SlideShare a Scribd company logo
1 of 30
Download to read offline
New Approaches to Vulnerability
        Management
                Todd Graham
         Director, Risk & Compliance
                      RSA
What is Vulnerability Management
• The definition thus far[1]:

   “Vulnerability management is the cyclical practice of identifying,
   classifying, remediating, and mitigating vulnerabilities. This practice
   generally refers to software vulnerabilities in computing systems.”

   “Host and infrastructure vulnerabilities can often be addressed by
   applying patches or changing configuration settings. Custom
   software or application-based vulnerabilities often require
   additional software development in order to fully mitigate.
   Technologies such as web application firewalls can be used in the
   short term to shield systems, but to address the root cause,
   changes must be made to the underlying software.”

                                                          [1] Thank you Wikipedia
Mega Changes Forcing Evolution
• Cloud
   – New area to audit and protect
   – Computing power available for good and evil
• Virtualization
   – The data center becomes homogeneous
   – Potential hypervisor-based vulnerabilities
• Attacker Motivation
   – Vulnerabilities exploited for financial gain
• “Enterprization” of Consumer
   – Web 2.0 technologies open up new threats to the enterprise
Classic VM Program Steps
•   Define Policy - Organizations must start out by determining what the desired security state
    for their environment is. This include determining desired device and service configurations
    and access control rules for users accessing resources.
•   Baseline the Environment - Once a policy has been defined, the organization must assess the
    true security state of the environment and determine where instances of policy violations are
    occurring.
•   Prioritize Vulnerabilities - Instances of policy violations are Vulnerability (computing). These
    vulnerabilities are then prioritized using risk and effort-based criteria. Shield - In the short
    term, the organization can take steps to minimize the damage that could be caused by the
    vulnerability by creating compensating controls.
•   Mitigate Vulnerabilities - Ultimately, the root causes of vulnerabilities must be addressed.
    This is often done via patching vulnerable services, changing vulnerable configurations or
    making application updates to remove vulnerable code.
•   Maintain and Monitor - Organizations' computing environments are dynamic and evolve over
    time, as do security policy requirements. In addition, additional security vulnerabilities are
    always being identified. For this reason, vulnerability management is an ongoing process
    rather than a point-in-time event.                           Gartner: Improve IT Security With Vulnerability Management
Technology Surfaces
• Network & Host
   – Scan network to discover assets
   – Determine asset type, version, and configuration
   – Compare current device state to known vulnerabilities
• Application
   – Profile applications to determine risky behavior or insecure
     programming techniques
   – Part of SDLC and Vendor Management Programs
• Configuration Management
   – Adjacent to traditional VM
   – Focused on managing configuration to mitigate threats
What’s Next
Thesis:
  The next generation of vulnerability management
  will come from the integration and correlation of
  disparate data sources, many of which already
  exist in the enterprise.
  We need to intelligently connect the dots (SIEM,
  DLP, App Scanners, File and DB Access
  Monitoring…).
Creative Zero Day Detection
• Leverage your SIEM to detect and correlate
  abnormal behaviors
3 Step Process – Step 1


1. Collect and normalize information from VA
   scanners and asset inventory tracking systems
  –   View and manage the asset details across the entire enterprise

                                                                      NIC
                                                                    IDS MSG                                                                     V3.5
                            FREQUENT                              GRAMMARS
                            SIGNATURE
                             UPDATES
                                                                  (EVENT IDs)


                  IDS/IPS
                                                                                                                                              Event ID
                   Device                        PARSE           Event ID             DETAIL         Event ID                 MAP
                                         IDS                                                                                  SIGs            Asset ID
                                                                 Asset ID             PARSE          Asset ID
                                         MSG                                             +                                                   VUL IDREFs
                                                                Threat Desc           ASSIGN          SIG ID
                                                                                        SIG




