SlideShare a Scribd company logo
RHEL6: Native Defense In Depth Tooling
Norman Mark St. Laurent,
Senior Solutions Architect
msl@redhat.com
Shawn Wells
Director, Innovation Programs
shawn@redhat.com
Agenda
l  Security Compliance Management [Prevention]
Shawn Wells
l  Incident Response [Detection
Mark St Laurent +
Response]
SCAP Security Guide
l  Delivers practical security guidance, baselines,
and associated validation mechanisms using the
SCAP protocol suite.
l  Current upstream source for STIG and NSA
SNAC documents
SCAP Security Guide
l  Recommendations map to institutionalized
policies where applicable
l  Because of this mapping, we can create custom
profiles
l  RHEL6 STIG (collaboration with DISA FSO)
l  RHEL6 SNAC (collaboration with NSA)
l  Baseline content for NIST 800-53 (working on USGCB now!)
Sample SSG Rule
<Rule id="enable_auditd_service”>

<title>Enable auditd Service</title>

<description>

The <tt>auditd</tt> service is an essential userspace 

component of the Linux Auditing System, as it is 

responsible for writing audit records to disk.

<service-enable-macro service="auditd" />

</description>

<ocil><service-enable-check-macro service="auditd" /></ocil>

<rationale>

Ensuring that the <tt>auditd</tt> service is active ensures that 

audit records generated by the kernel can be written to disk, or 

that appropriate actions will be taken if other obstacles exist.

</rationale>

<ident cce="4292-9" />

<oval id="service_auditd_enabled" />

<ref nist="CM-6, CM-7"
disa="169,172,174,1353,1462,1487,1115,1454,067,158,831,1123,1190,1312,126
3,130" />

