SlideShare a Scribd company logo
SETTING METHOD IN
CONSIDERATION OF THE PCI/DSS.
(PCI/DSS対応を考慮したVULS設定方
法)
@hogehuga
Today’s agenda
The subject of my LT is “Consider Vuls Settings with
the PCI/DSS”.
 We make clear what we do / do not it?
 do
 MUST
 MUST NOT
 RESTRICT
 about
 Vuls Server
 Target Server
 Service
Definition of term
 TargetServer
 To the test by using a Vuls.
 VulsServer
 The server to be inspected by Vuls
 vuls user
 User name “vuls” to use Vuls for inspection.
 Administrative user
 The user who can be connected to the “Vuls
server”.
Introduction
 To consider to the PCI/DSS, it is necessary to
take care of the following points.
 MUST NOT ASSIGN a special privilege to “vuls” user.
 Limited access, privileged, on a need-to-know basis.
 MUST REMOVE private key; About the “vuls” user of
TargetServer.
 Use SSH by Public key authentication when a VulsServer
access a TargetServer.
 MUST NOT Read/Write Vuls output data by general
user.
 Only privileged user can Read/Write Vuls output data.
 MUST RESTRICTED ACCESS and LOGGING to
Vuls output data.
 “Vuls output” include WEB( VulsRepo and the like)
POINT!
 Vuls server
 Login
 To restrict access to the Administrator.
 Logging the login.
 vuls user
 Limited privilege
 After setting the Vuls, sudo privileged is unnecessary.
 Logging the login/switch user to vuls.
 Vuls data (json reported data)
 To restrict access the Administrator/WEB process.
 Logging the access.
 WEB server
 Use Authentication access by Administrator.
 Logging the access.
POINT!
 Scanned Server
 vuls user
 Limited privilege by sudo.
 yum, apt-get only
 BSD does not require any sudo privilege
 Remove RSA private key
 Move(copy and delete) privatekey to VulsServer.
 Vuls Server only able to login to vuls.
Detail: Vuls server setting
For example…
 Prerequisite
 WEB server runs apache account.
 apache group contain vuls user.
 vuls user’s HOME is /opt/vuls .
 Login
 Only administrator can login the Vuls Server.
 Vuls data protection
 /opt/vuls/ is
 chmod 640 /opt/vuls
 chown vuls:apache /opt/vuls
 /opt/vuls/ssh_keys is
 chmod 600 /opt/vuls/ssh_keys
 chown vuls:vuls /opt/vuls/ssh_keys
 WEB Server
 Use /etc/hosts.allow, /etc/hosts.deny
 If basic authentication, MUST CHANGE every 90days and upper 7words(alphanumeric).
Detail: Scanned Server
For example
 Prerequisite
 vuls user’s HOME is /opt/vuls .
 Login
 MUST use key authentication.
 without passphrase , because using the Vuls as system.
 vuls user
 Limited setting to /etc/sudoers
 CentOS/RHEL
 vuls ALL=(root) NOPASSWD: /usr/bin/yum, /bin/echo
 Ubuntu, Debian
 vuls ALL=(root) NOPASSWD: /usr/bin/apt-get, /usr/bin/apt-cache
 Amazon LInux, FreeBSD
 Not required privilege settings.
 Remove the private key
 copy private key to Vuls Server, and remove private key on scanned server.
In conclusion
 I’m now going to give a brief summary of what we
have covered…
 Need-to-know basis
 limited privileged, restricted access, remove unnecessary
key.
 Logging, Logging, Logging!
Let’s patching software!
 PCI/DSS 6.2.a
 installation of applicable critical vendor-supplied
security patches within one month of release.
 Check security incident continuius by Vuls.
Sponser session.
 Thank you once again for talking the time to
join today’s presentation.
 we says, お疲れ様でした
 .. and sponsor session.

