The design and development of Vulnerability management system

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

System Security Scanning and Discovery Chapter 14.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Computer Security and Penetration Testing
Maintaining and Updating Windows Server 2008
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
IT:Network:Microsoft Applications
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
SEC835 Database and Web application security Information Security Architecture.
What is Enterprise Architecture?
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Security Architecture
MIS Week 6 Site:
M1G Introduction to Database Development 6. Building Applications.
Chapter 6 of the Executive Guide manual Technology.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Protecting Students on the School Computer Network Enfield High School.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Computer Security By Duncan Hall.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Enterprise Vulnerability Management
The Holmes Platform and Applications
CS457 Introduction to Information Security Systems
Architecture Review 10/11/2004
Internet Made Easy! Make sure all your information is always up to date and instantly available to all your clients.
Manuel Brugnoli, Elisa Heymann UAB
Cybersecurity - What’s Next? June 2017
CITA 352 Chapter 5 Port Scanning.
Penetration Test Debrief
Overview – SOE PatchTT November 2015.
Secure Software Confidentiality Integrity Data Security Authentication
Overview – SOE PatchTT December 2013.
Federated IdM Across Heterogeneous Clouding Environment
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Security in Networking
Building a Security Operations Center
Nessus Vulnerability Scanning
Intro to Ethical Hacking
Intro to Ethical Hacking
How to Mitigate the Consequences What are the Countermeasures?
Lecture 3: Secure Network Architecture
Intrusion Detection system
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Features Overview.
Yining ZHAO Computer Network Information Center,
Hao Hu, Luo Qi, Fazhi Qi IHEP 22 Mar. 2018
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

The design and development of Vulnerability management system Hao HU, Fazhi Qi, Chengcai Zhao, Manman Cheng Computing Center, IHEP ISGC 2019, Taipei

Outline Motivation & background Function modules design Project progress Summary & Future plan ISGC 2019, Taipei

Background & Motivation Facing network security problems/issues 99% of the network security problems are caused by the vulnerabilities Lack of combination of security evaluation tools Some tools/softwares are focusing on dedicated services What we need is a software that composed of evaluation tools for all the services based on users’ requirement Network inventory are usually incomplete, inaccurate and outdate Since the network asset changing frequently and rapidly, blind spots are likely to arise, attackers could exploit those oversights to conceal their malicious activity A vulnerability is a weakness in a system or device that can be exploited to allow unauthorized access, elevation of privileges or denial of service. ISGC 2019, Taipei

Background & Motivation Even we have security evaluation every 3 months at IHEP, some problems still exist: Scan results are not verified by the security team Security team distributes the fixing tasks to the users manually Vulnerabilities status are not tracked(left behind or fixed?) What’ more? Vulnerabilities knowledge database Correlation analysis Vulnerabilities trend The vulnerability management and lifecycle tracking are important and necessary for the security team. ISGC 2019, Taipei

function modules design

Design Principles Easy to use Scalability both for users and administrators since end users/physicists are not security specialist Scalability easy to add new functional module Multi Scanners/Engines should be supported (open source/ commercial security scanners) easily High availability & high concurrency Online services For the network security team to do the assessment, thousands of hosts will be scanned at the same time Least privilege & separation of duties Security administrators can scan all the needed hosts Normal users can only use it to scan his/her own hosts ISGC 2019, Taipei

Function modules Asset discovery Asset management Vulnerability detection Vulnerability handling and tracking Asset database (IP, port, service, user….) Vulnerability database (risk level, status..) Vulnerability reports & visualization ISGC 2019, Taipei

Asset discovery Asset is the foundation of VM system, and all the security assessment objects come from assets list. Build a list of every computing asset on the network and then build a database that vulnerability management solutions can use. tasks: Scan and detect to determine which hosts/services/ports are alive. The detection need to be constant to make assets list refreshed. Scanning Policy: every 30 Mins, a host/service/port is determined as unavailable only when it is not alive up to 3 times continuously. Make sure that the user information imported from asset management system, e.g., ip address, user name, user email, department… to determine which hosts are alive on the network, what services those hosts are offering and what ports those hosts are open. ISGC 2019, Taipei