</Rule>"
Sample SSG Check
<ind:textfilecontent54_object id="obj_20134" version="1">"
<ind:path>/etc</ind:path>"
<ind:filename>sysctl.conf</ind:filename>"
<ind:pattern operation="pattern match">^s*net.ipv6.conf.all
.disable_ipv6s*=s*1$</ind:pattern>"
<ind:instance datatype="int">1</ind:instance>"
</ind:textfilecontent54_object>"
Sample Scan Results
Sample Scan Results
RHN Satellite Integration
RHN Satellite Integration
More Information
l  Project Homepage
https://fedorahosted.org/scap-security-guide/
l  Mailing List
https://fedorahosted.org/mailman/listinfo/scap-security-guide
USING AN OPEN SOURCE FRAMEWORK
TO CATCH THE BAD GUY
BUILT-IN FORENSICS, INCIDENT RESPONSE, AND SECURITY
WITH RED HAT ENTERPRISE LINUX 6
Norman Mark St. Laurent,
Senior Solutions Architect
Red Hat, Inc.
msl@redhat.com
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
Integrity Checking with RHEL 6
l  Part 1:
Using the RHEL audit sub system for forensics and
incident response to meet security requirement objectives
and goals.
Closely followed and mapped NIST Special Publication
800-92 “Guide to Computer Security Log Management”.
http://www.redhat.com/solutions/industry/government/
Integrity Checking with RHEL 6
l  Part 2:
Integrity checking with RHEL 6, involves calculating a
message digest for each file and storing the message
digest securely to ensure changes to files such as
archived logs are detected.
A message digest, also called a digital signature,
uniquely identifies data and has the property that
changing a single bit in the data causes a completely
different message digest to be generated.
http://www.redhat.com/solutions/industry/government/
Integrity Checking with RHEL 6
l  RHEL 6 allows incident response, forensics examiners,
and system administrators easy access to lightweight,
easy-to-use tools and techniques that allow them to
quickly identify file system modifications, changes or
compromises.
l  A host-based IDS provides the data integrity needed to
ensure adequate protection of information and system
data, and helps meet security requirements and
compliance.
Integrity Checking with RHEL 6
l  RPM Package Manager (RPM) and Advanced
Intrusion Detection Environment (AIDE) delivers
continuous and automated monitoring for security
compliance and for implementing the needed
security controls for a true “Defense in Depth”
approach.
l  Revealing unwanted changes.
Integrity Checking with RHEL 6
l  An altered environment could be achieved on a
compromised system where a root kit has been installed.
l  A root kit contains a collection of “Bad Guy” tools that an
intruder installs on a victims computer after gaining access.
-  Log-cleaning scripts, network sniffers, and most importantly Trojan
replacements of core system utility programs....
last, ps, netstat, killall, ifconfig, find, du, passwd, pidof, tcpd, top...
Integrity Checking with RHEL 6
l  A root kit does not have to be a sophisticated program. It
could be as easy as replacing the binary of the last
program with a simple wrapper script.
#last | awk ‘$1 !~ /UserName/ { print 0}’
Integrity Checking with RHEL 6
l  RPM can be used as a host-based IDS. Verification options with
RPM can be invaluable to a forensics investigation and could
detect critical system files and executables that have been
modified.
l  AIDE is a file integrity checker. Using rules read from /etc/
aide.conf AIDE will create a database of file attributes and
extended attribute information. Once the database is initialized, it
can be used to verify the integrity of files.
l  Hashing Algorithms: md5, sha1, rmd10, tiger, haval, sha256, and
sha512.
Integrity Checking with RHEL 6
l  Every Good Computer Forensics Examiner / Incident Response Analyst
understands atime, ctime, and mtime......
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
l  It is important to understand specific terms dealing with Intrusion
detection tools with RHEL 6.
l  Understanding the terms will help you if your system defenses has been
penetrated or if you come in after-the-fact for forensics analysis.
l  They will allow you to know the factors and mechanics needed to:
-  Perform a forensics exam
-  Deep dive into an incident
-  Assist when something goes wrong from a systems administrative
perspective.
Integrity Checking with RHEL 6
l  Baseline
A baseline is a set of data used for comparison. A major advantage of a
baseline is that a file can be summarized by its file attributes.
When file attributes provide enough detail about a fiven file, then changes to
that file can be detected by comparing snapshot data to the
corresponding baseline data.
A baseline is usually the first snapshot taken.
Integrity Checking with RHEL 6
l  Snapshot
A snapshot is a view of something transitory in nature. A snapshot can be
taken multiple times to provide a “picture” of a specific point in time.
In the context of file integrity, a snapshot refers to a set of critical
observations (file attributes) taken at a particular point in time from one or
more file objects stored on a given Red Hat system.
When a particular snapshot is used as the reference in cange analysis, it is
called a baseline.
Integrity Checking with RHEL 6
l  Change Analysis
Change analysis is the process of comparing a snapshot to a baseline.
Change analysis improves the overall security and operational performance
by automatically analyzing detected changes against security policies.
It enhances file integrity monitoring to close the time gap between a bad
change of a file and detecting and correcting it.
Integrity Checking with RHEL 6
l  Digital Signature | Message Digest | Hash
A digital signature (also known as message digest, cryptographic check-
sum or cryptographic hash) is nothing more than a number.
A special number that is effectively a hash code produced by a functin
that is very difficult to reverse.
A message digest is a cryptographic hash computed over a given block
of data such as a file’s content.
Integrity Checking with RHEL 6
l  Digital Signature | Message Digest
Integrity: A digital signature indicates whether a file or a message has
been modified.
Authentication: A digital signature allows you to mathematical verify the
name of the file.
Integrity Checking with RHEL 6
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
l  Engineers at Red Hat and in the open source community
developed RPM Package Manger.
l  Used to Install ,upgrade, and verify software packages on a Red hat
system.
l  The verify feature of RPM can be used to check file integrity and
make sure that files have not been modified or replaced.
l  Verifying a package compares information about the installed files in
the package with information about the files taken from the package
metadata stored in the RPM database.
Integrity Checking with RHEL 6
l  The RPM database is known as the Baseline.
l  File size, file type, owner and group, file permissions, time stamps
and the MD5 are all stored in the database.
l  The format of the rpm -V or rpm --verify command is a string of
characters. The mnemonically emBoldened character denotes
failure of the corresponding test.
A single “.” (period) means the test passed, while a single “?” means the test
could not be performed (e.g., file permissions prevent reading).
Integrity Checking with RHEL 6
Integrity Checking with RHEL 6
Output String Definition
S The file Size differs
M Mode differs (includes permissions and file type)
5 MD5 sum differs
D Device major/minor number mismatch
L readLink (2) mismatch
U User ownership differs
G Group ownership differs
T mTime differs
P caPabilities differ
l  In the root kit example, lets say you need to find out which Red Hat
package the pidof command is a part of.
#rpm -qf `which pidof`
sysvinit-tools-2.87.4.dsf.el6.x86_64
#rpm --verify sysvinit-tools-2.87.4.dsf.el6.x86_64
Integrity Checking with RHEL 6
l 
[root@mstlaure mstlaure]# rpm -qf /etc/profile
setup-2.8.14-20.el6.noarch
[root@mstlaure mstlaure]# rpm --verify setup
SM5....T. c /etc/hosts.allow
S.5....T. c /etc/printcap
S.5....T. c /etc/profile
[root@mstlaure mstlaure]#
Integrity Checking with RHEL 6
l  An additional RPM challenge is that an intelligent attacker will
