SlideShare a Scribd company logo
Proprietary and confidential information of stackArmor
MEETING SECURITY AND COMPLIANCE REQUIREMENTS USING AWS SERVICES
Security by Design
Session 2:
Continuous Monitoring and Management (CM)
About Jack Heyman
2PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR
 Has worked with many Federal agencies, Fortune 500 companies and
Accounting/Consulting firms.
 Teaches IT related courses on a nationwide basis.
 Teaches CDM to most Federal agencies on behalf of Booz Allen Hamilton.
 Holds several certifications such as CISA, CAP, CIPP, CGFM, and CPA.
 Previously worked at PricewaterhouseCoopers for approximately 6 years.
 Loves to travel and interact with people from all over the world.
 Spent time volunteering to help those in need.
Why do you care about CDM?
• CDM is a best practice developed by experts in security and IT
systems management experts over a period of many years
• There are great lessons, practices and technologies that can be
leveraged by security focused organizations without having to
re-invent the wheel
• CDM is a great reference implementation and benchmark
source to help Executive Management understand the need for
continuous security monitoring and investments
PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 3
Introduction to CDM
• Established by the Department of Homeland Security (DHS).
• In conjunction with OMB, NIST, and others.
• Will address aspects of other requirements (e.g. FISMA,
Privacy laws, etc.).
• Better management of vulnerabilities, coordination of issues
across agencies, as well as cost savings
PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 4
CDM Requirements
•New devices need to be identified within 72 hours.
•Weaknesses need to be identified and remediated within
specified timelines.
•All agencies need to report up to DHS.
•DHS needs to be able to send communications and other
correspondence with the ’subordinate’ agencies.
•All agencies (Executive branch), States, and other affected
entities need to know their hardware, software, and be able
to report timely.
PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 5
The CDM Tech Stack
• There are 5 tools to be deployed as part of complying with
CDM:
◦ ForeScout
◦ BigFix
◦ RES
◦ Splunk
◦ Dashboard (RSA Archer)
PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 6
Manages inventory.
Works with many technologies.
Can identify, alert, restrict, disable and more for endpoints on the network.
Can even locate non-IP addressable endpoints on the network.
ForeScout Overview
All internal IP addresses need to be configured.
Assets must be categorized correctly (e.g. Windows, etc.) and also the various segments and
organizational units.
Specific ports needs to be open or listening in order for Forescout to report correctly (e.g. Port
135, 139, 445)
Assets that are unassigned or unclassified.
Firewalls must also not block the BigFix reporting.
Syslog communication
ForeScout Challenges
Applies patches and updates globally based on technology type.
Works with many technologies.
Subscribe to various checklists (e.g. CIS, USGCB, STIG, etc.) and ensure your endpoints are
compliant with those respective checklists.
BigFix Overview
Can accommodate secure LDAP (port 636 must be open for this to work properly)
Specific ports must be open (e.g. 52311/bi-directional) or else BigFix won’t work properly
 There are additional ports that should be open as well such as 52312, 52314, and 52315 (Web Reports,
Security and Compliance, and Inventory)
Firewalls must also not block the BigFix reporting.
Assigning Master operators to the same endpoints will likely result in errors (e.g one operator running a Fixlet
and the other operator running an opposing Fixlet).
Editing the Masthead (access to the URL where software is downloaded from).
Access to the database (DBA rights may be different from the BigFix endpoints).
Audit data is retained only for 10 days by default.
Syslog communication
BigFix Challenges
Homogenizes and anonymizes data for consistent reporting (e.g. individual Agency to DHS).
Identify only those audit events needed for reporting purposes.
Like Google but for searching data anywhere on the network.
Works with other technologies such as Nessus.
Splunk Overview
Access and configuration to the forwarders (those hardware items that forward data to the Splunk
indexer) for analysis.
Maybe incomplete data was configured to be sent to the syslog servers.
Other access configurations such as:
 Removing the use of LDAP.
 Limiting the number of jobs.
 Changing ports.
 Enabling SSL and/or email security.
Specific ports must be open (e.g. 8443, 8089, 8191, and 9996) or else Splunk won’t work
properly
 8443 – Splunk search page (port used for user login)
 8089 – used by the search engine (used by the search head against the indexer - 9996)
 8191 – used to store lookups for populating events with fields pulled from the Key Value (KV) store
 9996/7 – used by the data gathering component to the indexer
Splunk Challenges
Reporting tool based on all data ingested by Splunk.
Run filters, queries and other analysis to identify in real-time any issues that may have arisen.
Facilitates preventive, detective, and corrective controls.
RSA Archer Overview
RSA Archer Questions
General
 How can I see a report of all devices grouped by operating system, technology, etc.?
 Can I see a pie chart of the various operating systems?
 Can I sort by Windows 2008 R2?
 Can I see the location of my hardware devices?
 What were the changes to my inventory since last month?
 Can I get a report of all Nessus vulnerabilities by technology and location?
 Which of my systems are FISMA reportable?
RSA Archer Questions
Forescout
 Is there a report to show me all unassigned hardware from Forescout?
 How about a report of all unclassified hardware from Forescout?
 Is there a report showing which hardware appliances are currently without BigFix installed?
 Can I see a report of all new hardware devices added in the last month?
 Were there any hardware devices that had their firewall rulesets changed to block Forescout
reporting?
 Are there any IP addresses that have not been assigned or configured?
 Is there a report showing which servers have had specific ports closed?
 What are the assets that are non-IP addressable assets that are tracked by Forescout but not
BigFix?
RSA Archer Questions
BigFix
 How about a report that shows which applications have out of date patches?
 Is there a report showing which servers have had specific ports closed?
 Have there been any modifications to the Masthead within the BigFix installation?
 Have there been any new users created, deleted or modified with regard to the SQL database
used for BigFix?
 Has auditing exceeded the 10 day setting and is now being overwritten?
RSA Archer Questions
Splunk
 Have there been any new forwarders configured in the last month?
 Has the threshold limitations changed in the last month for ingesting data?
 Were any new configurations deployed within the Splunk architecture (e.g. forwarders, indexers,
index clusters)?
 Have the parameters concerning Splunk buckets changed or was data removed from the
buckets?
 Was SSL disabled on the Splunk indexer?
 Have any of the Splunk ports been closed in the last month?
Learn more at www.stackArmor.com
Thank you
www.stackArmor.com
solutions@stackArmor.com
Security By Design
https://www.stackArmor.com/SecurityByDesign