More Related Content

What's hot

Designing Azure compute and storage infrastructure
Designing Azure compute and storage infrastructureDesigning Azure compute and storage infrastructure
Designing Azure compute and storage infrastructure
William Lee
 
padmahasa november 2016 resume.Doc
padmahasa november 2016 resume.Docpadmahasa november 2016 resume.Doc
padmahasa november 2016 resume.Docpadma hasa
 
V mware course contents copy
V mware course contents   copyV mware course contents   copy
V mware course contents copy
Rakesh Puppala
 
Introduction to MariaDb
Introduction to MariaDbIntroduction to MariaDb
Introduction to MariaDb
BehzadDara
 
Introduction to Flow3
Introduction to Flow3Introduction to Flow3
Introduction to Flow3
Web Essentials Co., Ltd.
 
Drupal and Security: What You Need to Know
Drupal and Security: What You Need to KnowDrupal and Security: What You Need to Know
Drupal and Security: What You Need to Know
Acquia
 
Always on from the front lines1
Always on from the front lines1Always on from the front lines1
Always on from the front lines1
SitotpalSarkar
 
Configuring CQ Security
Configuring CQ SecurityConfiguring CQ Security
Configuring CQ Security
connectwebex
 
Vm ware course content (1)
Vm ware course content (1)Vm ware course content (1)
Vm ware course content (1)
Linux Training Chennai
 
What Is VMware
What Is VMwareWhat Is VMware
What Is VMware
Ashraf Ali
 
Vmware Training Institute in chennai
Vmware Training Institute in chennai Vmware Training Institute in chennai
Vmware Training Institute in chennai
THINK IT Training
 
Protect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes SecurityProtect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes Security
Red8 Interactive
 
What Is VMware
What Is VMwareWhat Is VMware
What Is VMware
Ashraf Ali
 

What's hot (20)

Designing Azure compute and storage infrastructure
Designing Azure compute and storage infrastructureDesigning Azure compute and storage infrastructure
Designing Azure compute and storage infrastructure
 
padmahasa november 2016 resume.Doc
padmahasa november 2016 resume.Docpadmahasa november 2016 resume.Doc
padmahasa november 2016 resume.Doc
 
V mware course contents copy
V mware course contents   copyV mware course contents   copy
V mware course contents copy
 
Vmware v sphere 5
Vmware v sphere 5Vmware v sphere 5
Vmware v sphere 5
 
Mastering VMware Datacenter Part-1
Mastering VMware Datacenter Part-1Mastering VMware Datacenter Part-1
Mastering VMware Datacenter Part-1
 
Introduction to MariaDb
Introduction to MariaDbIntroduction to MariaDb
Introduction to MariaDb
 
Linux system administration - part-2
Linux system administration - part-2Linux system administration - part-2
Linux system administration - part-2
 
Mastering VMware Datacenter - 15 Modules
Mastering VMware Datacenter - 15 ModulesMastering VMware Datacenter - 15 Modules
Mastering VMware Datacenter - 15 Modules
 
Introduction to Flow3
Introduction to Flow3Introduction to Flow3
Introduction to Flow3
 
Drupal and Security: What You Need to Know
Drupal and Security: What You Need to KnowDrupal and Security: What You Need to Know
Drupal and Security: What You Need to Know
 
Always on from the front lines1
Always on from the front lines1Always on from the front lines1
Always on from the front lines1
 
Configuring CQ Security
Configuring CQ SecurityConfiguring CQ Security
Configuring CQ Security
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
 
Vm ware course content (1)
Vm ware course content (1)Vm ware course content (1)
Vm ware course content (1)
 
What Is VMware
What Is VMwareWhat Is VMware
What Is VMware
 
Vmware Training Institute in chennai
Vmware Training Institute in chennai Vmware Training Institute in chennai
Vmware Training Institute in chennai
 
Vmware interview
Vmware interviewVmware interview
Vmware interview
 
Protect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes SecurityProtect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes Security
 