modify RPM itself to hide changes done by a root kit.
l  Allowing the attacker to mask its intrusion and gain root privilege.
Note: To solve this, you should implement a secondary check that can also be run
completely independent of the installed system.
***RPM from a Boot Disk as an Example...
l  RPM was not designed to specifically be a file auditing tool. However,
the nice thing is that it is installed on every version of supported
RHEL.
Integrity Checking with RHEL 6
l  In rescue mode, you can use RPM to install, remove, update or
verify packages from the installed system:
1. Boot the system into rescue mode with the linux rescue command at the boot
prompt.
2. Change to the root directory
#chroot /mnt/sysimage
3. Use RPM to verify a package
#rpm --verify /package/of/your/choice.rpm
Integrity Checking with RHEL 6
l  Backing up the RPM database
The /var/lib/rpm directory stores all files used by the RPM
command. All files inside this directory are binary files.
[root@mstlaure mstlaure]# file /var/lib/rpm/*
/var/lib/rpm/Basenames: Berkeley DB (Hash, version 9, native
byte-order)
/var/lib/rpm/Conflictname: Berkeley DB (Hash, version 9, native
byte-order)
/var/lib/rpm/__db.001: Applesoft BASIC program data
/var/lib/rpm/__db.002: 386 pure executable
/var/lib/rpm/__db.003: 386 pure executable
/var/lib/rpm/__db.004: 386 pure executable
/var/lib/rpm/Dirnames: Berkeley DB (Btree, version 9, native
byte-order)
/var/lib/rpm/Filedigests: Berkeley DB (Hash, version 9, native
byte-order)
Integrity Checking with RHEL 6
l  To back up the RPM data base stored in the /var/lib/rpm directory:
1. Log in as the root user.
2. Remove any Stale Lock Files. (You may need to make ensure
that no application has any of the RPM database files open using
the lsof command).
#losf /var/lib/rpm
#/bin/rm -f /var/lib/rpm/__db*
3. Backup the /var/lib/rpm directory using the tar command. Once the
back up is complete move the tar file to safe offline storage.
#tar -czfg $
(hostname).rpmdatabase.tar.gz /var/lib/rpm
Integrity Checking with RHEL 6
l  A couple of neat RPM scripts will be presented at this years
Red Hat Summit in Boston.
l  A script that will find all files in a given directory (or on a system
from “/” that do not belong to an RPM.
Note: It is important to verify which files were not put on a system by an RPM file.
l  A script that can be used as a System Integrity checking
script (finding all files on a system that have been
modified).
Integrity Checking with RHEL 6
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
l  Aide is a tool for monitoring file system changes.
l  Aide was written to be a simple and free alternative to
Tripwire.
l  Aide is not installed by default on a RHEL 6 system.
l  Aide will build a database of the files specified in the
configuration file /etc/aide.conf
Integrity Checking with RHEL 6
l  Aide stores various file attributes including: permissions,
inode number, user, group, file size, mtime-ctime-atime,
growing size, number of links, and link name.
l  Aide also generates a cryptographic check-sum of each file
using one or a combination of the following message digest
algorithms:
sha1, sha256, sha512, md5, rmd160, and tiger.
Integrity Checking with RHEL 6
l  After installation and setting up the RHEL 6 AIDE RPM, the
extended attributes acl, xattr, and selinux are ready to be
used because they have been explicitly enabled during
compile time.
l  The configuration file is /etc/aide.conf. Setting up this file can
be difficult and must be done on a case-by-case basis.
Note: At this years Red Hat summit, we will dive deeply into the /etc/
aide.conf file.
Integrity Checking with RHEL 6
l  The file /etc/aide.conf contains the runtime configuration AIDE
uses to initialize or check the AIDE database.
l  There are 3 types of of lines in the /etc/aide.conf file:
l  Configuration lines used to set the configuration parameters and
define/undefine variables.
l  Selection lines used to indicate which files are added to the database.
l  Macro lines used to define (or undefine) variables within the
configuration file.
Note: Lines starting with # are comments.
Integrity Checking with RHEL 6
l  The standard RHEL 6 /etc/aide.conf file is set up to pass the
Common Criteria Labeled Security Protection Profile (LSPP).
Note: This is a huge benefit for installing on government systems and
commercial systems who need to pass specific security accreditation and
allow for appropriate security policy settings.
(DoD 5300, DCID 6/3 at PL3, SOX, HIPPA, and PCI)
Integrity Checking with RHEL 6
Integrity Checking with RHEL 6
Integrity Checking with RHEL 6
Integrity Checking with RHEL 6
Integrity Checking with RHEL 6
l  Creating the AIDE Baseline Database
l  Once the /etc/aide.conf file has been constructed, it is time to
create the baseline database.
Note: This should be done as soon as all the system tools and
programs have been loaded and installed and before it is put onto the
network.
l  After specific changes have been made to the /etc/aide.conf file,
you can validate that the file is capable of running (e.g., no
syntax errors).
Integrity Checking with RHEL 6
l  The error message contains the last successful read line of
the /etc/aide.conf file. In the example here, line 40 has an
unexpected error.
#aide --verbose=255
#aide --config-check
39:sysntax error:!
39:error while reading configuration:!
Configuration error
Integrity Checking with RHEL 6
l  You can specify where the Baseline Database goes in the /
etc/aide.conf file. Default is:
/var/lib/aide/aide.db.gz
l  As soon as the baseline database has been created, a copy
should be saved to a secure location (e.g., CD-R or DVD-R or
a remote server or USB Disk) for later snapshot comparisons.
Integrity Checking with RHEL 6
l  Initialize the AIDE database:
#aide -i
#mv /var/lib/aide/aide.db.gz /mnt/usbdrive/aide_baseline_database/
aide.db.gz
l  Create the AIDE snapshot for comparison:
#cp /mnt/usbdrive/aide_baseline_database/aide.db.gz /var/lib/aide/
aide.db.baseline.gz
Note: The first step in creating the snapshot comparison is to copy the
saved baseline database to the file that you noted in the /etc/aide.conf.
This is denoted with the
database_new=file:@@(DBDIR)/aide.db.baseline directive.
Integrity Checking with RHEL 6
l  Perform the snapshot comparison.
#aide --check
Note: If no output follows, then, no changes were detected.
Integrity Checking with RHEL 6
l  Perform the snapshot comparison.
#aide --check
Note: If output follows, then, changes were detected.
---
AIDE found differences between database and filesystem!!
Summary:
Total number of files: 32,056
Added files: 0
Removed files: 0
Changed files: 1
....
Integrity Checking with RHEL 6
l  Snapshot Comaprison in Verbose Mode will go into great
detail about any and all changes.
#aide –check -V
---
AIDE found differences between database and filesystem!!
Summary:
Total number of files: 32,056
Added files: 0
Removed files: 0
Changed files: 1
------------------------------------------------------
Changed Files:
------------------------------------------------------
changed: /etc/passwd
Integrity Checking with RHEL 6
Agenda
l  Integrity Checking with RHEL 6
l  Background
l  Terminology
l  Operational Use of RHEL 6 RPM and AIDE
l  RPM
l  AIDE
l  Conclusion
l  From an intrusion detection point-of-view, incident response
teams, forensic analysts, systems administrators, and security
engineers need the ability to detect change correctly and
consistently on their machines.
l  Using lightweight, open source tools that come with RHEL 6 such
as RPM and AIDE provide incident response techniques that are
recognized in the court of law.
Integrity Checking with RHEL 6
l  Klayton Monroe Quote:
“When it comes to incident response and forensics analysis,
one snapshot is better than none. Two snapshots are better
than one, and a complete history of snapshots is nearly ideal.
However, even if no baseline exists, one should not rule out
the usefulness of baselining tools. A significant amount of
information can be collected or derived from data collected by
such tools even though a history of prior snapshots does not
exist.”
Integrity Checking with RHEL 6

