Download presentation
Presentation is loading. Please wait.
Published byRose Veronica Barber Modified over 9 years ago
1
Managing Security and System Integrity
2
Value Proposition Need for high reliability and integrity of information networks Need for security at multiple levels Operating systems, applications, network components, etc. Increased risk and frequency of DDOS attacks, worms, insider attacks, and outages from accidental IT issues Need for high reliability and integrity of information networks Need for security at multiple levels Operating systems, applications, network components, etc. Increased risk and frequency of DDOS attacks, worms, insider attacks, and outages from accidental IT issues
3
Elevator Pitch Tripwire is the data integrity assurance company. Our software assures the integrity of data by: Establishing a baseline of data in its desired state, Detecting and reporting any changes to the baseline, and Enabling rapid discovery and remediation when an undesired change occurs. In this way, Tripwire establishes the foundation for data security and ensures a safe, productive, and stable IT environment. Tripwire is the data integrity assurance company. Our software assures the integrity of data by: Establishing a baseline of data in its desired state, Detecting and reporting any changes to the baseline, and Enabling rapid discovery and remediation when an undesired change occurs. In this way, Tripwire establishes the foundation for data security and ensures a safe, productive, and stable IT environment.
4
Situation Today All servers are vulnerable to data integrity threats By both internal and external sources. Configuration errors by new or inexperienced administrators New service packs, application updates, patches, etc. Notification only initiates the process Determination or Assessment account for most of the effort in repairing a problem. Pin pointing your efforts is critical to getting back to a known good state quickly. Perimeter defenses only solve part of the problem Can only tell you that you’ve been compromised. Doesn’t tell what data has changed. All servers are vulnerable to data integrity threats By both internal and external sources. Configuration errors by new or inexperienced administrators New service packs, application updates, patches, etc. Notification only initiates the process Determination or Assessment account for most of the effort in repairing a problem. Pin pointing your efforts is critical to getting back to a known good state quickly. Perimeter defenses only solve part of the problem Can only tell you that you’ve been compromised. Doesn’t tell what data has changed.
5
Firewall/network Authentication/Authorization/Administration Log Analyzer/ Anti-virus DataIntegrity Tripwire in layered security Encryption Internet
6
Causes of System and Network Downtime Downtime due to inside malicious acts Downtime due to outside malicious acts Downtime due to non- malicious events 20% 5% 75% Source: Tripwire Industry Research
7
Network Downtime: Causal Factors Network and application downtime can result from a variety of factors. Based on IDC research, the chart below provides an analysis of network downtime (i.e., complete failure, significant latency, or only partial availability) casual factors for organizations with greater than 1,000 employees. On average, the LAN experienced downtime between 2 – 3 hours per month, while the WAN experienced downtime of similar length. Causal factors include: (1) Environmental, (2) Operator Error, (3) Application Failures, and (4) Malicious Events. IDC analysis indicates fully 97% of network downtime is due to non- malicious events.
8
Benefits of Data Integrity Assurance Data Integrity Assurance benefits your company by: Establishing a Foundation for Data Security Lowering Costs Maximizing System Uptime Providing Increased Control and Stability In a rapidly changing, highly unpredictable environment, Tripwire is the only way of knowing, for certain, that your data is safe and your systems remain uncompromised. Data Integrity Assurance benefits your company by: Establishing a Foundation for Data Security Lowering Costs Maximizing System Uptime Providing Increased Control and Stability In a rapidly changing, highly unpredictable environment, Tripwire is the only way of knowing, for certain, that your data is safe and your systems remain uncompromised.
