HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS The 20 Critical Security Controls published by the SANS Institute are a practical set of tactics focused on protecting an organization’s IT infrastructure against the most common security risks. Hundreds of organizations, including the US National Security Agency, the British Centre for the Protection of National Infrastructure, and the US Department of Homeland Security Federal Network Security Program, have shifted from a compliance focus to a security focus by adopting these controls. SANS’ 20 Critical Controls reflect the consensus of major organizations with a deep understanding of how cyber-attacks are carried out in the real world, why the attacks succeed, and what specific controls can stop them or mitigate their damage. ObserveIT’s User Activity Monitoring solution addresses many of the 20 Critical Controls in ways that go well beyond the essential technical requirements. Even once organizations have satisfactorily secured their servers and applications from external attacks, the user activity threat remains in full force. This is because the company’s employees, administrators and contractors are authorized to operate inside the security perimeter, rendering most traditional security mechanisms nearly useless. It is the activities of authorized users (or outsiders who manage to gain access to authorized user accounts) within applications that pose the greatest IT security risk. Both industry research and the rapidly-growing list of incidents in the news confirm this unfortunate reality. Read on to learn how ObserveIT’s User Activity Monitoring solution addresses 7 of the 20 SANS Critical Security Controls. CSC #2: Inventory of Authorized and Unauthorized Software CSC 2-4 specifies, Deploy software inventory tools throughout the organization covering each of the operating system types in use, including servers, workstations, and laptops. As part of its User Activity Monitoring functionality, ObserveIT captures the name of every application run by every user on every monitored server and desktop. This makes it easy to automatically run periodic reports (which are sent to designated recipients) listing every application used during a given time period. These reports include all the users who ran each application and even a video button that plays back the screen recording of the selected time that the application was run. This makes it child’s play for an administrator to quickly determine if any application usage posed a danger to the organization. Here is a portion of such a report: OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 1 CSC 2-3 specifies, Perform regular scanning for unauthorized software and generate alerts when it is discovered on a system, and CSC 2-6 specifies, Dangerous file types (e.g., .exe, .zip, .msi) should be closely monitored. ObserveIT’s rule-based alerts feature is ideally suited to both these controls: by defining lists of application names and/or file types (or even the actual names of sensitive files), administrators can receive real-time notifications any time any user accesses one of the specified applications, file names or file types. A definition for this kind of alert rule might appear like this: OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 2 CSC #4: Continuous Vulnerability Assessment and Remediation, and CSC #16: Account Monitoring and Control Assessing the vulnerability of network, hardware and software infrastructure is critical, but so is assessing the risks posed by users and their activities in applications and servers. Likewise, it is critical to monitor user accounts and to profile usage patterns of user accounts (as enumerated in CSC 16-5, Regularly monitor the use of all accounts, and CSC 16-13, Profile each user's typical account usage). ObserveIT’s User Behavior Analytics helps to secure a company’s data and systems by automatically and continuously profiling the behavior of every user. After initially profiling the typical, expected behavior of each type of user (and even individual users), these systems are able to automatically detect behavioral anomalies that may indicate negligent or fraudulent activities. For example, if a hacker gains access to a login account, his behavior will appear very differently than the real business or IT user who normally logs in with that account. Another example is a user who is suddenly accessing new resources for the first time, or running unusually large reports. There are numerous types of behavior anomalies that may trigger detection. Examples include: OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 3 running unusual applications accessing unusual systems, files or others resources performing unusual types of operations or running rarely-used commands generating larger-than-usual reports executing a larger number of actions than usual within a given time frame accessing systems from unusual client machines logging in outside normal/expected hours of the day or days of the week ObserveIT’s User Behavior Analytics detects these behavioral irregularities and alerts IT security staff about them in real time. The security administrator can then observe the suspicious user session via a streaming video broadcast of the user’s desktop, or review the user activity logs generated by the current session (and past sessions). If deemed necessary, administrators can instant-message the user via the desktop or even shut down the session from within the same interface. For lower-severity incidents, such as non-critical out-of-policy behaviors, administrators can later review session transcripts and/or videos to determine if