impact on availability from a bad patch vs. the risk of not patching Patch or mitigate Recommendations: QA security patches 24 hours Determine if there are wide spread problems Implement defense-in-depth

Measure

Measure Nemasis OutLook: Distribute Accountability (based on Asset, Asset-owner, Group) A universal standard to quantify risk (CVSS) Dashboard view of risk and vulnerabilities Nemasis will help answer the questions: Am I secure? Who is accountable and by when? Am I getting better or worse? How am I trending over time?

Summary All assets are not created equally You cannot respond to or even protect against all threats An effective vulnerability management program focuses on Risk Vulnerabilities Assets Threats The hardest step in a 1000 mile journey is the first – start somewhere Strategically manage vulnerabilities using a comprehensive process

10 Steps to Effective Vulnerability Management Identify all the assets in your purview Create an Asset Criticality Profile (ACP) Determine exposures and vulnerabilities Track relevant threats – realized and unrealized Determine Risk - union of vulnerabilities x assets x threats Take corrective action if risk > cost to eliminate or mitigate Create meaningful metrics Identify and address compliance gaps Implement an automated vulnerability management system Convince customer that vulnerability management is important

Protect The Right Assets With The Right Measures From The Right Threats With The Right Measures

Introducing Nemasis – Comprehensive Vulnerability Management Suite ‘Nemasis’ is a Vulnerability Management Suite which assists in implementing a comprehensive GRC (Governance, Risk Management, and Compliance) strategy for managing an organization's overall governance, risk, and compliance with regulations. ‘Nemasis’ offers various advantages like eliminating redundant costs, performing in-depth vulnerability scan, optimizing investments on assets by eliminating vulnerabilities and optimizing their performance, securing business reputation, asset discovery, and more. Contact sales@nemasisva.com for more information. Web: www.nemasisva.com

Nemasis – Brief Nemasis solution proactively supports the entire Vulnerability Management Lifecycle, that includes: Discovery Detection Verification Classification Prioritization Reporting Compliance Mitigation Designed for organizations with diverse networks and virtualized infrastructure, which require the highest levels of performance and scalability, Nemasis assists organizations in effectively improving their risk posture.

Nemasis Core Capabilities*: Unrivalled breadth of unified vulnerability scanning: Scans for over 51,000 vulnerabilities with more than 112,000 vulnerability checks in networks, operating systems, applications, web applications and databases across a wide range of platforms. Continuous, Real-time Vulnerability Updates: Automatically provides vulnerability and module updates without user intervention. Delivers Microsoft Patch Tuesday and Zero-day vulnerability updates within 24 hours to stay current with the changing threat landscape. Risk Prioritization: Provides intelligence about real risk of each identified vulnerability using in-depth research on Exploit availability, CVSS Score, Malware Exposure and vulnerability proliferation.

Nemasis Core Capabilities*: Renders easy-to-understand remediation strategy: Nemasis give you easy-to-understand and deploy remediation plans, which allows the IT team to focus on rapidly increasing security posture. Distributed Scan Architecture: Allows administrators to divide work-load across multiple networks in order to rapidly scan and provide reports. Comprehensive compliance and policy checks: Determine if systems comply with corporate or regulatory policies such as PCI, GLBA, HIPAA, NERC, or FISMA. Strong security configuration assessment: Centrally detect insecure configurations in your environment of Operating Systems and Databases.

Nemasis Core Capabilities*: Continuous discovery of assets using Passive Scans: Allows you to discover "hidden" or "newly-introduced" assets which may have not been actively assigned to a group. Create and manage dynamic groups: Administrators can group assets and assign ownership to track and streamline remediation efforts. Predefined and Customizable Reports and Dashboards: Leverage multiple pre-defined reports and view executive dashboards to obtain an insight into your security posture.

Nemasis Core Capabilities*: 360-degree Enterprise Workflow: Manages and helps automate complete Vulnerability Management Lifecycle including discovery, detection, testing, validation, and remediation. Effectively manages exceptions and policy overrides with approvals and escalations. Powerful administration management: Supports centralized administration for dispersed network environments and provide role-based access for delegated administration and reporting with LDAP compliant directory integration. Flexible deployment models: Deploy as virtual appliance, hardware appliance, managed service or private cloud to meet your unique security assessment needs.

