Solution Overview E-SPIN Vulnerability Management

Transcription

E-SPIN Vulnerability ManagementSolution Overview Since 2005 E-SPIN GROUP OF COMPANIES. All Right Reserved.

CopyrightedCopyright 2005 - 2021 by E-SPIN Group of Companies. All rights reserved.No part of this solution/product/training presentation/handout may be reproduced, stored in a retrieval system,or transmitted in any form or by an means, electronic, mechanical, photocopying, recording, scanning, orotherwise, without either the prior written permission of E-SPIN, or authorization through payment of theappropriate per-copy fee to E-SPIN, email info@e-spincorp.comLimit of Liability / Disclaimer of Warranty: While the author have used their best efforts in preparing thissolution/product/training presentation/handout, they make no representations or warranties with respectto the accuracy or completeness of the contents and specifically disclaim any implied warranties ofmerchantability or fitness for a particular purpose. No warranty may be created or extended by salesrepresentatives or written sales materials. The advice and strategies contained herein may not be suitablefor any situation. You should consult with a professional where appropriate. Neither the author shall beliable for any loss of profit or any other commercial damages, including but not limited to special, incidental,consequential, or other damages.For general information on our other products and services or for technical support, please contact our customerservice department please email info@e-spincorp.com.

What can you expect from the presentation?Solution Overview Solution Overview, Features and Benefits, What’s NewsProduct Overview (What’s News) Product Overview, Functionality and Requirements,What’s NewsOpen Discussion / Clarification (Before End) Based on your requirements / concern in hand

Client VAC/SOC/NOC IntegrationVulnerability Assessment Center (VAC) / Security OperationCenter (SOC) / Network Operation Center (NOC)Terminal / Workstation

CyberSecurity Center FacilityCyber warfare , Cyber defense,cyber offensive center facility

Client VAC/SOC/NOC IntegrationVAC/SOC/SIEM/EMS/NMS/NOC Terminal Workstation Integration

Client VAC/SOC/NOC IntegrationVAC/SOC/SIEM and EMS/NMS NOC Terminal Workstation IntegrationInteractive VoiceResponse (IVR)Mobile and GatewaySMS IntegrationIntegrated Support TicketSystem

WHO is doing WHAT and WHEN on your networkE-SPIN Complete end to end complementary Flow Network and Security Monitoring,Probe/TAP, Collector, Visualization and Reporting from 10MB to 100GB

Vulnerability Management Solution Overview Vulnerability ManagementVulnerability AssessmentRisk and Security AssessmentAudit and ManagementEthical HackingPenetration TestingCompliance ManagementApplication Security Testing (AST)Cyber warfareRed TeamDevSecOps

TenableFull range from Generic vulnerability scanner Nessus Pro to Enterprise Unified SecurityMonitoring (USM) SecurityCenter.SC / Modern Tenable.io Lumin

Tenable on prem single install,unlimited IP scanvulnerabilityassessment tool (VAT) cloud, license by asset modulecan add Lumin reportingon prem license by assetenterprise “vulnerabilitymanagement”Active scanner Log CorrectionEngine Passive vun scannersecurity continuous monitoring /SOC

Trustwave (formerly Application Security, inc)Full range from Dbprotect for Enterprise wide database activity monitoring (DAM) toAppDetectivePro for database security audit / assessment and compliance enforcement.

Immunity SecurityFull range from CANVAS packaged vulnerability exploitation modules and developing, testingframework and all the commercial addon/plugin module to expand the functionality; toSILICA for wireless assessment, penetration testing.

TitaniaFull range from Nipper Studio (Network device) to Paws Studio(Endpoint device) auditing & compliance

Invicti (formerly Acunetix)Full range of automated Acunetix web vulnerability scanner (WVS) - standard, premium,A360 for dynamic application security testing (DAST)

Invicti (formerly Netsparker) DAST scanner 2006 invent byFerruh Mavituna, penetrationtester License subscription product,license by how many website Netsparker Standard, Team,Enterprise edition

Hex-RaysHex-Rays Decompiler and The IDA Disassembler anddebugger is a multi-processor disassembler and debuggerhosted on the Windows, Linux and Mac OS X Platforms forMalware analysis and Reverse engineering.

