SlideShare a Scribd company logo
1 of 24
Download to read offline
White Paper




CONFIGURATION COMPLIANCE FOR STORAGE,
NETWORK & SERVER
A Detail Review




                  Abstract
                  This white paper explains how the Configuration Compliance
                  solution can enable companies to ensure visibility of the IT
                  infrastructure, automate remediation and increase efficiency.
                  The document will show the benefits of integrating IT
                  infrastructure management technologies such as Network
                  Configuration Manager, Storage Configuration Advisor and
                  vCenter Configuration Manager into the RSA Archer platform.

                  June 2012
Copyright © 2012 EMC Corporation. All Rights Reserved.

EMC believes the information in this publication is accurate as
of its publication date. The information is subject to change
without notice.

The information in this publication is provided “as is.” EMC
Corporation makes no representations or warranties of any kind
with respect to the information in this publication, and
specifically disclaims implied warranties of merchantability or
fitness for a particular purpose.

Use, copying, and distribution of any EMC software described in
this publication requires an applicable software license.

For the most up-to-date listing of EMC product names, see EMC
Corporation Trademarks on EMC.com.

VMware is registered trademark VMware, Inc. in the United
States and/or other jurisdictions. All other trademarks used
herein are the property of their respective owners.

Part Number h10841




             Configuration Compliance for Storage, Network & Server   2
Table of Contents
Executive summary.................................................................................................. 4
          summary..................................................................................................
                 ................................................................................................
Audience.................................................................................................................
Audience................................................................................................................. 4
        ................................................................................................
Introduction ............................................................................................................ 5
             ............................................................................................................
                                             ................................................................
   Infrastructure Compliance Challenges ................................................................................ 5
                                           .............................................................
IT Infrastructure Configuration Management ............................................................. 6
   EMC Storage Configuration Advisor .................................................................................... 6
   EMC Network Configuration Manager.................................................................................. 7
   VMWare vCenter Configuration Manager............................................................................. 9
IT GRC as a Business Imperative ............................................................................ 11
                                ............................................................................
                                                                ................................
   Platform Approach to IT GRC ............................................................................................. 12
RSA Archer Integration Scenarios ........................................................................... 13
                                 ...........................................................................
                                                                 ................................
   Scenario 1: Compliance Data Consolidation ..................................................................... 14
   Scenario 2: Detail Control Mapping .................................................................................. 15
                ................................................................
                                                ................................................................
Recommendations ................................................................................................ 16
   Focus on Quick Wins ........................................................................................................ 17
   Drive Automation via Integration ...................................................................................... 17
   Show the Cost Saving ....................................................................................................... 18
   Make it Easy for Executives............................................................................................... 18
   Involve Key Stakeholders Early ......................................................................................... 18
Conclusion ............................................................................................................ 19
           ............................................................................................................
                                           ................................................................
Appendix .............................................................................................................. 20
         ..............................................................................................................
                                         ................................................................




                                                    Configuration Compliance for Storage, Network & Server                           3
Executive summary
In today’s fast changing market, organizations must be quick to respond to changes
as well as be efficient and lower costs. In addition, the journey to the cloud has been
driving the IT organization toward better utilization of their infrastructure through
virtualization of compute and storage, and optimization of networks. However, this
transformation also leads to new challenges relating to IT visibility and compliance
complexity.
What most companies need is an effective approach to governance, risk
management, and compliance (GRC). IT infrastructure compliance needs to be a part
of the overall GRC strategy. It’s critical to address the internal complexities brought on
by today’s dynamic physical and virtual data centers with both new technologies and
new ways of doing business.
GRC used to start by discrete projects with focus on policy definition, manual testing
of controls and minimal use of risk management models. Over the years, companies
started to incorporate IT risk management & IT governance with periodic testing of IT
controls via web-based questionnaire method. Today we see the linkages between
enterprise GRC, information GRC, and IT operations GRC becoming more transparent.
Technologies are able to enable tighter integration for automated control monitoring
and better management of risks.
EMC, RSA and VMware are committed to expanding the benefits companies are
receiving from RSA Archer and infrastructure management software investments. The
EMC Configuration Compliance Solution provides a seamless integration of RSA
Archer with:
•   EMC Storage Configuration Advisor (SCA)
•   EMC Network Configuration Manager (NCM)
•   VMware vCenter Configuration Manager (vCM)
Most organizations are asking for help from technology vendors on addressing the
cost of compliance and increasing system uptime. In many scenarios, automation is
the key to their success.


Audience
This white paper is intended for Infrastructure Administrators, Storage Administrators,
Network Administrators, RSA Archer Administrators, Information Security Architects or
Compliance Officers.




                                    Configuration Compliance for Storage, Network & Server   4
Introduction
EMC is leading the industry in enabling companies of all sizes to progress along their
journey to the cloud. This journey can be divided into 3 phases:
1. Phase 1 – Focus on hardware consolidation and virtualization of non-mission
   critical IT production apps.
2. Phase 2 – Assess potential benefits from virtualizing mission critical apps.
3. Phase 3 – Explore new opportunities to drastically enhance the speed and agility
   of IT




This transition, together with competitive, internal and regulatory pressure, has
created many new challenges.

Infrastructure Compliance Challenges
The problems that both IT and Information Security teams facing are in 3 areas:
•   Lack of IT Visibility
        o $26.5B revenue lost in 2011 due to IT downtime
        o Infrastructure outage can cost average of $5,000 per minute
•   Configuration Complexity
        o 85% of IT problems are related to organization and technology change
        o 78% of outages caused by misconfigurations due to changes
•   Increasing Regulatory Requirements
        o Only 1 in 10 companies can effectively measure infrastructure compliance
First, many organizations may not have deep visibility into the IT infrastructure from
the security and compliance standpoint. Information is tracked via manual processes
and there are days or weeks of delay. There is no integrated approach to provide more




                                   Configuration Compliance for Storage, Network & Server   5
visibility to high level executives or blend the information from IT infrastructure into
the overall compliance context.
Second, security teams often do not realize there are better ways to collect
information and assess risk in the organization. In many instances, it’s possible to
leverage EMC and VMware technologies to collect IT data from the sources
automatically and perform correlation, analysis, and assessment.
Third, companies spend a significant amount of time proving compliance to internal
and external auditors. Without automation, manual data collection can be very
unreliable.


IT Infrastructure Configuration Management
Many tools out there may provide IT a partial picture of the infrastructure such as the
changes to server environment but not the changes to network and storage
environment. Others may cover all infrastructure domains but do not provide prebuilt
templates, change management or remediation capabilities.
This inconsistent vision of the entire infrastructure makes compliance management
and reporting a very challenging part of GRC operations. By offering complete
coverage across domains, companies will have a complete vision of the state of IT
infrastructure. EMC, RSA and VMware can provide the coverage across the entire
infrastructure, providing organizations the visibility to make compliance management
an efficient, cost effective and low risk process.
There is a big advantage of using EMC and VMware technologies to integrate into
existing RSA Archer framework and enhance the values. It’s critical to have an
understanding of the capabilities of infrastructure management tools.

                          Advisor
EMC Storage Configuration Advisor
EMC Storage Configuration Advisor tracks and reports changes to storage resources
and ensures that they are compliant with defined storage configuration policies.
Some examples of storage policies are:
•   Internal configuration policies
•   Industry best practices
•   EMC E-lab interoperability
•   Multipath management
Table 1 in Appendix provides more examples of how organizations can utilize this
technology for PCI DSS 2.0 compliance effort.
Storage Configuration Advisor leverages agentless discovery, near-real-time change
tracking, and configuration policy validation to identify issues before they can impact
service levels. It also provides change history and service analytics to help IT improve
processes and resource planning. Finally the technology provides recommendations
across storage infrastructure.



                                      Configuration Compliance for Storage, Network & Server   6
EMC delivers Storage Configuration Advisor on hardware or virtual appliance that
includes the application and its data repositories. It uses a web-based user interface
and employs industry-standard agentless discovery based on VMware API, WMI, SSH,
SNMP, and SMI-S standards. The below diagram explains Storage Configuration
Advisor’s architecture.




The key benefits of Storage Configuration Advisor are:
•   Efficient Change Monitoring and Validation
       o Validate host and infrastructure interoperability against defined policies
       o Automatically document configuration changes and violations
•   Lower Risk of Changes
       o Roll out infrastructure upgrades with continuous configuration validation
       o Improve MTTR by rapidly identifying changes that impact service levels
•   Operational Planning and Oversight
       o Understand current trends and their impact on change and configuration
         management processes
       o Automate documentation enabling audit readiness

EMC Network Configuration Manager
EMC Network Configuration Manager helps organization keep network components
compliant in a number of ways. Some use cases are:




                                  Configuration Compliance for Storage, Network & Server   7
•   Design, enforce and report on adherence to complex network policies. The policy
    enforcement could be for the entire domain or just one network site or subnet
•   Leverage best-practice templates to schedule and deploy any-scale change
    quickly through distributed architecture and workflow capabilities
•   Demonstrate on demand compliance and its change/control process
•   Report on historical compliance of the managed infrastructure using the
    configuration and policies in place on the date selected
Network Configuration Manager has an intuitive graphical network view and
automates complex and routine engineering tasks, such as adding devices and
connections, with drag-and-drop simplicity.




One important capability of Network Configuration Manager is its real-time auto
discovery of network devices and logical and physical topology information. Being
able to collect network asset information and track against enterprise compliance
policies is a critical component of GRC operations.
Another advantage of using Network Configuration Manager is that it allows the view
of configuration data, in a vendor-neutral format, using device modeling and merges
configuration data and device variables with best-practice templates to help ensure
compliance. This capability is delivered via the powerful Automation Library.




