CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Similar documents
University of Pittsburgh Security Assessment Questionnaire (v1.7)

Secret Server HP ArcSight Integration Guide

Privileged Identity Management. An Executive Overview

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

Rev.1 Solution Brief

with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Total Security Management PCI DSS Compliance Guide

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

Virtual Machine Encryption Security & Compliance in the Cloud

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

maxecurity Product Suite

MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT

Altius IT Policy Collection Compliance and Standards Matrix

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

IT infrastructure layers requiring Privileged Identity Management

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Altius IT Policy Collection Compliance and Standards Matrix

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

ISSP Network Security Plan

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

SECURITY & PRIVACY DOCUMENTATION

Comprehensive Database Security

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

The Common Controls Framework BY ADOBE

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Safeguarding Privileged Access. Implementing ISO/IEC Security Controls with the CyberArk Solution

COMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

2 Me. 3 The Problem. Speaker. Company. Ed Breay Sr. Sales Engineer, Hitachi ID Systems.

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Clearing the Path to PCI DSS Version 2.0 Compliance

Qualys Cloud Platform

PCI DSS Compliance. White Paper Parallels Remote Application Server

Single Secure Credential to Access Facilities and IT Resources

CA GovernanceMinder. CA IdentityMinder Integration Guide

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

locuz.com SOC Services

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Security in Bomgar Remote Support

Reinvent Your 2013 Security Management Strategy

AUTHORITY FOR ELECTRICITY REGULATION

CYBERSECURITY RISK LOWERING CHECKLIST

Understanding IT Audit and Risk Management

W H IT E P A P E R. Salesforce Security for the IT Executive

Ekran System v Program Overview

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Security Architecture

NIST SP Controls

Sparta Systems TrackWise Digital Solution

Implementing NIST Cybersecurity Framework Standards with BeyondTrust Solutions

Big Brother is Watching Your Big Data: z/os Actions Buried in the FISMA Security Regulation

Projectplace: A Secure Project Collaboration Solution

Ekran System v Program Overview

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Mapping BeyondTrust Solutions to

Managing the Risk of Privileged Accounts and Passwords

Oracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security

PCI DSS Requirements. and Netwrix Auditor Mapping. Toll-free:

Automating the Top 20 CIS Critical Security Controls

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

Compliance with CloudCheckr

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Vocera Secure Texting 2.1 FAQ

MEETING ISO STANDARDS

Best practices with Snare Enterprise Agents

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Securing Privileged Accounts: Meeting the Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 with CyberArk Solutions

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.

CSP & PCI DSS Compliance on HPE NonStop systems

CyberArk Privileged Account Security

How Can Security Management Technologies Help Me with PCI Compliance?

ACHIEVING COMPLIANCE WITH NIST SP REV. 4:

IBM services and technology solutions for supporting GDPR program

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Understand & Prepare for EU GDPR Requirements

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

PeopleSoft Finance Access and Security Audit

CA Security Management

Streamlined FISMA Compliance For Hosted Information Systems

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

Google Identity Services for work

WORKSHARE SECURITY OVERVIEW

Security Diagnostics for IAM

Ransomware A case study of the impact, recovery and remediation events

Security Fundamentals for your Privileged Account Security Deployment

Security Readiness Assessment

the SWIFT Customer Security

Transcription:

CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a

Identity Management Definitions Privileged Identity Management vs. User Identity Management or Keys to the Kingdom vs. User Provisioning 2009 by Lieberman Software Corporation. Rev 20090921a

Privileged Accounts What are they called? OS: Superuser, Root Database (DBA & Apps): SA, SYSADMIN, SYS Mainframe: UID=0, RACF SPECIAL Middleware: Proxies, Gateway Accounts Application: Setup, Admin, App local

Privileged Accounts Where are they used Servers & Workstations Every hardware platform Every operating system Datacenter Appliances Routers and switches Application accelerators Security appliances Applications Line-of-business Web services Database and middleware Backup services Identity and access management Systems management