What Is VMware
What Is VMwareWhat Is VMware
What Is VMware
 
Links todwnload
Links todwnloadLinks todwnload
Links todwnload
 

Viewers also liked

脆弱性情報はこうしてやってくる
脆弱性情報はこうしてやってくる脆弱性情報はこうしてやってくる
脆弱性情報はこうしてやってくる
JPCERT Coordination Center
 
Vuls×deep security
Vuls×deep securityVuls×deep security
Vuls×deep security
一輝 長澤
 
Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )
Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )
Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )
Takayuki Ushida
 
20170325 institute of-vulnerability_assessment
20170325 institute of-vulnerability_assessment20170325 institute of-vulnerability_assessment
20170325 institute of-vulnerability_assessment
hogehuga
 
Vulsで始めよう!DevSecOps!
Vulsで始めよう!DevSecOps!Vulsで始めよう!DevSecOps!
Vulsで始めよう!DevSecOps!
Takayuki Ushida
 
東京オリンピックに向けた、サイバーテロ対策
東京オリンピックに向けた、サイバーテロ対策東京オリンピックに向けた、サイバーテロ対策
東京オリンピックに向けた、サイバーテロ対策
hogehuga
 
Securing Your .NET Application
Securing Your .NET ApplicationSecuring Your .NET Application
Securing Your .NET Application
Iron Speed
 
Maximizing your coaxial (cable tv) v2
Maximizing your coaxial (cable tv) v2Maximizing your coaxial (cable tv) v2
Maximizing your coaxial (cable tv) v2
Broto Santoso
 
Real Life Information Security
Real Life Information SecurityReal Life Information Security
Real Life Information Security
Pawel Krawczyk
 
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Pawel Krawczyk
 
RootedCON 2015 - Deep inside the Java framework Apache Struts
RootedCON 2015 - Deep inside the Java framework Apache StrutsRootedCON 2015 - Deep inside the Java framework Apache Struts
RootedCON 2015 - Deep inside the Java framework Apache Struts
testpurposes
 
バックアップの基礎知識
バックアップの基礎知識バックアップの基礎知識
バックアップの基礎知識
hogehuga
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue TeamersGo Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
 
.Net Hijacking to Defend PowerShell BSidesSF2017
.Net Hijacking to Defend PowerShell BSidesSF2017 .Net Hijacking to Defend PowerShell BSidesSF2017
.Net Hijacking to Defend PowerShell BSidesSF2017
Amanda Rousseau
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
CSCJournals
 
●●●の知らないSBCの世界
●●●の知らないSBCの世界●●●の知らないSBCの世界
●●●の知らないSBCの世界
Fujishiro Takuya
 
マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~
マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~
マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~
Tomohiro Nakashima
 
Passive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overviewPassive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overview
Luc De Heyn
 

Viewers also liked (20)

脆弱性情報はこうしてやってくる
脆弱性情報はこうしてやってくる脆弱性情報はこうしてやってくる
脆弱性情報はこうしてやってくる
 
Vuls×deep security
Vuls×deep securityVuls×deep security
Vuls×deep security
 
Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )
Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )
Vulsで危険な脆弱性を最速検知!(The fastest detection of dangerous vulnerability by Vuls! )
 
20170325 institute of-vulnerability_assessment
20170325 institute of-vulnerability_assessment20170325 institute of-vulnerability_assessment
20170325 institute of-vulnerability_assessment
 
Vulsで始めよう!DevSecOps!
Vulsで始めよう!DevSecOps!Vulsで始めよう!DevSecOps!
Vulsで始めよう!DevSecOps!
 