                                  Configuration Compliance for Storage, Network & Server   8
These templates are key parts of IT GRC process to make sure the network is
compliant with industry regulation such as PCI DSS 2.0 (See Table 2 in Appendix
                                                        See            Appendix).
The key benefits of Network Configuration Manager are:
•   Control Network Change
       o One system to manage a multivendor network and ensure compliance
         across its entire lifecycle
•   Increase Operating Efficiency
       o Lower costs and simplify operations; increase network and service
         availability; and deliver services and respond to business needs faster
•   Ensure Network Compliance
       o Detect compliance states, flag violations and fix problems to reduce
         business risk

VMWare vCenter Configuration Manager
VMware vCenter Configuration Manager is a policy-driven configuration automation
solution that detects deep virtual and physical changes and checks whether those
changes are compliant to industry, regulatory or internal self-defined best practices. It
helps organizations avoid configuration drift by remediating systems to bring them
back into compliance. Some examples of use cases are:
•   Managing change
•   Controlling risk




                                    Configuration Compliance for Storage, Network & Server   9
•   Automating operating system, software provisioning and patching with vSphere
    integration
vCenter Configuration Manager automates critical IT configuration management and
compliance processes across thousands of assets, security and configuration
settings from vSphere, VMware ESXi™ and ESX®, Windows, UNIX or Linux servers
and user desktops.




Table 3 in Appendix provides a full list of how organizations can use vCenter
Configuration Manager for PCI DSS 2.0.
This technology is “cloud ready” as it allows IT organizations to detect changes
quickly and manage host compliance across multiple VMware vCloud Director’s
instances and guests.
The advantage of using vCenter Configuration Manager is its rule building capability.
The Rule Wizard will help IT organizations meet internal and external standards.




                                   Configuration Compliance for Storage, Network & Server   10
The key benefits of VMware vCenter Configuration Manager are:
•   Policy Driven Configuration Management
       o Provision IT approved OS images & software packages
       o Patch to mitigate known vulnerabilities
•   vSphere Compliance Checker
       o Check a small number of VMs against vSphere hardening Guidelines
•   Ensuring Compliance for Hybrid Cloud Workloads
       o Ability to manage guest level compliance across Clouds
       o Certified deployment models for vCloud Service Provider Partners


IT GRC as a Business Imperative
The emergence of IT GRC as a strategy for protecting the enterprise from IT risk while
removing barriers to growth is the result of a number of factors:
1. Demands on corporate governance
2. Multi-faceted risk environment
3. Growing regulatory requirements
4. Disappearing boundaries in the hyper-extended enterprise
These elements require stronger collaboration between IT and Information Security.
Today, there is a need to have the transformation to a more programmatic approach
with the use of technology.




                                    Configuration Compliance for Storage, Network & Server   11
Platform
Platform Approach to IT GRC
Organizations frequently rely on a document-centric, paper-based approach to risk
and compliance management, rarely attending sophistication beyond electronic
documents and spreadsheets. Aside from being error-prone and inefficient, this
approach makes it difficult to share information, thereby reinforcing silos. RSA Archer
provides a technology architecture that integrates with EMC/VMware systems to
provide a cohesive view.
The integrated solution not only provides compliance data for configuration violations
and vulnerabilities but also blends with:
•   Risk analytics
•   Loss events
•   Logs
•   Document and records retention data
•   Accounting and HR information
All of this data is scattered across multiple tools and systems. RSA Archer aggregates
the data putting risks, threats, incidents and compliance deficiencies into business
context and enabling prioritization of the response based on what is most significant
to the organization.




The key characteristics of RSA Archer platform include:
•   Centralized
    Centralized Views – A central view of risk and compliance activities provides a
    single lens through which stakeholders can identify threats early and prioritize




                                    Configuration Compliance for Storage, Network & Server   12
issues, as well as improve efficiencies by applying a single process to multiple
    regulations.
•   Automation
    Automation – Through automation, organizations achieve continuous risk and
    controls monitoring as opposed to the point-in-time spot checks of the past.
    Technological capabilities required include advanced risk analytics and modeling,
    automated controls tied to business rules engines, advanced content and process
    management capabilities, and embedded GRC control points.
•   Integrated Systems – Multiple point solutions that span different areas of the
    infrastructure are costly to manage, fail to deliver a holistic view of the enterprise
    and cannot correlate analysis to provide reliable conclusions. Integration enables
    management and reporting across the enterprise.
•   Flexibility – The platform is adaptable in order to evolve as the business evolves.
    Furthermore, business is able to make changes and build out applications to
    solve business programs without relying on costly, time-intensive custom
    development.


           Integration
RSA Archer Integration Scenarios
There are several ways to get data from the infrastructure management tools into RSA
Archer. When evaluating options, organizations should look into variables such as
regulation, timeframe, goals, etc. Some of the key questions are:
1. With what industry regulatory requirements must the company comply?
2. At what stage of a GRC program is the company?
3. What are the most urgent issues?
4. What are the easy targets?
The basic integration mechanism is RSA Archer’s Data Feed Manager (DFM). With EMC
infrastructure management technologies, organizations can automatically and easily
collect and evaluate vulnerability or configuration of Network, Storage and Compute.
EMC Network Configuration Manager, Storage Configuration Advisor and vCenter
Configuration Manager have their discovery, scanning and analysis engine which is
efficient for a particular infrastructure domain. Therefore it should be a better method
of getting data from these automated scans for compliance assessment because they
are reliable and faster than other methods.




                                    Configuration Compliance for Storage, Network & Server   13
Scenario 1: Compliance Data Consolidation
Consolidating data could be a simple use case to have all IT infrastructure
information in one location. This scenario utilizes the summary reports from each of
the management technologies and rolls everything into Archer’s dashboard. The
overall process can be summarized in the following steps:
1. Configuration management tools are setup to perform configuration checks
   against preset policies within those tools.
2. Once the tests or checks are executed within those tools, the scanned results are
   summarized into summary reports.
3. Each report will contain basic information such as device name, pass/fail, rule,
   description, etc.
4. Data Feed Manager will reach out to either SQL database or .csv location and
   import those summary reports.
5. The feeds are setup so that data is stored in either Devices or Configuration Check
   Results application.
6. In some instances, there could be new On-Demand Applications (ODAs) because
   it depends on whether there is a need to pull additional data from the
   management tools.
This method gives users more power and flexibility to map IT assets and vulnerability
states to defined Business Units, Regions or Criticality. For organizations that have
specific needs to track a certain area of the IT infrastructure, this method can be a
quick win to provide such tracking mechanisms without manual effort or education of
configuration management technologies.




                                   Configuration Compliance for Storage, Network & Server   14
Scenario 2: Detail Control Mapping
This scenario requires a more comprehensive mapping exercise and building of data
feeds. The benefit is that organizations can monitor specific controls which could be
automatically checked by the configuration management tools.
Some examples of use cases are:
 Infrastructure     Procedure Name            Description
 Server             Windows Server 2008       Windows Server 2008 Member Server Idle
                    Member Server Idle Time   Time before suspending a session should
                    before suspending a       not be longer than 15 minutes of inactivity.
                    session                   When not being used, accounts should be
                                              logged off from the system console

 Network            Disable services per      The following interface services will be
                    specified interface       checked if they are disabled, if not then they
                                              will be disabled on the specified interface.
                                              •   ICMP redirects
                                              •   ICMP unreachable
                                              •   ICMP mask reply messages
                                              •   Proxy-Arp
                                              •   Directed Broadcasts
 Storage            Ensure all assets in a    Install the latest releases, updates, or
                    storage area network      patches within one month of release from
                    have latest vendor-       the vendor
                    supplied patches



In a typical environment, there could be hundreds or thousands of control procedures
setup to automatically scan for violations. In order to ensure integration between RSA
Archer and infrastructure management technologies, the following process provides
an overview of how it would work:
1. Each tool must be configured so that policies, rules or tests are configured and
   defined. For example, NCM must be set up with a test such as "Disable services
   per specified interface" in order to feed the result data of that rule into Archer.
2. Mapping content of control procedures and the results from each tool must be
   done within Archer's content framework prior to pulling data. This content will be
   mapped manually to Control Procedures.
3. Devices feed will populate the Devices application with data with information
   such as Device Name, IP Address, Device Type, etc.
4. Scan result feed will populate Configuration Check Results application with the
   compliance results from each tool.




                                     Configuration Compliance for Storage, Network & Server    15
The architecture diagram below demonstrates how different areas in Archer could be
structured.




The content hierarchy starts with Authoritative Sources such as PCI, HIPAA, SOX or
internal compliance requirements. Control Standards are different aspects of each
source and contain multiple Control Procedures for checking compliance. Each
Control Procedure will detail a specific action that must be executed and result in
either Compliance or Non-Compliance.
There are two ways for testing a control procedure:
•   Manual – A web-based questionnaire will be sent to the IT asset owner to
    respond.
•   Automated – This is where the integration happens and all tests or scans occur
    automatically.


Recommendations
GRC implementation can vary based on industry regulations, immediate business
needs, customer requirements or security breech events. Some organizations might
already use IT GRC technology to align controls with departmental, corporate policies
and regulations. However, most organizations still function as silos and do not have
the right technologies or processes to measure activities, provide efficiencies, and
evaluate risks.
An IT GRC platform should help an organization:
•   Define IT policies and controls based on external and internal requirements
•   Manage policy content
•   Map policies to controls
•   Evaluate IT risk




                                   Configuration Compliance for Storage, Network & Server   16
•   Automate auditing and regulatory reporting
This effort will require collaboration amongst the process owners and technical
owners in order to maintain compliance in the IT infrastructure. The integrated
solution of RSA Archer/EMC/VMware is an example of using the right tool set for
driving collaboration. In order to evaluate, the below criteria could be used for
assessing each scenario:
 Criteria              Scenario 1                          Scenario 2
                       Compliance Data Consolidation Detail Control Mapping
 Scalability                          Good                              Average

 Granularity                        Generic                              Detail

 Complexity                          Simple                             Complex

 Feed Frequency                       High                              Average

But, the secret to success is not just in the right platform, it’s also in the right
management approach to people and processes.

