510 likes | 725 Views
Vulnerability Management Solutions. Harold Toomey Product Manager 13 August 2001. Agenda. Importance of Security Security Policy Security Management Web access management Vulnerability management Intrusion detection Symantec Products ESM – OS Security Web Server Security
E N D
Vulnerability Management Solutions Harold Toomey Product Manager 13 August 2001
Agenda • Importance of Security • Security Policy • Security Management • Web access management • Vulnerability management • Intrusion detection • Symantec Products • ESM – OS Security • Web Server Security • Database Security • Symantec NetRecon – Network Security • Questions and Answers
Company A Market Trends • Source – Business Week August 28th 2000 A transformation of the Corporate enterprise Company B 20th Century Corporation 21st Century Corporation • As technology has changed the way we do business, it changes the way we think about security • No longer about keeping people out, but letting people in….
Microsoft hacked Wide-spread Denial-of-Service Attacks (Yahoo!, eBay) “Zombies” appear SATAN is released Morris Internet Worm Evolution of Network Intrusions Source: CERT, Carnegie Mellon University
2001 CSI/FBI Computer Crime and Security Survey Average Reported Losses $4.42 M $4.45 M $454K $322K $275K Outside System Penetration Sabotage and Denialof Services UnauthorizedInsiderAccess Financial Fraud Theft of Proprietary Information Mar 12, 2001
Risk Remains High • $1.6 TRILLION - Estimated worldwide loss in 2000 due to downtime resulting from security breaches and virus attacks. (InformationWeek) • $266 BILLION - Estimated cost of damages caused by viruses and computer cracking in U.S. firms in 2000. (InformationWeek) • 42% of computers checked were still not running anti-virus software. 32% were infected. (Symantec SecurityCheck) • 12:1 - Ratio of the number of times on-line merchants suffer credit card fraud compared to the off-line, bricks-and-mortar counterparts. (Gartner Group)
*
Web Server Security Threat “Web Server Security has been at the forefront of the news throughout the last month, with the archive site attrition.org announcing that it had received a list of around 9,000 Microsoft-IIS sites that had been successfully been taken control of by attackers. • … Recently it has been receiving over 100 reports of successful attacks in a single day, more than for the entire years of 1995 & 1996.” • Source: http://www.netcraft.com/survey/ (Jun 2001)
Web Site Defacements Source: attrition.org
Policy Standards Procedures, Guidelines & Practices Policy is Key to Security • Mandate to implement security • Standard to measure security • Basis for all security technology and procedures
Confidentiality Who sees the data? Integrity Has the data been tampered with? Availability Can I access the server or data when I need it? Security Objectives
No Need to Start from Scratch Rather than analyzing every risk, look at what others are doing Meet standard of due care Use existing standards and “Best Practices” Pay attention to regulations and requirements • Government • Industry • Partner
Standards for Operational Security • BS7799 security requirements established by the British Government (ISO 17799) • SAS 70 and SysTrust requirements established by the AICPA • FISCAM requirements established by GAO for federal govt. • COBIT requirements established by Information Systems Audit and Control Association (ISACA) • IETF Site Security Handbook and User Security Handbook • The Top Ten Internet Security Threats from SANS • VISA's ten requirements for 21,000 organizations that carry the VISA logo • Future – Minimum standards of due care from The Center for Internet Security, a new world-wide standards consortium
Visa’s “Ten Commandments” • 1. Install and maintain a working network firewall to protect data accessible via the Internet • 2. Keep security patches up-to-date • 3. Encrypt stored data accessible from the Internet • 4. Encrypt data sent across networks • 5. Use and regularly update anti-virus software • 6. Restrict access to data by business "need to know" • 7. Assign unique IDs to each person with computer access to data • 8. Track access to data by unique ID • 9. Don't use vendor-supplied defaults for system passwords and other security parameters • 10. Regularly test security systems and processes Source: www.visabrc.com
Regulations forOperational Security • FDIC and OCC regulations for banking industry • HIPAA regulations for health care industry • SEC regulations for brokerage industry • DoD regulations for military commands and contractors • FDA regulations for pharmaceutical companies • NASA requirements for all its facilities and contractors • 1974 Privacy Act with amendments
Metrics for Security Effectiveness • Measuring Policy Compliance • Percent of organization following policy • Number of exemptions granted • Measuring Resistance and Response to Attack • Number of holes found by vulnerability scan • Percent of attacks detected during penetration test • Percent of detected attacks with proper response/report • Percent of attempted attacks that succeeded If you want to manage something, you have to be able to measure it.