東京オリンピックに向けた、サイバーテロ対策
東京オリンピックに向けた、サイバーテロ対策東京オリンピックに向けた、サイバーテロ対策
東京オリンピックに向けた、サイバーテロ対策
 
Securing Your .NET Application
Securing Your .NET ApplicationSecuring Your .NET Application
Securing Your .NET Application
 
Maximizing your coaxial (cable tv) v2
Maximizing your coaxial (cable tv) v2Maximizing your coaxial (cable tv) v2
Maximizing your coaxial (cable tv) v2
 
Real Life Information Security
Real Life Information SecurityReal Life Information Security
Real Life Information Security
 
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
 
RootedCON 2015 - Deep inside the Java framework Apache Struts
RootedCON 2015 - Deep inside the Java framework Apache StrutsRootedCON 2015 - Deep inside the Java framework Apache Struts
RootedCON 2015 - Deep inside the Java framework Apache Struts
 
バックアップの基礎知識
バックアップの基礎知識バックアップの基礎知識
バックアップの基礎知識
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue TeamersGo Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
 
.Net Hijacking to Defend PowerShell BSidesSF2017
.Net Hijacking to Defend PowerShell BSidesSF2017 .Net Hijacking to Defend PowerShell BSidesSF2017
.Net Hijacking to Defend PowerShell BSidesSF2017
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
 
hbstudy37 slide
hbstudy37 slidehbstudy37 slide
hbstudy37 slide
 
●●●の知らないSBCの世界
●●●の知らないSBCの世界●●●の知らないSBCの世界
●●●の知らないSBCの世界
 
マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~
マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~
マルウェア流入対策のもうひと工夫~プロが厳選!低予算でもできる効果あるセキュリティ施策~
 
Passive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overviewPassive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overview
 

Similar to SETTING METHOD IN CONSIDERATION OF THE PCI/DSS

Hardening Apache Web Server by Aswin
Hardening Apache Web Server by AswinHardening Apache Web Server by Aswin
Hardening Apache Web Server by AswinAgate Studio
 
Configuration of Self Signed SSL Certificate For CentOS 8
Configuration of Self Signed SSL Certificate For CentOS 8Configuration of Self Signed SSL Certificate For CentOS 8
Configuration of Self Signed SSL Certificate For CentOS 8
Kaan Aslandağ
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
Zero Point Development
 
Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...
Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...
Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...
Sandy Winarko
 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issuesDeepu Thomas
 
Simple tips to improve Server Security
Simple tips to improve Server SecuritySimple tips to improve Server Security
Simple tips to improve Server Security
ResellerClub
 
Hands on workshop on word press
Hands on workshop on word pressHands on workshop on word press
Hands on workshop on word press
Mohammad Shoriful Islam Ronju
 
Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8home
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
Zachary Russell
 
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web ApplicationNull bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Anant Shrivastava
 
AWS Cyber Security Best Practices
AWS Cyber Security Best PracticesAWS Cyber Security Best Practices
AWS Cyber Security Best Practices
DoiT International
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012
Brad Williams
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
Christina Hawkins
 
Cohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF GuideCohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive Networks
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Michael J Geiser
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press Blog
Chetan Gole
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
Dre Armeda
 
iSCSI Target Support for Ceph
iSCSI Target Support for Ceph iSCSI Target Support for Ceph
iSCSI Target Support for Ceph
Ceph Community
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptx
AkashMalkood1
 
Log in to a Linux VM in Azure using AAD authentication
Log in to a Linux VM in Azure using AAD authenticationLog in to a Linux VM in Azure using AAD authentication
Log in to a Linux VM in Azure using AAD authentication
Takayoshi Tanaka
 

Similar to SETTING METHOD IN CONSIDERATION OF THE PCI/DSS (20)

Hardening Apache Web Server by Aswin
Hardening Apache Web Server by AswinHardening Apache Web Server by Aswin
Hardening Apache Web Server by Aswin
 
Configuration of Self Signed SSL Certificate For CentOS 8
Configuration of Self Signed SSL Certificate For CentOS 8Configuration of Self Signed SSL Certificate For CentOS 8
Configuration of Self Signed SSL Certificate For CentOS 8
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...
Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...
Embrace and Extend - First-Class Activity and 3rd Party Ecosystem for SSIS in...
 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issues
 
Simple tips to improve Server Security
Simple tips to improve Server SecuritySimple tips to improve Server Security
Simple tips to improve Server Security
 