More Related Content

What's hot

The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
Infocyte
 
FedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceFedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP Marketplace
ControlCase
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
Rapid7
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
James W. De Rienzo
 
FedRAMP CSP SSP Training
FedRAMP CSP SSP TrainingFedRAMP CSP SSP Training
FedRAMP CSP SSP Training
1ECG
 
Risk Management for Public Cloud Projects
Risk Management for Public Cloud ProjectsRisk Management for Public Cloud Projects
Risk Management for Public Cloud Projects
Alex Mags
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Andrew Gerber
 
Implementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWSImplementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWS
Amazon Web Services
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
akquinet enterprise solutions GmbH
 
How to Simplify PCI DSS Compliance with AlienVault USM
How to Simplify PCI DSS Compliance with AlienVault USMHow to Simplify PCI DSS Compliance with AlienVault USM
How to Simplify PCI DSS Compliance with AlienVault USM
AlienVault
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
Splunk
 
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet ENITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust - Cybersecurity as a Service
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
Petteri Heino
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
Priyanka Aash
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 

What's hot (20)

The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
 
FedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceFedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP Marketplace
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
 
FedRAMP CSP SSP Training
FedRAMP CSP SSP TrainingFedRAMP CSP SSP Training
FedRAMP CSP SSP Training
 
