Secure Foundations: Why RHEL isn t just another Linux distribution

Similar documents
RED HAT INSIGHTS. Security & Proactive Response with Insights

Automating, Securing, and Managing Cox Automotive's (AutoTrader) Big Data Infrastructure

Red Hat Insights Mitigate Risk & Proactively Manage Your Infrastructure

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

S Automating security compliance for physical, virtual, cloud, and container environments

L105190: Proactive Security Compliance Automation with CloudForms, Satellite, OpenSCAP, Insights, and Ansible Tower

CREATING A CLOUD STRONGHOLD: Strategies and Methods to Manage and Secure Your Cloud

Automating Security and Compliance for Hybrid Environments

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE

CLOUD WORKLOAD SECURITY

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Accelerate Your Enterprise Private Cloud Initiative

Red Hat Containers Roadmap. Red Hat A panel of product directors

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

HOW TO MAKE THE CASE TO MANAGEMENT: PAYING FOR OPEN SOURCE

KEYNOTE How open source and hybrid cloud brought Microsoft and Red Hat together

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Reinvent Your 2013 Security Management Strategy

Uptime and Proactive Support Services

RiskSense Attack Surface Validation for IoT Systems

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

SYMANTEC DATA CENTER SECURITY

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

RED HAT CLOUDFORMS. Chris Saunders Cloud Solutions

Security. Made Smarter.

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

Day One Success for DevSecOps and Automation on Azure

Build an open hybrid cloud and paint it red and blue

Practical OpenSCAP Security Standard Compliance and Reporting. Robin Price II Senior Solutions Architect Martin Preisler Senior Software Engineer

Enabling Red Hat Virtualization for the Hybrid Cloud

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

Container Deployment and Security Best Practices

locuz.com SOC Services

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

SIEMLESS THREAT DETECTION FOR AWS

IT Consulting and Implementation Services

Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect

Copyright 2016 EMC Corporation. All rights reserved.

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

align security instill confidence

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Please give me your feedback

RED HAT CONTAINER CATALOG

Red Hat Roadmap for Containers and DevOps

TEN LAYERS OF CONTAINER SECURITY

Microsoft Security Management

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Maximizing IT Security with Configuration Management WHITE PAPER

OPENSTACK Building Block for Cloud. Ng Hwee Ming Principal Technologist (Telco) APAC Office of Technology

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Supporting the Cloud Transformation of Agencies across the Public Sector

Datacenter Security: Protection Beyond OS LifeCycle

Sage Data Security Services Directory

SIEM Solutions from McAfee

Red Hat Enterprise Virtualization and KVM Roadmap. Scott M. Herold Product Management - Red Hat Virtualization Technologies

Popular SIEM vs aisiem

CISCO CLOUD. Multi Cloud Management Multi Cloud Reference Architecture Multi Cloud Capability Map CiscoCloud CiscoCloud v Competition

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Goal 1: Maintain Security of ITS Enterprise Systems

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

Getting Started with AWS Security

INTELLIGENCE DRIVEN GRC FOR SECURITY

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

SIEMLESS THREAT MANAGEMENT

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

Novell ZENworks 7.2 Linux Management

IoT & SCADA Cyber Security Services

Cyber Resilience. Think18. Felicity March IBM Corporation

GDPR Update and ENISA guidelines

Best Practices in Securing a Multicloud World

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Automating Security Practices for the DevOps Revolution

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

Transforming IT: From Silos To Services

One Hospital s Cybersecurity Journey

Making the case for SD-WAN

Cloud Customer Architecture for Securing Workloads on Cloud Services

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Red Hat CloudForms Hybrid Cloud Management (CL220)

A Risk Management Platform

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Case Study: The Evolution of EMC s Product Security Office. Dan Reddy, CISSP, CSSLP EMC Product Security Office

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Demystifying Governance, Risk, and Compliance (GRC) with 4 Simple Use Cases. Gen Fields Senior Solution Consultant, Federal Government ServiceNow

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Transcription:

Secure Foundations: Why RHEL isn t just another Linux distribution Lucy Kerner Principal Technical Product Marketing Manager - Security, Red Hat May 3, 2017

ONLY TWO OPERATING SYSTEMS MATTER WORLDWIDE SERVER OPERATING ENVIRONMENT NEW LICENSE SHIPMENTS AND PAID SUBSCRIPTIONS 2008-2019 (000)

Why does the OS matter?