Web Server Customers File Servers Partners Database Servers Branch Office Groupware Servers Modems WirelessDevice Telecommuters Web Access Management Firewall E-mail servers
Hacker Traditional Web Access Management Web Users & Internet Service Network (DMZ) Web Servers & Content Firewall Application Servers Application Servers Secure (Trusted) Network DB DB Auth. DB Auth. DB
Web Users & Internet Service Network (DMZ) Proxy Server PKI Auth Agent Firewall LDAPAuth Agent Other Auth Agents NT Auth Agent Central Management Server Secure (Trusted) Network Authentication Mechanism(s) Web Servers & Content Secure Web Access Management
Authentication • Username/password most common • Can be stolen or frequently cracked • Use SSL or similar web technology • Two-factor authentication is stronger • Hardware token, smartcard, etc. • Soft token, digital certificate • Biometric
Web Server Customers File Servers Partners Database Servers Branch Office Groupware Servers Modems WirelessDevice Telecommuters Vulnerability Management – Policy Compliance Firewall
Some Typical Vulnerabilities • Password strength • Out-of-date patch levels • Account settings • Network parameters • NT RAS, NIS, UNIX .rhosts files, ftp, telnet • File protections • Improperly changed files • O/S specific problems • Windows NT registry, NetWare NDS, UNIX suid files, etc. • Improper CGI and other web vulnerabilities • Presence of DDoS “Zombie” code G. Mark Hardy
Probe for Vulnerabilities Web Server Firewall Customers Probe for Vulnerabilities Partners File Servers Branch Office Database Servers Groupware Servers Modems WirelessDevice Telecommuters Vulnerability Management –Vulnerability Scanning
IDS Hacker Web Server Customers File Servers Partners Database Servers Branch Office Groupware Servers Modems WirelessDevice Telecommuters Detect Intruders Firewall
Internet Network IDS Host IDS Network and Host IDS Partnership • Phase 1 • Discover & • Map • Automated Scanning & Probing • Phase 2 • Penetrate • Perimeter • Denial of Service • Spoofing • Protocol exploits • Web appl. attack • Phase 3 • Attack/Control • Resources • Password attacks • Privilege grabbing • Theft • Audit trail tampering • Admin. changes • Vandalism • Trojan horses
Host-Based Network-Based Vulnerability Management Enterprise Security Manager Symantec NetRecon Intrusion Detection Intruder Alert NetProwler VM and IDS Matrix • Symantec provides all important components to comprehensive security
Enterprise Security Manager • Comprehensive security “health check” of the enterprise from a central location. • Automatically discovers and reports vulnerabilities, including areas that do not comply with security policy. • Identify systems that are at risk or non-compliant. • Consistent, automated, repeatable, on-demand mechanism. • Provide baseline and measures by which to manage security. Enterprise Security Manager (ESM) is the worldwide leader in host-based Vulnerability Assessment with 68% market share according to IDC. Also, ESM has recently won Secure Computing Magazine’s Academy Award for Best SecurityManagement product. G. Mark Hardy
ESM: Manager/Agent Architecture GUI Code Code Code Network Code Code Code Code Manager
ESM Managers with Agents ESM Console ESM - Scales to Virtually any Enterprise ESM Agents
Symantec NetRecon • Gain a hacker’s eye view of the network. • Vulnerability assessment with root cause analysis - leads you to the real problem, not the symptoms • Unique path analysis illustrates exact sequence of steps to uncover vulnerability • Progressive scanning technology uses information from part of the scan to search deeper for weaknesses. • Shares information like a Tiger Team NetRecon, in conjunction with ESM, leads the Vulnerability Assessment space with 39% market share according to IDC. Secure Computing Magazine gave NetRecon a four-star overall rating, and recognized it as “capable of discovering more potential vulnerabilities than the competition in certain situations.” G. Mark Hardy
Holistic view of network Searches deeper for network weaknesses Correlates vulnerabilities across systems to demonstrate how related vulnerabilities can lead to attack Shows how low- and medium-risk problems combine to make high-risk problems Uncovers vulnerabilities that other scanners don’t find Enhanced performance provided by parallel objectives Runs faster by filtering out redundant risks NetRecon w/ Progressive Scanning Technology
Key Features & Benefits • Progressive Scanning • Scans entire network as a whole, not just each system in isolation to the others like other scanners • Uses information found on one system to penetrate the other systems • Path Analysis • Illustrates the exact sequence of steps taken to uncover a vulnerability • Helps the security administrator to pin-point the root cause of the vulnerabilities • Live Update™ • Incorporates Symantec’s renowned Live Update technology to deliver new vulnerability checks • Integrated Password Cracking • Actually cracks encrypted passwords as it scans • Enterprise Support • Is unique in that it also scans non-IP based networks, such as NetWare’s IPX/SPX and NetBEUI protocols • Is tightly integrated with ESM