Risk Management for Public Cloud Projects
Risk Management for Public Cloud ProjectsRisk Management for Public Cloud Projects
Risk Management for Public Cloud Projects
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Implementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWSImplementing FISMA Moderate Applications on AWS
Implementing FISMA Moderate Applications on AWS
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
How to Simplify PCI DSS Compliance with AlienVault USM
How to Simplify PCI DSS Compliance with AlienVault USMHow to Simplify PCI DSS Compliance with AlienVault USM
How to Simplify PCI DSS Compliance with AlienVault USM
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet ENITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet EN
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
 
Operational Security
Operational SecurityOperational Security
Operational Security
 

Similar to stackArmor - FedRAMP and 800-171 compliant cloud solutions

Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
NetworkCollaborators
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
Splunk
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
Hayat Azizi
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
Greg Hanchin
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
Greg Hanchin
 
SplunkLive! Zurich 2018: Integrating Metrics and Logs
SplunkLive! Zurich 2018: Integrating Metrics and LogsSplunkLive! Zurich 2018: Integrating Metrics and Logs
SplunkLive! Zurich 2018: Integrating Metrics and Logs
Splunk
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
ssuser4c54af
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Precisely
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
Olivier DASINI
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Mds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to herokuMds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to heroku
David Scruggs
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
Denodo
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
Niel Dunnage
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Implement a Universal Data Distribution Architecture to Manage All Streaming ...
Implement a Universal Data Distribution Architecture to Manage All Streaming ...Implement a Universal Data Distribution Architecture to Manage All Streaming ...
Implement a Universal Data Distribution Architecture to Manage All Streaming ...
Timothy Spann
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
Fidelis Cybersecurity
 

Similar to stackArmor - FedRAMP and 800-171 compliant cloud solutions (20)

Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
SplunkLive! Zurich 2018: Integrating Metrics and Logs
SplunkLive! Zurich 2018: Integrating Metrics and LogsSplunkLive! Zurich 2018: Integrating Metrics and Logs
SplunkLive! Zurich 2018: Integrating Metrics and Logs
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Mds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to herokuMds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to heroku
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Implement a Universal Data Distribution Architecture to Manage All Streaming ...
Implement a Universal Data Distribution Architecture to Manage All Streaming ...Implement a Universal Data Distribution Architecture to Manage All Streaming ...
Implement a Universal Data Distribution Architecture to Manage All Streaming ...
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 

More from Gaurav "GP" Pal

stackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSstackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
Gaurav "GP" Pal
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfee
Gaurav "GP" Pal
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
Gaurav "GP" Pal
 
stackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with SplunkstackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with Splunk
Gaurav "GP" Pal
 
Magento Hosting on AWS
Magento Hosting on AWS Magento Hosting on AWS
Magento Hosting on AWS
Gaurav "GP" Pal
 
Rapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWSRapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWS
Gaurav "GP" Pal
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Gaurav "GP" Pal
 
Implementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsImplementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud Platforms
Gaurav "GP" Pal
 
FGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC MeetupFGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC Meetup
Gaurav "GP" Pal
 
stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4
Gaurav "GP" Pal
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
Gaurav "GP" Pal
 
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and ChefDevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
Gaurav "GP" Pal
 
Hosting Tableau on AWS
Hosting Tableau on AWSHosting Tableau on AWS
Hosting Tableau on AWS
Gaurav "GP" Pal
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
Gaurav "GP" Pal
 
Big Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector ProgramsBig Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector Programs
Gaurav "GP" Pal
 
2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches
Gaurav "GP" Pal
 
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suroDevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
Gaurav "GP" Pal
 
Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014
Gaurav "GP" Pal
 

More from Gaurav "GP" Pal (18)

stackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSstackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfee
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
 
stackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with SplunkstackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with Splunk
 
Magento Hosting on AWS
Magento Hosting on AWS Magento Hosting on AWS
Magento Hosting on AWS
 
Rapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWSRapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWS
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWS
 
Implementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsImplementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud Platforms
 
FGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC MeetupFGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC Meetup
 
stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and ChefDevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
 
Hosting Tableau on AWS
Hosting Tableau on AWSHosting Tableau on AWS
Hosting Tableau on AWS
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
Big Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector ProgramsBig Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector Programs
 
2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches
 
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suroDevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
 
Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014
 

Recently uploaded

Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Congressional Budget Office
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
teeaszt
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
JSchaus & Associates
 
G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
Energy for One World
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
Congressional Budget Office
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
JuanFelipeHerrera4
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
odmqk
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
Scribe
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
Energy for One World
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
ProexportColombia1
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
Congressional Budget Office
 
History Of Balochistan amazing .pptx / HOB
History Of Balochistan amazing .pptx      / HOBHistory Of Balochistan amazing .pptx      / HOB
History Of Balochistan amazing .pptx / HOB
uzma baloch
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
Cheong Man Keong
 
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
vfefek
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
taqyea
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
Energy for One World
 

Recently uploaded (20)

Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
 
G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
 
History Of Balochistan amazing .pptx / HOB
History Of Balochistan amazing .pptx      / HOBHistory Of Balochistan amazing .pptx      / HOB
History Of Balochistan amazing .pptx / HOB
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
 