Veracode

ParasoftAutomated quality andsoftware testing Static analysis Unit Testing API Testing Load & PerformanceTesting Runtime Analysis Security Testing Service Virtualization Reporting & Analytics

PortSwigger Web Security manual webvulnerabilityscanner, unlper installautomatedweb scannerper serverinstall, licenseby instance

Qualys

Core Security Commercial penetrationtesting framework Use a common pen testmethodology Network, client-side, mobile,wireless and web vector cover Can add 3rd party exploitationpack to extend functionality

Core Security Cobalt Strike forAdversarySimulations andRed TeamOperations Customer withactive CoreImpact can on topsign up for theCore Impact Cobalt Strikecombo

DefenseCodeNext Generation of Application Security Testing (DAST SAST) can run in container architecture forDevSecOps CI/CD readySource Code Security Analysis (SAST) WebStrikeWeb Application Security Scanner(DAST), formerly WebScanner Single install, license by website or unlimitedper yearSingle Desktop Developer per yearSingle Server, single Developer instance per year

ImmuniWebCloud based only solution for application security needs and requirements.

SecPointNext Generation Vulnerability Scanner & UTM Firewall

AppScan App Security Testing (AST)formerly under IBM Security, but now is under HCLAppScanStandardDASTAppScanEnterpriseDAST, IASTAppScanSourceSASTAppScan onCloudDAST, IAST,SAST, SCA

Micro FocusFortify Application Security - WebInspect Solution (formerly SPI Dynamics)

Security Testing Market

End to End Vulnerability ManagementUnified VMNetwork & OSNetwork / Security DeviceMobile DeviceSource CodeMalware Analysis & ReverseEngineeringWirelessExploitationToolsSystems

Thank You & Open Discussion

Additional Information

E-SPIN Unified Vulnerability Management (UVM) Solution Overview

E-SPIN Unified Vulnerability Management (UVM) Solution Overview

DevSecOpsSecurityDevSecOpsDevelopmentOperations

DevSecOpsDevelopment TeamThe Revision ControlSystem TeamQA TeamRelease ing(SE)SecureDevOpsControlled environmentClustering Parallelism Load Balancing GridComputingScenarios (development,pre production, andproduction)Storage SAN - NAS - CASand BackUpRisk vernance ConstructionVerification DeploymentActive Directory SystemOperation Sensors RFIDVirtual Machine Web ServerApp Server DatabaseServerSecurity DevicesNetwork Geographic

Continuous MonitorOpsContinuous Integrated SecurityStatic AppSecurity Testing(SAST)VulnerabilityAssessmentDynamic AppSecurity Testing(DAST)Build / ianceDAST & it / Monitor /Protection (RASP/WAF)Secure SDLCTraining