Shared or Privileged Accounts Behavior and Technology Limitations: What actually is going on High Privilege Accounts: Spread throughout your enterprise Widely known / Shared indiscriminately Not changed when staff turns over Difficult to update due to lost knowledge and complexity Result: Failed Audit Findings Inability to Mitigate Risks Fines or Worse Competent technology can permanently correct some or all the problems in less than 7 days (more later)

Doesn t Active Directory, or Already Manage Privileged Identities? User Identity & Access Management (IAM) Microsoft Active Directory, Tivoli Identity Manager, Oracle Access Manager, etc. Controls user-level access to computers & applications Provisions and de-provisions ordinary users (hire/fire) Credentials used by everyone in organization every day. Privileged Identity Management (PIM) Special case and limited access administrative-level access to computers, applications, services & everything Required: No retained credential knowledge or persistent access to sensitive systems Access in concert with IAM software & workflow approvals (need to know only limited time only)

Why Auditors and Regulators Care About Privileged Identity Management 2009 by Lieberman Software Corporation. Rev 20090921a

Preparing for an IT Audit What is supposed to happen IT staff must show that: 1. Administrator passwords are changed every 90 days. 2. There are no group, shared, or generic privileged accounts or passwords. 3. Access rights are restricted to least privileges required. 4. Inactive privileged accounts are removed or disabled every 90 days. 5. Privileged access is immediately revoked for all terminated users. 6. All system components are covered by password security policies. 7. Vendors remote maintenance accounts are enabled only during time periods needed. 8. All vendor-supplied passwords are changed before systems are deployed. 9. Automated audit trails are implemented for all system components.

PCI DSS Ready PCI DSS Requirement 2.1 "Always change vendor-supplied passwords before installing a system on the network Lieberman Software Solution Auto-discover and change all privileged account passwords on all hardware and software. 6.3.6 Removal of custom application accounts, user IDs, and passwords before applications become active " Continuously identify undocumented service accounts and back doors on packaged and custom applications. 7.7.1 "Restriction of access rights to privileged user IDs to least privileges " 7.2.1 "Coverage of all system components." 8.5.4 "Immediately revoke access for all terminated users." Enforce role-based control of access to all privileged identities. Discover and manage all privileged accounts on all IT assets not just the documented ones. Randomize credentials upon check-out to prevent access by terminated users. 8.5.5 8.5.6 8.5.8 "Remove/disable inactive user accounts at least every 90 days." "Enable accounts used by vendors for remote maintenance only during the time periods needed." "Do not use group, shared, or generic accounts or passwords." Audit, flag, and disable inactive accounts. Enforce time-based vendor access. Auto-detect and segregate shared privileged accounts. 8.5.9 "Change user passwords at least every 90 days." Enforce password change frequency requirements on all privileged accounts. 10.2 "Implement automated audit trails for all system components " Audit privileged account access requests on servers, network appliances, desktops, and applications.

FISMA Requirement AC Access Control AU CA CM IA FISMA: FIPS Publication 200 Minimum Security Requirements for Federal Information & Information Systems Audit and Accountability Certification, Accreditation, and Security Assessments Configuration Management Identification and Authentication PS Personnel Security Lieberman Software Solution Auto-detect and segregate shared privileged accounts; Enforce rolebased control of access to all privileged identities Audit privileged account access requests on servers, network appliances, desktops, and applications; Audit, flag, and disable inactive accounts; Audit and alert by user, IP, system, application, account, and purpose of each requested access. Continuously identify undocumented service accounts and back doors on packaged and custom applications; Enforce time-based vendor access; Create comprehensive reports of each requested privileged access request by user, IP address, system, account, length of access, stated purpose and result. Auto-discover and change all privileged account passwords on all hardware and software; Enforce password change frequency requirements on all privileged accounts Discover and manage all privileged accounts on all IT assets not just the documented ones; Segregate privileged user accounts and allow only access that is identifiable by user and purpose. Randomize credentials upon check-out to prevent access by terminated users; Extend the power of your identity management systems to eliminate terminated employees privileged access and revoke any password secrets.

