• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Qualys Webex 24 June 2008
 

Qualys Webex 24 June 2008

on

  • 580 views

 

Statistics

Views

Total Views
580
Views on SlideShare
577
Embed Views
3

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 3

http://www.linkedin.com 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Qualys Webex 24 June 2008 Qualys Webex 24 June 2008 Presentation Transcript

      • Using Qualys to manage risks in vulnerability scanning and patch and configuration management.
      • Vladimir Jirasek
      • DSG International plc
    • Content
        • About DSG International
        • DSGi PCI DSS requirements
        • Patch management standard
        • Qualys in facts
        • Feedback, issues and challenges
    • DSG International plc
        • DSG international is one of Europe's leading specialist electrical retailers.
        • We have more than 1,300 stores and on-line stores, spanning 28 countries and employing 40,000 people. More than 100 million customers shop in-store and on-line with us every year.
        • Grown by investing in Europe ’s largest electrical retailers
        • We own brads like Currys, PC World, Pixmania, The TechGuys, PC City, Electroworld, Elkjop
    • PCI DSS defines 4 levels of merchants source: http://www.pcistandard.com/merchantlevels.html # of transactions Review by Vulnerability scan Level 1 over 6m in any channel QSA ASV (e.g. Qualys) Level 2 1m - 6m in any channel self questionnaire ASV (e.g. Qualys) Level 3 20k-1m online transactions self questionnaire ASV (e.g. Qualys) Level 4 less then 20k online or up-to 1m in any channel self questionnaire (not mandatory) ASV (e.g. Qualys) (not mandatory)
    • DSGi ’s PCI DSS project
      • Programme started in Q2 2007
      • Gap analysis identified some control weaknesses
          • No system to fulfil requirements of PCI DSS v1.1:
          • 11.2 - external and internal vulnerability scanning
          • 6.6 - web application scanning
          • 2.2 - system hardening/configuration
      • DSGi ’s requirements for the system:
          • Approved Scaning Vendor (ASV) certified by PCI SSC
          • Software as a Service - no HW or SW to maintain
          • Minimum admin overhead
          • Scales to large international implementations
          • Easy to use with out of the box PCI DSS reports
          • Internal scanning managed via the same interface
          • Clear roadmap for compliance checking and web application scanning
    • System classification for patch management and risk management Internet Internal network Head office DMZ POS server mainframe eBusiness VPN GW acquirer setlement Network or Host IPS may lower the level by 2 Store network Critical Important High Medium Low 5 24 hours 5 days 14 days 20 days 40 days 4 5 days 10 days 20 days 1 month 2 months 3 10 days 20 days 1 month 2 months 3 months 2 6 months* Next release* Next release Next release No fix 1 no fix* no fix* no fix no fix No fix
    • Authenticated scan proved to address false positives and increased visibility of issues
      • Non authenticated scan can only reveal a limited number vulnerabilities without breaking into the system
      • Authenticated scan has a lower number of false positives and gives better picture of the patch and configuration status of a system
      Authenticated scan Normal scan 134 804
    • DSG ’s Qualys implementation facts
      • Started in February 2008
      • 1200 IP addresses - of which 150 external
      • 7 Business units
      • 17 Qualys appliances
      • External and internal scans weekly - over 300 scans in 4 months
      • Daily maps of external IPs and DMZs
      • Two Qualys managers
      • Reader/Scanner accounts of IT administrators and 3rd parties
      • Testing the Compliance module
      • Preparing to test the Web application scanning module in Q3 08
    • Overall feedback is positive
        • IT teams now see Qualys as useful tool-set rather than something for security managers to beat them up (which we do anyway :)
        • Even diligent IT managers were surprised what Qualys found on their systems while they had believed their systems had been properly patched
        • Reports for PCI DSS are well structured and understand by PCI DSS team
        • Modular architecture of Qualys could help us utilise future functionality improvements easily (compliance and web application scanning)
    • Contact details
      • Vladimir Jirasek
      • Information security & compliance manager
      • DSG International plc
      • [email_address]