               Win
                ins
Focus on Quick Wins
An approach to focus on early quick wins will make it easier for the organization to
change. This is applicable to starting a new IT GRC strategy or revising an existing
one. Below are some examples to start with:
•   Focus on formalizing the risk process by taking some risk metrics from existing IT
    infrastructure management technologies.
•   Provide better visibility and awareness of risk at the senior executive level
•   Report on new risks which can be used to justify new security projects
•   Watch for inconsistency in processes, especially when it comes to control testing
•   Drive automated control testing for existing manual processes or even
    questionnaire
•   address compliance results which could be a very costly area when the company
    is fined
•   Bring in standardization and increase collaboration between Information Security
    and IT organizations

Drive Automation via Integration
IT tools such as VMware vCenter Configuration Manager (vCM), and EMC Network
Configuration Manager (NCM) and Storage Configuration Advisor (SCA) help to
monitor configuration settings and measure vulnerabilities in the IT infrastructure.
They collect data automatically and to perform correlations, analysis, and
assessments.




                                     Configuration Compliance for Storage, Network & Server   17
An advantage of using these technologies is their integration with a GRC framework
such as RSA Archer. Most organizations collect infrastructure information manually
either via spreadsheet, web portal, or archiving. This process can take time and is
prone to being out-of-date or unreliable due to human error. Integration with a GRC
framework allows these processes to happen automatically.

         Cost
Show the Cost Saving
Cost savings can be achieved in many different ways after compliance processes are
implemented. The obvious value is the improvement in an organization’s external
audit posture. Cost saving can also be translated from other metrics such as:
•   Percentage improvement in availability of critical business systems and processes
•   Reduced number of trouble tickets
•   Percentage of time IT staff needs to spend on problem management
•   Reduction in time spent planning and validating compliance with configuration
    best practices, security polices and industry regulations
•   Number of configuration violations identified
•   Reduction in service impacting events caused by improper configuration
•   Reduction in time spent remediating configuration violations
These metrics can also help to control company budget, avoiding over-spending or
under-spending. IT GRC strategy can only work if its success is proven by improving
the organization's capability to effectively address IT risks and economically align
processes.

Make it Easy for Executives
There is a lot of complexity behind infrastructure management technologies or IT
technologies in general. However, their results can be used by executives if the
reporting provides a simple way to roll up compliance data. A GRC framework such as
RSA Archer allows quick creation of simple dashboards with information such as the
current state of process and control compliance, vulnerabilities, and IT asset use.
Another argument for simplified compliance reporting is to meet the needs of internal
and external auditors. Without automation made possible by an integrated
compliance framework, it’s very likely that the data collected is inaccurate.

Involve Key Stakeholders Early
GRC strategies can be driven from either the top-down or bottom-up. IT GRC will have
more IT-centric requirements when driven from the bottom-up. Alternatively,
Enterprise GRC or eGRC will be more focused on enterprise risk and driven from top-
down. Both approaches will require a certain level of coordination amongst an
organization’s IT, security, audit, and risk management teams.




                                   Configuration Compliance for Storage, Network & Server   18
One key to success is to allow time to negotiate change. People need time to digest
the impact of a new way of thinking or doing things and assess what it means to them
and their jobs.


Conclusion
Understanding of key considerations and available options are critical to a successful
GRC implementation. With the journey to the cloud, this transformation will also
accelerate companies’ IT GRC journey. Therefore, the organization should have an
understanding of in-house infrastructure technologies, their capabilities and
integration options.
EMC’s infrastructure management portfolio has been helping its customers to provide
complete compliance and service assurance with the below proven results:
•   80% faster problem identification
•   60% faster resolution
•   2X more efficient IT operations
The values of EMC/RSA/VMware partnership provide (1) End-to-end Visibility, (2)
Automated Compliance and (3) Effective Remediation:
 Values          Features                              Benefits
 End-to-end      •   High Level Summary View           •   Summarize IT information
 Visibility          Dashboard                             relative to existing compliance
                 •   IT Operation Dashboard                programs
                 •   Detail Compliance Violation       •   Reduce time spent preparing for
                                                           audit via single reporting
                                                           engine
 Automated       •   Compliance Policies &             •   Provide compliance validation
 Compliance          Templates                             and change management
                 •   Configuration Checks              •   Avoid manual assessment via
                     Automation Against Policies           silo processes
                 •   Internal IT Best Practice
                     Standards
 Effective       •   Contextual Launch to Specific     •   Automate remediation to close
 Remediation         Remediation Technology                compliance gaps quickly with
                 •   Recommendation to Remediate           minimal effort
Technology improvements not only help EMC’s customers ensure compliance but also
provide them competitive advantages in the market place. That means companies
can be more agile and quicker to respond to business needs while improving
efficiencies and lowering costs.




                                      Configuration Compliance for Storage, Network & Server   19
Appendix
         Table 1. PCI DSS 2.0 Applicability Matrix for EMC Storage Configuration Advisor
Requirement                  Controls Addressed      Description
Requirement 2: Do not        2.2                     SCA has rules for checking SAN configuration against
use vendor-supplied                                  industry accepted best practices and EMC Support Matrix
defaults for system                                  (e.g. eLab) such as single initiator zoning, soft versus
passwords and other                                  hard zoning, and default zoning.
security parameters
Requirement 6: Develop       6.1, 6.2                SCA discovers Solutions Enabler, PowerPath, some third
and maintain secure                                  party MP drivers, HBA driver and firmware, switch OS and
systems and applications                             firmware, and array microcode.

                                                     SCA can also check SAN storage devices against EMC
                                                     Support matrix rules.

                                                     The integration with RSA Archer will help establish a
                                                     process to identify and assign a risk ranking to newly
                                                     discovered security vulnerabilities.
Requirement 10: Track        10.3.2, 10.3.3,         SCA tracks changes to the SAN configuration in near real
and monitor all access to    10.3.6                  time. Each change logged by SCA also includes date and
network resources and                                time. The name of the SAN asset is identified when
cardholder data                                      changes happen as well.
         Table 2. PCI DSS 2.0 Applicability Matrix for EMC Network Configuration Manager
Requirement                  Controls Addressed      Description
Requirement 1: Install and   1.1.1, 1.1.2, 1.1.3,    NCM is capable of accepting Syslog and Traps
maintain a firewall          1.1.4, 1.1.5, 1.1.6,    information from devices. This is to monitor the network
configuration to protect     1.2, 1.2.1, 1.2.2,      for changes completed outside of the configuration
cardholder data              1.2.3, 1.3, 1.3.1,      management system.
                             1.3.2, 1.3.3, 1.3.4,
                             1.3.5, 1.3.8            Network diagram can also be used to validate Layer 3
                                                     connectivity. NCM reports will also define for each
                                                     connection, what technology is in place such as ATM,
                                                     Frame relay, and Point-to-Point.

                                                     User access to secured network components are
                                                     constraint by access-list. A permission scheme in NCM
                                                     can be defined for users to access resources and
                                                     operations needed to perform their jobs.

                                                     Since only a small amount of documentation can be
                                                     stored on a firewall or router, NCM supports the creation
                                                     of network and device objects which can store comments
                                                     or attachments. NCM templates can also be used to
                                                     define best practices and tests can be created to enforce
                                                     these best practices.




                                                Configuration Compliance for Storage, Network & Server           20
Device State Report provides total devices out of sync
                                                     between startup and running configuration which could
                                                     result in vulnerability.

                                                     NCM templates consist of samples for implementing a
                                                     DMZ with inbound / outbound traffic to only protocols
                                                     that are necessary for the cardholder data environment.
Requirement 2: Do not      2.1, 2.1.1, 2.2, 2.2.2,   NCM has prebuilt templates for detecting default
use vendor-supplied        2.2.3, 2.2.4, 2.3         password of network devices or disabling unnecessary
defaults for system                                  and insecure services and protocols. Users can define
passwords and other                                  association of these templates with specific PCI
security parameters                                  requirements.

                                                     NCM allows a wide variety of communications protocols
                                                     including SSH, SCP, Telnet, SNMP V1, SNMP V2c, SNMP
                                                     V3, modems and terminal servers. It is recommended
                                                     that whenever a device supports the secure protocols
                                                     SSH, SCP and SNMP V3, they should be used. Using
                                                     Secure Shell Protocol (SSH) for network device
                                                     communication provides encrypted communications
                                                     between the device server and devices for issuing
                                                     configuration updates and polling configuration changes.

                                                     Many devices are also capable of using SNMP V3 for
                                                     network management. NCM provides SNMP V3
                                                     manageability using authorization and privacy protocols.
                                                     SNMP V3 in conjunction with SSH, provides the highest
                                                     level of security available to manage network devices.
Requirement 4: Encrypt     4.1                       VPN Encryption template can be used to associate with
transmission of                                      cryptography and security protocols requirements to
cardholder data across                               safeguard sensitive cardholder data during transmission
open, public networks                                over open, public networks.
Requirement 6: Develop     6.1, 6.4.1, 6.4.2         NCM can be used to prepare for OS upgrades by
and maintain secure                                  providing OS Inventory reports, and by providing
systems and applications                             hardware reports for verifying memory prerequisites. The
                                                     NCM OS Manager can be used to deploy new OS versions
                                                     to many types of network devices, including some
                                                     wireless access points.

                                                     For change control procedures of system components,
                                                     NCM’s job description field should be used to reference
                                                     change tickets and/or include full change description.
Requirement 8: Assign a    8.3, 8.5.13, 8.5.14,      Users can customize TACACS Server and RADIUS Server
unique ID to each person   8.5.15                    templates in automation library to satisfy authentication
with computer access                                 requirement of remote access to the network by
                                                     employees, administrators and third parties.