The Solution: Privileged Identity Management 2009 by Lieberman Software Corporation. Rev 20090921a

Privileged Identity Management Automation Process Automation Implements: Discovery of machines, process accounts, local & fire call accounts, services and tasks and everywhere those accounts are referenced (discovery and correlation technology) Password Change Process for randomizing privileged accounts and propagating those changes everywhere the accounts are used to avoid lock outs (propagation technology) Storage of complex, random passwords in an encrypted repository (encryption technology) Role Based Provisioning of password access and delegation Auditing of every password request, use and change

Privileged Identity Management Comprehensive Credential Management Process Scalable Highly Available Industry-Standard Architecture (non-proprietary data store) Proven Failover /DR Strategies Integrated Identity and Access Management Systems Security Information and Event Management (SIEM) Apps such as ArcSight and other Reporting Solutions Help Desk Ticketing Systems

Privileged Identity Management Comprehensive Credential Management Process Must control the entire life cycle of privileged accounts by: Always keeping up-to-date and accurate systems & account lists Immediately remove knowledge of shared credentials Provide access to credentials on a need to know basis for the shortest time possible Automatically change disclosed passwords Allow organizations to change sensitive passwords without fear from outages Automate as much as possible for low TCO and fast deployment

Two Scenarios: Unexpected Events and Datacenter Deployment 2009 by Lieberman Software Corporation. Rev 20090921a

Scenario: Dealing with Unexpected Events Mitigate Security Threats 2009 by Lieberman Software Corporation. Rev 20090921a

Customer Success Story Mitigating Security Threats at a Government Agency PROBLEM: Dozens of subcontractors being discharged and dozens more taking their place on a routine basis. RISK: With so many password secrets walking out the door, there is risk of a far-reaching security breach. SOLUTION: ERPM integrates with the agency s existing IDM solution, so they can immediately lock out contractors the moment their credentials are revoked, quickly give new personnel the access they need, and ensure all privileged password secrets are valid for a short time and then changed so contractors can do no harm once they walk out the door. RESULTS: The agency is more secure and saves significant time by eliminating the need to manually configure each new contractor for access to required IT resources.

Unexpected Events A defense contract abruptly changes hands to a different Federal Systems Integrator, and all of the existing contractors are pulled off the job. The next day your Information Assurance Manager tells you that one of the former contractors took a job with a foreign agency.

Unexpected Events Your IAM asks, Can we prove that he no longer has access to any of our computers, applications and network hardware? And what can you tell me about his privileged access to our IT resources, say, for the last 60 days?

Unexpected Events You launch Enterprise Random Password Manager

Unexpected Events and open the Accounts View to see a list of privileged passwords, sorted by age. You scan the list to verify that all privileged passwords have already been changed

Unexpected Events You then export the view to a report you ll send to your Information Assurance Manager.

Unexpected Events The report documents the date and time of every privileged password change.

Unexpected Events Next you return to ERPM and choose Compliance from the Actions menu.

Unexpected Events You click Activity Audit Report...

Unexpected Events and enter the former contractor s user name and the desired 60-day reporting period.

Unexpected Events A report appears in your Web browser, showing every privileged access request the former contractor made in the last 60 days. The report shows the day and time of each request, the systems involved, and the stated reason for each request.

Unexpected Events This report seems to show nothing unusual except for several requests for administrative access to a classified server in an external DMZ.

Unexpected Events The stated purpose for the repeated logins was to recover the server from a virus attack.

Unexpected Events You save the report and send it to your manager... with the recommendation that the security team examine the logs on the classified server for this time period.

ArcSight Integration ERPM provides the starting and ending point in time for ArcSight correlation Credential issuance details and attestation of identity fed into ArcSight Limited time validity of common administrator accounts means that ArcSight not only tracks what identity does, but by whom

Results Immediately access authoritative records of every privileged access request by user, system, and account Quickly answer questions of who, what, and why for each privileged access request Solid proof for audits, security reviews, and forensics

Scenario: Datacenter Deployment Protecting Classified Assets 2009 by Lieberman Software Corporation. Rev 20090921a

Datacenter Deployment New servers and applications have been deployed in a classified datacenter. The team must confirm that all local administrator accounts are randomized on these systems are as required by FISMA, PCI, NERC/FERC and others.

