Implementing NIST Cybersecurity Framework Standards with BeyondTrust Solutions

Size: px
Start display at page:

Download "Implementing NIST Cybersecurity Framework Standards with BeyondTrust Solutions"

Transcription

1 TECH BRIEF Implementing NIST Cybersecurity Framework Standards with BeyondTrust Solutions Privileged Access Management & Vulnerability Management 0

2 Contents Cybersecurity Framework Overview... 2 The Role of Privileged Access Management in Meeting Cybersecurity Framework Requirements... 2 BeyondTrust Alignment to Framework Core Functions... 3 Identify... 3 Protect... 5 Detect Respond About BeyondTrust TECH TIP: In many cases features associated with successfully implementing a function or control may be found in multiple BeyondTrust products. If a specific product is not listed in the capabilities description, then several products help address the capability. For a deeper examination of specific capabilities as they align to specific NIST SP r4 controls please reference our guide Addressing NIST SP Requirements. 1

3 Cybersecurity Framework Overview In February 2014 the National Institute of Standards and Technology (NIST), in response to Executive Order 13636, released the Framework for Improving Critical Infrastructure Cybersecurity now referred to widely as the Cybersecurity Framework. The executive order called for the development of a risk-based framework for critical infrastructure organizations to voluntarily manage their cybersecurity risks. This standard was to be based on industry best practices and international standards. The adoption of the framework has steadily increased since its initial release. It has now become the standard for many organizations globally and is being adopted widely by U.S. Government agencies. The Cybersecurity Framework, developed in partnership between industry and government, was designed to provide a universal standard, yet be flexible enough to address an organization s unique risks and risk tolerance. It is a living document 1 that will be refined as technology and practices evolve and industry continues to provide feedback. The risk based approach developed for the framework is based on three sections: The Core, Implementation Tiers and Profile. The framework core is a set of desired actions, outcomes and references across critical infrastructure sectors. This core consists of five functions: Identify, Protect, Detect, Respond, and Recover. The recommendations within the core map back to several globally recognized standards, including NIST SP r4. The Role of Privileged Access Management in Meeting Cybersecurity Framework Requirements Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders must walk a fine line between protecting the organization s critical data to ensure business continuity, and enabling users and administrators to be productive. Disparate, disjointed tools deployed and managed in silos leave gaps in coverage over privileged access. This legacy model is expensive, difficult to manage, and requires too much time to show any meaningful risk reduction. It also impedes the adoption of best practices like those called out in the Cybersecurity Framework as well as compliance achievement with mandates like FISMA. The BeyondTrust PowerBroker family of solutions deliver the complete spectrum of privileged access management to meet the cybersecurity framework requirements mandated by United States Government. From establishing and enforcing least privilege on endpoints and servers, to securing enterprise credentials, PowerBroker unifies best-of-breed capabilities into a single, 1 Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 NIST February 12,

4 integrated platform that acts as a central policy manager and primary reporting interface. Leveraging vulnerability data from BeyondTrust s Retina and other third party vulnerability assessment solutions (including ACAS) provides a complete picture of privileged system and asset security including for network, cloud and virtual assets. This zero-gap coverage reduces risk by ensuring that no assets are left unprotected. This unified approach enables agencies to take advantage of a modular implementation strategy, adding products and capabilities as each access control is implemented. BeyondTrust Alignment to Framework Core Functions For the purpose of this brief, we ll explore the Cybersecurity Framework functions that include areas of privileged access management, vulnerability management, behavioral and threat analytics guidelines and practices supported by BeyondTrust as they align to the specific NIST SP r4 controls referenced in the framework. Information is organized by the five functional areas of the framework: Identify, Protect, Detect, Respond, and Recover. IDENTIFY Asset Management ID. AM-2: Software platforms and applications within the organization are inventoried ID. AM-3: Organizational communication and data flows are mapped. ID. AM-4: External information systems are cataloged. BeyondTrust vulnerability management (Retina) solutions can scan and enumerate attributes about a system (i.e. Software, software version, machine name, and more). This information can be used for tracking and reporting. BeyondTrust provides a central repository of all the inventory collected. PowerBroker privileged access management (PAM)products: Allow for targeted policies that regulate which devices can communicate with each other, and assist in specified criteria that establishes what type of data is allowed. Provide authorization usage data to support interconnection security agreements. Provide a complete audit trail of actions taken by privileged users. Provide a secure, hardened RDP & SSH "Proxy. " The proxy approach helps to define protective boundaries between environments. Can implement both deny all policies, and deny all except policies for whitelisting Allow for security compliance checks before privilege commands or events are executed. The BeyondTrust IT Risk Management Platform utilizes a Microsoft SQL backend for its database. It can also integrate with change management databases from various vendors, 3