IT Auditing Tools and TechniquesMission /ObjectiveThe AuditProcessUsing Controls to Protect Information AssetsEstablished Internal Controls on system & process (id. &mitigrate risks) Preventive, detective, reactive (corrective) controltypes Administrative control (eg policies & processes) Technical implementations tools & software enforcecontrol (eg passwords) Physical implementations control (eg guards, lockeddoors)Determine what to audit Centralize IT functions Decentralize IT functions Business Applications Regulatory Compliance Ranking those potential Audit in orderindependent assurance internal controls in placeStages of an Audit Planning Fieldwork & documentation Issue discovery & validation Solution development Report drafting & issuance Issue trackingidentify and addressing internal control weaknessesincorporate International Standards for the ProfessionalPractice of Internal AuditingAuditingEntity-Level Controls1. Review overall IT org structure to ensure it providesclear assignment of authority & responsibility over ITOp. & provide adequate duties segregation 2. Review IT strategic planning process & ensure italigns v biz strateigies. Eval IT org's processes formonitoring progress against the strategic plan 3. determine whether technology & app strategies &roadmaps exist, & eval processes for long-rangetechnical planning 4. review & ensure has performance indicators &measurements for IT. Measuring performance ofdaily activities & for tracking performance againstSLAs, budgets & other Op requirements 5. review IT org's process for approving & prioritizingnew projects. Determine whether has adequateprocess for ensuiring that system acquisition & devprojects cannot commence w/out approval. Ensuremgt & key stakeholders review project status,schedule, budget periodically thru/out the life ofsignificant projects 6. Evaluate standards for governing the execution ofIT projects & for ensuring the quality of productsdeveloped or acquired by IT org. Determine howthese stds are comm. & enforced. 7. Ensure IT security policies exist & provideadequate req for the sec of the env. Determine howthose policies are comm & how compliance ismonitored & enforced 8. Review & eval risk assessment process in plancefor the IT org 9. review & eval processes for ensuring IT employeesat the company have the skills & knowledgenecesssary for performing their jobs 10. review & eval policies & processes for assigningownership of company data, classifying the data,protecting the data in accordance with theirclassification, def the data' life cycle 11. ensure that effective processes exist forcomplying v appliacable laws & regulations thataffect IT & for maintaining awareness of changes inthe regulatory env. 12. review & eval processes for ensure end users ofIT env have ability to report problems, appropriateinvolvement in IT decisions, satisfied with theservices provided by IT 13. review & eval processes for managing 3rd partysvs, ensure their roles & responsibilities are clearlydefined & monitoring their performance 14. review & eval processes for control nonemployeelogical access 15. review & eval processes for ensure company is incompliance with applicable software licenses 16. review & eval controls over remote access intocompany's network 17. ensure hire & terminate procedures are clear &comprehensive 18. review & eval policies & procedures forcontrolling the procurement & movement ofhardware 19. ensure system config are controlled v change mgtto avoid unnecessary system outages 20. ensure media transportation, storage, reuse,disposal are address adequately by company widepolicies & procedures 21. verify capacity monitoring & planning areaddressed adequately by company policies &procedures 22. based on the structure of company's IT org &processes, id & audit other entity-level IT processesAuditingDataCenters &DisasterRecoveryFacility based controls Access control systems Alarm systems Fire Suppression systemsSystem & site resiliency Power Heating, Ventilation, air-conditioning Network connectivityData Center Operations Physical access control System & facility monitoring Facility & equipment maintenance Responding to outages, emergencies & ls1. Review controls around dev & maintainconfigurations 2. Ensure appropriate controls in place for any vul.assoc. v current software version. These controlsmight include software updates, config change, orother compensating controls. 3. Verify that all unnecessary svs are disabled 4. ENsure good SNMP mgt practices are followed (egSNMPv3, strong password & change frequency) 5. Review & eval procedures for creating useraccounts & ensuring that accounts are created onlywhen there's a legitimate biz need. Also review &eval processes for ensure that accounts are removeor diable in a timely fashion in the event ofterminate or job change. 6. Ensure appropriate password controls are used. 7. Verify that secure mgt protocols are used wherepossible. 8. Ensure that current backups exist for cong files ifapplicable. 9. Verify that logging is enabled & sent to acentralized system. 10. Eval use of Network Time Protocol (NTP) 11. Verify that a banner is configured to make allconnecting users aware of the company's policy forAuditing2 Devices - additional controls foruse & Layermonitoring.switches 12. Ensure that access controls are applied to the 1.verify thatconsoleport.admin avoid using VLAN 113.EvalEnsurethatofalltrunknetworkequipment is stored in a 2.the useautonegotiationsecurelocation 3. Verify that Spanning-Tree Protocol attack mitigration14. Ensure thata std namingconventionused foris enabled(BPDU Guard,RootisGuard)allEvaldevices 4.the use of VALNs on the network.15.DiableVerifyallthatstd, documentedfor 5.unusedports, & put processesthem in anexistunusedbuildingnetworkdevicesVLAN 6. Eval use of the VLAN Trunking Portocol (VTP) in theenv 7. Verify that thresholds exist that limitbroadcast/multicast traffic on portsAuditing Layer 3 Devices - Additional controls for Routers 1. Verify that inactive interfaces on the router aredisabled 2. Ensure that the router is config to save all coredumps 3. Verify that all routing updates are authenticated 4. Verify that IP source routing & IP directedbroadcasts are diabledAuditing