SCM: System Hardening... Made Easy

18
System Hardening Made Easy… Security Configuration Management from Tripwire MICHAEL THELANDER, PRODUCT MARKETING DIRECTOR 1.29.2013

description

System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with: Recognized best practices; vendor hardening guidelines; custom security polices; industry standards or benchmarks. Security Configuration Management is an automated, security-focused set of capabilities that makes system hardening: Repeatable and enterprise-scalable; continuous with real-time or periodic capabilities as needed; flexible and aligned with business needs, workflows and exceptions; self-correcting and self-remediating. Here's where the rubber meets the road...

Transcript of SCM: System Hardening... Made Easy

Page 1: SCM: System Hardening... Made Easy

System Hardening Made Easy… Security Configuration Management from Tripwire

MICHAEL THELANDER, PRODUCT MARKETING DIRECTOR 1.29.2013

Page 2: SCM: System Hardening... Made Easy

System Hardening … Made EasySecurity Configuration Management from TripwireMichael Thelander, Product Marketing Director 1.29.2013

Page 3: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION3

What Is It?

System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with:

• Recognized Best Practices

• Vendor Hardening Guidelines

• Custom Security Polices

• Industry Standards or Benchmarks

Security Configuration Management is an automated, security-focused set of capabilities that makes system hardening:

• Repeatable and enterprise-scalable

• Continuous, with real-time or periodic capabilities as needed

• Flexible, and aligned with business needs, workflows and exceptions

• Self-correcting and self-remediating

Page 4: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION4

“The management and control

of configurations for an

information system with the

goal of enabling security and

managing risk”

NIST says SCM is:

Page 5: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION5

SCM: Tripwire Definition

The ability to create, edit and manage

IT security hardening policies in a way that

fits real-world business processes and

continually balances risk and productivity

Page 6: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION6

On Many Short-term Buying Lists

© 451 Group 2013

Page 7: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION7

Gartner says SCM is the #1 priority in creating a server protection strategy

1

Page 8: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION8

Securosis says configuration hardening is the 2nd most effective

data security control2

Page 9: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION9

SANS says SCM is the 3rd most important security control you can implement

3 (& 10)

Page 10: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION10

GCHQ’s New Cyber Security Guidance

GCHQ released new “10 Steps to CyberSecurity” in Fall 2012

Focused on executive

and board

responsibility

Names Secure

Configurations as one

of the most critical

steps to achieving

an objective measure

of cybersecurity

Page 11: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION11

What’s the Reality When It Comes to SCM? It’s Hard To Do:

Page 12: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION12

Configuration Drift Is A Constant Enemy

“Configuration drift is a natural condition in every data center environment due to the sheer number of ongoing hardware and software changes.” – Continuity Software blog

“In less than a week, all the configuration controls, permissions and entitlements that IT spends time testing are useless.” – ITPCG blog

Page 13: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION13

How Does Tripwire Help?

Tripwire’s solution monitors and assesses critical configurations in:

• File systems of all kinds: Windows, Linux, Solaris, AIX, HP-UX

• Databases like MS-SQL, Oracle, IBM DB2 and Sybase

• Directory services and network devices

Tripwire’s SCM is built on the world’s best integrity solution, assuring:

• Immediate detection of changes to critical, defense-dependant configurations

• Efficient, change-triggered configuration assessment

• Continuous risk reduction

Tripwire’s system hardening solutions are enterprise-scalable, with:

• Automated deployment and setup

• A complete system of waiver and workflow management

• Automated or assisted remediation options for failed or weak configurations

• The industry’s largest , most customizable policy library

Page 14: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION

Time

Secure& CompliantState

Sec

urity

Pos

ture

TRIPWIRE’s SCM ENFORCES SECURITY POLICIES…CONTINUOUSLY

Continuous Monitoring

14

Tripwire’s solutions continually assess and remediate insecure configurations, insuring always-hardened, always-ready information

systems and network devices

Page 15: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION15

Tripwire Enterprise: Key SCM Features

Broadest Platform & Device Support Harden all operating systems: Windows,

Linux, Solaris, AIX, HP-UX, Cent OS, more

Assess and harden applications like Microsoft IIS and Exchange

Assess and harden directory servers: MS Active Directory, Novell eDirectory, more

Harden database servers like MS SQL, IBM DB2, Oracle, Sybase ASE

Support For Real-World Environments Easy policy editing and customization

Customizable weights and severities give security teams power over policies

Waiver and exception management fits real-world workflows and constraints

Industry-Recognized Expertise SC Magazine’s Best Policy Manager, 2012

More CIS security software benchmark certifications than any competitor

World’s Largest Policy & Content Library Over 250 out-of-box policy / platform

combinations, with ISO, CIS, MAS, PCI, NERC, HIPAA, DISA STIGS & more

Vendor hardening guidelines for vmWare, Microsoft, Solaris, Cisco, Oracle, & more

Import polices to meet your needs, with SCAP support for content automation

Operations Gets Rapid Repair Built-in remediation guidance provides

instant, detailed configuration advice Detailed forensics assist in analysis and

show Who? What? When? information Role-based Remediation Manager can

automate and streamline repairs

Built On the Industry’s Best FIM Enables true continuous monitoring Change-triggered policy checking

provides real-time configuration hardening

Page 16: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION16

Configuration Hardening Reports to Meet Every Need

Automated dashboards and reports

Page 17: SCM: System Hardening... Made Easy

IT SECURITY & COMPLIANCE AUTOMATION17

Connect Security Hardening to the Business: VIA Data Mart

Optional VIA Data Mart extracts and abstracts security data from Tripwire’s SCM solution to:

• Make risk visible and actionable

• Add critical business context

Translates system hardening into concepts the businesses understands:

• Risk and relevance

• Cost and efficiency of security

• Trends over time and projections

Transforms raw security data into meaningful business intelligence

Page 18: SCM: System Hardening... Made Easy

www.tripwire.comTripwire Americas: 1.800.TRIPWIRETripwire EMEA: +44 (0) 20 7382 5420Tripwire Japan: +812.53206.8610Tripwire Singapore: +65 6733 5051Tripwire Australia-New Zealand: +61 (0) 402 138 980

System Hardening Made Easy, By Tripwire