5 Risk Assessment ID. AM-5: Resources (e. g., hardware, devices, data, and software) are prioritized based on their classification, criticality, and business value. ID. RA-1: Asset vulnerabilities are identified and documented. like ServiceNow, which provides cataloging, by means of our free built in connectors. BeyondTrust vulnerability management solutions provide the capability to logically group assets/scans based on attributes and characteristics important to an agency. This capability is called Smart Groups and is one feature that differentiates our technology from others in this space. The BeyondTrust IT Risk Management Platform includes an enterprise-class network security scanner. This solution: Can launch enterprise scans on a scheduled or ad hoc basis. Organizations can perform both credentialed and non-credentialed scans to retrieve asset information. Will process all information discovered by the security scanner and will enumerate software, platform, and configurations, and compare the findings against known vulnerabilities and best practices. The platform will process all information discovered by the security scanner and provide a vulnerability impact report. ID. RA-2: Threat and vulnerability information is received from information sharing forums and sources. ID. RA-3: Threats both internal and external, are identified and documented. ID. RA-4: Potential business impacts and likelihoods are identified. The BeyondTrust vulnerability management solution, Retina, associates vulnerabilities with several databases of known exploits from multiple penetration testing tools such as Core, Metasploit, Exploit DB and Canvas in addition to many others. Retina and BeyondSaaS can perform vulnerability and access scans across both internal and external systems, and will identify and document potential threats, and even help tie risk scores to the various items found. Retina can assist in classifying vulnerability information as well as various other auditable events. Retina will perform vulnerability and access scans across an environment and help tie risk scores to the various items found. 4

6 ID. RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk. ID. RA-6: Risk responses are identified and prioritized. The BeyondTrust IT Risk Management Platform includes a built-in threat management feature, which: Allows correlation of user activity with vulnerability data, to determine where an attack originated, and its history within the protected environment. Processes all information discovered by the security scanner and will enumerate software, platform, and configurations, and compare the findings against known vulnerabilities, exploits, and best practices, and provide a vulnerability impact report. Incorporates pivot grid technology to allow for analysis of scan results and comparing security assessments. The BeyondTrust IT Risk Management platform can: Assist with the identification, prioritization and remediation of flaws in information systems. Assist with the deployment of security patches. Provide many vulnerability trending reports that assist in measuring time between identification and remediation. PROTECT Access Control PR. AC-1: Identities and credentials are managed for authorized devices and users. PowerBroker privileged access management (PAM) solutions: Provide controls to assist with the identification of accounts based on targeted functions. Group based policy allows delegated rights to be assigned to managers of information system accounts. Authorized users and Groups of users may be defined to determine rights and roles of access to information systems and accounts. Provide control and audit of access to privileged accounts such as shared administrative accounts, application accounts, local administrative accounts, service accounts, database accounts, cloud and social media accounts, devices and SSH keys. Manage system and account passwords providing a variety of password policies covering complexity, rotation, release and expiration for credentialed users considering their complexity, lifetime as well as prohibiting re-use. Passwords can also be managed long term with restricted access/use to authorized individuals and services. 5

7 PR. AC-3: Remote access is managed. PR. AC-4: Access permissions are managed, incorporated the principles of least privilege and separation of duties. PR. AC-5: Network integrity is protected, incorporating network segregation, where appropriate. The PowerBroker privileged access management (PAM)platform incorporates role-based access control policies that limit and restrict access to only authorized users. PowerBroker implements cryptographic mechanisms to protect the confidentiality and integrity of remote access solutions, and force information system routes for all remote accesses through managed network access control points. PowerBroker Password Safe, PowerBroker for Unix & Linux and PowerBroker for Windows can automatically terminate a user s session based on idle time or a preset length of time that a session is active. Sessions can also be manually terminated. BeyondTrust privileged access management (PAM) and vulnerability management solutions are designed around the principle of least privilege. They provide the controls required to dictate a user s access rights, allowable application launches, as well as the rights associated with those applications. In addition, all actions attempted or taken by end-users can be reported for addition analysis and forensics. Patented privilege elevation capabilities grant privileges to applications and tasks not users without providing administrator credentials. BeyondTrust enables organizations to leverage vulnerability data from Retina and other PowerBroker privileged access management (PAM) platform products for a complete picture of privileged application and asset security. PowerBroker centrally controls privileged access management policies and deployment, and report to multiple stakeholders. Reporting is available for all actions attempted or take by users to enable additional analysis and forensics. Both PowerBroker for Unix & Linux and PowerBroker Identity Services allow for targeted policies that regulate which devices can communicate with each other, and assist in specified criteria that establishes what type of data is allowed. This solution provides a granular policy engine which allows administrators to dissect information transfer between security domains, and based on real-time findings, trigger enforcement of organizational policy. PowerBroker enables agencies to allow and direct all access to sensitive assets via a centralized channel. This 6