More Related Content

Viewers also liked

2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat
Shawn Wells
 
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
Shawn Wells
 
2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook
Shawn Wells
 
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 20132013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
Shawn Wells
 
2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day
Shawn Wells
 
2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event
Shawn Wells
 
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
Shawn Wells
 
2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group
Shawn Wells
 
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
Shawn Wells
 
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
Shawn Wells
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
Shawn Wells
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day
Shawn Wells
 
2010-11-08 NSA Technical Symposium
2010-11-08 NSA Technical Symposium2010-11-08 NSA Technical Symposium
2010-11-08 NSA Technical Symposium
Shawn Wells
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
Shawn Wells
 
2013-08-22 NSA System Security & Management
2013-08-22 NSA System Security & Management2013-08-22 NSA System Security & Management
2013-08-22 NSA System Security & Management
Shawn Wells
 
2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...
2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...
2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...
Shawn Wells
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
Shawn Wells
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
Shawn Wells
 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update
Shawn Wells
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
Shawn Wells
 

Viewers also liked (20)

2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat
 
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
 
2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook
 
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 20132013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
 
2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day
 
2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event
 
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
 
2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group
 
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
 
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day
 
2010-11-08 NSA Technical Symposium
2010-11-08 NSA Technical Symposium2010-11-08 NSA Technical Symposium
2010-11-08 NSA Technical Symposium
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
 
2013-08-22 NSA System Security & Management
2013-08-22 NSA System Security & Management2013-08-22 NSA System Security & Management
2013-08-22 NSA System Security & Management
 
2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...
2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...
2011-12-08 Red Hat Enterprise Virtualization for Desktops (RHEV VDI) with Cis...
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
 

Similar to 2013-04-03 Open Source Framework to Catch the Bad Guys

Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Dev confus.2020 compliance operator
Dev confus.2020 compliance operatorDev confus.2020 compliance operator
Dev confus.2020 compliance operator
jaormx
 
Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
Protect724migration
 
Workflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8cWorkflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8c
Protect724migration
 
Netflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8cNetflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by Intel
Amazon Web Services
 
NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c	NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c
Protect724migration
 
Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411
Sqrrl
 
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8cIntrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
Marco Casassa Mont
 
Sqrrl and Accumulo
Sqrrl and AccumuloSqrrl and Accumulo
Sqrrl and Accumulo
John Dougherty
 
FIM and System Call Auditing at Scale in a Large Container Deployment
FIM and System Call Auditing at Scale in a Large Container DeploymentFIM and System Call Auditing at Scale in a Large Container Deployment
FIM and System Call Auditing at Scale in a Large Container Deployment
Priyanka Aash
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
Great Wide Open
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
Rommel Garcia
 
OWASP Dependency-Track Introduction
OWASP Dependency-Track IntroductionOWASP Dependency-Track Introduction
OWASP Dependency-Track Introduction
Sergey Sotnikov
 
2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z
2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z
2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z
Shawn Wells
 