                                                     NCM contains four different types of authentication, each
                                                     of which allows the administrator to control the number
                                                     of logins which a user can attempt before the account is




                                               Configuration Compliance for Storage, Network & Server            21
locked.

                                                    With this authentication mechanism, user accounts are
                                                    authenticated against an internal database in NCM,
                                                    external TACACS+ server, RADIUS server or LDAP server.
                                                    Administrators can set an explicit limit to the number of
                                                    authentication attempts a user can have before the
                                                    account is locked. The administrator should set this to
                                                    less than six.

                                                    When a user session is locked out in NCM, the user
                                                    account will not be unlocked until explicit action is taken
                                                    by the administrator to unlock the user ID.

                                                    The default user session timeout in NCM is 30 minutes,
                                                    after which the user’s session will automatically timeout
                                                    and require a login to continue. This can be controlled
                                                    through the JMX console, which ca be accessed by
                                                    system administrator.
Requirement 10: Track       10.1, 10.2.2, 10.2.3,   NCM maintains an audit log of all device accesses made,
and monitor all access to   10.2.4, 10.2.5,         as well as any device change events detected on the
network resources and       10.2.7, 10.3.1,         device via notification from the device (Syslogs, or
cardholder data             10.3.2, 10.3.3,         Traps), or timed configuration pull.
                            10.3.4, 10.3.5,
                            10.3.6, 10.4, 10.5,     For automated audit trails, NCM logs all accesses to
                            10.5.1, 10.5.2, 10.6    protected resources through the user interface or API,
                                                    regardless of whether the user is a system administrator
                                                    or not. It exposes both AuthorizationFailedEvent and
                                                    AuthorizationSucceededEvent for any logical access
                                                    attempts.

                                                    Many other events related to creation and deletion of
                                                    system-level objects is also collected for Security
                                                    System-level Objects, Device and Credentials System-
                                                    level Objects, Device Containment System-level Object,
                                                    Automation Library (Compliance and Standardization)
                                                    System-level Objects.

                                                    NCM records change of both the user who made the
                                                    change and the user who approved the change in its
                                                    revision history, including time stamp as detected either
                                                    from the scheduled job, the change notification, or the
                                                    device itself.

                                                    All audit trail entries are also recorded for both success
                                                    and failure status such as DeviceRevChangeFailedEvent,
                                                    DeviceRevCreateFailedEvent,
                                                    DeviceRevPolicyCheckFailedEvent,
                                                    CommunicationRestoredEvent, etc…




                                              Configuration Compliance for Storage, Network & Server              22
NCM categorizes each event by action type, event type,
                                                       severity type, and source type. The action type is the
                                                       actual type of event, such as JobFailedEvent.

                                                       To synchronize all critical system clocks and times, a
                                                       template called Test For Network Time Protocol can be
                                                       used.

                                                       Securing audit trails to avoid altering can be done with
                                                       NCM as well. Users are constrained to only see events for
                                                       resources to which they have view permissions. NCM has
                                                       a system-level permission named View Audit which
                                                       controls whether a user may see event logs.
Requirement 12: Maintain       12.1, 12.1.1            The Archer/NCM integration can be used to publish the
a policy that addresses                                process documentation written by the user. This process
information security for all                           documentation is useful not only for dissemination
personnel                                              across the group but also for daily review by engineers
                                                       responsible for certain aspects of PCI.

                                                       Users and auditors can also get a focused view of the
                                                       requirements, best practices, samples and reports to
                                                       help engineers address each requirement. The
                                                       integration will help engineers stay well informed as to
                                                       the requirements of PCI and the compliance status of the
                                                       network.
          Table 3. PCI DSS 2.0 Applicability Matrix for VMWare vCenter Configuration Manager
Requirement                    Controls Addressed      Description
Requirement 2: Do not          2.1.1, 2.2.1, 2.2.2,    vCM can be used to detect, and in many circumstances,
use vendor-supplied            2.2.3, 2.2.4            correct default security settings on Windows, Solaris and
defaults for system                                    Linux systems. System security parameters can be
passwords and other                                    configured following hardening guideline for Windows,
security parameters                                    Solaris and Linux.

                                                       Admin can also remove unnecessary functionality via
                                                       built-in remediation actions as well as scripted remote
                                                       commands.
Requirement 5: Use and         5.1, 5.2                Although vCM is not an anti-virus solution, it can be used
regularly update anti-virus                            to assess and report the anti-virus state of the system.
software or programs                                   This allow a determination that all systems have anti-
                                                       virus software installed and running with the updated
                                                       signature files.
Requirement 6: Develop         6.1                     vCM is able to access, download and deploy patches to
and maintain secure                                    Windows, Unix, Linux and Mac operating systems.
systems and applications                               Assessments are customizable and can be set to verify
                                                       critical patches in the past 30 days.

                                                       Changes within the virtual environment are captured as
                                                       well. Each change made to the configuration settings is




                                                  Configuration Compliance for Storage, Network & Server            23
documented and logged. If a change is made without the
                                                      proper approval it is alerted with a simple roll back
                                                      procedure and the change is reversed. vCM is able to
                                                      track changes both made through the standard change
                                                      process or out of band changes conducted directly on the
                                                      VMs or through another tools.
Requirement 7: Restrict     7.1                       vCM can be used to validate user access to data stored on
access to cardholder data                             any Windows, Solaris and Linux system.
by business need to know
Requirement 8: Assign a     8.1, 8.2, 8.5.1, 8.5.4,   vCM has the ability to monitor access controls and report
unique ID to each person    8.5.5, 8.5.6, 8.5.9,      on the following:
with computer access        8.5.10, 8.5.11,           • Local and domain-level users (Windows) and users with
                            8.5.12, 8.5.13,               unique username (UNIX, Linux and Mac).
                            8.5.14, 8.5.15            • System password policies for expiration, length,
                                                          standards, creation settings, and access attempts
                                                      • Changes to user accounts, credential stores, and
                                                          identifier objects to provide visibility and control over
                                                          system access
                                                      • User access across all the systems in the datacenter at
                                                          once
                                                      • Disable and remove access for terminated user
                                                          accounts
                                                      • Inactive accounts (which it can also disable and remove
                                                          access for these user accounts)
                                                      • The status of maintenance accounts and to confirm
                                                          that they are disabled and configured to only be used
                                                          during the times specified
                                                      • Login policies, to include lockout settings and auto-
                                                          logout settings, and remediating as needed.
                                                          Assessment, reporting and remediation is conducted in
                                                          accordance with scheduling through vCM
Requirement 10: Track       10.2.1, 10.2.2,           vCM will assess, report and remediate the following:
and monitor all access to   10.2.3, 10.2.4,           • Configurations of the system auditing and logging
network resources and       10.2.5, 10.2.6,              services to support proper logging across system
cardholder data             10.2.7, 10.4, 10.5.1,        components
                            10.5.2, 10.5.3,           • Collect audit logs entries to provide a single view of
                            10.5.4, 10.5.5               events
                                                      • NTP settings and configuration details
                                                      • User access audit trails by ensuring proper permissions
                                                         for log files and their directories and alert on changes
                                                         to critical audit trails
Requirement 11: Regularly
               11           11.5                      vCM can be configured to monitor critical files and
test security systems and                             provide alerts and reports detailing any changes made or
processes                                             attempted.




                                               Configuration Compliance for Storage, Network & Server                 24

More Related Content

What's hot

BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsChris Farwell
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...Symantec
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideSymantec
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodaySymantec
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec
 
Backup exec 2015 end user presentation
Backup exec 2015 end user presentationBackup exec 2015 end user presentation
Backup exec 2015 end user presentationTania Macarlupú
 
How windows server 2008 r2 helps optimize it and save you money
How windows server 2008 r2 helps optimize it and save you moneyHow windows server 2008 r2 helps optimize it and save you money
How windows server 2008 r2 helps optimize it and save you moneyupendhra90
 
Dim-to-Dark Datacenter Operations
Dim-to-Dark Datacenter OperationsDim-to-Dark Datacenter Operations
Dim-to-Dark Datacenter OperationsMatt Mansell
 
Protecting Microsoft Exchange with the NEW Backup Exec 15
Protecting Microsoft Exchange with the NEW Backup Exec 15Protecting Microsoft Exchange with the NEW Backup Exec 15
Protecting Microsoft Exchange with the NEW Backup Exec 15Symantec
 
Micro Focus Connected MX - Remote Data Backups case study
Micro Focus Connected MX - Remote Data Backups case studyMicro Focus Connected MX - Remote Data Backups case study
Micro Focus Connected MX - Remote Data Backups case studyDaniel Dugal
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recrosu555
 
Tideway Foundation 7.2 Cmdb Population
Tideway Foundation 7.2 Cmdb PopulationTideway Foundation 7.2 Cmdb Population
Tideway Foundation 7.2 Cmdb PopulationPeter Grant
 
328491-PCI-dss white paper
328491-PCI-dss white paper328491-PCI-dss white paper
328491-PCI-dss white paperManoj Punamia
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facilityramparasa
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsSchneider Electric
 
Belden Industrial Ethernet White Paper
Belden Industrial Ethernet White PaperBelden Industrial Ethernet White Paper
Belden Industrial Ethernet White Paperadventive1
 
Managing Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User ExperienceManaging Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User ExperienceIBM India Smarter Computing
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu
 
Intel Node Manager Intro
Intel Node Manager IntroIntel Node Manager Intro
Intel Node Manager IntroDavid Jenkins
 

What's hot (20)

BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 Years
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
 
Backup exec 2015 end user presentation
Backup exec 2015 end user presentationBackup exec 2015 end user presentation
Backup exec 2015 end user presentation
 
How windows server 2008 r2 helps optimize it and save you money
How windows server 2008 r2 helps optimize it and save you moneyHow windows server 2008 r2 helps optimize it and save you money
How windows server 2008 r2 helps optimize it and save you money
 