8 Data Security Information Protection Processes and Procedures PR. DS-1: Data-atrest is protected. PR. DS-2: Data-intransit is protected. PR. DS-3: Assets are formally managed throughout removal, transfers, and disposition. PR. DS-4: Adequate capacity to ensure availability is maintained. PR. DS-5: Protections against data leaks are implemented. PR. DS-7: The development and testing environment(s) are separate from the production environment. PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained access is further secured through security controls, access policies, and session monitoring. Data-at-rest stored within our products is protected using AES 256 encryption. Data-in-transit is encrypted via HTTPS/TLS and certificates, as well as SSL and Hash Values/Checksums on installers. BeyondTrust vulnerability management solutions can scan and enumerate attributes about a system (i.e. software, software version, machine name, etc.) This information can be used for tracking and reporting. Audit records generated by the BeyondTrust audit event can be transferred, archived and/or moved as required by the system administrator and organizational defined storage requirements. BeyondTrust privileged access management (PAM) and vulnerability management solutions are designed around the principle of least privilege. They provide the controls required to dictate a user s access rights, allowable application launches, as well as the rights associated with those applications. In addition, all actions attempted or taken by end-users can be reported for addition analysis and forensics. Patented privilege elevation capabilities grant privileges to applications and tasks not users without providing administrator credentials. Leverage vulnerability data from Retina and other PowerBroker PAM platform products for a complete picture of privileged application and asset security. Centrally control privileged access management policies and deployment, and report to multiple stakeholders. Retina, the BeyondTrust vulnerability management solution, can scan and report against configuration compliance benchmarks BeyondTrust products can be used in both a Development / Test environment and a Production environment. Retina, the BeyondTrust vulnerability management solution, can scan and report against SCAP configuration benchmarks. This can help validate if configuration changes have been applied to systems. The PowerBroker PAM platform can be: o Configured to allow/block the execution/installation of applications based on their signature. 7

9 PR. IP-3: Configuration change control processes are in place. PR. IP-7: Protection processes are continuously improved. o Implemented to support a least privilege model, limiting privileges including those that allow changes to systems. o Configured to monitor, log or alert when certain system changes occur. Retina, the BeyondTrust vulnerability management solution, can: Limit the access/privilege of a user until approvals are received. Scan and report against configuration compliance benchmarks. This can help validate if configuration changes have been applied to systems. Delta reports can be used to quickly identify system changes. BeyondTrust privileged access management (PAM) and vulnerability management solutions o Control and audit across supported platforms and information systems. o Provide a detailed audit trail as well as an executive style report to assist in assessing security controls effectiveness. o Provide detailed asset information to assist in the security assessment. o Include a comprehensive audit and reporting console to help organizations determine what controls have been implemented. Reports can be run ad hoc or subscribed to be received on a regular basis. o Reporting and analytics console supports full rolesbased access controls to support an organization's defined roles or individuals. o Return valuable information that is used for assessment. The solution allows for role-based access control when viewing such assessment data to support a clear separation of duties. o Provide reports for privileged user access, privilege commands that are executed, as well as vulnerability data. Continuous Monitoring is supported across a variety of BeyondTrust solutions. o BeyondTrust privileged access management (PAM)and vulnerability management solutions provide a mechanism to perform continuous monitoring based on the organization's defined metrics. Many commonly used metrics are predefined within the solution. These continuous 8

10 PR. IP-12: A vulnerability management plan is developed and implemented. monitoring mechanisms can be tailored to meet an organizations frequency requirements. o The PowerBroker privileged access management (PAM) platform provides privileged command execution and file integrity monitoring. This information can be presented for both scheduled reports and alerting, insuring compliance. o The BeyondTrust IT Risk Management Platform offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust privileged access management and vulnerability management solutions as well as third party feeds. These clusters can help identify patterns indicating malicious activity. This includes a reporting feature that allows for quicker and easier ways to summarize audit data, targeting the most meaningful information quickly and easily based on internal and external filters. o Features within the BeyondTrust IT Risk Management platform allow for the discovery of and reporting on security related trends within an organization. This information can be distributed directly from the tool or sent to external systems. The BeyondTrust IT Risk Management Platform: Includes an enterprise-class network security scanner. Scans can be performed on a scheduled basis and ad hoc. Organizations can perform both credentialed and non-credentialed scans to retrieve asset information. Will process all information discovered by the security scanner and will enumerate software, platform, and configurations, and compare the findings against known vulnerabilities and best practices, then provide a vulnerability impact report. Incorporates pivot grid technology to allow for analysis of scan results and comparison security assessments. Can be used to remediate vulnerabilities with prescriptive guidance. Utilizes role-based access control when disseminating reporting and analytic information. Is configured to receive regular updates as new vulnerabilities are discovered. Allows for granular configuration when determining what system information is discovered during network security scans. Allows for both credentialed and non-credentialed scans of information systems. 9