Hands on workshop on word press
Hands on workshop on word pressHands on workshop on word press
Hands on workshop on word press
 
Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web ApplicationNull bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
 
AWS Cyber Security Best Practices
AWS Cyber Security Best PracticesAWS Cyber Security Best Practices
AWS Cyber Security Best Practices
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
 
Cohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF GuideCohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF Guide
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press Blog
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
iSCSI Target Support for Ceph
iSCSI Target Support for Ceph iSCSI Target Support for Ceph
iSCSI Target Support for Ceph
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptx
 
Log in to a Linux VM in Azure using AAD authentication
Log in to a Linux VM in Azure using AAD authenticationLog in to a Linux VM in Azure using AAD authentication
Log in to a Linux VM in Azure using AAD authentication
 

More from hogehuga

LT大会資料 URL踏むとBSoDになる、心あたたまるお話
LT大会資料 URL踏むとBSoDになる、心あたたまるお話LT大会資料 URL踏むとBSoDになる、心あたたまるお話
LT大会資料 URL踏むとBSoDになる、心あたたまるお話
hogehuga
 
水風呂道
水風呂道水風呂道
水風呂道
hogehuga
 
本当は怖いフリーWiFi(社内怪談LT)
本当は怖いフリーWiFi(社内怪談LT)本当は怖いフリーWiFi(社内怪談LT)
本当は怖いフリーWiFi(社内怪談LT)
hogehuga
 
最近のドローン界隈(仮)
最近のドローン界隈(仮)最近のドローン界隈(仮)
最近のドローン界隈(仮)
hogehuga
 
サウナととのいと水風呂ととのい
サウナととのいと水風呂ととのいサウナととのいと水風呂ととのい
サウナととのいと水風呂ととのい
hogehuga
 
Vuls祭り5 ; 脆弱性トリアージの考え方
Vuls祭り5 ; 脆弱性トリアージの考え方Vuls祭り5 ; 脆弱性トリアージの考え方
Vuls祭り5 ; 脆弱性トリアージの考え方
hogehuga
 
SIEMやログ監査で重要な事
SIEMやログ監査で重要な事SIEMやログ監査で重要な事
SIEMやログ監査で重要な事
hogehuga
 
Owasp io t_top10_and_drone
Owasp io t_top10_and_droneOwasp io t_top10_and_drone
Owasp io t_top10_and_drone
hogehuga
 
Drone collection2019
Drone collection2019Drone collection2019
Drone collection2019
hogehuga
 
ハラスメントについて
ハラスメントについてハラスメントについて
ハラスメントについて
hogehuga
 
ハニーポットのログ、毎日アクセスログを見よう
ハニーポットのログ、毎日アクセスログを見ようハニーポットのログ、毎日アクセスログを見よう
ハニーポットのログ、毎日アクセスログを見よう
hogehuga
 
ドローンの現状とハッキング(概要版)
ドローンの現状とハッキング(概要版)ドローンの現状とハッキング(概要版)
ドローンの現状とハッキング(概要版)
hogehuga
 
Vuls祭りvol3
Vuls祭りvol3Vuls祭りvol3
Vuls祭りvol3
hogehuga
 
Honypotのログを見る
Honypotのログを見るHonypotのログを見る
Honypotのログを見る
hogehuga
 
ハニーポッターと謎のアクセス
ハニーポッターと謎のアクセスハニーポッターと謎のアクセス
ハニーポッターと謎のアクセス
hogehuga
 
WEBサイトのセキュリティ対策 -継続的なアップデート-
WEBサイトのセキュリティ対策 -継続的なアップデート-WEBサイトのセキュリティ対策 -継続的なアップデート-
WEBサイトのセキュリティ対策 -継続的なアップデート-
hogehuga
 
20170408 securiy-planning
20170408 securiy-planning20170408 securiy-planning
20170408 securiy-planning
hogehuga
 