Vulnerabilities, patch management, and their exploitation are still the root cause of most breaches. - Gartner, September 2016 [http://www.gartner.com/doc/3438517/time-align-vulnerability-manageme nt-priorities]

There are lots of OS s out there. TRADITIONAL LIGHTWEIGHT ABSTRACTION

15 Years of Making Open Source Enterprise-Ready PARTICIPATE We participate in and create community-powered upstream projects. STABILIZE We commercialize these platforms together with a rich ecosystem of services and certifications. INTEGRATE We integrate upstream projects, fostering open community platforms. Red Hat Enterprise Linux is Born 02 03 Cluster File Systems 05 IBM Power IBM Z Series Virtualization 07 10 Secure Virtualization Control Groups Real-Time Automated Security Kernel Audits Software Defined Storage 11 12 13 Containers Software Defined Networking 15 17

Top Corporate Maintainer of the Linux Kernel CORPORATE SIGNOFFS SINCE KERNEL 3.19 Source: Linux Kernel Development (The Linux Foundation, August 2016)

What security do I get with Red Hat Enterprise Linux?

Security Technologies in Red Hat Enterprise Linux Crypto SELinux Identity Management IdM/SSSD OpenSCAP Auditd

VALUE OF A RED HAT SUBSCRIPTION CUSTOMER PORTAL GLOBAL TECHNICAL SUPPORT AUTOMATED SERVICES PRODUCT SECURITY EXPERTISE CERTIFICATIONS COMMUNITIES CONTINUOUS FEEDBACK ASSURANCES LIFE-CYCLE PROMISE

PRODUCT SECURITY MISSION Red Hat Product Security's mission is to help protect customers from meaningful security concerns and manage vulnerabilities in open source software.

CUSTOMER SECURITY AWARENESS WORKFLOW Identify security vulnerability Triage the impact of the threat Investigate the issue Work with upstream communities to develop patches Package and test patches Draft documentation and customer communications Release security advisories and communicate patches to customers Determine the customer impact of the threat

From Community to Red Hat Enterprise Linux

RED HAT SUPPLY CHAIN SECURITY Community leadership Quality assurance Package selection Certifications Manual inspection Signing Automated inspection Distribution Packaging guidelines Support Trusted builds Security updates/patches Upstream Community projects Red Hat solutions Red Hat customers

Build Roots: Repeatability for binaries We don t just build on some developer s workstation Everything that s built is translated into a buildroot We can say exactly what was on the system when the rpm was built Versions of RPMSs Versions of libraries Versions of compilers Compiler flags (optimization, function fortification, etc) If needed, we could rebuild an RPM down to the same checksum

Where does the OS matter?

23 RED HAT ENTERPRISE LINUX RED HAT

A Standard Foundation for Next Gen Infrastructure Big Data Modern apps Mobile IoT PHYSICAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD RED HAT ENTERPRISE LINUX

RED HAT ENTERPRISE LINUX THE FOUNDATION FOR ALL RED HAT PLATFORMS

Want to have a deeper discussion? Come visit us at the Red Hat Enterprise Linux Ask the Experts area at the Partner Pavilion! The Security Pod at the Partner Pavilion will also feature demos on Secure Foundation as well And come talk to our Product Security experts at the Partner Pavilion as well And of course, come check out the Red Hat Enterprise Linux breakout sessions and labs we have here for you at Summit!

Secure Foundations: Infrastructure Risk Management Will Nix Principal Technical Product Marketing Manager Red Hat Management

COMPLEXITY IS RISK % 80 Percentage of commercial application outages caused by software failure and operational complexity % 65 k/hr $336 The median cost per hour of downtime for a production application for a large enterprise m/yr $15 Mean annualized cost of cybercrime deference and remediation for large US-based corporations Customers thought they were significantly behind in training and capabilities needed to manage their next generation infrastructure.