11 Protective Technology PR. PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy. PR. PT-3: Access to systems and assets is controlled, incorporating the principle of least functionality. PR. PT-4: Communications and control networks are protected. Includes numerous reporting options allowing for the comparison of collected vulnerability data between defined dates or against an initial baseline. These also include identification of vulnerabilities that have been previously exploited in the wild. Includes a built-in threat management feature, which allows correlation of user activity with vulnerability data, to determine where an attack originated, and its history within the protected environment. Integrates password management directly with the scanner allowing for automatic password retrieval and rotation when performing credentialed scans. BeyondTrust audit records contain the standard who, what, where and when; along with many other relevant tracking details specific to the platform or product that is generating the audit event. Session recording is offered on systems that make sense, and detailed time line audit trails are provided everywhere else. Once authenticated by the solution, all actions performed by an individual are audited. These audit logs can be reviewed to quickly trace all actions that were performed by that individual during that session or previous sessions. PowerBroker privileged access management (PAM) solutions: Provide the controls required to dictate a user s access rights, allowable application launches, as well as the rights associated with those applications. In addition, all actions attempted or taken by end-users can be reported for addition analysis and forensics Incorporate Role Based Access Controls (RBAC) policies that limit and restrict access to only authorized users. These can be implemented based on individual or group membership. Support dynamic privilege management to ensure that privileges are immediately implemented on policy change. Privileged role assignments may be monitored, logged, and revoked when roles change within the organization. Adaptive workflow allows access to be based upon day, date, time and location. The PowerBroker privileged access management (PAM) platform incorporates role-based access control policies that limit and restrict access to only authorized users. BeyondTrust solutions help implement cryptographic mechanisms to protect the confidentiality and integrity 10

12 of remote access solutions, and force information system routes for all remote accesses through managed network access control points. PowerBroker Password Safe, PowerBroker for Unix & Linux and PowerBroker for Windows can automatically terminate a user s session based on idle time or a preset length of time that a session is active. Sessions can also be manually terminated. All communication is encrypted via HTTPS/TLS, and certificates. The password database is encrypted using AES 256. DETECT Anomalies and Events DE. AE-1: A baseline of network operations and expected data flows for users and systems is established and managed. DE. AE-2: Detected events are analyzed to understand attack targets and methods. Both PowerBroker for Unix & Linux and PowerBroker Identity Services allow for targeted policies that regulate which devices can communicate with each other, and assist in specified criteria that establishes what type of data is allowed. This solution provides a granular policy engine which allows administrators to dissect information transfer between security domains, and based on real-time findings, trigger enforcement of organizational policy. Based on a set of identifiers PowerBroker privileged access management (PAM) platform products can be set to allow/disallow commands or authentication, thereby limiting or enforcing data structure and content. BeyondTrust Privilege Management solutions provide o Authorization usage data to support interconnection security agreements. o A complete audit trail of actions taken by privileged users. o A secure, hardened RDP & SSH "Proxy." The Beyond Trust proxy approach helps to define protective boundaries between environments. The BeyondTrust IT Risk Management Platform o Acts as a security information and event management platform for BeyondTrust privileged access management (PAM) and vulnerability management solutions which provides centralized logging with audit and reporting capabilities. o Offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust privileged access management and vulnerability management solutions as well as third party feeds. These clusters 11

13 can help identify patterns indicating malicious activity. o Includes a reporting feature that allows for quicker and easier ways to summarize audit data, targeting the most meaningful information quickly and easily based on internal and external filters. BeyondTrust privileged access management (PAM) and vulnerability management solutions o Provide a mechanism to perform continuous monitoring based on the organization's defined metrics. Many commonly used metrics are predefined within the solution. These continuous monitoring mechanisms can be tailored to meet an organizations frequency requirements. o Provide a security dashboard view to gain insight into an organizations security status based on defined metrics. The PowerBroker privileged access management (PAM) platform provides privileged command execution and file integrity monitoring. This information can be presented for both scheduled reports and alerting, insuring compliance. DE. AE-3: Event data are aggregated and correlated from multiple sources and sensors. DE. AE-4: Impact of events is determined. BeyondTrust IT Risk Management Platform offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust privileged access management (PAM) and vulnerability management solutions as well as third party feeds. These clusters can help identify patterns indicating malicious activity. The BeyondTrust IT Risk Management Platform will perform vulnerability and access scans across an environment and help tie risk scores to the various items found. In BeyondTrust privileged access management (PAM) and vulnerability management solutions, because a user is authenticated by either a local group membership, LDAP, or Active Directory, that users identity is captured regardless of organizational boundaries. Once authenticated by the solution, all actions performed by an individual are audited. These audit logs can be reviewed to quickly trace all actions that were 12