                    WWW...                                                                                                                     BUILD &
                                                                                                                                             DISTRIBUTE           SIG ID
                      VULNERABILTY                                                                                         NIC
                       DEFINITION                                                                                     VULNERABILITY                             VUL IDREFs
                        SOURCE VULNERABILTY
                                                                                             VUL ID
                                                                                                                        DATABASE
                           A     DEFINITION
                                                                              PARSE
                                                                                         Structured Desc
                                    SOURCE
                                      C                                                                                                                       MAP
                     VULNERABILTY                                                                                                 BUILD &
                                                  ACQUIRE                                       BUILD &   NORMALIZE                                       SIGNATUREs to
                      DEFINITION                                VUL ID                         MAINTAIN
                                                                                                                                DISTRIBUTE
                                                                                                                                                             VUL IDs
                       SOURCE
                          B
                                                            Vulnerabilty Desc
                                                                                                                    VUL ID
                                                                                                                Asset Predicates
                                                                                              NIC                   Severity
                    FREQUENT
                  VULNERABILITY
                                                                                           NORMALIZED
                     UPDATES                                                                 ASSET
                                                                                           PREDICATES


                                                                                                                                                                      SIG
                                                                                                                                                                    UPDATE

                                            VA                                                                                                                            FREQUENT
                                                      PARSE                             ENCODE
                                                                                                       Asset ID        LOAD
                                           Report
                                          VA                         Asset ID                                                                                             SIGNATURE
                                         VA
                                         Report                                                     Asset Predicate                    PRODUCTION                          UPDATES
                                                                 Structured Desc
                   Vulnerability        Report                                                          Flags                        ASSET PREDICATE
                                                                                                                                          FLAGS
                   Assesment
                       Tool
                                                                                                                                                                     IDS
                                                 PERIODICALLY                                                                                                      Vendors
                                                  REFRESHED
3 Step Process – Step 2


2. Embedded Vulnerability Repository
  •   Database of vulnerabilities from NVD
  •   Description, impact, cross-reference meta-data, affected products,
      vendors, versions, protocols, network service

                                                                      NIC
                                                                    IDS MSG                                                                     V3.5
                            FREQUENT                              GRAMMARS
                            SIGNATURE
                             UPDATES
                                                                  (EVENT IDs)


                  IDS/IPS
                                                                                                                                              Event ID
                   Device                        PARSE           Event ID             DETAIL         Event ID                 MAP
                                         IDS                                                                                  SIGs            Asset ID
                                                                 Asset ID             PARSE          Asset ID
                                         MSG                                             +                                                   VUL IDREFs
                                                                Threat Desc           ASSIGN          SIG ID
                                                                                        SIG




                    WWW...                                                                                                                     BUILD &
                                                                                                                                             DISTRIBUTE           SIG ID
                      VULNERABILTY                                                                                         NIC
                       DEFINITION                                                                                     VULNERABILITY                             VUL IDREFs
                        SOURCE VULNERABILTY
                                                                                             VUL ID
                                                                                                                        DATABASE
                           A     DEFINITION
                                                                              PARSE
                                                                                         Structured Desc
                                    SOURCE
                                      C                                                                                                                       MAP
                     VULNERABILTY                                                                                                 BUILD &
                                                  ACQUIRE                                       BUILD &   NORMALIZE                                       SIGNATUREs to
                      DEFINITION                                VUL ID                         MAINTAIN
                                                                                                                                DISTRIBUTE
                                                                                                                                                             VUL IDs
                       SOURCE
                          B
                                                            Vulnerabilty Desc
                                                                                                                    VUL ID
                                                                                                                Asset Predicates
                                                                                              NIC                   Severity
                    FREQUENT
                  VULNERABILITY
                                                                                           NORMALIZED
                     UPDATES                                                                 ASSET
                                                                                           PREDICATES


                                                                                                                                                                      SIG
                                                                                                                                                                    UPDATE

                                            VA                                                                                                                            FREQUENT
                                                      PARSE                             ENCODE
                                                                                                       Asset ID        LOAD
                                           Report
                                          VA                         Asset ID                                                                                             SIGNATURE
                                         VA
                                         Report                                                     Asset Predicate                    PRODUCTION                          UPDATES
                                                                 Structured Desc
                   Vulnerability        Report                                                          Flags                        ASSET PREDICATE
                                                                                                                                          FLAGS
                   Assesment
                       Tool
                                                                                                                                                                     IDS
                                                 PERIODICALLY                                                                                                      Vendors
                                                  REFRESHED
3 Step Process – Step 3