Vuls ローカルスキャンモードの活用方法
Vuls ローカルスキャンモードの活用方法Vuls ローカルスキャンモードの活用方法
Vuls ローカルスキャンモードの活用方法
hogehuga
 
(Vulsで)脆弱性対策をもっと楽に!
(Vulsで)脆弱性対策をもっと楽に!(Vulsで)脆弱性対策をもっと楽に!
(Vulsで)脆弱性対策をもっと楽に!
hogehuga
 
Windows server2012のインストールと初期構築 for biginner
Windows server2012のインストールと初期構築 for biginnerWindows server2012のインストールと初期構築 for biginner
Windows server2012のインストールと初期構築 for biginner
hogehuga
 

More from hogehuga (20)

LT大会資料 URL踏むとBSoDになる、心あたたまるお話
LT大会資料 URL踏むとBSoDになる、心あたたまるお話LT大会資料 URL踏むとBSoDになる、心あたたまるお話
LT大会資料 URL踏むとBSoDになる、心あたたまるお話
 
水風呂道
水風呂道水風呂道
水風呂道
 
本当は怖いフリーWiFi(社内怪談LT)
本当は怖いフリーWiFi(社内怪談LT)本当は怖いフリーWiFi(社内怪談LT)
本当は怖いフリーWiFi(社内怪談LT)
 
最近のドローン界隈(仮)
最近のドローン界隈(仮)最近のドローン界隈(仮)
最近のドローン界隈(仮)
 
サウナととのいと水風呂ととのい
サウナととのいと水風呂ととのいサウナととのいと水風呂ととのい
サウナととのいと水風呂ととのい
 
Vuls祭り5 ; 脆弱性トリアージの考え方
Vuls祭り5 ; 脆弱性トリアージの考え方Vuls祭り5 ; 脆弱性トリアージの考え方
Vuls祭り5 ; 脆弱性トリアージの考え方
 
SIEMやログ監査で重要な事
SIEMやログ監査で重要な事SIEMやログ監査で重要な事
SIEMやログ監査で重要な事
 
Owasp io t_top10_and_drone
Owasp io t_top10_and_droneOwasp io t_top10_and_drone
Owasp io t_top10_and_drone
 
Drone collection2019
Drone collection2019Drone collection2019
Drone collection2019
 
ハラスメントについて
ハラスメントについてハラスメントについて
ハラスメントについて
 
ハニーポットのログ、毎日アクセスログを見よう
ハニーポットのログ、毎日アクセスログを見ようハニーポットのログ、毎日アクセスログを見よう
ハニーポットのログ、毎日アクセスログを見よう
 
ドローンの現状とハッキング(概要版)
ドローンの現状とハッキング(概要版)ドローンの現状とハッキング(概要版)
ドローンの現状とハッキング(概要版)
 
Vuls祭りvol3
Vuls祭りvol3Vuls祭りvol3
Vuls祭りvol3
 
Honypotのログを見る
Honypotのログを見るHonypotのログを見る
Honypotのログを見る
 
ハニーポッターと謎のアクセス
ハニーポッターと謎のアクセスハニーポッターと謎のアクセス
ハニーポッターと謎のアクセス
 
WEBサイトのセキュリティ対策 -継続的なアップデート-
WEBサイトのセキュリティ対策 -継続的なアップデート-WEBサイトのセキュリティ対策 -継続的なアップデート-
WEBサイトのセキュリティ対策 -継続的なアップデート-
 
20170408 securiy-planning
20170408 securiy-planning20170408 securiy-planning
20170408 securiy-planning
 
Vuls ローカルスキャンモードの活用方法
Vuls ローカルスキャンモードの活用方法Vuls ローカルスキャンモードの活用方法
Vuls ローカルスキャンモードの活用方法
 
(Vulsで)脆弱性対策をもっと楽に!
(Vulsで)脆弱性対策をもっと楽に!(Vulsで)脆弱性対策をもっと楽に!
(Vulsで)脆弱性対策をもっと楽に!
 
