SSH Product Overview

Similar documents
Venafi Server Agent Agent Overview

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP18 Venafi Security Professional

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.

User Guide. Version R92. English

Streamline Certificate Request Processes. Certificate Enrollment

Secure SSH: Risk Management Solutions. Greg Kent Vice President, SecureIT

Comodo Certificate Manager

User Guide. Version R94. English

epldt Web Builder Security March 2017

Sophos Mobile as a Service

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus

Integration Guide. Auvik

ISO27001 Preparing your business with Snare

ForeScout Extended Module for Tenable Vulnerability Management

HIPAA Compliance Assessment Module

L105190: Proactive Security Compliance Automation with CloudForms, Satellite, OpenSCAP, Insights, and Ansible Tower

NetIQ Identity Manager Jobs Guide. February 2017

ForeScout Extended Module for Qualys VM

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014

PCI Compliance Assessment Module with Inspector

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Licensing the Application CHAPTER

Forescout. Configuration Guide. Version 2.4

Industrial Defender ASM. for Automation Systems Management

Discovery. Discovery

Parallels Management Suite for Microsoft SCCM 2007

WhatsConfigured v3.1 User Guide

Sophos Mobile. startup guide. Product Version: 8.1

Venafi Trust Protection Platform 18.1 Common Criteria Guidance

Restore Online Backup Manager Guide

Sophos Mobile SaaS startup guide. Product version: 7.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

Integrate Saint Security Suite. EventTracker v8.x and above

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

User Guide. Version R95. English

macos Security Checklist:

Azzule Premium Supply Chain Program Quick Reference Guide

Securing ArcGIS Services

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Android Enterprise Device Management with ZENworks 2017 Update 2

Integrating with Prime Service Catalog

User Guide. Version R93. English

Ekran System v Program Overview

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Security in Bomgar Remote Support

Booting a Galaxy Instance

BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.0

Lab Guide for Managing Hitachi Storage With Hitachi Command Suite v8.x

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator)

Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program

macos Security Checklist:

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd.

Foundstone 7.0 Patch 6 Release Notes

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

MOVE AntiVirus page-level reference

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

Message Networking 5.2 Administration print guide

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Acronis Monitoring Service

The following topics describe how to use backup and restore features in the Firepower System:

CIS Controls Measures and Metrics for Version 7

User Guide. Version R95. English

User Guide. BlackBerry Workspaces for Windows. Version 5.5

ACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee

ZENworks 2017 Audit Management Reference. December 2016

Security. ITM Platform

Configure WSA to Upload Log Files to CTA System

Scan Report Executive Summary

ForeScout Extended Module for Carbon Black

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. Swimlane 2.x

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

EMC Unisphere for VMAX Database Storage Analyzer

Community Edition Getting Started Guide. July 25, 2018

10 FOCUS AREAS FOR BREACH PREVENTION

Un SOC avanzato per una efficace risposta al cybercrime

ForeScout Extended Module for Advanced Compliance

WhatsConfigured for WhatsUp Gold 2016 User Guide

HIPAA Compliance Module. Using the HIPAA Module without Inspector Instructions. User Guide RapidFire Tools, Inc. All rights reserved.

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

User Guide. Version R95. English

User Guide. Version R92. English

Qualys Cloud Platform

Qualys Integration with CyberArk Application Identity Manager (AIM)

vapp Deployment and Configuration Guide

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

SECURITY & PRIVACY DOCUMENTATION

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

Configure WSA to Upload Log Files to CTA System

Sophos Mobile in Central

Kaseya 2. User Guide. Version 7.0. English

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

PDU Utility. User Manual

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Transcription:

SSH Product Overview

SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2

Where is SSH used? File Transfer & Remote Script Execution SSH (SCP or SFTP) Jupiter TLS SSH Customers Partners Employees Admins with Root Access Application Owners System Admins

Where is SSH used? File Transfer & Remote Script Execution SSH (SCP or SFTP) Simple rule of thumb: If it s not Windows or a Mainframe, SSH is Jupiter probably used to login into it. TLS SSH Customers Partners Employees Admins with Root Access Application Owners System Admins

SSH Basics User Access 1 Server Keys A A 1 21 User Keys User Keys Host Keys Server1 Host Keys Server2 Server1 Authorized Server Keys Keys A1 Alice Server1 2 A Server Keys Authorized Keys Alice Alice Server2

SSH Basics Server-to-Server Access A Client Keys C 1 Trusted Server1 Keys 12 User Keys Host Keys Server1 Server2 1 1 A A2 Server Keys Server Keys Authorized Keys Alice Authorized Keys Server2 Alice Server1 2 2 Authorized Server Keys Keys A2 Authorized Host Keys Keys A1 Server Keys User Keys Alice Server1 Alice Alice Server2

The State of SSH in Most Organizations No inventory No key rotation Weak keys Terminated employees still have access Potential backdoor keys Pivoting opportunities for attackers

SSH Discovery and Remediation Venafi Products can discover and report back to Venafi server crucial details about SSH keys. Discovery is a critical part of identifying the status of your SSH key environment across all of your systems.