3. Automatically relate security events to
   asset attributes via the vulnerability
   repository
  –   Assign a confidence to the impact an incident will have upon the target
                                                                          NIC
                                                                        IDS MSG                                                                     V3.5
                                FREQUENT                              GRAMMARS
                                SIGNATURE
                                 UPDATES
                                                                      (EVENT IDs)


                      IDS/IPS
                                                                                                                                                  Event ID
                       Device                        PARSE           Event ID             DETAIL         Event ID                 MAP
                                             IDS                                                                                  SIGs            Asset ID
                                                                     Asset ID             PARSE          Asset ID
                                             MSG                                             +                                                   VUL IDREFs
                                                                    Threat Desc           ASSIGN          SIG ID
                                                                                            SIG




                        WWW...                                                                                                                     BUILD &
                                                                                                                                                 DISTRIBUTE           SIG ID
                          VULNERABILTY                                                                                         NIC
                           DEFINITION                                                                                     VULNERABILITY                             VUL IDREFs
                            SOURCE VULNERABILTY
                                                                                                 VUL ID
                                                                                                                            DATABASE
                               A     DEFINITION
                                                                                  PARSE
                                                                                             Structured Desc
                                        SOURCE
                                          C                                                                                                                       MAP
                         VULNERABILTY                                                                                                 BUILD &
                                                      ACQUIRE                                       BUILD &   NORMALIZE                                       SIGNATUREs to
                          DEFINITION                                VUL ID                         MAINTAIN
                                                                                                                                    DISTRIBUTE
                                                                                                                                                                 VUL IDs
                           SOURCE
                              B
                                                                Vulnerabilty Desc
                                                                                                                        VUL ID
                                                                                                                    Asset Predicates
                                                                                                  NIC                   Severity
                        FREQUENT
                      VULNERABILITY
                                                                                               NORMALIZED
                         UPDATES                                                                 ASSET
                                                                                               PREDICATES


                                                                                                                                                                          SIG
                                                                                                                                                                        UPDATE

                                                VA                                                                                                                            FREQUENT
                                                          PARSE                             ENCODE
                                                                                                           Asset ID        LOAD
                                               Report
                                              VA                         Asset ID                                                                                             SIGNATURE
                                             VA
                                             Report                                                     Asset Predicate                    PRODUCTION                          UPDATES
                                                                     Structured Desc
                       Vulnerability        Report                                                          Flags                        ASSET PREDICATE
                                                                                                                                              FLAGS
                       Assesment
                           Tool
                                                                                                                                                                         IDS
                                                     PERIODICALLY                                                                                                      Vendors
                                                      REFRESHED
The New Threat Surface: Customers
• Enterprises are beginning to view their
  customers and partners as threat sources
• Must identify threats against their customers
  (phishing, etc.) and work to mitigate
• Customer wanted to
  view VA scans next to
  anti-phishing
Bringing It All Together:
                       Case Study Overview
• A global internet, mobility and communications company built a
  best-in-class Threat Management Program by:
   –   Consolidating Security and Asset Information
   –   Creating correlations to generate actionable intelligence
   –   Providing key-stakeholders with information and vision of their risk
   –   Building a repetitive process for effective and efficient Threat
       Management

• Company Facts:
   – Fortune Ranking: ~60
   – 2006 Revenue: $54.29b
   – Number of Employees: 68,483
Challenges
•   Information Silos – Difficult to correlate
    security data to determine actual risk.

•   Global Segmentation – Impossible to                            Sys
    correlate data from third party and company         VA         Mgm
    managed assets.                                                 t

•   Ownership of Risk – Difficult for executives
    to determine which vulnerabilities affect
    their Products and Services.
                                                             VA’
•   Lack of Visibility – Lack of reporting
    prevented executives from making intelligent
    decisions about acceptable risk to their
    business.
                                                    Threat
                                                     Feed
Goals
•   Effective Threat Management – Manage
    Threats from a Product and Services
    perspective.