ANALYZING INFRASTRUCTURE RISK RESPONSE Are you confident that you can quickly respond when vulnerabilities strike? TOOLS Are you comfortable that your tooling and processes will scale as your environment scales? COMPLIANCE Are you certain that systems are compliant with various internal infosec and package security requirements?

ANALYZING INFRASTRUCTURE RISK WE CANNOT JUST THROW PEOPLE AT THE PROBLEM, WE NEED TECHNOLOGY

INFRASTRUCTURE RISK MANAGEMENT DO MORE WITH LESS AUTOMATE YOUR IT PROCESSES & DEPLOYMENTS PREVENT CRITICAL ISSUES BEFORE THEY OCCUR BUILD A TRUSTED & SECURE RED HAT ENVIRONMENT DELIVER SERVICES ACROSS YOUR HYBRID CLOUD Simple & powerful language Continuous Insights Manage the Red Hat Lifecycle Hybrid Cloud Management No agents to install Verified Knowledge Provision & Configure at Scale Self-Service Provisioning Scale with Proactive Resolution Standardize Your Environment Policy-driven Compliance

INTEGRATED INTO TOOLS YOU USE Works on physical, virtual, cloud, and container-based workloads No new infrastructure to manage Integrated into Satellite 5.7, 6.1+, CloudForms 4.0+, and Red Hat Customer Portal API available for custom integration Ansible Tower integration enables playbooks generated in Red Hat Insights to be automatically imported into Ansible Tower

RISK MANAGEMENT WITH INSIGHTS ACTIONABLE INTELLIGENCE POWERED BY RED HAT CONTINUOUS VULNERABILITY ALERTS INCREASED VISIBILITY TO SECURITY RISKS AUTOMATED REMEDIATION Confidently scale complex environments with no added infrastructure cost. Maximize uptime and avoid fire-fighting so businesses can focus on strategic initiatives. Get ahead of security risks and fix them before businesses are impacted. Minimize human error, do more with less, and fix things faster.

RISK MANAGEMENT WITH INSIGHTS Real-time risk assessment Proactive alerts & executive reporting As a global leader in healthcare information technology, security, and infrastructure intelligence are main priorities for us. Red Hat Insights enables us to be alerted to potential vulnerabilities across thousands of active systems and provide swift remediation. Tailored remediations Quick setup The technology helps us prioritize risk resolution in our infrastructure. Automated, validated, resolutions SaaS No added infrastructure cost TIM ERDEL Senior director, Cerner Works Technology Improvement Center

RED HAT INSIGHTS CAPABILITIES

REMEDIATION MADE SIMPLE Automatically tailored recommendations and remediation down to the per-host level Create and share maintenance plans to better coordinate responses within your team 22% of disasters are caused by human error. QUORUM DISASTER RECOVERY REPORT 37 PRESENTATION TITLE OR CONFIDENTIALITY STATEMENT (OPTIONAL)

AUTOMATE RISK MANAGEMENT RISK IDENTIFIED!!! Insights Planner Playbook or RISK REMEDIATED. Monitor RHEL 6.4 and higher, OSP 7 and higher, RHV 4 and higher, with OCP support coming soon Generate Ansible playbooks for use with Ansible core or Ansible Tower Available in RHEL base channels via yum or deploy quickly with Satellite or playbook Integrates with Satellite, CloudForms, Customer Portal, and Ansible Tower

PROACTIVE & CONTINUOUS ASSESSMENT DISCOVER VALIDATE 1,000,000+ solved cases 100,000+ unique solutions RESOLVE Continuous identification of new risks driven by unique industry data Based on real-world results from millions of enterprise deployments 85% of critical issues raised to Red Hat support are already known to Red Hat or our partners. RED HAT GLOBAL SUPPORT SERVICES