Vulnerability detection Contains detectors/scanners for kinds of vulnerabilities Functions provided: Form vulnerability detector for weak password in HTML pages Web application vulnerability is detected by the response of a constructed request to that application Port vulnerability is detected and analysis by the response of a customized request sending to an opening port Weak password detection is carried out by verification of user password against a weak password list collected from internet. System vulnerability is detected by performing CVE scanning Credentialed Patch audit, Bash Shellshock Detection, ….. Easy to add more detectors/scanners in this function module CVE: common vulnerabilities and exposures ISGC 2019, Taipei

Vulnerability handling and tracking Aimed at distributing and tracking the vulnerability until all the vulnerability tickets are closed. Work flow Scan results are parsed and formatted, then saved to a temporary table in database. Notify the security administrator to verify the risk level for a detected vulnerability. If a vulnerability is verified as a high/middle risk level, a ticket will be created to inform users to repair it. After fixing, users need to submit tickets to administrator for review. The administrator determine if the ticket should be closed or sent back to users to re-handle. ISGC 2019, Taipei

Reports and visualization By increasing visibility into the vulnerability status of the network at IHEP, security team can focus mitigation strategies accordingly. Dashboards: Top 10: represents the proportion of the top 10 detected vulnerabilities by category . Vulnerability status: displays the count of vulnerabilities by status: new, active, fixed, re-opened. Vulnerability trend: shows the trend data about new detected vulnerabilities on the network. Vulnerability Categories. Every vulnerability is mapped to a vulnerability category. This includes vulnerabilities, potential vulnerabilities and information gathered checks. Some vulnerability categories are platform-specific (for example Debian and SUSE) while others are more general (for example Database and Firewall) ISGC 2019, Taipei

Architecture …… Service layer Middle layer Module layer Asset discovery service Vulnerability detection service Permission control Ticket service Visualization Service layer scan task detection task push pull message queue DB server Data access module Middle layer Congestion Role based access control Integrated with ihep unified authentication system detection task pull detection result push Asset scanner Detector node 1 Detector node 2 Detector node 3 …… Module layer

project progress

Development Environment Programing Language: JAVA, PYTHON Operation system: CentOS 6 Database: MySQL 5.6 Web framework: springboot+Vue.js, Nginx

Asset discovery : host & service Detect network asset( hosts/services/ports/OS/mac address) on IHEP network through passive scanning by IP range Linked to network asset management system to get user information(name/email/department) Tool: Nmap-- a free and open source utility for network discovery and security auditing Nmap scan results  database schema ISGC 2019, Taipei

Examples of host discovery Create a task to scan asset by ip range 192.168.32.1/24 command:nmap –T4 –sn 192.168.32.1/24 ISGC 2019, Taipei

Examples of service discovery Asset list: IP, service, port, port status. ISGC 2019, Taipei

Vulnerability detection Multi scanners supporting : Nessus :  popular and capable vulnerability scanners NSFOCUS scanner(commercial): web service/host vulnerability Scuba: a dedicated security software tool for database, such as weak passwords, known configuration risks, and missing patches on a range of database platforms. Vulnerability/Leaks information storage: Scanning name, scanner, scan strategy, IP, port, service, Risk level, description, suggested solution Role based access control Integrated with IHEP unified authentication/Oauth2.0 ISGC 2019, Taipei

Examples of vulnerability detection Create detection task Task name IP address range Scan strategy(web application test, Spectre and meltdown, bash shellshock detection…)

Examples of vulnerability detection

Examples of vulnerability detection

Vulnerability Tracking Integated with IHEP ticket system(http://helpdesk.ihep.ac.cn) A ticket will be created when a high risk vulnerabilty is found ISGC 2019, Taipei

Examples of vulnerability tracking

Current Status Assets discovery:Finished Vulnerability detection: Partly finished Batch detection is not supported Multi-scanners are not available Vulnerability tracking: Finished Reports & visualization: Ongoing ISGC 2019, Taipei

Summary & future plan Motivated by the requirements of a easy-to-use vulnerability management system for both security team and normal users Function modules of assets discovery, vulnerability detection and the vulnerability handling& tracking have been finished, reports visualization are under development More vulnerability scanners will be added according to the needs in the future

Thank you for your attention!