•   Information Consolidation – Turn disparate                 Sys
    silos of information into actionable                  VA   Mgm
    knowledge.
                                                                t

•   Information Correlation – Correlate threat
    and asset data across multiple business units
    and geographies.

•   Delivery – Enable executives to release their     Threat   VA’
    Products and Services faster to market.            Feed


•   Ownership – Empower executives to
    effectively manage risks to their business
    through an enterprise security view of their
    business.
Threat Management Strategy




   VA



Threat
 Feed



                   Analyze &    Notify Personnel   Remediation
                   Prioritize                        Tasks
     VA’
Threat Management Reporting

                         Enterprise Reporting




   VA



Threat
 Feed



            Analyze &      Notify Personnel     Remediation
     VA’    Prioritize                            Tasks
A Best-in-Class Threat
Management Program
1   Assets    • Consolidate Asset Data

2   Threats   • Consolidate Threat Data

3    Risks    • Manage your Risk
                Posture
4   Reports
              • Monitor your Business
                Security and Risk
                Mitigation efforts
1                 Consolidating Asset Information
                                            Sensors   Sensors
    Asset Discovery




    Asset
    Inventory




    Asset
    Integration




    Asset Management
    Consolidated Database
1                        What is an Asset?

    Products and
      Services




           Business
           Processes




          Applications




            Devices




           Facilities
1   Device: Application Server Details
2                Consolidating Threat Data

•   Threat Alerts
     –   Known vulnerabilities
     –   Patches
     –   CVE
     –   Bugtrack ID
•   Vulnerability Scan
     – Host IP address
     – Vulnerabilities Found
     – CVE
•   Configuration Scan
     –   Hostname
     –   Registry Information
     –   Users
     –   Installed Applications
     –   Risks
2   Vulnerability: Details Overview
3              Turning Threat Data into Intelligence
               Asset Data
                                            Scan Results
    Host Name        IP Address
                                       Host Name    IP Address
    APPSERV002       192.168.1.100
                                       DBSERV001    192.168.1.101
    DBSERV001        192.168.1.101
                                      APPSERV002    192.168.1.100

            Threat Alerts               Scan ID        CVE-ID
                                                   CVE-2007-0069
      Alert ID         CVE-ID            90423
                                                   CVE-2007-0066
      466355         CVE-2007-5350       90420     CVE-2007-5350

      466938        CVE-2007-0069        90418     CVE-2007-0064

      466951        CVE-2007-0066
3   Map Alerts and Assets to Scan Results

                                            Map Scan Results to
                                            Alerts using CVE-ID




                                                     Identify
                                                  Vulnerability
                                                Alerts associated
                                                to Scan Results
3   Manage and Track Remediation Progress

                                        Document Remediation
                                              Activity




                                         Track Activity History




                                         Assign and Delegate
                                         Tasks to responsible
                                              personnel
4              Reports: Enterprise Security Posture

•   Provides users with a
    single interface for IT
    Security information at
    any level for Threat
    Management

•   Presents relevant
    security information in
    an understandable
    format customized for
    differing environments

•   Enables users to
    understand what
    actions should be taken
    to reduce risk and/or
    improve configuration
    compliance Asset
Additional Data Sources
                                                                                                 Business          Eng.         HR
                                                                                                 Reporting
                                                                                                                     Legal
                           SIEM




                                                                      Geo Info
                                                         Division
                                              Identity




                                                                                   Data
                    IPS
                                                                                                                      UI
Event Aggregation




                           AV
                                   EP
                    Auth




                                                                                                       Incidents

                                                                                                                      Threats
                                               Data Enhancement




                                                                                                                                     GRC
                             WAF        DLP
                     FW

                           WLAN   URL                    Department
                                              Location