Integrated Host- & Network-Based Security Assessment • Security is an on-going process • Assessment gives you a baseline from which to build • Two approaches to vulnerability assessment • Host-based (“privileged access”) • Network-based (“hacker’s view”) • Each has it’s own benefits and limits • Comprehensive vulnerability assessment includes a combination of both approaches • “…a combination of network- and host-based is critical. If you’re doing just one or the other, you’re missing half the elements." • InformationWeek, May 29, 2000
Routers Web Servers Applications (ERP, CRM) Firewalls Databases ESM Application Security • ESM leads the market in OS-level security, vulnerability assessment and policy compliance • Now it is addressing mission-critical e-business components: • Integrate both host-based and network-based assessment for comprehensive coverage
Application-level security Network Components NetRecon Firewalls e-Mail Servers Applications Web Servers Databases NAV Servers WAP Servers Single integrated view Operating System security ESM Application Security Modules Architecture Operating Systems
ESM for AntiVirus NetRecon ESM for WebServers ESM for Oracle Operating Systems Current ESM Modules • Implementation • Uses best of host-based and network-based technologies to provide complete assessment coverage
Symantec NetRecon 3.5 Integration • Benefits • Displays NetRecon scan data in ESM Console • Provides a central view of both host-based and network-based assessment and vulnerability data • Integrates NetRecon data into ESM reports • ESM policies can launch NetRecon scans using ICE • Provides trend analysis and other ESM features • Each release gets more integrated with ESM • .NRD file (v2.0) • CLI / ESM Console using ICE (v3.5) • Vulnerability correlation (future)
ESM for WebServers • Features • Network-based approach (hacker’s view) • Coverage of all major web servers and OSs • Apache • NT, W2K, XP • Microsoft IIS • Redhat Linux • Netscape •Unix (Solaris, AIX, HP-UX) • Addresses SANS / FBI Top 10 Internet Vulnerabilities • Combination of ESM host OS agent + ESM for WebServers = Comprehensive coverage
Shell Whois Printer FTP CGI / HTTP (20, 21) (80, 8080) Echo POP3 DNS Name Login Netstat Gateway Login SMTP Assessment Methodology Web Server
Best Practice Configuration • Install an ESM Agent on each web server for host-based checks • Covers ~80% of vulnerabilities • Ensures proper policy compliance • OS patches module most critical • Install ESM for WebServers on a separate NT workstation, preferably on the same segment as the web server(s) • Covers ~20% of remaining vulnerabilities • ESM policy options • One web server per policy for tight data correlation • Multiple web servers per policy to assess a web server farm
ESM for Oracle • Features • First host-based database vulnerability assessment product on the market • Integrates into ESM at the application level • Supports Oracle versions 7.3.x – 8.0.6 • Supported host systems • Sun Solaris 2.4 – 2.6 • IBM AIX 4.1 – 4.3.1 (RS6000) • HP-UX 10.20 – 11.x • Digital Unix OSF1-AXP v4.0d • Oracle 7.3.4 only
ESM for Oracle • Benefits • Extends policy compliance and management to critical systems • Assesses database for known vulnerabilities • Integrates database security into enterprise policy management picture
dB Inst. 1 dB Inst. 2 dB Inst. 3 ESM for Oracle Oracle Server (Unix) Securing Oracle Instances Each Oracle instance may have different priority levels and different security vulnerabilities… ESM Console ESM Manager ESM Agent
ESM for Oracle Database Checks • Coverage of key vulnerabilities associated with Oracle RDBMS • Eight Oracle RDBMS assessment groups • Access Group • Accounts Group • Auditing Group • File Attributes Group • Passwords Group • Roles Group • Startup Group • Table Attributes Group • Each group contains multiple key vulnerability checks
ESM for NAV Servers • Benefits • Best Practice policies to secure Norton Anti-Virus Corporate Edition servers • Shows synergy and value between Symantec and AXENT product integration • Free to maintenance paying ESM customers
Client PC Client PC Client PC ESM for NAV Servers Architecture Client PC Client PC Client PC … ESM Enterprise Console ESM Manager - ESM for NAV CE Server - ESM Agent - ESM for NAV Servers Best Practice Policy - Client PCs - ESM Agents
Security Updates SWAT Security Update Program • What: • Team of Security Professionals conducting research on vulnerabilities and delivering detection and countermeasure capabilities to IDvA products. • How: • Security Updates are deployed via the web and Live Update. • Frequency: • ESM Security Updates are released quarterly. • NetRecon Security Updates are released monthly. • In emergencies (DDoS, Trin00, etc.), updates are available within several hours. • Track Record (2000): • ESM Security Updates added 260 new checks. • NetRecon Security Updates added 350 new checks. • ESM for WebServers added 246 new checks.
Final Thoughts • The SANS' Top Ten list identified CGI vulnerabilities as the #2 issue • Security analysts who conduct penetration studies indicate that 80% of break-ins occur because of: • 1) Out-of-date, unpatched systems and applications • 2) Easy-to-guess passwords • “For cyber security, 47% of consumers would like enhanced Web site security measures, safeguards for credit card information and privacy policies.” (USA Today Snapshots – Nov. 27, 2000) • Follow best practices to achieve due care • Implement process to manage policy and incidents