9
Who Recommends Tripwire? The NSA 60 Minute Network Security Guide published by the National Security Agency The CERT ® Guide to System and Network Security Practices written by Julia H. Allen State of the Practice of Intrusion Detection Technologies by CERT Coordination Computer Security Handbook Windows 2000 Security Handbook System Administration, Networking and Security (SANS) Institute Practical Unix and Internet Security Handbook for Computer Security Incident Response Teams The NSA 60 Minute Network Security Guide published by the National Security Agency The CERT ® Guide to System and Network Security Practices written by Julia H. Allen State of the Practice of Intrusion Detection Technologies by CERT Coordination Computer Security Handbook Windows 2000 Security Handbook System Administration, Networking and Security (SANS) Institute Practical Unix and Internet Security Handbook for Computer Security Incident Response Teams
10
What is Data Integrity ? Assuring that the object (files, systems registry) and infrastructure items (server data, Web page content, router configurations etc.) remain in a desired good state. Deviations from the desired state are identified via an integrity check. Alerts will be generated and routed to the appropriate parties, and other software systems, enabling rapid recovery. Assuring that the object (files, systems registry) and infrastructure items (server data, Web page content, router configurations etc.) remain in a desired good state. Deviations from the desired state are identified via an integrity check. Alerts will be generated and routed to the appropriate parties, and other software systems, enabling rapid recovery.
11
Maximizing IT Security and Reliability Challenge:Security My job is on the line due to data security issues Goal:MaximizeROI Tripwire sets the foundation for an effective security strategy Challenge:Discovery Challenge:Audit Challenge:Control Challenge:Resources Challenge:Confidence Something’s wrong. And, we don’t know what or where to start Tripwire pinpoints exact changes, allowing for rapid remediation I have to comply with internal and external requirements and regulations Tripwire provides a tamper-proof record of system status, with audit trail of changes I have to be able to document and explain everything I do to my systems Tripwire detects all changes to systems and provides a framework for documentation I’m expected to scale capacity and maintain service levels with fewer people & a lower budget Tripwire increases staff productivity and leverages existing IT investment I need to know that my systems can be trusted and demonstrate that to others Tripwire ensures trust by verifying and confirming that systems are in a known good state
12
Where will you deploy Tripwire? Enterprise integrity at each and every point…. Web/E-commerce Servers DNS Servers Application Servers Firewalls File and Print Servers Database Servers Email Servers
13
How Does Tripwire Work? SSL Tripwire Manager Email Syslog SNMP 1. Take digital snapshot of existing files 2. Take a second digital snapshot later in time to compare 3. Any integrity violations are reported in various formats
14
Supported Platforms Tripwire Manager Solaris 7 & 8 Microsoft Windows NT 4.0 - Workstation, Serer, Enterprise Server Windows 2000 -Professional, Server and Advanced Server Tripwire for Servers Solaris (Sparc) 2.6-7, 8 Microsoft Windows NT 4.0 - Workstation, Serer, Enterprise Server Windows 2000 -Professional, Server and Advanced Server Windows XP HP-UX 10.2, 11.0, 11i Compaq Tru64 UNIX 4.0F, 4.0G, 5.0A, 5.1 and 5.1A IBM AIX 4.3, 4.3.3 FreeBSD 4.3 Linux – Various distributions, kernel 2.2 and 2.4
15
Tripwire Protects Itself El Gamal 1024-bit asymmetric cryptography Four message-digest algorithms used to insure data integrity MD5 Haval SHA/SHS CRC 32 Authentication and Encryption Between Manager and Server All data transmission uses SSL (Secure Socket Layer) 168 Triple DES Encryption Built On Strong Security Technology
16
What does Tripwire Monitor? Permissions Inode number Number of links (i.e. inode reference count) User ID of owner Group ID of owner File type File size File is expected to grow Device number of the disk on which the inode is stored Permissions Inode number Number of links (i.e. inode reference count) User ID of owner Group ID of owner File type File size File is expected to grow Device number of the disk on which the inode is stored Device number of the device to which the inode points. Number of blocks allocated Access timestamp Modification timestamp Inode creation / modification timestamp CRC-32 hash of the data MD5 hash of the data SHA hash of the data HAVAL hash of the data Unix File System
17