Windows server2012のインストールと初期構築 for biginner
Windows server2012のインストールと初期構築 for biginnerWindows server2012のインストールと初期構築 for biginner
Windows server2012のインストールと初期構築 for biginner
 

Recently uploaded

In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 

Recently uploaded (20)

In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 

SETTING METHOD IN CONSIDERATION OF THE PCI/DSS

  • 1. SETTING METHOD IN CONSIDERATION OF THE PCI/DSS. (PCI/DSS対応を考慮したVULS設定方 法) @hogehuga
  • 2. Today’s agenda The subject of my LT is “Consider Vuls Settings with the PCI/DSS”.  We make clear what we do / do not it?  do  MUST  MUST NOT  RESTRICT  about  Vuls Server  Target Server  Service
  • 3. Definition of term  TargetServer  To the test by using a Vuls.  VulsServer  The server to be inspected by Vuls  vuls user  User name “vuls” to use Vuls for inspection.  Administrative user  The user who can be connected to the “Vuls server”.
  • 4. Introduction  To consider to the PCI/DSS, it is necessary to take care of the following points.  MUST NOT ASSIGN a special privilege to “vuls” user.  Limited access, privileged, on a need-to-know basis.  MUST REMOVE private key; About the “vuls” user of TargetServer.  Use SSH by Public key authentication when a VulsServer access a TargetServer.  MUST NOT Read/Write Vuls output data by general user.  Only privileged user can Read/Write Vuls output data.  MUST RESTRICTED ACCESS and LOGGING to Vuls output data.  “Vuls output” include WEB( VulsRepo and the like)
  • 5. POINT!  Vuls server  Login  To restrict access to the Administrator.  Logging the login.  vuls user  Limited privilege  After setting the Vuls, sudo privileged is unnecessary.  Logging the login/switch user to vuls.  Vuls data (json reported data)  To restrict access the Administrator/WEB process.  Logging the access.  WEB server  Use Authentication access by Administrator.  Logging the access.
  • 6. POINT!  Scanned Server  vuls user  Limited privilege by sudo.  yum, apt-get only  BSD does not require any sudo privilege  Remove RSA private key  Move(copy and delete) privatekey to VulsServer.  Vuls Server only able to login to vuls.
  • 7. Detail: Vuls server setting For example…  Prerequisite  WEB server runs apache account.  apache group contain vuls user.  vuls user’s HOME is /opt/vuls .  Login  Only administrator can login the Vuls Server.  Vuls data protection  /opt/vuls/ is  chmod 640 /opt/vuls  chown vuls:apache /opt/vuls  /opt/vuls/ssh_keys is  chmod 600 /opt/vuls/ssh_keys  chown vuls:vuls /opt/vuls/ssh_keys  WEB Server  Use /etc/hosts.allow, /etc/hosts.deny  If basic authentication, MUST CHANGE every 90days and upper 7words(alphanumeric).
  • 8. Detail: Scanned Server For example  Prerequisite  vuls user’s HOME is /opt/vuls .  Login  MUST use key authentication.  without passphrase , because using the Vuls as system.  vuls user  Limited setting to /etc/sudoers  CentOS/RHEL  vuls ALL=(root) NOPASSWD: /usr/bin/yum, /bin/echo  Ubuntu, Debian  vuls ALL=(root) NOPASSWD: /usr/bin/apt-get, /usr/bin/apt-cache  Amazon LInux, FreeBSD  Not required privilege settings.  Remove the private key  copy private key to Vuls Server, and remove private key on scanned server.
  • 9. In conclusion  I’m now going to give a brief summary of what we have covered…  Need-to-know basis  limited privileged, restricted access, remove unnecessary key.  Logging, Logging, Logging! Let’s patching software!  PCI/DSS 6.2.a  installation of applicable critical vendor-supplied security patches within one month of release.  Check security incident continuius by Vuls.
  • 10. Sponser session.  Thank you once again for talking the time to join today’s presentation.  we says, お疲れ様でした  .. and sponsor session.