                                                                      Regulation

                                                                                   Asset Value
                    AD

                                                                                                                                SOC




                                                                                                       CIRT
                                                                                                                                 GIS
Emerging Vendors to Watch
• NeuralIQ
  – Next-generation honey pot
  – Virtual machine-based clones of production systems
    capture all attacker behavior from the hypervisor
• HBGary
  – Technologies to analyze malware, fingerprinting the
    ‘DNA’ at the memory and execution-level
  – Has proactive capabilities to prevent execution of
    identified “risky” behavior
Emerging Vendors to Watch ‘cont
• Checkmarx
  – Static Application Security Testing (SAST) company
  – Compiles all scanned code into common framework
    for future testing
• Mykonos
  – Web 2.0 AJAX framework
  – Ensures that Javascript code on end-user systems is
    not compromised
  – Built-in security for AJAX calls and functions
A Parting Thought
“Security is always going to be a cat and
mouse game because there'll be people out
there that are hunting for the zero day award,
you have people that don't have configuration
management, don't have vulnerability
management, don't have patch management.”
                                -Kevin Mitnick

More Related Content

What's hot

digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Live ensure overview 1.4
Live ensure overview 1.4Live ensure overview 1.4
Live ensure overview 1.4Ross Macdonald
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyJayHicks
 
Ast Corporate Presentation 09
Ast Corporate Presentation 09Ast Corporate Presentation 09
Ast Corporate Presentation 09davidpslow
 
Experiences Streaming Analytics at Petabyte Scale
Experiences Streaming Analytics at Petabyte ScaleExperiences Streaming Analytics at Petabyte Scale
Experiences Streaming Analytics at Petabyte ScaleDataWorks Summit
 
Securing and Governing Cloud APIs
Securing and Governing Cloud APIsSecuring and Governing Cloud APIs
Securing and Governing Cloud APIsCA API Management
 
Honeywell 5870api-dealer-brochure
Honeywell 5870api-dealer-brochureHoneywell 5870api-dealer-brochure
Honeywell 5870api-dealer-brochureAlarm Grid
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 

What's hot (13)

digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Recent Work
Recent WorkRecent Work
Recent Work
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Live ensure overview 1.4
Live ensure overview 1.4Live ensure overview 1.4
Live ensure overview 1.4
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
 
Ast Corporate Presentation 09
Ast Corporate Presentation 09Ast Corporate Presentation 09
Ast Corporate Presentation 09
 
280 284
280 284280 284
280 284
 
Experiences Streaming Analytics at Petabyte Scale
Experiences Streaming Analytics at Petabyte ScaleExperiences Streaming Analytics at Petabyte Scale
Experiences Streaming Analytics at Petabyte Scale
 
Securing and Governing Cloud APIs
Securing and Governing Cloud APIsSecuring and Governing Cloud APIs
Securing and Governing Cloud APIs
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Honeywell 5870api-dealer-brochure
Honeywell 5870api-dealer-brochureHoneywell 5870api-dealer-brochure
Honeywell 5870api-dealer-brochure
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 

Similar to New approaches to vulnerability management

CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCloudIDSummit
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...
Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...
Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...Dealmaker Media
 
Infosys sequence services proof of concept
Infosys sequence services proof of conceptInfosys sequence services proof of concept
Infosys sequence services proof of conceptPistoia Alliance
 
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked Networks
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudGovCloud Network
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...CA API Management
 
Creating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information SharingCreating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information SharingInnoTech
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technicalImranD1
 
Continuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming AnalyticsContinuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming AnalyticsInside Analysis
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the CloudWSO2
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4guest66dc5f
 

Similar to New approaches to vulnerability management (20)

CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...
Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...
Marrying Design & Development: a Match made in Heaven, not Hell (Jeff Veen & ...
 
Infosys sequence services proof of concept
Infosys sequence services proof of conceptInfosys sequence services proof of concept
Infosys sequence services proof of concept
 
Fast Pitch Forum (VANTOS)
Fast Pitch Forum (VANTOS)Fast Pitch Forum (VANTOS)
Fast Pitch Forum (VANTOS)
 
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
 
Creating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information SharingCreating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information Sharing
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technical
 
Continuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming AnalyticsContinuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming Analytics
 
NWU Wireless
NWU WirelessNWU Wireless
NWU Wireless
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 

More from Interop

Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloudInterop
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standardsInterop
 
Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessInterop
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7Interop
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storageInterop
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemInterop
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructureInterop
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability processInterop
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutionsInterop
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threatsInterop
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategiesInterop
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environmentInterop
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glassInterop
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkInterop
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit allInterop
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practicesInterop
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeInterop
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performanceInterop
 