SFS (Secure File System)
SFS (Secure File System)SFS (Secure File System)
SFS (Secure File System)
Ahmed EL-KOSAIRY
 
Esm scg net_flow_6.0c
Esm scg net_flow_6.0c Esm scg net_flow_6.0c
Esm scg net_flow_6.0c
Protect724v3
 
IPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8cIPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8c
Protect724migration
 

Similar to 2013-04-03 Open Source Framework to Catch the Bad Guys (20)

Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
 
Dev confus.2020 compliance operator
Dev confus.2020 compliance operatorDev confus.2020 compliance operator
Dev confus.2020 compliance operator
 
Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8c
 
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
 
Workflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8cWorkflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8c
 
Netflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8cNetflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8c
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by Intel
 
NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c	NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c
 
Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411
 
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8cIntrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8c
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
Sqrrl and Accumulo
Sqrrl and AccumuloSqrrl and Accumulo
Sqrrl and Accumulo
 
FIM and System Call Auditing at Scale in a Large Container Deployment
FIM and System Call Auditing at Scale in a Large Container DeploymentFIM and System Call Auditing at Scale in a Large Container Deployment
FIM and System Call Auditing at Scale in a Large Container Deployment
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
OWASP Dependency-Track Introduction
OWASP Dependency-Track IntroductionOWASP Dependency-Track Introduction
OWASP Dependency-Track Introduction
 
2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z
2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z
2008-07-30 IBM Teach the Teacher (IBM T3), Red Hat Update for System z
 
SFS (Secure File System)
SFS (Secure File System)SFS (Secure File System)
SFS (Secure File System)
 
Esm scg net_flow_6.0c
Esm scg net_flow_6.0c Esm scg net_flow_6.0c
Esm scg net_flow_6.0c
 
IPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8cIPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8c
 

More from Shawn Wells

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
Shawn Wells
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
Shawn Wells
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
Shawn Wells
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
Shawn Wells
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
Shawn Wells
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
Shawn Wells
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
Shawn Wells
 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
Shawn Wells
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
Shawn Wells
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement
Shawn Wells
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
Shawn Wells
 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex event
Shawn Wells
 

More from Shawn Wells (12)

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex event
 

Recently uploaded

PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
ahcitycouncil
 
Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024
Texas Alliance of Groundwater Districts
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
Christina Parmionova
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
Partito democratico
 
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".United Nations World Oceans Day 2024; June 8th " Awaken new dephts".
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".
Christina Parmionova
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
Bharat Mata
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
Scalabrini Institute for Human Mobility in Africa
 
Circular Economy implementation in the EU
Circular Economy implementation in the EUCircular Economy implementation in the EU
Circular Economy implementation in the EU
HasanHamdan9
 
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
yemqpj
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
yemqpj
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
dj1cx4ex
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
JSchaus & Associates
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
ahcitycouncil
 
PPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code AmendmentsPPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code Amendments
ahcitycouncil
 
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Christina Parmionova
 
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
ssuser05e8f3
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptxPUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
Marked12
 

Recently uploaded (20)

PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
 
Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".United Nations World Oceans Day 2024; June 8th " Awaken new dephts".
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Circular Economy implementation in the EU
Circular Economy implementation in the EUCircular Economy implementation in the EU
Circular Economy implementation in the EU
 
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
 
PPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code AmendmentsPPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code Amendments
 
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
 
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptxPUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
 

