mnescot controls monitoring

51
Drupal Security Controls and Monitorin Mike Nescot, JBS International

Upload: mnescot

Post on 06-May-2015

183 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Mnescot controls monitoring

Drupal Security Controls and Monitoring

Mike Nescot, JBS International

Page 2: Mnescot controls monitoring

Drupal Security Controls and Monitoring

Mike Nescot, JBS International

http://drupal.jbsinternational.com

Page 5: Mnescot controls monitoring

SP800-53 Rev 4 Security Controls: 18 Families

• Access Control• Awareness & Training• Audit & Accountability• Security Assessment & Authorization• Configuration Management• Contingency Planning• Identification & Authorization• Incident Response• Maintenance

Page 6: Mnescot controls monitoring

SP800-53 Rev 4 Security Controls: 18 Families (con.)

• Media Protection• Physical and Environmental Protection• Planning• Personnel Security• Risk Assessment• System and Services Acquistion• System & Communications Protection• System & Information Integrity• Program Management

Page 7: Mnescot controls monitoring

SP800-53 Rev 4 Privacy Controls: 8 Families (FEA)

• Authority & Purpose• Accountability, Audit, & Risk Management• Data Quality & Integrity• Data Minimization & Retention• Individual Participation & Redress• Security• Transparency• Use Limitation

Page 8: Mnescot controls monitoring

Anatomy of a Control

• Account Management• Control count: from 198 to 267, or 600 to 850• More tailoring guidance, overlays, focus on

assurance controls, strategic, privacy

Page 9: Mnescot controls monitoring

SANS Top 20

• Inventory of Authorized and Unauthorized Devices• Inventory of Authorized and Unauthorized Software• Secure Configurations for Hardware & Software on Laptops,

Workstations, & Servers• Continuous Vulnerability Assessment and Remediation• Malware Defense• Application Software Security• Wireless Device Control• Data Recovery Capability• Security Skills Assessment & Training• Secure Configurations for Firewalls, Routers, & Switches

Page 10: Mnescot controls monitoring

SANS Top 20 (cont)

• Limitation & Control of Network Ports, Protocols, & Services• Controlled Use of Administrative Privileges• Boundary Defense• Maintenance, Monitoring, & Analysis of Audit Logs• Controlled Access Based on Need to Know• Account Monitoring & Control• Data Loss Prevention• Incident Response & Management• Secure Network Engineering• Penetration Testing & Team Exercises

Page 11: Mnescot controls monitoring

SANS Top 20

The five critical tenets of an effective cyber defense system as reflected in the Critical Controls are:• Offense informs defense: Use knowledge of actual attacks for

defense• Prioritization: Invest first in controls that will provide the

greatest risk reduction and protection • Metrics: Establish common metrics to measure effectiveness• Continuous monitoring: Test and validate the effectiveness

of current security measures.• Automation: Automate defenses, achieve reliable, scalable,

and continuous measurements

Page 12: Mnescot controls monitoring

State of Required Security Controls

• Newly updated: NIST SP-53 Rev 4 • SANS Top 20 Controls• Build it Right (SDLC), Continuous Monitoring• 2011: NIST SP 800-137

Page 13: Mnescot controls monitoring

Information Systems Continuous Monitoring (ISCM)

• Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.

• From compliance driven to data driven risk management

Page 14: Mnescot controls monitoring

Conventional

• Hostile cyber attacks• Natural disaster• Structural failures• Human errors of omission or commission• Strong Foundation

Page 15: Mnescot controls monitoring

Advanced Persistent Threat

• Significant expertise• Multiple attack vectors• Establishes footholds

Page 16: Mnescot controls monitoring

Continuous Asset Evaluation, Situational Awareness, and Risk

Scoring (CAESARS)

• Reference Architecture: Security Automation Standards

• Data Sources• Data Collection• Data Storage & Analysis• Consumer Presentation• Decisions

Page 17: Mnescot controls monitoring

CAESARS Subsystems

• Sensor (Assets, devices, servers, devices, appliances)

• Database Sub (repository of configuration and inventory baselines)

• Analysis/Scoring• Presentation (variety of views, query

capabilities)

Page 18: Mnescot controls monitoring
Page 19: Mnescot controls monitoring

CAESARS

The end goal of CAESARS FE is to enable enterprise CM by presenting a technical reference model that allows organizations to aggregate collected data from across a diverse set of security tools, analyze that data, perform scoring, enable user queries, and provide overall situational awareness.

Page 20: Mnescot controls monitoring

Establish

• Metrics: number and severity of vulnerabilities, unauthorized access attempts, contingency plan testing results, risk scores for configuration

• Monitoring and assessment frequencies: volatility, impact levels, identified weaknesses, threat info, vulnerabilit info, assessment results, strategic reviews, reporting requirements

Page 21: Mnescot controls monitoring

Logging vs. Auditing vs. Monitoring

• Logging: Collecting event records• Event: single occurance involinvg an attempted state

chabge• Message: what a system does or generates in response

to request or stimulus• Timestamp, source, data• Auditing: System is behaving as expected, compliance• Monitoring: Situational awareness• Log all you can, but alert on what you must respond

(monitor as little as you need)

Page 22: Mnescot controls monitoring

Logging Formats and Standards

• Syslog• XML (SCAP)• Relational Database• NoSQL Database (Hadoop, MongoDB)• Binary (Windows Event Log)