More from Interop (20)

Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloud
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standards
 
Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wireless
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storage
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problem
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructure
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability process
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threats
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategies
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environment
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glass
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area network
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit all
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practices
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally change
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performance
 

Recently uploaded

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

New approaches to vulnerability management

  • 1. New Approaches to Vulnerability Management Todd Graham Director, Risk & Compliance RSA
  • 2. What is Vulnerability Management • The definition thus far[1]: “Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice generally refers to software vulnerabilities in computing systems.” “Host and infrastructure vulnerabilities can often be addressed by applying patches or changing configuration settings. Custom software or application-based vulnerabilities often require additional software development in order to fully mitigate. Technologies such as web application firewalls can be used in the short term to shield systems, but to address the root cause, changes must be made to the underlying software.” [1] Thank you Wikipedia
  • 3. Mega Changes Forcing Evolution • Cloud – New area to audit and protect – Computing power available for good and evil • Virtualization – The data center becomes homogeneous – Potential hypervisor-based vulnerabilities • Attacker Motivation – Vulnerabilities exploited for financial gain • “Enterprization” of Consumer – Web 2.0 technologies open up new threats to the enterprise
  • 4. Classic VM Program Steps • Define Policy - Organizations must start out by determining what the desired security state for their environment is. This include determining desired device and service configurations and access control rules for users accessing resources. • Baseline the Environment - Once a policy has been defined, the organization must assess the true security state of the environment and determine where instances of policy violations are occurring. • Prioritize Vulnerabilities - Instances of policy violations are Vulnerability (computing). These vulnerabilities are then prioritized using risk and effort-based criteria. Shield - In the short term, the organization can take steps to minimize the damage that could be caused by the vulnerability by creating compensating controls. • Mitigate Vulnerabilities - Ultimately, the root causes of vulnerabilities must be addressed. This is often done via patching vulnerable services, changing vulnerable configurations or making application updates to remove vulnerable code. • Maintain and Monitor - Organizations' computing environments are dynamic and evolve over time, as do security policy requirements. In addition, additional security vulnerabilities are always being identified. For this reason, vulnerability management is an ongoing process rather than a point-in-time event. Gartner: Improve IT Security With Vulnerability Management
  • 5. Technology Surfaces • Network & Host – Scan network to discover assets – Determine asset type, version, and configuration – Compare current device state to known vulnerabilities • Application – Profile applications to determine risky behavior or insecure programming techniques – Part of SDLC and Vendor Management Programs • Configuration Management – Adjacent to traditional VM – Focused on managing configuration to mitigate threats