What does Tripwire Monitor? Archive flag Read only flag Hidden flag Offline flag Temporary flag System flag Directory flag Last access time Last write time Create time File size Archive flag Read only flag Hidden flag Offline flag Temporary flag System flag Directory flag Last access time Last write time Create time File size MS-DOS 8.3 name NTFS Compressed flag NTFS Owner SID NTFS Group SID NTFS DACL NTFS SACL Security descriptor control Size of security descriptor for this object 0 to 4 hashes of the default data stream Number of NTFS data streams 0 to 4 hashes of non-default data streams Windows NT/2000 File System
18
What does Tripwire Monitor? Registry type: key or value Owner SID Group SID DACL SACL Name of class Number of subkeys Maximum length of subkey name Maximum length of classname Number of values Maximum length of the value name Registry type: key or value Owner SID Group SID DACL SACL Name of class Number of subkeys Maximum length of subkey name Maximum length of classname Number of values Maximum length of the value name Maximum length of data for any value in the key Security descriptor control Size of security descriptor Last write time Registry type: key or value Type of value data Length of value data CRC-32 hash of the value data MD5 hash of the value data SHA hash of the value data HAVAL hash of the value data Windows NT/2000 Registry
19
Tripwire Manager Powerful, easy-to-use software for managing up to 2500 Tripwire for Servers installations Centralized management and easy distribution of policies See changes over your entire enterprise by object, violation type or group Centralized analysis allows you to: Quickly assess which systems have been changed Correlate changes across multiple systems Powerful, easy-to-use software for managing up to 2500 Tripwire for Servers installations Centralized management and easy distribution of policies See changes over your entire enterprise by object, violation type or group Centralized analysis allows you to: Quickly assess which systems have been changed Correlate changes across multiple systems
20
Tripwire Manager 3.0 Tripwire Manager Features: Tripwire Manager Architecture NT or UNIX NT or UNIX Tripwire for Servers Tripwire for ServersNT/2000 NT/2000 UNIX UNIX Tripwire Manager Commands SSL Reports Data Centralized reporting Centralized policy management Edit & distribute configuration file Edit & distribute policy file Execute manual integrity checks Update Tripwire database Centralized scheduling Centralized reporting Centralized policy management Edit & distribute configuration file Edit & distribute policy file Execute manual integrity checks Update Tripwire database Centralized scheduling
21
Active vs. Passive Tripwire Managers Tripwire Manager Active Tripwire for Servers Tripwire Manager Passive Multiple Tripwire Managers monitoring the same set of Tripwire for Servers Active Tripwire Manager has complete management control Passive Tripwire Manger has view only control Active control is passed when Tripwire Manager is shut down Can have only one active connection for each TFS Multiple Tripwire Managers monitoring the same set of Tripwire for Servers Active Tripwire Manager has complete management control Passive Tripwire Manger has view only control Active control is passed when Tripwire Manager is shut down Can have only one active connection for each TFS
22
Key Benefits of Tripwire Faster discovery and diagnosis problems Results in faster remediation and less down time Augments other security and systems management Helps you maximize the effectiveness of your IT investments Identifies changes, regardless of source or intent Doesn’t rely on known patterns or signatures Detects accidental and malicious changes Peace of mind Helps you know which systems you can trust, and which ones you can’t Faster discovery and diagnosis problems Results in faster remediation and less down time Augments other security and systems management Helps you maximize the effectiveness of your IT investments Identifies changes, regardless of source or intent Doesn’t rely on known patterns or signatures Detects accidental and malicious changes Peace of mind Helps you know which systems you can trust, and which ones you can’t
23
In Summary Tripwire… -Is the foundation for an effective security strategy and assures the integrity of data wherever it resides across your network. -Gives you control over your IT infrastructure by quickly pinpointing areas of change to enable fast, effective remediation. -Is the standard for data integrity assurance and the trusted choice in 92 countries around the world. Tripwire… -Is the foundation for an effective security strategy and assures the integrity of data wherever it resides across your network. -Gives you control over your IT infrastructure by quickly pinpointing areas of change to enable fast, effective remediation. -Is the standard for data integrity assurance and the trusted choice in 92 countries around the world.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.