qualys - ISACA

QUALYS
Cybersecurity incident response
planning and scenarios
ISACA,
Ljubljana, marec 2015
Andrej Vnuk
Number of attacks is growing
Ponemon Institute© Research Report
Exponential growth …
•
New ransomware
•
New malware
•
VIR: McAfee Threat Report Q2 2013
Exponential growth…
Most common types of attacks
•
Types of cyber attacks experienced by 257 benchmarked
companies from 7 countries (USA, UK, F, D, AUS, JAP, RUS)
Ponemon Institute© Research Report
The prevalent threats in Slovenia
•
Malware (Viruses, Worms, Trojans, Root-kits, …)
•
Botnets
•
Phishing & SE
•
Web-based attacks
•
Is the existing technology (FW, AV, IPS, NAC, …) efficient enough?
How to improve it without replacing it? How to improve the
security posture if your resources are limited?
Better prevent than cure …
•
More than 90% of successful attacks due to vulnerable systems
and/or applications!
•
Automated vulnerability detection and management:
– System vulnerabilities (computers, network devices, system SW,
certificates, …)
– Web applications
•
Pen-testing
•
Source code auditing
… and better monitor than getting surprised!
•
Idealy: log all events from all sources, correlate them, recognize
incidents, alert in real-time, prioritize and solve issues!
•
Obstacles in the real world:
– funds
– Human resources
– Absence of metrics to plan such solutions
•
SIEM “incarnations”:
– “proper” SIEM: collecting all events, act upon normalized (filtered) data
– “expanded” SIEM: act upon ALL data, able to recognize yet unknown
types of attacks AND/OR react to incidents via some management
platform
– “minimized” SIEM: integral part of a solution to produce SIEM like
functionality for particular solution
Continuous Attacks / Changes
Attackers scan / attack you continuously
•
New machines are probed within minutes
•
Vulnerable machines are exploited within hours
•
Toxic Combinations Expose Your Data
•
Vectors for further infections
•
Zero-days / Race to the finish line
Controls change at network speed
Any process run by people eventually fails
Securing the Global Enterprise
A Problem of Scale and Accuracy
OUTDATED
SOFTWARE
ACCESS
PRIVILEGES
VULNERABILITIES
CODING
WEAKNESSE
S
Dispersed IT Assets,
Data and Networks
THE EXTENDED
ENTERPRISE
MISCONFIGURATIONS
THREATS
INCOMPLETE
INVENTORY
SOCIAL MEDIA
SANS TOP 20 Critical Security Controls – ver.5, March 2014
Qualys solution for Very-high to Mid-high SANS Critical Controls
Traditional Approach ..
1. Scan
 Periodic Scanning
2. Report
 Review and act based on static reports
 Sort/prioritize through heaps of data
3. Repeat
Then wait until the next time you scan and repeat the entire process
again and again – simply doesn’t Scale
Leaving plenty of time for hackers ...
What Is Needed
Your security/audit teams should have tools
& processes at least as good as your attackers.
Continuous Assessment
Comprehensive Analysis
Timely Action
Why Continuous Monitoring / Auditing?
Don’t let the hackers have a better view of your
systems than you do!
How Continuous Monitoring Works
Leverage Existing Scans
Nothing new required – just scan as normal
Leverage Qualys’ global cloud infrastructure scale as needed
Define Your Needs
Whitelists and blacklists of ports, OSes, certificate providers, etc.
Important changes – new hosts added, certificates nearing expiration, etc.
Inform Via Alerts
Distribute email alerts to any users or systems that need to know
Alerts sent as often as every 5 minutes or grouped every day/week
Why is Continuous Monitoring Unique?
Truly Continuous Monitoring
 Scan as often as needed with only a browser required.
 Keeps your security team ahead of attackers.
Automates Analysis
 Define how your business works; the system will then find vulnerabilities,
misconfigurations, and process problems automatically.
Drives Action
 Timely and targeted alerts to ensure you’re protected.
 Drive action before a breach occurs!
Event Integration
 API for SIEM (including Splunk and HP ArcSight)
 Common Event Format (CEF) Support
Speed, Accuracy and Scale
- HeartBleed -
Risk
Detection for HeartBleed Vulnerability
Released Within 24 Hours
 Free Tool to Assess Site Vulnerabilities
 Information About Overall Health
of Site SSL Implementation
 Reports Detailing Enterprise Wide
Exposure
Blue Chip Global Customer Base
40% of Fortune 500 & 20% of Forbes Global 2000
8 of top 10 in Software
8 of top 10 in Technology
6,700+ Customers
only bought
70% have
one solution so far
8 of top 10 in Biotechnology
8 of top 10 in Retail
7 of top 10 in Banking
7 of top 10 in Media
6 of top 10 in Telecommunications
6 of top 10 in Chemical
6 of top 10 in Car Manufacturing
5 of top 10 in Business Services
Based on Forbes Global 2000 Classification.
DAIMLER
QUALYS
Cybersecurity incident response planning
and scenarios
HVALA !
ISACA,
Ljubljana, marec 2015
Andrej Vnuk