irresponsible or dangerous activities had taken place. CSC #6: Application Software Security Despite an organization’s best efforts to ensure that the software used on their networks is secure and that the latest patches/upgrades are applied, software-based vulnerabilities will always remain inevitable. This is true both because software may still have weaknesses to hacking attacks, but also because even hardened software can be abused by the users authorized to use it. For both reasons, it is therefore critical to continuously monitor all user activity within applications. Whether by negligence, carelessness or malicious intent, employees and contractors alike can do things within applications that threaten a company’s data and systems. It is extremely difficult to identify unauthorized activity among authorized users, given the large number of actions performed every day by all types of users. However, when organizations fail to notice abnormal activity patterns in the context of IT and business user actions, both hackers and internal malicious users are able to steal, leak or destroy valuable data. Examples of IT administrator activities that can impact on the security of an organization include: Making changes to configuration files that can cause systems to fail Creating unauthorized local or remote access accounts (e.g., VPN or SSH) Escalating privileges on Unix/Linux machines using sudo Changing the administrator or root password Using admin credentials on one machine to “leapfrog” to a more restricted machine Installing “backdoors” to enable later penetration Running malicious code that causes denial of service (DOS) to critical services Tampering with data by intentionally modifying data or code Examples of business user activities that can impact on the security of an organization include: Running a report in an application that exports a huge amount of sensitive data “Innocently” uploading sensitive data to a third-party cloud application, exposing it in various ways Deliberately sharing sensitive data with others via email, cloud application, thumb drive, etc. OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 4 Installing a remote desktop application to work from home, thus opening a remote back door into the network Responding to a phishing email, thus granting network access to a hacker Visiting unauthorized websites that could install malware on the network ObserveIT addresses this gaping security gap with a combination of: Configurable real-time alerts – Security administrators can manually define any number of simple or complex “alert rules” to generate real-time alerts about particular user activities that they want to know about, whenever they occur. When user-based attacks occur, every second counts. The longer a threat goes undetected, the more damage a company will incur in terms of both financial costs and brand reputation. Without the ability to monitor user activity in real-time, companies will continue to suffer from undetected user-based breaches, significantly increasing the scope and costs of those breaches. Bullet-proof IT forensics – ObserveIT provides fast, easy and incontrovertible evidence of all actions performed within applications. Keyword-searchable user activity logs and session screen recordings are invaluable for IT troubleshooting, root cause analysis and incident investigations. If user actions are responsible for a system failure, data leak or any other incident, administrators will be able to quickly discover exactly who did what, where, when and how. The deterrence factor – ObserveIT’s User Activity Monitoring has an effect similar to “speed cams” on the highway: because users are informed upon every login that their actions are being monitored and recorded, instances of unsanctioned and reckless activity fall dramatically. This is not theoretical; system and security administrators consistently report that, after deploying User Activity Monitoring, employees and contractors alike exhibit much more cautious behavior when accessing sensitive data and systems. CSC #10: Secure Configurations for Network Devices CSC 10-3: Use automated tools to verify standard device configurations and detect changes. All alterations to such files should be automatically reported to security personnel. ObserveIT allows administrators to visually record, replay, monitor and audit all configuration changes made to network devices. Network devices – including switches, routers, hubs, firewalls and IP telephony exchanges – are the backbone on which businesses run. While making changes to the configuration settings of these sensitive devices is frequently necessary, both human error and malicious intent by those with administrative access have the potential to cause disaster. The most common way these changes are tracked today is by accessing the logs OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 5 maintained by these devices. However, these logs are very technical and were designed by developers for debug purposes – and not to provide the types of information of interest to IT admins, security officers and auditors. Because these logs are so difficult and time-consuming to understand, they are not very useful for most investigation and decision-making processes. ObserveIT offers an easy-to-understand visual monitoring and auditing solution for network device configuration changes, featuring: Full recording and playback of every user action while working in configuration utilities Keyword-searchable activity logs of all keyboard activity, mouse clicks and on-screen output Custom alerts based on user-definable granular triggers Tight integration with