Datacenter Deployment You launch Enterprise Random Password Manager and verify in the Systems View that ERPM has automatically discovered these servers.

Datacenter Deployment You switch to the Account Store View, expand a node for one of the new servers, and view all of the privileged accounts detected on the system. Discovered accounts include System Administrator Accounts and privileged accounts used by Services and Applications.

Datacenter Deployment You right-click a local Administrator account on the server and choose Properties from the context menu.

Datacenter Deployment The Properties window confirms that Enterprise Random Password Manager has already deployed new password credentials.

Datacenter Deployment Now authorized IT personnel can get privileged access to these servers from anywhere on the network by logging onto our secure Web interface. rwilson *********

Datacenter Deployment Privileged access is granted through permissions already configured in the agency s directory and when an IT staff member clicks Recover Password.

Datacenter Deployment he is prompted to type the reason for the password request so there s an audit trail.

Datacenter Deployment A password is then provided for one-time use. Immediately after use, the password will be randomized according to the agency s configured policy.

Results Randomize local admin accounts on new servers Get an authoritative list of privileged accounts on new servers Secure privileged account credentials and change according to a schedule policy Enable authorized IT staff to quickly access systems without taking approvers time Audit all requests for privileged access Meet your mandate to secure newly-deployed hardware

ArcSight Integration All ERPM password check-out/check-in & credential changes fed to ArcSight ESM Every succeeded /failed password verification fed to ArcSight ESM ArcSight completes the security picture by Starting with our password management events Follows the credential use (other event feeds) Confirms the removal of privilege (our rekey) Correlates credential use on all other systems

ArcSight Integration: ArcSight ESM Events Generated by ERPM

Partial List of Privileged Events Mapped To ArcSight ESM Console Operations: EVENT_ID_PASSWORD_RECOVERY_MAIL_ALERT EVENT_ID_JOB_FAILED_TO_LOCK EVENT_ID_JOB_RESET_FOR_RUN EVENT_ID_JOB_CONTINUE_PARTIAL_RUN EVENT_ID_JOB_CANCELING_RUN EVENT_ID_JOB_STARTING_TRUST_UPDATE EVENT_ID_JOB_TRUST_UPDATE_OPERATION EVENT_ID_JOB_STARTING_DYNAMIC_GROUP_UPDATE EVENT_ID_JOB_DYNAMIC_GROUP_UPDATE_OPERATION EVENT_ID_JOB_STARTING_ADMIN_ACTIVITY_REPORT EVENT_ID_JOB_ADMIN_ACTIVITY_REPORT_OPERATION EVENT_ID_JOB_PASSWORD_STATUS_REPORT_OPERATION EVENT_ID_SYSTEM_RESTRICTED EVENT_ID_JOB_LAUNCHING_THREADS EVENT_ID_JOB_COULD_NOT_CONNECT_TO_SYSTEM EVENT_ID_CONSOLE_STARTED EVENT_ID_JOB_COMPLIANCE_DATABASE_SNAPSHOT EVENT_ID_JOB_MISSED_RUN_RESCHEDULED EVENT_ID_JOB_MISSED_RUN_FINISHED Password Operations: EVENT_ID_PASSWORD_ACCESS_GRANTED EVENT_ID_PASSWORD_ACCESS_REFUSED EVENT_ID_PASSWORD_CHECKED_OUT EVENT_ID_PASSWORD_CHECKED_IN EVENT_ID_PASSWORD_CHECKOUT_EXPIRED EVENT_ID_PASSWORD_RETRIEVED EVENT_ID_PASSWORD_REQUESTED EVENT_ID_PASSWORD_REQUEST_GRANTED EVENT_ID_PASSWORD_REQUEST_DENIED EVENT_ID_PASSWORD_RECOVERED_FOR_RDP EVENT_ID_JOB_GENERATED_RANDOM_PASSWORD EVENT_ID_JOB_STARTING_PASSWORD_STATUS_REPORT EVENT_ID_JOB_FAILED_PASSWORD_STATUS_CHECK_FOR_ACCOUNT EVENT_ID_JOB_STARTING_PASSWORD_CHANGE_ON_SYSTEM EVENT_ID_JOB_FAILED_LINUX_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_LINUX_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_CISCO_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_CISCO_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_MYSQL_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_MYSQL_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_ORACLE_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_ORACLE_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_WINDOWS_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_WINDOWS_PASSWORD_UPDATE