2013-04-03 Open Source Framework to Catch the Bad Guys

  • 1. RHEL6: Native Defense In Depth Tooling Norman Mark St. Laurent, Senior Solutions Architect msl@redhat.com Shawn Wells Director, Innovation Programs shawn@redhat.com
  • 2. Agenda l  Security Compliance Management [Prevention] Shawn Wells l  Incident Response [Detection Mark St Laurent + Response]
  • 3. SCAP Security Guide l  Delivers practical security guidance, baselines, and associated validation mechanisms using the SCAP protocol suite. l  Current upstream source for STIG and NSA SNAC documents
  • 4. SCAP Security Guide l  Recommendations map to institutionalized policies where applicable l  Because of this mapping, we can create custom profiles l  RHEL6 STIG (collaboration with DISA FSO) l  RHEL6 SNAC (collaboration with NSA) l  Baseline content for NIST 800-53 (working on USGCB now!)
  • 5. Sample SSG Rule <Rule id="enable_auditd_service”>
 <title>Enable auditd Service</title>
 <description>
 The <tt>auditd</tt> service is an essential userspace 
 component of the Linux Auditing System, as it is 
 responsible for writing audit records to disk.
 <service-enable-macro service="auditd" />
 </description>
 <ocil><service-enable-check-macro service="auditd" /></ocil>
 <rationale>
 Ensuring that the <tt>auditd</tt> service is active ensures that 
 audit records generated by the kernel can be written to disk, or 
 that appropriate actions will be taken if other obstacles exist.
 </rationale>
 <ident cce="4292-9" />
 <oval id="service_auditd_enabled" />
 <ref nist="CM-6, CM-7" disa="169,172,174,1353,1462,1487,1115,1454,067,158,831,1123,1190,1312,126 3,130" />
 </Rule>"
  • 6. Sample SSG Check <ind:textfilecontent54_object id="obj_20134" version="1">" <ind:path>/etc</ind:path>" <ind:filename>sysctl.conf</ind:filename>" <ind:pattern operation="pattern match">^s*net.ipv6.conf.all .disable_ipv6s*=s*1$</ind:pattern>" <ind:instance datatype="int">1</ind:instance>" </ind:textfilecontent54_object>"
  • 11. More Information l  Project Homepage https://fedorahosted.org/scap-security-guide/ l  Mailing List https://fedorahosted.org/mailman/listinfo/scap-security-guide
  • 12. USING AN OPEN SOURCE FRAMEWORK TO CATCH THE BAD GUY BUILT-IN FORENSICS, INCIDENT RESPONSE, AND SECURITY WITH RED HAT ENTERPRISE LINUX 6 Norman Mark St. Laurent, Senior Solutions Architect Red Hat, Inc. msl@redhat.com
  • 13. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 14. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 15. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 16. Integrity Checking with RHEL 6 l  Part 1: Using the RHEL audit sub system for forensics and incident response to meet security requirement objectives and goals. Closely followed and mapped NIST Special Publication 800-92 “Guide to Computer Security Log Management”. http://www.redhat.com/solutions/industry/government/
  • 17. Integrity Checking with RHEL 6 l  Part 2: Integrity checking with RHEL 6, involves calculating a message digest for each file and storing the message digest securely to ensure changes to files such as archived logs are detected. A message digest, also called a digital signature, uniquely identifies data and has the property that changing a single bit in the data causes a completely different message digest to be generated. http://www.redhat.com/solutions/industry/government/
  • 18. Integrity Checking with RHEL 6 l  RHEL 6 allows incident response, forensics examiners, and system administrators easy access to lightweight, easy-to-use tools and techniques that allow them to quickly identify file system modifications, changes or compromises. l  A host-based IDS provides the data integrity needed to ensure adequate protection of information and system data, and helps meet security requirements and compliance.
  • 19. Integrity Checking with RHEL 6 l  RPM Package Manager (RPM) and Advanced Intrusion Detection Environment (AIDE) delivers continuous and automated monitoring for security compliance and for implementing the needed security controls for a true “Defense in Depth” approach. l  Revealing unwanted changes.
  • 20. Integrity Checking with RHEL 6 l  An altered environment could be achieved on a compromised system where a root kit has been installed. l  A root kit contains a collection of “Bad Guy” tools that an intruder installs on a victims computer after gaining access. -  Log-cleaning scripts, network sniffers, and most importantly Trojan replacements of core system utility programs.... last, ps, netstat, killall, ifconfig, find, du, passwd, pidof, tcpd, top...
  • 21. Integrity Checking with RHEL 6 l  A root kit does not have to be a sophisticated program. It could be as easy as replacing the binary of the last program with a simple wrapper script. #last | awk ‘$1 !~ /UserName/ { print 0}’
  • 22. Integrity Checking with RHEL 6 l  RPM can be used as a host-based IDS. Verification options with RPM can be invaluable to a forensics investigation and could detect critical system files and executables that have been modified. l  AIDE is a file integrity checker. Using rules read from /etc/ aide.conf AIDE will create a database of file attributes and extended attribute information. Once the database is initialized, it can be used to verify the integrity of files. l  Hashing Algorithms: md5, sha1, rmd10, tiger, haval, sha256, and sha512.
  • 23. Integrity Checking with RHEL 6 l  Every Good Computer Forensics Examiner / Incident Response Analyst understands atime, ctime, and mtime......
  • 24. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 25. l  It is important to understand specific terms dealing with Intrusion detection tools with RHEL 6. l  Understanding the terms will help you if your system defenses has been penetrated or if you come in after-the-fact for forensics analysis. l  They will allow you to know the factors and mechanics needed to: -  Perform a forensics exam -  Deep dive into an incident -  Assist when something goes wrong from a systems administrative perspective. Integrity Checking with RHEL 6