GET AHEAD OF KEY SECURITY RISKS Don t wait for your security team to tap you on the shoulder Prioritizes security response by analyzing runtime configuration and usage Automates security analysis for customers, beyond just CVEs In the first year when a vulnerability is released, it s likely to be exploited within 40-60 days. However, it takes security teams between 100-120 days on average to remediate existing vulnerabilities. KENNA SECURITY GROUP

HOW INSIGHTS WORKS

MANAGING INFRASTRUCTURE RISK Automated remediation ANALYZE IDENTIFY PRIORITIZE RESOLVE

ARCHITECTURE SERVER DATA ANONYMIZATION INFRASTRUCTURE MINIMAL NETWORK IMPACT RESULTS TAILORED TO EACH HOST REMEDIATION STEPS PLAYBOOKS

ARCHITECTURE CUSTOMER PORTAL 16 ACTIONS View results and alerts from Insights in either the customer portal or through the Satellite user interface. ANALYSIS AND FINDINGS ANONYMIZED HOST INFORMATION ANALYTICS ENGINE RULES DATABASE PLAYBOOK GENERATION RED HAT SATELLITE & RED HAT CLOUDFORMS

AUTOMATED KEY RISK REPORTING Tailored resolution steps included for resolution Performance issue: Network interface is not performing at maximum speed Recommended action: Check cable, connections, and remote switch settings. Security risk detected: Privilege escalation Recommended action: Apply mitigation and update the Kernel. Availability/stability: Unexpected behavior with syntax in bonding config Recommended action: Change uppercase to lowercase in the config file.

START RISK MANAGEMENT TODAY Start using Insights with your RHEL subscription. ALREADY A RED HAT ENTERPRISE LINUX CUSTOMER? Try Insights at no cost: https://access.redhat.com/insights/getting-started INTERESTED IN A MANAGEMENT SUITE? Insights is included in: Red Hat Cloud Infrastructure + Red Hat Cloud Suite WOULD YOU LIKE TO LEARN MORE ABOUT INSIGHTS? https://www.redhat.com/en/technologies/management/insights For more info, visit: https://access.redhat.com/insights/info

START RISK MANAGEMENT TODAY Run an Insights assessment for 30 days: 1. Work with your account team to get an Insights eval subscription. 2. Install the Red Hat Insights RPM. 3. Register 50+ systems for best view. 4. See results immediately. 24 ACTIONS 5. Schedule a best practices workshop. 45.8% See valuable insights in minutes: 1. Activate eval: https://access.redhat.com/insights/evaluation. 2. Installation: https://access.redhat.com/insights/getting-started. QUESTIONS? insights@redhat.com

MAKING DAY-TO-DAY OPERATIONS MORE PROACTIVE, LESS REACTIVE Phil Griffiths Senior Solutions Architect May 2017

WHY?

MORE THINGS THAN EVER AFFECTING YOU I want more I need it now. Security Compliance... xn

SUPPORT OPERATIONS SECURITY

SUPPORT Break-fix scenarios No centralised audit/logging? More support tickets than people False positives disguise problems

BUILD THE CAKE Predictive Analytics Application install and configuration Automated Testing (CI/CD) OS customisation Minimal OS Infrastructure - physical/virtual/cloud

ADD SPRINKLES... DISCOVER 1,000,000 VALIDATE 100,000 solved cases unique solutions RESOLVE

OPERATIONS Manual or semi-manual Mostly homebrew scripts Everyone has their favourites Configuration management (drift)

AUTOMATION IS THE KEY

SECURITY Port scanning One way traffic - security team Can t see wood for the trees Only fix critical red issues

APPLY POLICY AT DAY-1 BUILD TIME...

THEN DAY-2 OPS COMPLIANCE

JOIN THE DOTS.

BUSINESS PROCESS AUTOMATION, MEET SYSTEMS AUTOMATION Full post provision lifecycle management: control, audit, utilisation, planning, chargeback and more

Proactive analysis of your systems with regularly updated information The most powerful, simple yet effective systems automation tool on the market End-to-end policy and rules driven business automation Full systems lifecycle management