+ All Categories
Home > Documents > Continuous Monitoring with the 20 Critical Security Controls

Continuous Monitoring with the 20 Critical Security Controls

Date post: 06-Jan-2016
Category:
Upload: wyanet
View: 26 times
Download: 3 times
Share this document with a friend
Description:
Continuous Monitoring with the 20 Critical Security Controls. SPO1-W02. Wolfgang Kandek CTO. We called 2013 the year of the data breach…. …but 2014 started in much the same spirit…. Background. Open System Administration Channels Default and Weak Passwords End-user has Admin Privileges - PowerPoint PPT Presentation
Popular Tags:
46
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO
Transcript
Page 1: Continuous Monitoring with the 20 Critical Security Controls

SESSION ID:

Continuous Monitoring with the 20 Critical Security Controls

SPO1-W02

Wolfgang KandekCTO

Page 2: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

2

We called 2013 the year of the data breach…

Page 3: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

3

…but 2014 started in much the same spirit…

Page 4: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Background

Open System Administration Channels

Default and Weak Passwords

End-user has Admin Privileges

Outdated Software Versions

4

Page 5: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Outdated Software Versions

5

EDB+MSP

Metasploit

Exploit DB

CVSS 10

Random

0% 5% 10% 15% 20% 25% 30% 35%

Vulnerability Breach Use Probability

Page 6: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Background

Open System Administration Channels

Default and Weak Passwords

End-user has Admin Privileges

Outdated Software Versions

Non-Hardened Configurations

=> Flaws in System Administration

6

Page 7: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

7

Page 8: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

8

Page 9: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industryexpert input

9

Page 10: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

10

Page 11: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

11

Page 12: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industryexpert input

International Participation

12

Page 13: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industryexpert input

International Participation

13

Page 14: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

5 Tenets

14

Page 15: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

5 Tenets 20 CSC

Offense informs Defense

Prioritization

Metrics

Continuous Diagnostics and Mitigation

Automation

15

Page 16: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

5 Tenets 20 CSC

Offense informs Defense

Prioritization

Metrics Continuous Diagnostics and Mitigation

Automation

16

Page 17: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

5 Tenets

Prioritized

17

Page 18: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

5 Tenets

Prioritized

18

Page 19: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

5 Tenets

Prioritized

Implementation Guidelines

19

Page 20: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Solution

20 Critical Security Controls

What works in Security?

Owned by the Council on Cybersecurity With widespread industry expert input

International Participation

5 Tenets

Prioritized

Implementation Guidelines = Quick Wins, Visibility/Attribution, Configuration/Hygiene, Advanced

20

Page 21: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementation Guidelines

21

Page 22: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementation Guidelines

Quick Win 1 - Control 1 – HW Inventory Implement an automated discovery engine (active/passive)

Quick Win 3 – Control 2 – SW Inventory Scan for Deviations from Approved List

Quick Win 3 – Control 3 – Secure Configurations Limit Admin privileges

Quick Win 10 – Control 4 – Vulnerability Scanning Risk rate by groups

22

Page 23: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementation Guidelines

Measure Success Control 1: Detect new machines in 24 hours

Control 1: How many unauthorized machines on network?

Control 2: How many unauthorized software packages installed?

Control 3: Percentage of machines that do not run an approved image ?

Control 4: Percentage of machines not scanned recently (3d)?

23

Page 24: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

QualysGuard, API, PERL, Splunk

Daily Authenticated Scan of Network

Scripted API Access and Load

24

Page 25: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

25

Page 26: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

Logins - user, date, type

Scans - user, date, type, target, duration

Reports - user, date, type, duration, size

Hosts – machine, date, active, fixed, severity counts, scores

Vulnerabilities – id, severity, cvss, age

Software – name, publisher

Certificates – subject, validdate, signer, self-signed

Ports – date, ports

26

Page 27: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

Logins - user, date, type

Scans - user, date, type, target, duration

Reports - user, date, type, duration, size

Hosts – machine, date, active, fixed, severity counts, scores

Vulnerabilities – id, severity, cvss, age

Software – name, publisher

Certificates – subject, validdate, signer, self-signed

Ports – date, ports

27

Page 28: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Implementing Quick Wins - Prototype

QualysGuard, API, PERL, Splunk

Daily Authenticated Scan of Network

Scripted API Access and Load

Data Transformation in Scripts Scoring – Dept. State CVSS based

Data Promotion Software, Patches, MAC address

Splunk for Reports and Graphing

28

Page 29: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC1 – HW Inventory - Quick Win 1

Deploy Asset Inventory Discovery Tool (active/passive)

Goal: Discover new machines within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for new Machines ~ where the earliest scandate is within the last day

29

Page 30: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC1 – HW Inventory - Quick Win 1

Asset Inventory Discovery Tool (active/passive)

Discover new machines within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for new Machines

30

Page 31: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for new Server Ports ~ where the earliest scandate is within the last day

31

Page 32: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

32

Page 33: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for new Software ~ where the earliest scandate is within the last day

33

Page 34: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for new Server Ports ~ where the earliest scandate is within the last day

Query Splunk for new Software

34

Page 35: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC2 – SW Inventory - Quick Win 3

Discover Unauthorized Software

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for new Software ~ where the earliest scandate is within the last day

Can be Alerted On

35

Page 36: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC3 – Secure Configuration

Automation: Discover Non Standard Setups

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for certain SoftwareMarker Here: “Qualys Desktop Build” – which is a custom SW package

that identifies our IT standard builds

36

Page 37: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC3 – Secure Configuration

Automation: Discover Non Standard Setups

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for certain SoftwareMarker Here: “Qualys Desktop Build” – which is a custom SW packag

that identifies out IT standard builds

37

Page 38: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

CSC3 – Secure Configuration

Automation: Discover Non Standard Setups

Goal: Within 24 hours

Daily Active Scan of the Network -> Splunk

Query Splunk for certain Software Marker Here: “Qualys Desktop Build” – which is a custom SW package

that identifies out IT standard builds

Can be Alerted On

38

Page 39: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

39

Page 40: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

40

Page 41: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

Plot Progress for a Network

41

Page 42: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Further Uses and Projects

Plot Progress for a Machine

42

Page 43: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Other Operational Reports

Usage Reporting User Logins

API Logins

Reports

Anomaly Detection GeoIP

43

Page 44: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Other Operational Reports

Usage Reporting User Logins

API Logins

Reports

Anomaly Detection GeoIP

44

Page 45: Continuous Monitoring with the 20 Critical Security Controls

#RSAC

Beyond Prototyping

Continuous Monitoring

Alert on Additions & Changes Machines

Vulnerabilities

Ports

Certificates

Simple Configuration

45

Page 46: Continuous Monitoring with the 20 Critical Security Controls

Questions?

[email protected]@wkandekhttp://laws.qualys.com


Recommended