Dim-to-Dark Datacenter Operations
Dim-to-Dark Datacenter OperationsDim-to-Dark Datacenter Operations
Dim-to-Dark Datacenter Operations
 
Protecting Microsoft Exchange with the NEW Backup Exec 15
Protecting Microsoft Exchange with the NEW Backup Exec 15Protecting Microsoft Exchange with the NEW Backup Exec 15
Protecting Microsoft Exchange with the NEW Backup Exec 15
 
Micro Focus Connected MX - Remote Data Backups case study
Micro Focus Connected MX - Remote Data Backups case studyMicro Focus Connected MX - Remote Data Backups case study
Micro Focus Connected MX - Remote Data Backups case study
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
 
Tideway Foundation 7.2 Cmdb Population
Tideway Foundation 7.2 Cmdb PopulationTideway Foundation 7.2 Cmdb Population
Tideway Foundation 7.2 Cmdb Population
 
328491-PCI-dss white paper
328491-PCI-dss white paper328491-PCI-dss white paper
328491-PCI-dss white paper
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility Operations
 
Belden Industrial Ethernet White Paper
Belden Industrial Ethernet White PaperBelden Industrial Ethernet White Paper
Belden Industrial Ethernet White Paper
 
Managing Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User ExperienceManaging Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User Experience
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
 
Intel Node Manager Intro
Intel Node Manager IntroIntel Node Manager Intro
Intel Node Manager Intro
 

Viewers also liked

Insaat kursu-samsun
Insaat kursu-samsunInsaat kursu-samsun
Insaat kursu-samsunsersld54
 
คณิตศาสตร์
คณิตศาสตร์คณิตศาสตร์
คณิตศาสตร์jojowhisky
 
Metrographics
MetrographicsMetrographics
Metrographicstklubert
 
Tuesday marginal analysis
Tuesday marginal analysisTuesday marginal analysis
Tuesday marginal analysisTravis Klein
 
Fourth lesson
Fourth lessonFourth lesson
Fourth lessonmeteab
 
โรคขาดโปรตีน
โรคขาดโปรตีนโรคขาดโปรตีน
โรคขาดโปรตีนThanaporn Srithananun
 
Insaat kursu-bahcelievler
Insaat kursu-bahcelievlerInsaat kursu-bahcelievler
Insaat kursu-bahcelievlersersld54
 
Where doyoustand!(1)
Where doyoustand!(1)Where doyoustand!(1)
Where doyoustand!(1)Chandan Dubey
 
Facebook vs Twitter
Facebook vs TwitterFacebook vs Twitter
Facebook vs TwitterSiti Rizki
 
InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!Sara M
 
Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...
Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...
Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...Amanda James
 

Viewers also liked (17)

Insaat kursu-samsun
Insaat kursu-samsunInsaat kursu-samsun
Insaat kursu-samsun
 
Yura
Yura Yura
Yura
 
คณิตศาสตร์
คณิตศาสตร์คณิตศาสตร์
คณิตศาสตร์
 
Spain
SpainSpain
Spain
 
Metrographics
MetrographicsMetrographics
Metrographics
 
Tuesday marginal analysis
Tuesday marginal analysisTuesday marginal analysis
Tuesday marginal analysis
 
Fourth lesson
Fourth lessonFourth lesson
Fourth lesson
 
โรคขาดโปรตีน
โรคขาดโปรตีนโรคขาดโปรตีน
โรคขาดโปรตีน
 
Insaat kursu-bahcelievler
Insaat kursu-bahcelievlerInsaat kursu-bahcelievler
Insaat kursu-bahcelievler
 
Where doyoustand!(1)
Where doyoustand!(1)Where doyoustand!(1)
Where doyoustand!(1)
 
Tue law of demand
Tue law of demandTue law of demand
Tue law of demand
 
Teamwork
TeamworkTeamwork
Teamwork
 
Nessa
NessaNessa
Nessa
 
Facebook vs Twitter
Facebook vs TwitterFacebook vs Twitter
Facebook vs Twitter
 
InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!
 
Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...
Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...
Wind_Energy_Law_2014_Amanda James _Avoiding Regulatory Missteps for Developer...
 
Windows Server 2012 Virtualization: Notes from the Field
Windows Server 2012 Virtualization: Notes from the FieldWindows Server 2012 Virtualization: Notes from the Field
Windows Server 2012 Virtualization: Notes from the Field
 

Similar to Configuration Compliance For Storage, Network & Server

EMC Hybrid Cloud for SAP - Enhanced Security and Compliance
EMC Hybrid Cloud for SAP - Enhanced Security and ComplianceEMC Hybrid Cloud for SAP - Enhanced Security and Compliance
EMC Hybrid Cloud for SAP - Enhanced Security and ComplianceEMC
 
EMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOPEMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOPEMC
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1Craig Burma
 
Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...
Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...
Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...Vinay Rajagopal
 
EMC IT's Journey to the Private Cloud: A Practitioner's Guide
EMC IT's Journey to the Private Cloud: A Practitioner's Guide EMC IT's Journey to the Private Cloud: A Practitioner's Guide
EMC IT's Journey to the Private Cloud: A Practitioner's Guide EMC
 
EMC IT Redefined
EMC IT RedefinedEMC IT Redefined
EMC IT RedefinedEMC
 
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlCloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlAshwin V.
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...EMC
 
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...EMC
 
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...EMC
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - finalAndrew White
 
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC
 
A proven roadmap to business agility by industry
A proven roadmap to business agility by industryA proven roadmap to business agility by industry
A proven roadmap to business agility by industryIBM Software India
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...Symantec
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecksbenscheerer
 
Practical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster RecoveryPractical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster Recoveryatif_kamal
 
White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service   White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service EMC
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsHitachi ID Systems, Inc.
 

Similar to Configuration Compliance For Storage, Network & Server (20)

EMC Hybrid Cloud for SAP - Enhanced Security and Compliance
EMC Hybrid Cloud for SAP - Enhanced Security and ComplianceEMC Hybrid Cloud for SAP - Enhanced Security and Compliance
EMC Hybrid Cloud for SAP - Enhanced Security and Compliance
 
EMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOPEMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOP
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...
Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...
Recover First, Resolve Next – Towards Closed Loop Control for Managing Hybrid...
 
EMC IT's Journey to the Private Cloud: A Practitioner's Guide
EMC IT's Journey to the Private Cloud: A Practitioner's Guide EMC IT's Journey to the Private Cloud: A Practitioner's Guide
EMC IT's Journey to the Private Cloud: A Practitioner's Guide
 
EMC IT Redefined
EMC IT RedefinedEMC IT Redefined
EMC IT Redefined
 
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlCloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
 
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
 
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
White Paper: EMC Security Design Principles for Multi-Tenant As-a-Service Env...
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
 
A proven roadmap to business agility by industry
A proven roadmap to business agility by industryA proven roadmap to business agility by industry
A proven roadmap to business agility by industry
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
 
Practical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster RecoveryPractical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster Recovery
 
White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service   White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service
 
Building private clouds on IBM Power systems
Building private clouds on IBM Power systemsBuilding private clouds on IBM Power systems
Building private clouds on IBM Power systems
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged Accounts
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Configuration Compliance For Storage, Network & Server