Page 23: Mnescot controls monitoring

NIST: Security Automation Domains

• Vulnerability Management• Patch Management• Event Management• Incident Management• Malware Detection• Asset Management• Configuration Management• Network Management• License Mangement• Information Management• Software Assurnce

Page 24: Mnescot controls monitoring

Monitoring Targets: Objects System Boundary

• Web Server Status• Database Server Status• Operating System• File system changes (HIDS)• Network Traffic • Network Devices (Firewalls, routers,

switches)• Vulnerabilities• Drupal application(s)

Page 25: Mnescot controls monitoring

Monitoring Targets: Metrics

• Adverse Events • Performance & Reliability• Configuration Compliance • Authorized devices and services • Vulnerabilities • Risk

Page 26: Mnescot controls monitoring

Minimize Monitoring

• Cloud & virtualization• Integrate development, design, operations,

acquisition• Centralized, Application-Centric View

Page 27: Mnescot controls monitoring

Integration: Continuous Continuum

• Continuous Quality Improvement• Continuous Integration• Continuous Delivery• Continuous Design• Continuous Monitoring

Page 28: Mnescot controls monitoring

From Standard Monitoring :

Page 29: Mnescot controls monitoring
Page 30: Mnescot controls monitoring

To Focused, Application-Centric

Monitoring:

Page 31: Mnescot controls monitoring
Page 32: Mnescot controls monitoring

Security Monitoring Capability Levels

• Centralized Logging• Infrastructure Monitoring• Security Information and Event Management

(SIEM): Risk Assessment• Real-Time Intelligent Query

Page 33: Mnescot controls monitoring

Drupal Monitoring Assets

• Watchdog: SQL, MongoDB or Syslog• Infrastructue: Nagios Module/Plugin

Infrastructure Monitoring– Production Check/Monitor

• SIEM: OSSIM Plugin (Watchdog) SIEM• Search Enhancements: Logstash Module,log

collection, centralization, parsing, storage and search

Page 34: Mnescot controls monitoring

Network & Infrastructure Monitoring (Nagios)

• monitoring and alerting • servers• switches • applications • Services• Status: availability, load, physical condition

Page 35: Mnescot controls monitoring

Security Information and Event Management (SIEM)

• Intrusion Detection• Anomaly Detection• Vulnerability Detection• Discovery, Learning and Network Profiling systems• Inventory systemsIncident Reporting & Responese

Page 36: Mnescot controls monitoring

Open Source Security Information Management (OSSIM)

• Asset Discovery• Vulnerability Assessment• Threat Detection• Behavioral Monitoring• Security Intelligence

Page 37: Mnescot controls monitoring

OSSIM Components

• Snort (Network Intrusion Detection System)• • Ntop (Network and usage Monitor)• • OpenVAS (Vulnerability Scanning)• • P0f (Passive operative system detection) fingerprint OS• • Pads (Passive Asset Detection System) complements SNORT

with context• • Arpwatch (Ethernet/Ip address parings monitor)• • OSSEC (Host Intrusion Detection System)• • Osiris (Host integrity Monitoring)• • Nagios (Availability Monitoring)• • OCS (Inventory)

Page 38: Mnescot controls monitoring

Drupal Monitoring Assets

• Watchdog: logdb/SQL, MongoDB or Syslog• Infrastructure: Nagios Module/Plugin

Infrastructure Monitoring– Production Check/Monitor

• SIEM: OSSIM Plugin (Watchdog) SIEM• Search Enhancements: Logstash Module: log

collection, centralization, parsing, storage and search

Page 39: Mnescot controls monitoring
Page 40: Mnescot controls monitoring

Core Nagios Monitoring

• Pending Drupal version update• Pending Drupal module updates• Unwritable 'files' directory• Pending updates to the database schema• Status of Cron• Number of published nodes.• Number of active users

Page 41: Mnescot controls monitoring
Page 42: Mnescot controls monitoring

Drupal Monitoring Assets

• Watchdog: SQL, MongoDB or Syslog• Infrastructure: Nagios Module/Plugin

Infrastructure Monitoring– Production Check/Monitor

• SIEM: OSSIM Plugin (Watchdog) SIEM• Search Enhancements: Logstash Modulelog

collection, centralization, parsing, storage and search

Page 43: Mnescot controls monitoring

OSSIM

Page 44: Mnescot controls monitoring

OSSIM, Nagios

Page 45: Mnescot controls monitoring

LogStash, Kibana, Elasticsearch

Page 46: Mnescot controls monitoring
Page 47: Mnescot controls monitoring

Software Defined Defined Infrastructure

• SDIM: Machine Configuration (Virtualization, Chef & Puppet), AWS, VMWare & OpenStack

• SDN: Software Defined Networking• SDS: Software Defined Storage• Software Defined Drupal Security?

Page 48: Mnescot controls monitoring
Page 49: Mnescot controls monitoring

Configuration & Patch Management

Security Content Automation Protocol (SCAP)

• Specifications for Security Data (baselines, xccdf, oval)

• Checklist Repository (USCGB)• NIST Validated Commercial tools• OpenSCAP • RH Satellite, Spacewalk

Page 50: Mnescot controls monitoring

SCAP Workbench

Page 51: Mnescot controls monitoring

Thank You!!!

Comments, Questions, Criticism?

http://drupal.jbsinternational.com

[email protected]