14 Security Continuous Monitoring DE. CM-1: The network is monitored to detect potential cybersecurity events. DE. CM-2: The physical environment is monitored to detect potential cybersecurity events. performed by that individual during that session or previous sessions. BeyondTrust privileged access management (PAM) and vulnerability management solutions provide a mechanism to perform continuous monitoring based on the organization's defined metrics. Many commonly used metrics are predefined within the solution. These continuous monitoring mechanisms can be tailored to meet an organizations frequency requirements. The PowerBroker privileged access management (PAM) platform provides privileged command execution and file integrity monitoring. This information can be presented for both scheduled reports and alerting, insuring compliance. BeyondTrust privileged access management (PAM) and vulnerability management solutions provide a security dashboard view to gain insight into an organizations security status based on defined metrics. The BeyondTrust IT Risk Management Platform offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust privileged access management and vulnerability management solutions as well as third party feeds. These clusters can help identify patterns indicating malicious activity The BeyondTrust IT Risk Management Platform allows environments to be scanned for usage and configuration, and can scan system accounts to determine privilege set up and use. In the PowerBroker privileged access management (PAM) platform, all actions performed by a user/administrator are logged and time-stamped. Reports can be generated to view a complete audit-trail. All audit information can be retrieved and presented in the most common formats. Audit information can be adjusted to meet any organizational requirements. The BeyondTrust IT Risk Management Platform offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust privileged access management (PAM) and vulnerability management solutions as well as third party feeds. Including when a system has been disconnected, or data has been downloaded to a removable drive, or other 13

15 DE. CM-3: Personnel activity is monitored to detect potential cybersecurity events. DE. CM-4: Malicious code is detected. DE. CM-6: External service provider activity is monitored to detect potential cybersecurity events. DE. CM-7: Monitoring for unauthorized personnel, connections, devices, and similar types of activity. These clusters can help identify patterns indicating malicious activity. BeyondTrust privileged access management (PAM)and vulnerability management solutions provide a mechanism to perform continuous monitoring based on the organization's defined metrics. Many commonly used metrics are predefined within the solution. These continuous monitoring mechanisms can be tailored to meet an organizations frequency requirements. In the PowerBroker privileged access management (PAM) platform, all actions performed by a user/administrator are logged and time-stamped. Reports can be generated to view a complete audit-trail. Once authenticated by the solution, all actions performed by an individual are audited. These audit logs can be reviewed to quickly trace all actions that were performed by that individual during that session or previous sessions. PowerBroker for Windows, together with The BeyondTrust IT Risk Management Platform, evaluates all recorded application data for the presence of known malicious code. This information is used in real-time, at application launch to deny or quarantine and report on further attempts to execute this software throughout the enterprise. In the PowerBroker privileged access management (PAM) platform, all actions performed by a user/administrator are logged and time-stamped. Reports can be generated to view a complete audit-trail. Once authenticated by the solution, all actions performed by an individual are audited. These audit logs can be reviewed to quickly trace all actions that were performed by that individual during that session or previous sessions. Anomalies to normal or expected activity are identified and reported on as potential cybersecurity events, allowing security personnel to investigate and preemptively remediate. Once installed and configured, Powerbroker privileged access management (PAM) solutions will automatically monitor for unauthorized activity. Its core functionality will: o o Control user access to enterprise systems. Limit their activity to only those tasks necessary to do their jobs. 14

16 software is performed. DE. CM-8: Vulnerability scans are performed. o Prevent users from performing unauthorized activities. o Prevent unauthorized personnel from accessing enterprise systems. o Report on attempts by user to perform unauthorized actions. o Report on attempts by unauthorized personnel to access enterprise systems. o Connections, device or software installation, are initiated by users, so any unauthorized install would be prevented by PowerBroker, and the attempt would be logged and reported. The BeyondTrust IT Risk Management Platform o Includes an enterprise-class network security scanner. Scans can be performed on a scheduled basis and ad hoc. Organizations can perform both credentialed and non-credentialed scans to retrieve asset information. o Will process all information discovered by the security scanner and will enumerate software, platform, and configurations, and compare the findings against known vulnerabilities and best practices. The platform will process all information discovered by the security scanner and provide a vulnerability impact report. o Incorporates pivot grid technology to allow for analysis of scan results and comparison security assessments. o Can be used to remediate vulnerabilities. o Utilizes role-based access control when disseminating reporting and analytic information. o Is configured to receive regular updates as new vulnerabilities are discovered. o Allows for granular configuration when determining what system information is discovered during network security scans. o Allows for both credentialed and non-credentialed scans of information systems. PowerBroker Password Safe integrates directly with the scanner allowing for automatic password retrieval and rotation when performing credentialed scans. o Includes numerous reporting options allowing for the comparison of collected vulnerability data between defined dates or against an initial baseline. These also include identification of vulnerabilities that have been previously exploited in the wild. 15