  • 1. White Paper CONFIGURATION COMPLIANCE FOR STORAGE, NETWORK & SERVER A Detail Review Abstract This white paper explains how the Configuration Compliance solution can enable companies to ensure visibility of the IT infrastructure, automate remediation and increase efficiency. The document will show the benefits of integrating IT infrastructure management technologies such as Network Configuration Manager, Storage Configuration Advisor and vCenter Configuration Manager into the RSA Archer platform. June 2012
  • 2. Copyright © 2012 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware is registered trademark VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number h10841 Configuration Compliance for Storage, Network & Server 2
  • 3. Table of Contents Executive summary.................................................................................................. 4 summary.................................................................................................. ................................................................................................ Audience................................................................................................................. Audience................................................................................................................. 4 ................................................................................................ Introduction ............................................................................................................ 5 ............................................................................................................ ................................................................ Infrastructure Compliance Challenges ................................................................................ 5 ............................................................. IT Infrastructure Configuration Management ............................................................. 6 EMC Storage Configuration Advisor .................................................................................... 6 EMC Network Configuration Manager.................................................................................. 7 VMWare vCenter Configuration Manager............................................................................. 9 IT GRC as a Business Imperative ............................................................................ 11 ............................................................................ ................................ Platform Approach to IT GRC ............................................................................................. 12 RSA Archer Integration Scenarios ........................................................................... 13 ........................................................................... ................................ Scenario 1: Compliance Data Consolidation ..................................................................... 14 Scenario 2: Detail Control Mapping .................................................................................. 15 ................................................................ ................................................................ Recommendations ................................................................................................ 16 Focus on Quick Wins ........................................................................................................ 17 Drive Automation via Integration ...................................................................................... 17 Show the Cost Saving ....................................................................................................... 18 Make it Easy for Executives............................................................................................... 18 Involve Key Stakeholders Early ......................................................................................... 18 Conclusion ............................................................................................................ 19 ............................................................................................................ ................................................................ Appendix .............................................................................................................. 20 .............................................................................................................. ................................................................ Configuration Compliance for Storage, Network & Server 3
  • 4. Executive summary In today’s fast changing market, organizations must be quick to respond to changes as well as be efficient and lower costs. In addition, the journey to the cloud has been driving the IT organization toward better utilization of their infrastructure through virtualization of compute and storage, and optimization of networks. However, this transformation also leads to new challenges relating to IT visibility and compliance complexity. What most companies need is an effective approach to governance, risk management, and compliance (GRC). IT infrastructure compliance needs to be a part of the overall GRC strategy. It’s critical to address the internal complexities brought on by today’s dynamic physical and virtual data centers with both new technologies and new ways of doing business. GRC used to start by discrete projects with focus on policy definition, manual testing of controls and minimal use of risk management models. Over the years, companies started to incorporate IT risk management & IT governance with periodic testing of IT controls via web-based questionnaire method. Today we see the linkages between enterprise GRC, information GRC, and IT operations GRC becoming more transparent. Technologies are able to enable tighter integration for automated control monitoring and better management of risks. EMC, RSA and VMware are committed to expanding the benefits companies are receiving from RSA Archer and infrastructure management software investments. The EMC Configuration Compliance Solution provides a seamless integration of RSA Archer with: • EMC Storage Configuration Advisor (SCA) • EMC Network Configuration Manager (NCM) • VMware vCenter Configuration Manager (vCM) Most organizations are asking for help from technology vendors on addressing the cost of compliance and increasing system uptime. In many scenarios, automation is the key to their success. Audience This white paper is intended for Infrastructure Administrators, Storage Administrators, Network Administrators, RSA Archer Administrators, Information Security Architects or Compliance Officers. Configuration Compliance for Storage, Network & Server 4
  • 5. Introduction EMC is leading the industry in enabling companies of all sizes to progress along their journey to the cloud. This journey can be divided into 3 phases: 1. Phase 1 – Focus on hardware consolidation and virtualization of non-mission critical IT production apps. 2. Phase 2 – Assess potential benefits from virtualizing mission critical apps. 3. Phase 3 – Explore new opportunities to drastically enhance the speed and agility of IT This transition, together with competitive, internal and regulatory pressure, has created many new challenges. Infrastructure Compliance Challenges The problems that both IT and Information Security teams facing are in 3 areas: • Lack of IT Visibility o $26.5B revenue lost in 2011 due to IT downtime o Infrastructure outage can cost average of $5,000 per minute • Configuration Complexity o 85% of IT problems are related to organization and technology change o 78% of outages caused by misconfigurations due to changes • Increasing Regulatory Requirements o Only 1 in 10 companies can effectively measure infrastructure compliance First, many organizations may not have deep visibility into the IT infrastructure from the security and compliance standpoint. Information is tracked via manual processes and there are days or weeks of delay. There is no integrated approach to provide more Configuration Compliance for Storage, Network & Server 5
  • 6. visibility to high level executives or blend the information from IT infrastructure into the overall compliance context. Second, security teams often do not realize there are better ways to collect information and assess risk in the organization. In many instances, it’s possible to leverage EMC and VMware technologies to collect IT data from the sources automatically and perform correlation, analysis, and assessment. Third, companies spend a significant amount of time proving compliance to internal and external auditors. Without automation, manual data collection can be very unreliable. IT Infrastructure Configuration Management Many tools out there may provide IT a partial picture of the infrastructure such as the changes to server environment but not the changes to network and storage environment. Others may cover all infrastructure domains but do not provide prebuilt templates, change management or remediation capabilities. This inconsistent vision of the entire infrastructure makes compliance management and reporting a very challenging part of GRC operations. By offering complete coverage across domains, companies will have a complete vision of the state of IT infrastructure. EMC, RSA and VMware can provide the coverage across the entire infrastructure, providing organizations the visibility to make compliance management an efficient, cost effective and low risk process. There is a big advantage of using EMC and VMware technologies to integrate into existing RSA Archer framework and enhance the values. It’s critical to have an understanding of the capabilities of infrastructure management tools. Advisor EMC Storage Configuration Advisor EMC Storage Configuration Advisor tracks and reports changes to storage resources and ensures that they are compliant with defined storage configuration policies. Some examples of storage policies are: • Internal configuration policies • Industry best practices • EMC E-lab interoperability • Multipath management Table 1 in Appendix provides more examples of how organizations can utilize this technology for PCI DSS 2.0 compliance effort. Storage Configuration Advisor leverages agentless discovery, near-real-time change tracking, and configuration policy validation to identify issues before they can impact service levels. It also provides change history and service analytics to help IT improve processes and resource planning. Finally the technology provides recommendations across storage infrastructure. Configuration Compliance for Storage, Network & Server 6
  • 7. EMC delivers Storage Configuration Advisor on hardware or virtual appliance that includes the application and its data repositories. It uses a web-based user interface and employs industry-standard agentless discovery based on VMware API, WMI, SSH, SNMP, and SMI-S standards. The below diagram explains Storage Configuration Advisor’s architecture. The key benefits of Storage Configuration Advisor are: • Efficient Change Monitoring and Validation o Validate host and infrastructure interoperability against defined policies o Automatically document configuration changes and violations • Lower Risk of Changes o Roll out infrastructure upgrades with continuous configuration validation o Improve MTTR by rapidly identifying changes that impact service levels • Operational Planning and Oversight o Understand current trends and their impact on change and configuration management processes o Automate documentation enabling audit readiness EMC Network Configuration Manager EMC Network Configuration Manager helps organization keep network components compliant in a number of ways. Some use cases are: Configuration Compliance for Storage, Network & Server 7
  • 8. Design, enforce and report on adherence to complex network policies. The policy enforcement could be for the entire domain or just one network site or subnet • Leverage best-practice templates to schedule and deploy any-scale change quickly through distributed architecture and workflow capabilities • Demonstrate on demand compliance and its change/control process • Report on historical compliance of the managed infrastructure using the configuration and policies in place on the date selected Network Configuration Manager has an intuitive graphical network view and automates complex and routine engineering tasks, such as adding devices and connections, with drag-and-drop simplicity. One important capability of Network Configuration Manager is its real-time auto discovery of network devices and logical and physical topology information. Being able to collect network asset information and track against enterprise compliance policies is a critical component of GRC operations. Another advantage of using Network Configuration Manager is that it allows the view of configuration data, in a vendor-neutral format, using device modeling and merges configuration data and device variables with best-practice templates to help ensure compliance. This capability is delivered via the powerful Automation Library. Configuration Compliance for Storage, Network & Server 8
  • 9. These templates are key parts of IT GRC process to make sure the network is compliant with industry regulation such as PCI DSS 2.0 (See Table 2 in Appendix See Appendix). The key benefits of Network Configuration Manager are: • Control Network Change o One system to manage a multivendor network and ensure compliance across its entire lifecycle • Increase Operating Efficiency o Lower costs and simplify operations; increase network and service availability; and deliver services and respond to business needs faster • Ensure Network Compliance o Detect compliance states, flag violations and fix problems to reduce business risk VMWare vCenter Configuration Manager VMware vCenter Configuration Manager is a policy-driven configuration automation solution that detects deep virtual and physical changes and checks whether those changes are compliant to industry, regulatory or internal self-defined best practices. It helps organizations avoid configuration drift by remediating systems to bring them back into compliance. Some examples of use cases are: • Managing change • Controlling risk Configuration Compliance for Storage, Network & Server 9