  • 6. What’s Next Thesis: The next generation of vulnerability management will come from the integration and correlation of disparate data sources, many of which already exist in the enterprise. We need to intelligently connect the dots (SIEM, DLP, App Scanners, File and DB Access Monitoring…).
  • 7. Creative Zero Day Detection • Leverage your SIEM to detect and correlate abnormal behaviors
  • 8. 3 Step Process – Step 1 1. Collect and normalize information from VA scanners and asset inventory tracking systems – View and manage the asset details across the entire enterprise NIC IDS MSG V3.5 FREQUENT GRAMMARS SIGNATURE UPDATES (EVENT IDs) IDS/IPS Event ID Device PARSE Event ID DETAIL Event ID MAP IDS SIGs Asset ID Asset ID PARSE Asset ID MSG + VUL IDREFs Threat Desc ASSIGN SIG ID SIG WWW... BUILD & DISTRIBUTE SIG ID VULNERABILTY NIC DEFINITION VULNERABILITY VUL IDREFs SOURCE VULNERABILTY VUL ID DATABASE A DEFINITION PARSE Structured Desc SOURCE C MAP VULNERABILTY BUILD & ACQUIRE BUILD & NORMALIZE SIGNATUREs to DEFINITION VUL ID MAINTAIN DISTRIBUTE VUL IDs SOURCE B Vulnerabilty Desc VUL ID Asset Predicates NIC Severity FREQUENT VULNERABILITY NORMALIZED UPDATES ASSET PREDICATES SIG UPDATE VA FREQUENT PARSE ENCODE Asset ID LOAD Report VA Asset ID SIGNATURE VA Report Asset Predicate PRODUCTION UPDATES Structured Desc Vulnerability Report Flags ASSET PREDICATE FLAGS Assesment Tool IDS PERIODICALLY Vendors REFRESHED
  • 9. 3 Step Process – Step 2 2. Embedded Vulnerability Repository • Database of vulnerabilities from NVD • Description, impact, cross-reference meta-data, affected products, vendors, versions, protocols, network service NIC IDS MSG V3.5 FREQUENT GRAMMARS SIGNATURE UPDATES (EVENT IDs) IDS/IPS Event ID Device PARSE Event ID DETAIL Event ID MAP IDS SIGs Asset ID Asset ID PARSE Asset ID MSG + VUL IDREFs Threat Desc ASSIGN SIG ID SIG WWW... BUILD & DISTRIBUTE SIG ID VULNERABILTY NIC DEFINITION VULNERABILITY VUL IDREFs SOURCE VULNERABILTY VUL ID DATABASE A DEFINITION PARSE Structured Desc SOURCE C MAP VULNERABILTY BUILD & ACQUIRE BUILD & NORMALIZE SIGNATUREs to DEFINITION VUL ID MAINTAIN DISTRIBUTE VUL IDs SOURCE B Vulnerabilty Desc VUL ID Asset Predicates NIC Severity FREQUENT VULNERABILITY NORMALIZED UPDATES ASSET PREDICATES SIG UPDATE VA FREQUENT PARSE ENCODE Asset ID LOAD Report VA Asset ID SIGNATURE VA Report Asset Predicate PRODUCTION UPDATES Structured Desc Vulnerability Report Flags ASSET PREDICATE FLAGS Assesment Tool IDS PERIODICALLY Vendors REFRESHED
  • 10. 3 Step Process – Step 3 3. Automatically relate security events to asset attributes via the vulnerability repository – Assign a confidence to the impact an incident will have upon the target NIC IDS MSG V3.5 FREQUENT GRAMMARS SIGNATURE UPDATES (EVENT IDs) IDS/IPS Event ID Device PARSE Event ID DETAIL Event ID MAP IDS SIGs Asset ID Asset ID PARSE Asset ID MSG + VUL IDREFs Threat Desc ASSIGN SIG ID SIG WWW... BUILD & DISTRIBUTE SIG ID VULNERABILTY NIC DEFINITION VULNERABILITY VUL IDREFs SOURCE VULNERABILTY VUL ID DATABASE A DEFINITION PARSE Structured Desc SOURCE C MAP VULNERABILTY BUILD & ACQUIRE BUILD & NORMALIZE SIGNATUREs to DEFINITION VUL ID MAINTAIN DISTRIBUTE VUL IDs SOURCE B Vulnerabilty Desc VUL ID Asset Predicates NIC Severity FREQUENT VULNERABILITY NORMALIZED UPDATES ASSET PREDICATES SIG UPDATE VA FREQUENT PARSE ENCODE Asset ID LOAD Report VA Asset ID SIGNATURE VA Report Asset Predicate PRODUCTION UPDATES Structured Desc Vulnerability Report Flags ASSET PREDICATE FLAGS Assesment Tool IDS PERIODICALLY Vendors REFRESHED
  • 11. The New Threat Surface: Customers • Enterprises are beginning to view their customers and partners as threat sources • Must identify threats against their customers (phishing, etc.) and work to mitigate • Customer wanted to view VA scans next to anti-phishing
  • 12. Bringing It All Together: Case Study Overview • A global internet, mobility and communications company built a best-in-class Threat Management Program by: – Consolidating Security and Asset Information – Creating correlations to generate actionable intelligence – Providing key-stakeholders with information and vision of their risk – Building a repetitive process for effective and efficient Threat Management • Company Facts: – Fortune Ranking: ~60 – 2006 Revenue: $54.29b – Number of Employees: 68,483