log management, SIEM, network monitoring and IT ticketing systems If not already the case in the organization, access to the all device configuration user interfaces should be restricted to access via a gateway (e.g., Unix/Linux using SSH, Windows Terminal Server, Citrix). The ObserveIT agent software is installed on the gateway and configured to record all user activity performed while configuring network devices. ObserveIT then generates a comprehensive record of all user activity, including screen video recordings, detailed (searchable) user action log data and easy-to-read summary reports of every session. An additional advantage of this approach is that users can be restricted from logging into a particular device’s configuration utility unless they have a valid ticket number from an IT ticketing system (ObserveIT validates the supplied ticket number against ticketing systems such as ServiceNow in real-time). Furthermore, all ObserveIT activity data can be incorporated into a SIEM or networking monitor system for user activity reporting within those environments. CSC #12: Controlled Use of Administrative Privileges CSC 12: The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications. As recommended by the controls specific in CSC 12, it is very important to minimize the use of privileged accounts within the organization, to enforce strict password controls, to implement two-factor authentication and to ensure that there is executive-level approval of all privileged accounts. However, even once all of these recommendations have been implemented, two important gaps remain: 1. 2. Identification of the actual people logging in using shared administrator accounts (such as administrator, dba, sa and root) – it is not enough to log that someone logged in to a system using a shared administrator account; it is very important to know who logged in using that account. Visibility into what users are doing once they’ve logged in to sensitive systems using privileged credentials – the use of administrator accounts will always be necessary; it is very important to monitor, record and OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 6 user activity once they’ve logged in – and to generate real-time alerts when suspicious activities are detected. ObserveIT comprehensively addresses both of these requirements: ObserveIT Secondary Identification – ObserveIT features a built-in “privileged user identification” solution which ensures unambiguous identification of individual users accessing shared accounts. After logging in to a Windows or Unix/Linux server using a shared account, ObserveIT requires valid individual credentials as well. (When logging into server using a named-user account, this secondary identification window does not appear.) This is how it appears in Windows: Not only does this approach record the name of the actual person logging in to a server using a shared administrator account, it is also a form of two-factor authentication: even if a hacker were to gain access to the password for an administrator account, he would not be able to log in without a user’s individual credentials. Screen capture recording and user activity logging – ObserveIT provides unparalleled visibility into everything that users are doing on company servers. From the moment that a privileged user logs in until the last keystroke or mouse click of the session, ObserveIT records every screen for later (or real-time streaming) video-like play-back. The software also captures an easy-to-read user activity log so that watching the video is not necessary to get a basic understanding of what the user was up to during the session. Furthermore, the software provides keyword-based search of all activity logs and screen video recordings, making it easy to find any action of interest from among thousands of hours of session recordings. Security administrators and auditors can search by the names of applications run, the titles of windows opened, commands executed, files/resources accessed, text typed/pasted-auto-corrected, checkboxes and radio buttons clicked and much more. Finally, real-time alerts provide immediate awareness of suspicious, dangerous and out-of-policy behaviors. Only this level of visibility ensures that accounts are not being abused by employees, contractors or hackers. OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 7 CSC #14: Maintenance, Monitoring, and Analysis of Audit Logs CSC 14: Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack. The specific CSC control implementations relate to system logs, such as those generated by operating systems, network devices, firewalls, IDS/IPS, proxies and remote access systems. While it is very important to correlate, monitor and audit these logs, the fact is that they focus on infrastructure and thus leave open a huge security blindspot: user activity. This blind-spot is the result of three main factors: 1. Logging data is only available from systems, devices and applications which generate logs. Because many critical user actions do not generate any logs at all, there is no data to analyze. 2. The available log data was designed mostly for the purposes of debugging and tracking system changes, and is not suited for understanding and tracking user activity. 