  • 10. Automating operating system, software provisioning and patching with vSphere integration vCenter Configuration Manager automates critical IT configuration management and compliance processes across thousands of assets, security and configuration settings from vSphere, VMware ESXi™ and ESX®, Windows, UNIX or Linux servers and user desktops. Table 3 in Appendix provides a full list of how organizations can use vCenter Configuration Manager for PCI DSS 2.0. This technology is “cloud ready” as it allows IT organizations to detect changes quickly and manage host compliance across multiple VMware vCloud Director’s instances and guests. The advantage of using vCenter Configuration Manager is its rule building capability. The Rule Wizard will help IT organizations meet internal and external standards. Configuration Compliance for Storage, Network & Server 10
  • 11. The key benefits of VMware vCenter Configuration Manager are: • Policy Driven Configuration Management o Provision IT approved OS images & software packages o Patch to mitigate known vulnerabilities • vSphere Compliance Checker o Check a small number of VMs against vSphere hardening Guidelines • Ensuring Compliance for Hybrid Cloud Workloads o Ability to manage guest level compliance across Clouds o Certified deployment models for vCloud Service Provider Partners IT GRC as a Business Imperative The emergence of IT GRC as a strategy for protecting the enterprise from IT risk while removing barriers to growth is the result of a number of factors: 1. Demands on corporate governance 2. Multi-faceted risk environment 3. Growing regulatory requirements 4. Disappearing boundaries in the hyper-extended enterprise These elements require stronger collaboration between IT and Information Security. Today, there is a need to have the transformation to a more programmatic approach with the use of technology. Configuration Compliance for Storage, Network & Server 11
  • 12. Platform Platform Approach to IT GRC Organizations frequently rely on a document-centric, paper-based approach to risk and compliance management, rarely attending sophistication beyond electronic documents and spreadsheets. Aside from being error-prone and inefficient, this approach makes it difficult to share information, thereby reinforcing silos. RSA Archer provides a technology architecture that integrates with EMC/VMware systems to provide a cohesive view. The integrated solution not only provides compliance data for configuration violations and vulnerabilities but also blends with: • Risk analytics • Loss events • Logs • Document and records retention data • Accounting and HR information All of this data is scattered across multiple tools and systems. RSA Archer aggregates the data putting risks, threats, incidents and compliance deficiencies into business context and enabling prioritization of the response based on what is most significant to the organization. The key characteristics of RSA Archer platform include: • Centralized Centralized Views – A central view of risk and compliance activities provides a single lens through which stakeholders can identify threats early and prioritize Configuration Compliance for Storage, Network & Server 12
  • 13. issues, as well as improve efficiencies by applying a single process to multiple regulations. • Automation Automation – Through automation, organizations achieve continuous risk and controls monitoring as opposed to the point-in-time spot checks of the past. Technological capabilities required include advanced risk analytics and modeling, automated controls tied to business rules engines, advanced content and process management capabilities, and embedded GRC control points. • Integrated Systems – Multiple point solutions that span different areas of the infrastructure are costly to manage, fail to deliver a holistic view of the enterprise and cannot correlate analysis to provide reliable conclusions. Integration enables management and reporting across the enterprise. • Flexibility – The platform is adaptable in order to evolve as the business evolves. Furthermore, business is able to make changes and build out applications to solve business programs without relying on costly, time-intensive custom development. Integration RSA Archer Integration Scenarios There are several ways to get data from the infrastructure management tools into RSA Archer. When evaluating options, organizations should look into variables such as regulation, timeframe, goals, etc. Some of the key questions are: 1. With what industry regulatory requirements must the company comply? 2. At what stage of a GRC program is the company? 3. What are the most urgent issues? 4. What are the easy targets? The basic integration mechanism is RSA Archer’s Data Feed Manager (DFM). With EMC infrastructure management technologies, organizations can automatically and easily collect and evaluate vulnerability or configuration of Network, Storage and Compute. EMC Network Configuration Manager, Storage Configuration Advisor and vCenter Configuration Manager have their discovery, scanning and analysis engine which is efficient for a particular infrastructure domain. Therefore it should be a better method of getting data from these automated scans for compliance assessment because they are reliable and faster than other methods. Configuration Compliance for Storage, Network & Server 13
  • 14. Scenario 1: Compliance Data Consolidation Consolidating data could be a simple use case to have all IT infrastructure information in one location. This scenario utilizes the summary reports from each of the management technologies and rolls everything into Archer’s dashboard. The overall process can be summarized in the following steps: 1. Configuration management tools are setup to perform configuration checks against preset policies within those tools. 2. Once the tests or checks are executed within those tools, the scanned results are summarized into summary reports. 3. Each report will contain basic information such as device name, pass/fail, rule, description, etc. 4. Data Feed Manager will reach out to either SQL database or .csv location and import those summary reports. 5. The feeds are setup so that data is stored in either Devices or Configuration Check Results application. 6. In some instances, there could be new On-Demand Applications (ODAs) because it depends on whether there is a need to pull additional data from the management tools. This method gives users more power and flexibility to map IT assets and vulnerability states to defined Business Units, Regions or Criticality. For organizations that have specific needs to track a certain area of the IT infrastructure, this method can be a quick win to provide such tracking mechanisms without manual effort or education of configuration management technologies. Configuration Compliance for Storage, Network & Server 14
  • 15. Scenario 2: Detail Control Mapping This scenario requires a more comprehensive mapping exercise and building of data feeds. The benefit is that organizations can monitor specific controls which could be automatically checked by the configuration management tools. Some examples of use cases are: Infrastructure Procedure Name Description Server Windows Server 2008 Windows Server 2008 Member Server Idle Member Server Idle Time Time before suspending a session should before suspending a not be longer than 15 minutes of inactivity. session When not being used, accounts should be logged off from the system console Network Disable services per The following interface services will be specified interface checked if they are disabled, if not then they will be disabled on the specified interface. • ICMP redirects • ICMP unreachable • ICMP mask reply messages • Proxy-Arp • Directed Broadcasts Storage Ensure all assets in a Install the latest releases, updates, or storage area network patches within one month of release from have latest vendor- the vendor supplied patches In a typical environment, there could be hundreds or thousands of control procedures setup to automatically scan for violations. In order to ensure integration between RSA Archer and infrastructure management technologies, the following process provides an overview of how it would work: 1. Each tool must be configured so that policies, rules or tests are configured and defined. For example, NCM must be set up with a test such as "Disable services per specified interface" in order to feed the result data of that rule into Archer. 2. Mapping content of control procedures and the results from each tool must be done within Archer's content framework prior to pulling data. This content will be mapped manually to Control Procedures. 3. Devices feed will populate the Devices application with data with information such as Device Name, IP Address, Device Type, etc. 4. Scan result feed will populate Configuration Check Results application with the compliance results from each tool. Configuration Compliance for Storage, Network & Server 15
  • 16. The architecture diagram below demonstrates how different areas in Archer could be structured. The content hierarchy starts with Authoritative Sources such as PCI, HIPAA, SOX or internal compliance requirements. Control Standards are different aspects of each source and contain multiple Control Procedures for checking compliance. Each Control Procedure will detail a specific action that must be executed and result in either Compliance or Non-Compliance. There are two ways for testing a control procedure: • Manual – A web-based questionnaire will be sent to the IT asset owner to respond. • Automated – This is where the integration happens and all tests or scans occur automatically. Recommendations GRC implementation can vary based on industry regulations, immediate business needs, customer requirements or security breech events. Some organizations might already use IT GRC technology to align controls with departmental, corporate policies and regulations. However, most organizations still function as silos and do not have the right technologies or processes to measure activities, provide efficiencies, and evaluate risks. An IT GRC platform should help an organization: • Define IT policies and controls based on external and internal requirements • Manage policy content • Map policies to controls • Evaluate IT risk Configuration Compliance for Storage, Network & Server 16
  • 17. Automate auditing and regulatory reporting This effort will require collaboration amongst the process owners and technical owners in order to maintain compliance in the IT infrastructure. The integrated solution of RSA Archer/EMC/VMware is an example of using the right tool set for driving collaboration. In order to evaluate, the below criteria could be used for assessing each scenario: Criteria Scenario 1 Scenario 2 Compliance Data Consolidation Detail Control Mapping Scalability Good Average Granularity Generic Detail Complexity Simple Complex Feed Frequency High Average But, the secret to success is not just in the right platform, it’s also in the right management approach to people and processes. Win ins Focus on Quick Wins An approach to focus on early quick wins will make it easier for the organization to change. This is applicable to starting a new IT GRC strategy or revising an existing one. Below are some examples to start with: • Focus on formalizing the risk process by taking some risk metrics from existing IT infrastructure management technologies. • Provide better visibility and awareness of risk at the senior executive level • Report on new risks which can be used to justify new security projects • Watch for inconsistency in processes, especially when it comes to control testing • Drive automated control testing for existing manual processes or even questionnaire • address compliance results which could be a very costly area when the company is fined • Bring in standardization and increase collaboration between Information Security and IT organizations Drive Automation via Integration IT tools such as VMware vCenter Configuration Manager (vCM), and EMC Network Configuration Manager (NCM) and Storage Configuration Advisor (SCA) help to monitor configuration settings and measure vulnerabilities in the IT infrastructure. They collect data automatically and to perform correlations, analysis, and assessments. Configuration Compliance for Storage, Network & Server 17
  • 18. An advantage of using these technologies is their integration with a GRC framework such as RSA Archer. Most organizations collect infrastructure information manually either via spreadsheet, web portal, or archiving. This process can take time and is prone to being out-of-date or unreliable due to human error. Integration with a GRC framework allows these processes to happen automatically. Cost Show the Cost Saving Cost savings can be achieved in many different ways after compliance processes are implemented. The obvious value is the improvement in an organization’s external audit posture. Cost saving can also be translated from other metrics such as: • Percentage improvement in availability of critical business systems and processes • Reduced number of trouble tickets • Percentage of time IT staff needs to spend on problem management • Reduction in time spent planning and validating compliance with configuration best practices, security polices and industry regulations • Number of configuration violations identified • Reduction in service impacting events caused by improper configuration • Reduction in time spent remediating configuration violations These metrics can also help to control company budget, avoiding over-spending or under-spending. IT GRC strategy can only work if its success is proven by improving the organization's capability to effectively address IT risks and economically align processes. Make it Easy for Executives There is a lot of complexity behind infrastructure management technologies or IT technologies in general. However, their results can be used by executives if the reporting provides a simple way to roll up compliance data. A GRC framework such as RSA Archer allows quick creation of simple dashboards with information such as the current state of process and control compliance, vulnerabilities, and IT asset use. Another argument for simplified compliance reporting is to meet the needs of internal and external auditors. Without automation made possible by an integrated compliance framework, it’s very likely that the data collected is inaccurate. Involve Key Stakeholders Early GRC strategies can be driven from either the top-down or bottom-up. IT GRC will have more IT-centric requirements when driven from the bottom-up. Alternatively, Enterprise GRC or eGRC will be more focused on enterprise risk and driven from top- down. Both approaches will require a certain level of coordination amongst an organization’s IT, security, audit, and risk management teams. Configuration Compliance for Storage, Network & Server 18