Firewalls- additional controls 1. Verify that all packets are denied by default 2. Ensure that inappropriate internal & external IPaddresses are filteredAuditingWindowsOperatingSystems1. Obtain the sys info & svs pack ver, & compare vpolicy req 2. Determine if the server is running thecompany-privisioned firewall 3. Determine if the server is running acompany-provisioned antivirus program 4. Ensure that all approved patches are installed peryour server mgt policy 5. Determine if the server is running acompany-provisioned patch mgt solution 6. Review & verify startup info 7. Determine what svs are enabled on the system &validate their necessity v the system admin. Fornecessary svs, review & eval procedures forassessing vul assoc v those svs & keeping thempatched 8. Ensure that only approved app are installed on thesystem per your server mgt policy 9. Ensure that only approved scheduled tasks arerunning 10. Review & eval procedures fore creating useraccounts & ensuring that act are created only whenthere's a legitimate biz need. Revemo or disabled actin timely fashion in the event of termination or jobchange. 11. Ensure that all users are create at the domainlevel & clearly annotated in active directory. Eachuser should trace to a specific employee or team 12. Review & eval the use of groups, & determinethe restrictiveness of their use 13. Review & eval the strength of system passwords 14. Eval the use of password controls on the server,such as password aging, length, complxity, history &lockout policies 15. Review & eval the use of user rights & securityoptions assigned to the elements in the securitypolicy settings 16. Review & eval the use & need for remote access,including RAS connections, FTP, Telnet, SSH, VPN, &other methods 17. Ensure that a legal warning banner is displayedwhen connecting to the system 18. Look for & eval the use of shares on the host 19. Ensure that the server has auditing enabled peryour policies or org's practices 20. Review & eval system admin procedures formonitoring the state of security on the system 21. If you are auditing a larger env, determinewhether there is a std buld for new systems &whether that baseline has adequate iting a system freshly created 1.Determineif the clients is running thefromthe baseline company-provisioned22. Auditing data centers& disaster recovery (followfirewallsteps) 2.Determine if the client is running acompany-provisioned antivirus program 3. Determine if the client is running acompany-provisioned patch mgt solution 4. Determine if the client is equipped v the minimumrecommended svs pack, hotfixes, & software 5. Ensure that the client has following MS BaselineSecurity Analyzer (MBSA) 6. Scan the system using a commercial-grade networkscanner 7. Eval physical sec controls during a walk-thruAuditingUnix &LinuxOperatingSystemsAccount Mgt & Password Controls 1. Review & eval procedures for creating Unix/Linuxuser accounts & ensure that act are create only whenthere's legitimate biz need. Remove/diabled in atimely fashion in the event of terminate/job change 2. Ensure that all UID's in the password file(s) areunique 3. Ensure that passowrds are shadowed & use stronghashes where possible 4. Eval the file permissions for the password &shadow password files 5. Review & eval the system password strength 6. Eval the use of password controls such as aging Auditing7. Reviewprocessused by the system admin forFile theSecurity& Controlssettinginitialfor new& commsamplethose of 1.Eval thefilepasswordpermissionsfor a userjudgmentalpasswordfiles& theirdirectories critical8. Ensurethateach relatedact is assocv & can be traced 2.Looktoforopen directorieseasilya specificemployeeon the system, &whethershouldstickly determine9. Ensure setdisabled act 3.the securityof all userSUID(root-level)files on theaccesssystem,10.EvalReview& eval superto "root" especially11. Reviewthose& evalthattheareuseSUIDof groups,& determine the 4.Review & evaloverrestrictivenessofsectheirusethe kernel 5.thathave a legalownerthe12.EnsureEval theusealloffilespasswordsat thegroupinlevel /etc/passwd13. Review &fileeval the security of directories in the 6.Ensuretheusedchowncannotwhenbe usedbydefaultpathby commandthe sysm adminaddingusersto compromiseuseract "current directory" innew users.Eval the useof the Auditing7.& evalSecuritythe defaultumask vale for the serverNetwork& ControlstheObtainpath eReview & whateval thesecuritydirectoriesin root's1.networksvsofareenabled currentdirectory"inthesystem& validatenecessitysys admin.Forwithinnecessary path9.Reviewthe securityof thevfilesreferencesvs,review& evalproceduresfor assessingvul entriesassoc vcrontabentries,particularlyroot's.Ensurethe those15.Reviewevalthesecurityof dbyThey& writableonlyby thedirectoriesconfigfiles.generallyshouldbe owner2.Executea&networkvulscanningtool intoof thecrontab.Ensureno cronsareorderrun fromwritableby thecheckdirectories.foronlycurrentvulownerin the envopen 3.Review&evaltheuseoftrustedaccessviathe10. Exam system's schedul at jobs for/etc/hosts,if necessary,is restricted to the extentunusual/suspiciousentriespossible 4. If anonymous FTP is enabled & needed, ensure thatit is locked down proerly 5. If NFS is enabled & needed, ensure it is securedproperlyAuditingAudit Logs6. ReviewReview controlsfor the usesecure protocols 1.forofpreventingdirect "root" logins 7. Review & eval the use of .netrc files2. EnsureReview athesu warning& sudo commandto ensure 8.legalbanner is logsdisplayedwhenthatwhenthesetocommandsare used, they are logged vconnectingthe systemthedate,userusewhotheoncommand 9. Reviewtime,& eval&theof typedmodemsthe server 3. Eval the syslog in order to ensure that adequateinfo is being captured 4. Eval the security & retention of the wtmp log,sulog, syslog, & any other relevant audit logs 5. Eval security over the utmp fileAuditing Security Monitoring & other controls 1. Review & eval sys admin procedures for

Full range from Nipper Studio (Network device) to Paws Studio . auditing & compliance. Invicti (formerly Acunetix) Full range of automated Acunetix web vulnerability scanner (WVS) - standard, premium, A360 for dynamic application security testing (DAST) Invicti (formerly Netsparker) DAST scanner 2006 invent by Ferruh Mavituna, penetration