  • 26. l  Baseline A baseline is a set of data used for comparison. A major advantage of a baseline is that a file can be summarized by its file attributes. When file attributes provide enough detail about a fiven file, then changes to that file can be detected by comparing snapshot data to the corresponding baseline data. A baseline is usually the first snapshot taken. Integrity Checking with RHEL 6
  • 27. l  Snapshot A snapshot is a view of something transitory in nature. A snapshot can be taken multiple times to provide a “picture” of a specific point in time. In the context of file integrity, a snapshot refers to a set of critical observations (file attributes) taken at a particular point in time from one or more file objects stored on a given Red Hat system. When a particular snapshot is used as the reference in cange analysis, it is called a baseline. Integrity Checking with RHEL 6
  • 28. l  Change Analysis Change analysis is the process of comparing a snapshot to a baseline. Change analysis improves the overall security and operational performance by automatically analyzing detected changes against security policies. It enhances file integrity monitoring to close the time gap between a bad change of a file and detecting and correcting it. Integrity Checking with RHEL 6
  • 29. l  Digital Signature | Message Digest | Hash A digital signature (also known as message digest, cryptographic check- sum or cryptographic hash) is nothing more than a number. A special number that is effectively a hash code produced by a functin that is very difficult to reverse. A message digest is a cryptographic hash computed over a given block of data such as a file’s content. Integrity Checking with RHEL 6
  • 30. l  Digital Signature | Message Digest Integrity: A digital signature indicates whether a file or a message has been modified. Authentication: A digital signature allows you to mathematical verify the name of the file. Integrity Checking with RHEL 6
  • 31. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 32. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 33. l  Engineers at Red Hat and in the open source community developed RPM Package Manger. l  Used to Install ,upgrade, and verify software packages on a Red hat system. l  The verify feature of RPM can be used to check file integrity and make sure that files have not been modified or replaced. l  Verifying a package compares information about the installed files in the package with information about the files taken from the package metadata stored in the RPM database. Integrity Checking with RHEL 6
  • 34. l  The RPM database is known as the Baseline. l  File size, file type, owner and group, file permissions, time stamps and the MD5 are all stored in the database. l  The format of the rpm -V or rpm --verify command is a string of characters. The mnemonically emBoldened character denotes failure of the corresponding test. A single “.” (period) means the test passed, while a single “?” means the test could not be performed (e.g., file permissions prevent reading). Integrity Checking with RHEL 6
  • 35. Integrity Checking with RHEL 6 Output String Definition S The file Size differs M Mode differs (includes permissions and file type) 5 MD5 sum differs D Device major/minor number mismatch L readLink (2) mismatch U User ownership differs G Group ownership differs T mTime differs P caPabilities differ
  • 36. l  In the root kit example, lets say you need to find out which Red Hat package the pidof command is a part of. #rpm -qf `which pidof` sysvinit-tools-2.87.4.dsf.el6.x86_64 #rpm --verify sysvinit-tools-2.87.4.dsf.el6.x86_64 Integrity Checking with RHEL 6
  • 37. l  [root@mstlaure mstlaure]# rpm -qf /etc/profile setup-2.8.14-20.el6.noarch [root@mstlaure mstlaure]# rpm --verify setup SM5....T. c /etc/hosts.allow S.5....T. c /etc/printcap S.5....T. c /etc/profile [root@mstlaure mstlaure]# Integrity Checking with RHEL 6
  • 38. l  An additional RPM challenge is that an intelligent attacker will modify RPM itself to hide changes done by a root kit. l  Allowing the attacker to mask its intrusion and gain root privilege. Note: To solve this, you should implement a secondary check that can also be run completely independent of the installed system. ***RPM from a Boot Disk as an Example... l  RPM was not designed to specifically be a file auditing tool. However, the nice thing is that it is installed on every version of supported RHEL. Integrity Checking with RHEL 6
  • 39. l  In rescue mode, you can use RPM to install, remove, update or verify packages from the installed system: 1. Boot the system into rescue mode with the linux rescue command at the boot prompt. 2. Change to the root directory #chroot /mnt/sysimage 3. Use RPM to verify a package #rpm --verify /package/of/your/choice.rpm Integrity Checking with RHEL 6
  • 40. l  Backing up the RPM database The /var/lib/rpm directory stores all files used by the RPM command. All files inside this directory are binary files. [root@mstlaure mstlaure]# file /var/lib/rpm/* /var/lib/rpm/Basenames: Berkeley DB (Hash, version 9, native byte-order) /var/lib/rpm/Conflictname: Berkeley DB (Hash, version 9, native byte-order) /var/lib/rpm/__db.001: Applesoft BASIC program data /var/lib/rpm/__db.002: 386 pure executable /var/lib/rpm/__db.003: 386 pure executable /var/lib/rpm/__db.004: 386 pure executable /var/lib/rpm/Dirnames: Berkeley DB (Btree, version 9, native byte-order) /var/lib/rpm/Filedigests: Berkeley DB (Hash, version 9, native byte-order) Integrity Checking with RHEL 6
  • 41. l  To back up the RPM data base stored in the /var/lib/rpm directory: 1. Log in as the root user. 2. Remove any Stale Lock Files. (You may need to make ensure that no application has any of the RPM database files open using the lsof command). #losf /var/lib/rpm #/bin/rm -f /var/lib/rpm/__db* 3. Backup the /var/lib/rpm directory using the tar command. Once the back up is complete move the tar file to safe offline storage. #tar -czfg $ (hostname).rpmdatabase.tar.gz /var/lib/rpm Integrity Checking with RHEL 6