3. Logs typically contain hundreds or thousands of discrete events in obscure technical language, while relying on complex and unreliable correlations, making it nearly impossible for anyone but a top security expert with lots of time (and a specific purpose) to determine or infer what a user actually did. To effectively address user-based risks, it is critical for organizations to understand exactly what users are doing with company systems, data and applications. Adding ObserveIT’s User Activity Monitoring to an organization’s existing security ecosystem fills this critical cyber-security gap and dramatically reduces the time it takes to identify and respond to suspicious user activity, security incidents and data breaches. By integrating ObserveIT’s User Activity Monitoring with existing log management, SIEM, IAM and ITSM solutions, organizations gain a complete user- and infrastructurebased security view. Instead of investigating security incidents by drilling down into arcane system logs, security administrators can simply click into actual video playback of user activity at any particular point in time. Also gained is the ability to integrate user-based alerting and reporting. In addition to streamlining incident response for systemand infrastructure-level issues, organizations gain complete visibility into user-based risks and attacks to which they were completely blind before. OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 8 WHAT IS USER ACTIVITY MONITORING? ObserveIT’s User Activity Monitoring system generates video recordings of every user session, providing unparalleled insight into what is being done on company servers and desktops. Whereas standard logs collect data on server and network activity, session recordings and logs focus on the user activity within the operating system and every application (commercial, bespoke, legacy and cloud). This granular, user-focused monitoring capability offers a detailed and invaluable tool with which to understand what application users, administrators and remote contractors are doing on monitored servers. ObserveIT goes far beyond simply recording the on-screen activity to video: the software transcribes every session into an easy-to-read user activity log so that watching the video isn’t necessary to know what the user did. Clicking on any particular event in the log launches the video playback from that exact moment. This activity analysis is also used to generate keyword-searchable video indexes, real-time user activity alerts and comprehensive user activity reporting. Integration with other systems – including log analysis, security information and event monitoring (SIEM), access control and IT ticketing systems – further leverages the value of the session recordings and text logs by making them readily available when and where they are needed. Learn more about ObserveIT at www.observeit.com. OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 9 ZERO-GAP MONITORING, ANALYSIS, ALERTING AND INTERVENTION ObserveIT monitors, records and analyzes all user activity in every application, webpage and window, over any connection method (Remote Desktop, Terminal Services, GoToMyPC, LogMeIn, PC Anywhere, local login, etc.). ObserveIT also records Windows sessions running as Citrix published applications, in Citrix virtual desktops and VMware environments, as well as standalone Windows, Unix/Linux desktops and servers. Addressing a major security gap in most organizations, ObserveIT generates user activity logs and screen recordings for commercial, legacy, bespoke and cloud apps, including those with no internal logging facilities of their own. Administrators can watch live sessions and can even lock a session and user account from within ObserveIT if they wish to immediately stop a suspicious activity. This is particularly useful in the event that the system generates a real-time alert: the administrator receiving the alert can view all activity occurring in the live session screen, rewind to see the actions that led up the alert and take immediate action to halt the session. Additionally, the recordings and resulting user activity logs are valuable for root cause analysis, ad hoc IT forensics and regulatory compliance audit reporting. Reports can be customized to specific business needs and can be scheduled or run on demand. LOW RESOURCE REQUIREMENTS ObserveIT utilizes ultra-efficient data storage, requiring less than 250GB/year for a high-usage, 1000-server environment. The local agents have a minimal footprint of 1%-2% CPU utilization, 10 MB RAM during session and 0% CPU when users are inactive. OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 10 OBSERVEIT FEATURE HIGHLIGHTS Screen capture recording plus video activity analysis for searchable, text-based logging of all user activity Real-time alerts provide immediate awareness of suspicious, dangerous and out-of-policy behavior Advanced keylogging enables keyword searching to instantly find any on-screen mouse or keyboard action Records actions in all system areas and all apps – zero-gap recording of all commercial, legacy, bespoke and cloud apps plus all system areas Supports all connection methods, including local login, Remote Desktop, Terminal Services, PC Anywhere, Citrix, VMware, VNC, Dameware, etc. SIEM, NMS and IT ticketing system integration for better security and easier investigations – including direct links to session replay and user activity logs Privileged User Identification, without requiring password rotation or check-in/check-out Threat detection console detects and pinpoints suspicious activity DBA Activity Audit monitors and audits all SQL queries executed by DBAs against production databases Pre-built and customizable audit reports can be exported to Excel or XML, or scheduled to run automatically for email delivery TRUSTED BY 1200+ CUSTOMERS OBSERVEIT IDENTIFY AND MANAGE USER-BASED RISK Start monitoring in minutes, free: www.observeit.com/tryitnow OBSERVEIT HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS 11
© Copyright 2024