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
 

stackArmor - FedRAMP and 800-171 compliant cloud solutions

  • 1. Proprietary and confidential information of stackArmor MEETING SECURITY AND COMPLIANCE REQUIREMENTS USING AWS SERVICES Security by Design Session 2: Continuous Monitoring and Management (CM)
  • 2. About Jack Heyman 2PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR  Has worked with many Federal agencies, Fortune 500 companies and Accounting/Consulting firms.  Teaches IT related courses on a nationwide basis.  Teaches CDM to most Federal agencies on behalf of Booz Allen Hamilton.  Holds several certifications such as CISA, CAP, CIPP, CGFM, and CPA.  Previously worked at PricewaterhouseCoopers for approximately 6 years.  Loves to travel and interact with people from all over the world.  Spent time volunteering to help those in need.
  • 3. Why do you care about CDM? • CDM is a best practice developed by experts in security and IT systems management experts over a period of many years • There are great lessons, practices and technologies that can be leveraged by security focused organizations without having to re-invent the wheel • CDM is a great reference implementation and benchmark source to help Executive Management understand the need for continuous security monitoring and investments PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 3
  • 4. Introduction to CDM • Established by the Department of Homeland Security (DHS). • In conjunction with OMB, NIST, and others. • Will address aspects of other requirements (e.g. FISMA, Privacy laws, etc.). • Better management of vulnerabilities, coordination of issues across agencies, as well as cost savings PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 4
  • 5. CDM Requirements •New devices need to be identified within 72 hours. •Weaknesses need to be identified and remediated within specified timelines. •All agencies need to report up to DHS. •DHS needs to be able to send communications and other correspondence with the ’subordinate’ agencies. •All agencies (Executive branch), States, and other affected entities need to know their hardware, software, and be able to report timely. PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 5
  • 6. The CDM Tech Stack • There are 5 tools to be deployed as part of complying with CDM: ◦ ForeScout ◦ BigFix ◦ RES ◦ Splunk ◦ Dashboard (RSA Archer) PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 6
  • 7. Manages inventory. Works with many technologies. Can identify, alert, restrict, disable and more for endpoints on the network. Can even locate non-IP addressable endpoints on the network. ForeScout Overview
  • 8. All internal IP addresses need to be configured. Assets must be categorized correctly (e.g. Windows, etc.) and also the various segments and organizational units. Specific ports needs to be open or listening in order for Forescout to report correctly (e.g. Port 135, 139, 445) Assets that are unassigned or unclassified. Firewalls must also not block the BigFix reporting. Syslog communication ForeScout Challenges
  • 9. Applies patches and updates globally based on technology type. Works with many technologies. Subscribe to various checklists (e.g. CIS, USGCB, STIG, etc.) and ensure your endpoints are compliant with those respective checklists. BigFix Overview
  • 10. Can accommodate secure LDAP (port 636 must be open for this to work properly) Specific ports must be open (e.g. 52311/bi-directional) or else BigFix won’t work properly  There are additional ports that should be open as well such as 52312, 52314, and 52315 (Web Reports, Security and Compliance, and Inventory) Firewalls must also not block the BigFix reporting. Assigning Master operators to the same endpoints will likely result in errors (e.g one operator running a Fixlet and the other operator running an opposing Fixlet). Editing the Masthead (access to the URL where software is downloaded from). Access to the database (DBA rights may be different from the BigFix endpoints). Audit data is retained only for 10 days by default. Syslog communication BigFix Challenges
  • 11. Homogenizes and anonymizes data for consistent reporting (e.g. individual Agency to DHS). Identify only those audit events needed for reporting purposes. Like Google but for searching data anywhere on the network. Works with other technologies such as Nessus. Splunk Overview
  • 12. Access and configuration to the forwarders (those hardware items that forward data to the Splunk indexer) for analysis. Maybe incomplete data was configured to be sent to the syslog servers. Other access configurations such as:  Removing the use of LDAP.  Limiting the number of jobs.  Changing ports.  Enabling SSL and/or email security. Specific ports must be open (e.g. 8443, 8089, 8191, and 9996) or else Splunk won’t work properly  8443 – Splunk search page (port used for user login)  8089 – used by the search engine (used by the search head against the indexer - 9996)  8191 – used to store lookups for populating events with fields pulled from the Key Value (KV) store  9996/7 – used by the data gathering component to the indexer Splunk Challenges
  • 13. Reporting tool based on all data ingested by Splunk. Run filters, queries and other analysis to identify in real-time any issues that may have arisen. Facilitates preventive, detective, and corrective controls. RSA Archer Overview
  • 14. RSA Archer Questions General  How can I see a report of all devices grouped by operating system, technology, etc.?  Can I see a pie chart of the various operating systems?  Can I sort by Windows 2008 R2?  Can I see the location of my hardware devices?  What were the changes to my inventory since last month?  Can I get a report of all Nessus vulnerabilities by technology and location?  Which of my systems are FISMA reportable?
  • 15. RSA Archer Questions Forescout  Is there a report to show me all unassigned hardware from Forescout?  How about a report of all unclassified hardware from Forescout?  Is there a report showing which hardware appliances are currently without BigFix installed?  Can I see a report of all new hardware devices added in the last month?  Were there any hardware devices that had their firewall rulesets changed to block Forescout reporting?  Are there any IP addresses that have not been assigned or configured?  Is there a report showing which servers have had specific ports closed?  What are the assets that are non-IP addressable assets that are tracked by Forescout but not BigFix?
  • 16. RSA Archer Questions BigFix  How about a report that shows which applications have out of date patches?  Is there a report showing which servers have had specific ports closed?  Have there been any modifications to the Masthead within the BigFix installation?  Have there been any new users created, deleted or modified with regard to the SQL database used for BigFix?  Has auditing exceeded the 10 day setting and is now being overwritten?
  • 17. RSA Archer Questions Splunk  Have there been any new forwarders configured in the last month?  Has the threshold limitations changed in the last month for ingesting data?  Were any new configurations deployed within the Splunk architecture (e.g. forwarders, indexers, index clusters)?  Have the parameters concerning Splunk buckets changed or was data removed from the buckets?  Was SSL disabled on the Splunk indexer?  Have any of the Splunk ports been closed in the last month?
  • 18. Learn more at www.stackArmor.com Thank you www.stackArmor.com solutions@stackArmor.com Security By Design https://www.stackArmor.com/SecurityByDesign