  • 13. Challenges • Information Silos – Difficult to correlate security data to determine actual risk. • Global Segmentation – Impossible to Sys correlate data from third party and company VA Mgm managed assets. t • Ownership of Risk – Difficult for executives to determine which vulnerabilities affect their Products and Services. VA’ • Lack of Visibility – Lack of reporting prevented executives from making intelligent decisions about acceptable risk to their business. Threat Feed
  • 14. Goals • Effective Threat Management – Manage Threats from a Product and Services perspective. • Information Consolidation – Turn disparate Sys silos of information into actionable VA Mgm knowledge. t • Information Correlation – Correlate threat and asset data across multiple business units and geographies. • Delivery – Enable executives to release their Threat VA’ Products and Services faster to market. Feed • Ownership – Empower executives to effectively manage risks to their business through an enterprise security view of their business.
  • 15. Threat Management Strategy VA Threat Feed Analyze & Notify Personnel Remediation Prioritize Tasks VA’
  • 16. Threat Management Reporting Enterprise Reporting VA Threat Feed Analyze & Notify Personnel Remediation VA’ Prioritize Tasks
  • 17. A Best-in-Class Threat Management Program 1 Assets • Consolidate Asset Data 2 Threats • Consolidate Threat Data 3 Risks • Manage your Risk Posture 4 Reports • Monitor your Business Security and Risk Mitigation efforts
  • 18. 1 Consolidating Asset Information Sensors Sensors Asset Discovery Asset Inventory Asset Integration Asset Management Consolidated Database
  • 19. 1 What is an Asset? Products and Services Business Processes Applications Devices Facilities
  • 20. 1 Device: Application Server Details
  • 21. 2 Consolidating Threat Data • Threat Alerts – Known vulnerabilities – Patches – CVE – Bugtrack ID • Vulnerability Scan – Host IP address – Vulnerabilities Found – CVE • Configuration Scan – Hostname – Registry Information – Users – Installed Applications – Risks
  • 22. 2 Vulnerability: Details Overview
  • 23. 3 Turning Threat Data into Intelligence Asset Data Scan Results Host Name IP Address Host Name IP Address APPSERV002 192.168.1.100 DBSERV001 192.168.1.101 DBSERV001 192.168.1.101 APPSERV002 192.168.1.100 Threat Alerts Scan ID CVE-ID CVE-2007-0069 Alert ID CVE-ID 90423 CVE-2007-0066 466355 CVE-2007-5350 90420 CVE-2007-5350 466938 CVE-2007-0069 90418 CVE-2007-0064 466951 CVE-2007-0066
  • 24. 3 Map Alerts and Assets to Scan Results Map Scan Results to Alerts using CVE-ID Identify Vulnerability Alerts associated to Scan Results
  • 25. 3 Manage and Track Remediation Progress Document Remediation Activity Track Activity History Assign and Delegate Tasks to responsible personnel
  • 26. 4 Reports: Enterprise Security Posture • Provides users with a single interface for IT Security information at any level for Threat Management • Presents relevant security information in an understandable format customized for differing environments • Enables users to understand what actions should be taken to reduce risk and/or improve configuration compliance Asset
  • 27. Additional Data Sources Business Eng. HR Reporting Legal SIEM Geo Info Division Identity Data IPS UI Event Aggregation AV EP Auth Incidents Threats Data Enhancement GRC WAF DLP FW WLAN URL Department Location Regulation Asset Value AD SOC CIRT GIS
  • 28. Emerging Vendors to Watch • NeuralIQ – Next-generation honey pot – Virtual machine-based clones of production systems capture all attacker behavior from the hypervisor • HBGary – Technologies to analyze malware, fingerprinting the ‘DNA’ at the memory and execution-level – Has proactive capabilities to prevent execution of identified “risky” behavior
  • 29. Emerging Vendors to Watch ‘cont • Checkmarx – Static Application Security Testing (SAST) company – Compiles all scanned code into common framework for future testing • Mykonos – Web 2.0 AJAX framework – Ensures that Javascript code on end-user systems is not compromised – Built-in security for AJAX calls and functions
  • 30. A Parting Thought “Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.” -Kevin Mitnick