  • 42. l  A couple of neat RPM scripts will be presented at this years Red Hat Summit in Boston. l  A script that will find all files in a given directory (or on a system from “/” that do not belong to an RPM. Note: It is important to verify which files were not put on a system by an RPM file. l  A script that can be used as a System Integrity checking script (finding all files on a system that have been modified). Integrity Checking with RHEL 6
  • 43. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 44. l  Aide is a tool for monitoring file system changes. l  Aide was written to be a simple and free alternative to Tripwire. l  Aide is not installed by default on a RHEL 6 system. l  Aide will build a database of the files specified in the configuration file /etc/aide.conf Integrity Checking with RHEL 6
  • 45. l  Aide stores various file attributes including: permissions, inode number, user, group, file size, mtime-ctime-atime, growing size, number of links, and link name. l  Aide also generates a cryptographic check-sum of each file using one or a combination of the following message digest algorithms: sha1, sha256, sha512, md5, rmd160, and tiger. Integrity Checking with RHEL 6
  • 46. l  After installation and setting up the RHEL 6 AIDE RPM, the extended attributes acl, xattr, and selinux are ready to be used because they have been explicitly enabled during compile time. l  The configuration file is /etc/aide.conf. Setting up this file can be difficult and must be done on a case-by-case basis. Note: At this years Red Hat summit, we will dive deeply into the /etc/ aide.conf file. Integrity Checking with RHEL 6
  • 47. l  The file /etc/aide.conf contains the runtime configuration AIDE uses to initialize or check the AIDE database. l  There are 3 types of of lines in the /etc/aide.conf file: l  Configuration lines used to set the configuration parameters and define/undefine variables. l  Selection lines used to indicate which files are added to the database. l  Macro lines used to define (or undefine) variables within the configuration file. Note: Lines starting with # are comments. Integrity Checking with RHEL 6
  • 48. l  The standard RHEL 6 /etc/aide.conf file is set up to pass the Common Criteria Labeled Security Protection Profile (LSPP). Note: This is a huge benefit for installing on government systems and commercial systems who need to pass specific security accreditation and allow for appropriate security policy settings. (DoD 5300, DCID 6/3 at PL3, SOX, HIPPA, and PCI) Integrity Checking with RHEL 6
  • 53. l  Creating the AIDE Baseline Database l  Once the /etc/aide.conf file has been constructed, it is time to create the baseline database. Note: This should be done as soon as all the system tools and programs have been loaded and installed and before it is put onto the network. l  After specific changes have been made to the /etc/aide.conf file, you can validate that the file is capable of running (e.g., no syntax errors). Integrity Checking with RHEL 6
  • 54. l  The error message contains the last successful read line of the /etc/aide.conf file. In the example here, line 40 has an unexpected error. #aide --verbose=255 #aide --config-check 39:sysntax error:! 39:error while reading configuration:! Configuration error Integrity Checking with RHEL 6
  • 55. l  You can specify where the Baseline Database goes in the / etc/aide.conf file. Default is: /var/lib/aide/aide.db.gz l  As soon as the baseline database has been created, a copy should be saved to a secure location (e.g., CD-R or DVD-R or a remote server or USB Disk) for later snapshot comparisons. Integrity Checking with RHEL 6
  • 56. l  Initialize the AIDE database: #aide -i #mv /var/lib/aide/aide.db.gz /mnt/usbdrive/aide_baseline_database/ aide.db.gz l  Create the AIDE snapshot for comparison: #cp /mnt/usbdrive/aide_baseline_database/aide.db.gz /var/lib/aide/ aide.db.baseline.gz Note: The first step in creating the snapshot comparison is to copy the saved baseline database to the file that you noted in the /etc/aide.conf. This is denoted with the database_new=file:@@(DBDIR)/aide.db.baseline directive. Integrity Checking with RHEL 6
  • 57. l  Perform the snapshot comparison. #aide --check Note: If no output follows, then, no changes were detected. Integrity Checking with RHEL 6
  • 58. l  Perform the snapshot comparison. #aide --check Note: If output follows, then, changes were detected. --- AIDE found differences between database and filesystem!! Summary: Total number of files: 32,056 Added files: 0 Removed files: 0 Changed files: 1 .... Integrity Checking with RHEL 6
  • 59. l  Snapshot Comaprison in Verbose Mode will go into great detail about any and all changes. #aide –check -V --- AIDE found differences between database and filesystem!! Summary: Total number of files: 32,056 Added files: 0 Removed files: 0 Changed files: 1 ------------------------------------------------------ Changed Files: ------------------------------------------------------ changed: /etc/passwd Integrity Checking with RHEL 6
  • 60. Agenda l  Integrity Checking with RHEL 6 l  Background l  Terminology l  Operational Use of RHEL 6 RPM and AIDE l  RPM l  AIDE l  Conclusion
  • 61. l  From an intrusion detection point-of-view, incident response teams, forensic analysts, systems administrators, and security engineers need the ability to detect change correctly and consistently on their machines. l  Using lightweight, open source tools that come with RHEL 6 such as RPM and AIDE provide incident response techniques that are recognized in the court of law. Integrity Checking with RHEL 6
  • 62. l  Klayton Monroe Quote: “When it comes to incident response and forensics analysis, one snapshot is better than none. Two snapshots are better than one, and a complete history of snapshots is nearly ideal. However, even if no baseline exists, one should not rule out the usefulness of baselining tools. A significant amount of information can be collected or derived from data collected by such tools even though a history of prior snapshots does not exist.” Integrity Checking with RHEL 6