17 Detection Processes DE. DP-1: Roles and responsibilities for detection are well defined to ensure accountability. DE. DP-2: Detection activities comply with all applicable requirements. DE. DP-3: Detection processes are tested. o Includes a built-in threat management feature, which allows correlation of user activity with vulnerability data, to determine where an attack originated, and its history within the protected environment. The BeyondTrust Retina Network Security Scanner incorporates a very broad and deep array of vulnerabilities and target assets definitions. PowerBroker provides accountability to a user in detecting their activities by using the identity information that is defined and authenticated in either a local group membership, LDAP, or Active Directory. This includes their roles and responsibilities across organization boundaries. BeyondTrust privileged access management (PAM)and vulnerability management solutions: Control and audit across supported platforms and information systems. Provide a detailed audit trail as well as an executive style report to assist in assessing security controls effectiveness. Include a comprehensive audit and reporting console to help organizations determine what controls have been implemented. Reports can be run ad hoc or subscribed to be received on a regular basis. Reporting and analytics console supports full roles-based access controls to support an organization's defined roles or individuals. Provide detailed asset information to assist in the security assessment. The solution allows for role-based access control when viewing such assessment data to support a clear separation of duties. Provide reports for privileged user access, privilege commands that are executed, as well as vulnerability data. The PowerBroker privileged access management (PAM) platform provides privileged command execution and file integrity monitoring. This information can be presented for both scheduled reports and alerting, insuring compliance. BeyondTrust privileged access management (PAM) and vulnerability management solutions provide a security dashboard view to gain insight into an organizations security status based on defined metrics. 16

18 DE. DP-4: Event detection information is communicated to appropriate parties. DE. DP-5: Detection processes are continuously improved. BeyondTrust unifies best-of-breed capabilities into a single, integrated platform that acts as a central policy manager and primary reporting interface. The BeyondTrust IT Risk Management Platform: o Centrally controls privileged access management policies and deployment, and report to multiple stakeholders. o Offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust solutions as well as third party feeds. These clusters can help identify patterns indicating malicious activity. o Can be used to monitor events from all BeyondTrust solutions connected to it. o Can generate automated s/alerts based on various usage conditions including usage and access changes. BeyondTrust solutions support improved detection processes over time. Since detection is based on correlation of data, the greater volume and diversity of the data over time, the greater the result. RESPOND Communications Analysis RS. CO-2: Events are reported consistent with established criteria. RS. CO-3: Information is shared consistent with response plans. RS. CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness. RS. AN-1: Notifications from detection systems are investigated. The BeyondTrust IT Risk Management Platform provides various types and style of reports based on established criteria such as Executive, Auditor, Administrator, Approver, etc. Reports generated by the BeyondTrust IT Risk Management Platform can be scheduled for delivery based on various factors including report type, how often, who receives what report, delivery method, etc. The BeyondTrust IT Risk Management Platform includes over 270 reports in addition to the ability to create custom reports as desired. The output of these reports can be shared with external stakeholders. The BeyondTrust IT Risk Management Platform can import data from not only our PowerBroker and Retina security products, but also Third Party security tools. After import, our Threat Analytics function combines and correlates the data to help predict where a cyber event may be developing. 17

19 Mitigation RS. AN-2: The impact of the incident is understood. RS. AN-3: Forensics are performed. RS. MI-1: Incidents are contained. RS. MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks. The BeyondTrust IT Risk Management Platform can help with the configuration and interpretation of events and alerts generated by BeyondTrust products such that the impact of an incident is clearly defined. BeyondTrust solutions are designed around the principle of least privilege. They provide the controls required that dictate a user s access rights, allowable application launches, and rights associated with those applications. In addition, all actions attempted or taken by end-users can be reported for additional analysis and forensics. PowerBroker privileged access management (PAM) solutions can automatically terminate a users session based on idle time or a pre-set length of time a session is active, or sessions can be manually terminated. The BeyondTrust IT Risk Management Platform: Includes an enterprise-class network security scanner. Scans can be performed on a scheduled basis and ad hoc. Organizations can perform both credentialed and non-credentialed scans to retrieve asset information. Will process all information discovered by the security scanner and will enumerate software, platform, and configurations, and compare the findings against known vulnerabilities and best practices. The platform will process all information discovered by the security scanner and provide a vulnerability impact report. Incorporates pivot grid technology to allow for analysis of scan results and comparison security assessments. Can be used to remediate vulnerabilities. Is configured to receive regular updates as new vulnerabilities are discovered. 18

20 About BeyondTrust BeyondTrust is a global security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: privileged access management and vulnerability management. Our solutions grow with your needs, making sure you maintain control no matter where your organization goes. BeyondTrust's security solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. To learn more about BeyondTrust, please visit 19