Key Benefits*: Get Enterprise-Class protection with up-to-date scans for over 51,000 vulnerabilities and 112,000 checks across your physical and virtual networks, operating systems, databases, applications, and web applications. Improve and expidite strategic decision making with intelligent scoring & prioritization for rapid remediation. Ensure compliance with policies, auditing guidelines and regulations such as PCI, GLBA, CIS, HIPAA, SOX, FISMA, FDCC, USGCB, and NERC Automate all steps in your vulnerability management lifecycle from discovery to prioritization and issue resolution.

Key Benefits*: Gain accurate visibility with continuous discovery of all physical and virtual assets, including IPv6 enabled devices. Reduce costs for vulnerability and configuration assessment from a single unified console. Accurate and expert support services available for training, guidance & remediation. *Few of the features are still under active development & internal tests. Please confer with MicroWorld Engineering team to check availability of a specific feature.

Authenticated Scanning An Authenticated Vulnerability scan uncovers possible vulnerabilities that a logged in user could exploit. Nemasis provides following types of Authenticated scans. • SNMP • SMB • SSH • ESXi

1. Consolidated Reporting Combine data collected from every scans for reporting 2. Quick Report Scheduling and Distribution Quick Report Scheduling and Distribution for quick vulnerability fixes 3. Compliance Reporting Compliance assessments using industry-recommended best practices such as CIS Benchmarks, OWASP 2010, PCI 4. Report Options Select from multiple report options such as below CVSS SCORE, Patch, Microsoft patch, NVT Port/Protocol/Service 5. Report Template Types Choose this report template from following options OWASP 2010, PCI,CIS 6. Multiple Report formats Multiple report formats such as Text, PDF, HTML, RTF, CSV, Native XML

Dashboard Date Sources Nemasis combines the information From following sources and displays data Comfortably in the web interface in dashboards. CVEs (Common Vulnerability and Exposures) by CVSS Scan Plugins by Severity Class

Risk Scoring with CVSS Rating CVSS Score Issue for Risk Rating None 0.0 3.5 Low 0.1-3.9 3 Medium 4.0-6.9 2.5 High 7.0-8.9 2 Critical 9.0-10.0 1.5 1 0.5 Critical High Medium None Low

User Access Control Module Level Permissions Organization Hierarchy Assigning Roles and Profile to Users Relates users and Roles to Groups

1 2 3 4 5 6 Monitoring Assets Alert Teams Custom Fitted Alerts Continues Monitoring and Alerts This determines which systems you want to monitor. you can recognize system to monitor via asset tagging or by range. 2 Alert Teams Constant monitoring and alerts help teams to proactively be alerted about potential threats so problems can be tackled before turning into breaches. 3 Custom Fitted Alerts Alerts can be custom fitted for a wide variety of situations affecting systems certificates, ports services and software. 4 Quick Incident Response It also continuously recognizes and proactively locates issues, instead of delayed response to incidents. 5 Define Rulesets Determines what (i.e. which events) you want to monitor. For example, you can define rulesets to only monitor for new ports on systems. Assets 6 Notifications Determines which individuals or teams receive alerts

No Access Visibility Mode Authority Mode Configure Mode When a scan or policy is created, no other users or groups have access to it. Visibility Mode Users and groups set to visibility mode can view the results of the scan. Authority Mode Users and groups set to authority mode can launch, pause, and stop a scan, as well as view its results. Configure Mode Users and groups set to configure mode can modify the configuration of the scan in addition to all other permissions.

Configuration Auditing/Management Ensures that the IT assets/ systems are configured securely according to industry benchmarks and best practices and are compliant with policy and standards. Scans against benchmarks such as below. USGCB 2.0 policies USGCB 1.0 policies FDCC policies CIS benchmarks SCAP NIST PCI

THANK YOU v1.3 64