Partial List of Privileged Events Mapped To ArcSight ESM EVENT_ID_JOB_FAILED_SQL_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_SQL_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_AS400_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_AS400_PASSWORD_UPDATE EVENT_ID_JOB_PROPAGATING_TO_SERVICES EVENT_ID_JOB_PROPAGATING_TO_TASKS EVENT_ID_JOB_PROPAGATING_TO_COMPLUS EVENT_ID_JOB_PROPAGATING_TO_DCOM EVENT_ID_JOB_PROPAGATING_TO_IIS EVENT_ID_JOB_PROPAGATING_TO_CUSTOM EVENT_ID_JOB_PROPAGATING EVENT_ID_PASSWORD_VAULT_OPENED EVENT_ID_JOB_FAILED_CUSTOM_ACCOUNT_STORE_PASSWORD _UPDATE EVENT_ID_JOB_SUCCESS_CUSTOM_ACCOUNT_STORE_PASSWORD _UPDATE EVENT_ID_JOB_STARTING_ACCOUNT_ELEVATION_JOB EVENT_ID_JOB_FAILED_LDAP_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_LDAP_PASSWORD_UPDATE EVENT_ID_JOB_FAILED_SYBASE_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_SYBASE_PASSWORD_UPDATE EVENT_ID_PASSWORD_RECOVERED_BY_GRANT EVENT_ID_PASSWORD_RECOVERED_FOR_TERMINAL_SERVICES EVENT_ID_PASSWORD_RECOVERED_BY_CLIENT_AGENT EVENT_ID_JOB_FAILED_OS390_PASSWORD_UPDATE EVENT_ID_JOB_SUCCESS_OS390_PASSWORD_UPDATE EVENT_ID_JOB_DISCOVERY Web Application Operations/Errors: EVENT_ID_WEBAPP_FAILED_PERMISSIONS_CHECK EVENT_ID_WEBAPP_INVALID_AUTH_TOKEN EVENT_ID_WEBAPP_PERMISSION_NOT_GRANTED EVENT_ID_WEBAPP_DATABASE_CONNECTION_FAILURE File Vault Operations: EVENT_ID_FILE_RETREIVAL_REFUSED Scheduler Service Operations: EVENT_ID_SCHEDULER_STARTED EVENT_ID_SCHEDULER_PROCESSOR_DISPATCH EVENT_ID_SCHEDULER_PROCESSOR_FINISHED EVENT_ID_SCHEDULER_FAILED_TO_RUN_JOB EVENT_ID_SCHEDULER_FAILED_LICENSING_ERROR EVENT_ID_SCHEDULER_JOB_COMPLETE_ALERTS EVENT_ID_SCHEDULER_JOB_COMPLETE_ALERTS_FAILED EVENT_ID_SCHEDULER_STOPPED YES, we do integrate with ArcSight!!!

About Lieberman Software The Problem: Unrestricted, Unaudited Access to Privileged IT Resources The Mandate: FISMA The Solution: Privileged Identity Management Two Scenarios: Unexpected Events and Datacenter Deployment Offer for Attendees About Lieberman Software Q&A 2009 by Lieberman Software Corporation. Rev 20090921a

About Lieberman Software Founded in 1978 Originators of Password Randomization & Recovery for Privileged Identity Management going back to 2001 USA-based, management-owned & profitable No FOREIGN interests, No off-shore development Los Angeles headquarters, Austin support office and sales offices throughout the USA Technical partnerships include:

900 Enterprise Customers

Questions