  • 19. One key to success is to allow time to negotiate change. People need time to digest the impact of a new way of thinking or doing things and assess what it means to them and their jobs. Conclusion Understanding of key considerations and available options are critical to a successful GRC implementation. With the journey to the cloud, this transformation will also accelerate companies’ IT GRC journey. Therefore, the organization should have an understanding of in-house infrastructure technologies, their capabilities and integration options. EMC’s infrastructure management portfolio has been helping its customers to provide complete compliance and service assurance with the below proven results: • 80% faster problem identification • 60% faster resolution • 2X more efficient IT operations The values of EMC/RSA/VMware partnership provide (1) End-to-end Visibility, (2) Automated Compliance and (3) Effective Remediation: Values Features Benefits End-to-end • High Level Summary View • Summarize IT information Visibility Dashboard relative to existing compliance • IT Operation Dashboard programs • Detail Compliance Violation • Reduce time spent preparing for audit via single reporting engine Automated • Compliance Policies & • Provide compliance validation Compliance Templates and change management • Configuration Checks • Avoid manual assessment via Automation Against Policies silo processes • Internal IT Best Practice Standards Effective • Contextual Launch to Specific • Automate remediation to close Remediation Remediation Technology compliance gaps quickly with • Recommendation to Remediate minimal effort Technology improvements not only help EMC’s customers ensure compliance but also provide them competitive advantages in the market place. That means companies can be more agile and quicker to respond to business needs while improving efficiencies and lowering costs. Configuration Compliance for Storage, Network & Server 19
  • 20. Appendix Table 1. PCI DSS 2.0 Applicability Matrix for EMC Storage Configuration Advisor Requirement Controls Addressed Description Requirement 2: Do not 2.2 SCA has rules for checking SAN configuration against use vendor-supplied industry accepted best practices and EMC Support Matrix defaults for system (e.g. eLab) such as single initiator zoning, soft versus passwords and other hard zoning, and default zoning. security parameters Requirement 6: Develop 6.1, 6.2 SCA discovers Solutions Enabler, PowerPath, some third and maintain secure party MP drivers, HBA driver and firmware, switch OS and systems and applications firmware, and array microcode. SCA can also check SAN storage devices against EMC Support matrix rules. The integration with RSA Archer will help establish a process to identify and assign a risk ranking to newly discovered security vulnerabilities. Requirement 10: Track 10.3.2, 10.3.3, SCA tracks changes to the SAN configuration in near real and monitor all access to 10.3.6 time. Each change logged by SCA also includes date and network resources and time. The name of the SAN asset is identified when cardholder data changes happen as well. Table 2. PCI DSS 2.0 Applicability Matrix for EMC Network Configuration Manager Requirement Controls Addressed Description Requirement 1: Install and 1.1.1, 1.1.2, 1.1.3, NCM is capable of accepting Syslog and Traps maintain a firewall 1.1.4, 1.1.5, 1.1.6, information from devices. This is to monitor the network configuration to protect 1.2, 1.2.1, 1.2.2, for changes completed outside of the configuration cardholder data 1.2.3, 1.3, 1.3.1, management system. 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.8 Network diagram can also be used to validate Layer 3 connectivity. NCM reports will also define for each connection, what technology is in place such as ATM, Frame relay, and Point-to-Point. User access to secured network components are constraint by access-list. A permission scheme in NCM can be defined for users to access resources and operations needed to perform their jobs. Since only a small amount of documentation can be stored on a firewall or router, NCM supports the creation of network and device objects which can store comments or attachments. NCM templates can also be used to define best practices and tests can be created to enforce these best practices. Configuration Compliance for Storage, Network & Server 20
  • 21. Device State Report provides total devices out of sync between startup and running configuration which could result in vulnerability. NCM templates consist of samples for implementing a DMZ with inbound / outbound traffic to only protocols that are necessary for the cardholder data environment. Requirement 2: Do not 2.1, 2.1.1, 2.2, 2.2.2, NCM has prebuilt templates for detecting default use vendor-supplied 2.2.3, 2.2.4, 2.3 password of network devices or disabling unnecessary defaults for system and insecure services and protocols. Users can define passwords and other association of these templates with specific PCI security parameters requirements. NCM allows a wide variety of communications protocols including SSH, SCP, Telnet, SNMP V1, SNMP V2c, SNMP V3, modems and terminal servers. It is recommended that whenever a device supports the secure protocols SSH, SCP and SNMP V3, they should be used. Using Secure Shell Protocol (SSH) for network device communication provides encrypted communications between the device server and devices for issuing configuration updates and polling configuration changes. Many devices are also capable of using SNMP V3 for network management. NCM provides SNMP V3 manageability using authorization and privacy protocols. SNMP V3 in conjunction with SSH, provides the highest level of security available to manage network devices. Requirement 4: Encrypt 4.1 VPN Encryption template can be used to associate with transmission of cryptography and security protocols requirements to cardholder data across safeguard sensitive cardholder data during transmission open, public networks over open, public networks. Requirement 6: Develop 6.1, 6.4.1, 6.4.2 NCM can be used to prepare for OS upgrades by and maintain secure providing OS Inventory reports, and by providing systems and applications hardware reports for verifying memory prerequisites. The NCM OS Manager can be used to deploy new OS versions to many types of network devices, including some wireless access points. For change control procedures of system components, NCM’s job description field should be used to reference change tickets and/or include full change description. Requirement 8: Assign a 8.3, 8.5.13, 8.5.14, Users can customize TACACS Server and RADIUS Server unique ID to each person 8.5.15 templates in automation library to satisfy authentication with computer access requirement of remote access to the network by employees, administrators and third parties. NCM contains four different types of authentication, each of which allows the administrator to control the number of logins which a user can attempt before the account is Configuration Compliance for Storage, Network & Server 21
  • 22. locked. With this authentication mechanism, user accounts are authenticated against an internal database in NCM, external TACACS+ server, RADIUS server or LDAP server. Administrators can set an explicit limit to the number of authentication attempts a user can have before the account is locked. The administrator should set this to less than six. When a user session is locked out in NCM, the user account will not be unlocked until explicit action is taken by the administrator to unlock the user ID. The default user session timeout in NCM is 30 minutes, after which the user’s session will automatically timeout and require a login to continue. This can be controlled through the JMX console, which ca be accessed by system administrator. Requirement 10: Track 10.1, 10.2.2, 10.2.3, NCM maintains an audit log of all device accesses made, and monitor all access to 10.2.4, 10.2.5, as well as any device change events detected on the network resources and 10.2.7, 10.3.1, device via notification from the device (Syslogs, or cardholder data 10.3.2, 10.3.3, Traps), or timed configuration pull. 10.3.4, 10.3.5, 10.3.6, 10.4, 10.5, For automated audit trails, NCM logs all accesses to 10.5.1, 10.5.2, 10.6 protected resources through the user interface or API, regardless of whether the user is a system administrator or not. It exposes both AuthorizationFailedEvent and AuthorizationSucceededEvent for any logical access attempts. Many other events related to creation and deletion of system-level objects is also collected for Security System-level Objects, Device and Credentials System- level Objects, Device Containment System-level Object, Automation Library (Compliance and Standardization) System-level Objects. NCM records change of both the user who made the change and the user who approved the change in its revision history, including time stamp as detected either from the scheduled job, the change notification, or the device itself. All audit trail entries are also recorded for both success and failure status such as DeviceRevChangeFailedEvent, DeviceRevCreateFailedEvent, DeviceRevPolicyCheckFailedEvent, CommunicationRestoredEvent, etc… Configuration Compliance for Storage, Network & Server 22
  • 23. NCM categorizes each event by action type, event type, severity type, and source type. The action type is the actual type of event, such as JobFailedEvent. To synchronize all critical system clocks and times, a template called Test For Network Time Protocol can be used. Securing audit trails to avoid altering can be done with NCM as well. Users are constrained to only see events for resources to which they have view permissions. NCM has a system-level permission named View Audit which controls whether a user may see event logs. Requirement 12: Maintain 12.1, 12.1.1 The Archer/NCM integration can be used to publish the a policy that addresses process documentation written by the user. This process information security for all documentation is useful not only for dissemination personnel across the group but also for daily review by engineers responsible for certain aspects of PCI. Users and auditors can also get a focused view of the requirements, best practices, samples and reports to help engineers address each requirement. The integration will help engineers stay well informed as to the requirements of PCI and the compliance status of the network. Table 3. PCI DSS 2.0 Applicability Matrix for VMWare vCenter Configuration Manager Requirement Controls Addressed Description Requirement 2: Do not 2.1.1, 2.2.1, 2.2.2, vCM can be used to detect, and in many circumstances, use vendor-supplied 2.2.3, 2.2.4 correct default security settings on Windows, Solaris and defaults for system Linux systems. System security parameters can be passwords and other configured following hardening guideline for Windows, security parameters Solaris and Linux. Admin can also remove unnecessary functionality via built-in remediation actions as well as scripted remote commands. Requirement 5: Use and 5.1, 5.2 Although vCM is not an anti-virus solution, it can be used regularly update anti-virus to assess and report the anti-virus state of the system. software or programs This allow a determination that all systems have anti- virus software installed and running with the updated signature files. Requirement 6: Develop 6.1 vCM is able to access, download and deploy patches to and maintain secure Windows, Unix, Linux and Mac operating systems. systems and applications Assessments are customizable and can be set to verify critical patches in the past 30 days. Changes within the virtual environment are captured as well. Each change made to the configuration settings is Configuration Compliance for Storage, Network & Server 23
  • 24. documented and logged. If a change is made without the proper approval it is alerted with a simple roll back procedure and the change is reversed. vCM is able to track changes both made through the standard change process or out of band changes conducted directly on the VMs or through another tools. Requirement 7: Restrict 7.1 vCM can be used to validate user access to data stored on access to cardholder data any Windows, Solaris and Linux system. by business need to know Requirement 8: Assign a 8.1, 8.2, 8.5.1, 8.5.4, vCM has the ability to monitor access controls and report unique ID to each person 8.5.5, 8.5.6, 8.5.9, on the following: with computer access 8.5.10, 8.5.11, • Local and domain-level users (Windows) and users with 8.5.12, 8.5.13, unique username (UNIX, Linux and Mac). 8.5.14, 8.5.15 • System password policies for expiration, length, standards, creation settings, and access attempts • Changes to user accounts, credential stores, and identifier objects to provide visibility and control over system access • User access across all the systems in the datacenter at once • Disable and remove access for terminated user accounts • Inactive accounts (which it can also disable and remove access for these user accounts) • The status of maintenance accounts and to confirm that they are disabled and configured to only be used during the times specified • Login policies, to include lockout settings and auto- logout settings, and remediating as needed. Assessment, reporting and remediation is conducted in accordance with scheduling through vCM Requirement 10: Track 10.2.1, 10.2.2, vCM will assess, report and remediate the following: and monitor all access to 10.2.3, 10.2.4, • Configurations of the system auditing and logging network resources and 10.2.5, 10.2.6, services to support proper logging across system cardholder data 10.2.7, 10.4, 10.5.1, components 10.5.2, 10.5.3, • Collect audit logs entries to provide a single view of 10.5.4, 10.5.5 events • NTP settings and configuration details • User access audit trails by ensuring proper permissions for log files and their directories and alert on changes to critical audit trails Requirement 11: Regularly 11 11.5 vCM can be configured to monitor critical files and test security systems and provide alerts and reports detailing any changes made or processes attempted. Configuration Compliance for Storage, Network & Server 24