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Mapping BeyondTrust Solutions to

Mapping BeyondTrust Solutions to TECH BRIEF Taking a Preventive Care Approach to Healthcare IT Security Table of Contents Table of Contents... 2 Taking a Preventive Care Approach to Healthcare IT Security... 3 Improvements to be Made

More information

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments 1 ID.AM-1: Physical devices and systems within the organization are inventoried Asset Management (ID.AM): The

More information

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager 7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

COMPLIANCE BRIEF: NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY S FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

COMPLIANCE BRIEF: NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY S FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY COMPLIANCE BRIEF: NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY S FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY OVERVIEW On February 2013, President Barack Obama issued an Executive Order

More information

Securing an IT. Governance, Risk. Management, and Audit

Securing an IT. Governance, Risk. Management, and Audit Securing an IT Organization through Governance, Risk Management, and Audit Ken Sigler Dr. James L. Rainey, III CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is an imprint cf the

More information

Mapping BeyondTrust Solutions to

Mapping BeyondTrust Solutions to TECH BRIEF Privileged Access Management and Vulnerability Management Purpose of This Document... 3 Table 1: Summary Mapping of BeyondTrust Solutions to... 3 What is the Payment Card Industry Data Security

More information

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations VARONIS COMPLIANCE BRIEF NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) 800-53 FOR FEDERAL INFORMATION SYSTEMS CONTENTS OVERVIEW 3 MAPPING NIST 800-53 CONTROLS TO VARONIS SOLUTIONS 4 2 OVERVIEW

More information

PowerBroker Password Safe Version 6.6

PowerBroker Password Safe Version 6.6 PowerBroker Password Safe Version 6.6 New and Updated Features BeyondTrust PowerBroker Password Safe automates privileged password and privileged session management, providing secure access control, auditing,

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Rev.1 Solution Brief

Rev.1 Solution Brief FISMA-NIST SP 800-171 Rev.1 Solution Brief New York FISMA Cybersecurity NIST SP 800-171 EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker delivers business critical

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security NIST 800-82 Revision 2: Guide to Industrial Control Systems (ICS) Security How CyberArk can help meet the unique security requirements of Industrial Control Systems Table of Contents Executive Summary

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

NIST Framework for Improving Critical Infrastructure Cybersecurity Technical Control Automation

NIST Framework for Improving Critical Infrastructure Cybersecurity Technical Control Automation NIST Framework for Improving Critical Infrastructure Cybersecurity Technical Control Automation Automating Cybersecurity Framework Technical Controls with Tenable SecurityCenter Continuous View February

More information

MIS Week 9 Host Hardening

MIS Week 9 Host Hardening MIS 5214 Week 9 Host Hardening Agenda NIST Risk Management Framework A quick review Implementing controls Host hardening Security configuration checklist (w/disa STIG Viewer) NIST 800-53Ar4 How Controls

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

NIST Special Publication

NIST Special Publication DATASHEET NIST Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations Mapping for Carbon Black BACKGROUND The National Institute of Standards and Technology

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

MITIGATE CYBER ATTACK RISK

MITIGATE CYBER ATTACK RISK SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations

More information

Use Cases for Unix & Linux

Use Cases for Unix & Linux WHITE PAPER 15 Server Privilege Management PowerBroker for Unix & Linux, PowerBroker Identity Services, and PowerBroker for Sudo Table of Contents Executive Summary... 3 15 Common Use Cases... 4 1. Removing

More information

PowerBroker Auditing & Security Suite Version 5.6

PowerBroker Auditing & Security Suite Version 5.6 PowerBroker Auditing & Security Suite Version 5.6 New and Updated Features BeyondTrust PowerBroker Auditing & Security Suite performs centralized real-time change auditing for Active Directory, file systems,

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

IBM services and technology solutions for supporting GDPR program

IBM services and technology solutions for supporting GDPR program IBM services and technology solutions for supporting GDPR program 1 IBM technology solutions as key enablers - Privacy GDPR Program Work-stream IBM software 2.1 Privacy Risk Assessment and Risk Treatment

More information

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017 Technology Roadmap for Managed IT and Security Michael Kirby II, Scott Yoshimura 04/12/2017 Agenda Managed IT Roadmap Operational Risk and Compliance Cybersecurity Managed Security Services 2 Managed IT

More information

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Aligning with the Critical Security Controls to Achieve Quick Security Wins Aligning with the Critical Security Controls to Achieve Quick Security Wins Background The Council on CyberSecurity s Critical Security Controls for Effective Cyber Defense provide guidance on easy wins

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

ACHIEVING COMPLIANCE WITH NIST SP REV. 4:

ACHIEVING COMPLIANCE WITH NIST SP REV. 4: ACHIEVING COMPLIANCE WITH NIST SP 800-53 REV. 4: How Thycotic Helps Implement Access Controls OVERVIEW NIST Special Publication 800-53, Revision 4 (SP 800-53, Rev. 4) reflects the U.S. federal government

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

THE TRIPWIRE NERC SOLUTION SUITE

THE TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED BUSINESS INTELLIGENCE SOLUTION BRIEF THE TRIPWIRE NERC SOLUTION SUITE A TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on

More information

Total Security Management PCI DSS Compliance Guide

Total Security Management PCI DSS Compliance Guide Total Security Management PCI DSS Guide The Payment Card Industry Data Security Standard (PCI DSS) is a set of regulations to help protect the security of credit card holders. These regulations apply to

More information

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations FFIEC Cyber Security Assessment Tool Overview and Key Considerations Overview of FFIEC Cybersecurity Assessment Tool Agenda Overview of assessment tool Review inherent risk profile categories Review domain

More information

NIST SP Controls

NIST SP Controls NIST SP 800-53 Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About FISMA / NIST The Federal Information Security Management Act of 2002 (commonly abbreviated to FISMA) is

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 05/24/2017

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 05/24/2017 Technology Roadmap for Managed IT and Security Michael Kirby II, Scott Yoshimura 05/24/2017 Agenda Managed IT Roadmap Operational Risk and Compliance Cybersecurity Managed Security Services 2 Managed IT

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

CyberArk Privileged Threat Analytics

CyberArk Privileged Threat Analytics CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical

More information

HIPAA Regulatory Compliance

HIPAA Regulatory Compliance Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health

More information

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Privileged Account Security: A Balanced Approach to Securing Unix Environments Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH CONTEXT RBI has provided guidelines on Cyber Security Framework circular DBS. CO/CSITE/BC.11/33.01.001/2015-16

More information

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2, IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against

More information

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/protect/ndcbf_

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

Acalvio Deception and the NIST Cybersecurity Framework 1.1

Acalvio Deception and the NIST Cybersecurity Framework 1.1 Acalvio Deception and the NIST Cybersecurity Framework 1.1 June 2018 The Framework enables organizations regardless of size, degree of cybersecurity risk, or cybersecurity sophistication to apply the principles

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Fabrizio Patriarca. Come creare valore dalla GDPR

Fabrizio Patriarca. Come creare valore dalla GDPR Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data

More information

EXABEAM HELPS PROTECT INFORMATION SYSTEMS

EXABEAM HELPS PROTECT INFORMATION SYSTEMS WHITE PAPER EXABEAM HELPS PROTECT INFORMATION SYSTEMS Meeting the Latest NIST SP 800-53 Revision 4 Guidelines SECURITY GUIDELINE COMPLIANCE There has been a rapid increase in malicious insider threats,

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

A Measurement Companion to the CIS Critical Security Controls (Version 6) October A Measurement Companion to the CIS Critical Security Controls (Version 6) October 2015 1 A Measurement Companion to the CIS Critical Security Controls (Version 6) Introduction... 3 Description... 4 CIS

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Meeting RMF Requirements around Compliance Monitoring

Meeting RMF Requirements around Compliance Monitoring Meeting RMF Requirements around Compliance Monitoring An EiQ Networks White Paper Meeting RMF Requirements around Compliance Monitoring Purpose The purpose of this paper is to provide some background on

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com DFARS Compliance SLAIT Consulting SECURITY SERVICES Mike D Arezzo Director of Security Services Introduction 18+ year career in Information Technology and Security General Electric (GE) as Software Governance

More information

Xerox and Cisco Identity Services Engine (ISE) White Paper

Xerox and Cisco Identity Services Engine (ISE) White Paper Xerox and Cisco Identity Services Engine (ISE) White Paper Contents Securing Your Networked Printing Devices... 1 Providing Security in an Internet of Things World... 1 Cisco ISE: A Powerful, Simple and

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

An Oracle White Paper April Oracle Technology for Government Cybersecurity

An Oracle White Paper April Oracle Technology for Government Cybersecurity An Oracle White Paper April 2014 Oracle Technology for Government Cybersecurity Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

RiskSense Attack Surface Validation for Web Applications

RiskSense Attack Surface Validation for Web Applications RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment

More information

SecureVue. SecureVue

SecureVue. SecureVue SecureVue SecureVue Detects Cyber-Attacks Before They Impact Your Business Provides Situational Awareness to Proactively Address Enterprise Threats Ensures Quick and Easy Compliance Reporting and Documentation

More information

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045 Critical Security Control Solution Brief Version 6 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable,

More information

The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator

The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator White Paper The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator Migrating from Cisco Tidal Horizon for SAP to Cisco Process Orchestrator can help you reduce total cost of ownership

More information