SSH Discovery and Remediation Identifying orphaned public keys and resolving them quickly can help to avoid potentially serious vulnerabilities, particularly when an orphaned key is found in a root or administrative account on a server. Venafi Products allow us to add/remove SSH keys.

Agentless SSH TPP server(s) will SSH to target systems to perform scans and remediation Work performed at the time of User UI action Discussed in detail in it s own module

Agent Based SSH Requires installation of Agent software Supports wide range of OS types Can gather SSH Key Usage info Agents call home for work Discussed in detail in it s own module

Agent vs. Agentless Considerations Network traffic direction Agent: Key usage logging Agent: Better support for intermittent systems (e.g., user laptops) Agent: Support for Windows Agentless: More platform independent (e.g., mainframe, etc.) Agentless: Credential management for our own agentless access

Review 1. What are SSH Keys used for? 2. What is the purpose of authorized_keys file? 3. What is default expiration for an SSH key?

Agentless SSH

Agentless SSH Agentless SSH Overview Configuring Agentless SSH Group 2018 Venafi. All Rights Reserved. 15

Agentless SSH Overview SSH discovery can find SSH keys on devices that do not have agents installed on them SSH Remediation can add and remove SSH keys TPP uses a remote SSH connection to connect to the systems or servers TPP will scan per configured work and create keysets in Aperture

Configuring Agentless SSH Create Credential Objects Create Device Objects Configure SSH Work Allow scheduled work to happen View Results in Aperture

Create Credential Objects Password (Aperture or WebAdmin) SSH Private Key (WebAdmin)

Create Device Objects Done in WebAdmin Supports sudo Set Temp Directory if using sudo

Device Objects Device Inventory See status of Devices Use filters Can be created using Network Discovery

View Device Objects Shows status info Test Connection

Edit Device Objects

Configure Agentless SSH Work Enable folders for Agentless

Configure Agentless SSH Work Add a Group Group Purpose = Agentless SSH

Configure Agentless SSH Work Hardcodes Membership Criteria

Configure Agentless SSH Work Work Types: SSH Discovery SSH Remediation Work explained in upcoming module

Run Agentless SSH Scan Runs per schedule Can be triggered on demand

Lab: Agentless SSH Lab coming up after next module

Review 1. What are benefits of Agentless SSH? 2. Can we mix and match Agent and Agentless SSH? 3. Can Agentless SSH typically be used with Windows Servers?

Configuring SSH Work

Configuring SSH Work Configuring SSH Work Overview SSH Discovery Work Settings SSH Discovery Work SSH Remediation Work 2018 Venafi. All Rights Reserved. 31

Configuring SSH Work Overview SSH work can apply to Agents and Agentless SSH Done on the Group under Groups & Work > Work Specify what to scan Specify where to scan Specify when to scan Enable Remediation

Enabling SSH Discovery Work Work items are created under Groups & Work Unique Name Type

SSH Discovery Work Settings Enable work item Scan interval is similar to Agent check-in time options are: Daily Weekly Monthly Hourly On Receipt Every 30 Minutes Randomization to not over load VMs

SSH Discovery Work Settings Default scan paths for SSH server information and keys

SSH Discovery Work Settings Specify folder where agent will look for: Host Keys User Keys Host Keys and User Keys Supports wildcards Specify where to not scan

SSH Discovery Work Settings Should the agent scan Network File System (NFS) mount points Minimize the impact of discovery

SSH Discovery Work Settings Select a file size threshold after which the agent should ignore files By setting this limit to 1mb, all keystore files larger than 1mb are ignored during SSH discovery.

SSH Discovery Work Settings Logging level detail Default is Info Written to System logs

SSH Remediation Work SSH Remediation > Remediate SSH Work = Yes

Enabling SSH Discovery Work Work items are created under Groups & Work Unique Name Type

Creating SSH Remediation Work

SSH Remediation Work How often Agents check for Remediation work Interval between Monthly and 1min Randomization Start time Agentless SSH performs work immediately

SSH Remediation Work Logging level detail Default is Info Agent Writes to: Syslog Event Logs

SSH Key Usage Work SSH Key Usage > SSH Key Usage Enabled = Yes

SSH Key Usage Work How often Agents Deliver SSH Key Usage data Interval between daily and 1min Randomization

SSH Key Usage Work Cache size on Agent side Agent logging for SSH Key Usage

SSH Key Usage Agent side Only Venafi Agent can gather SSH Key Usage! Steps required on Venafi Agent side: https://support.venafi.com/hc/en-us/articles/215911487

Lab: Configuring SSH Work SSH labs can be done with Agentless or Agent Based SSH Configuring Agent SSH Work Lab Agent SSH configuration Enable Discovery and Remediation Configuring Agentless SSH Lab Agentless Based SSH configuration Enable Discovery and Remediation

Review 1. Where are SSH Discovery results placed? 2. How often will the Agents scan for SSH Keys? 3. How often will Agentless SSH scan run? 4. Where does the Agent log SSH discovery information?

SSH Policy Creating and Configuring

SSH Policy Working with SSH Key Policies Configuring SSH Policy SSH Policy Settings Viewing Devices 2018 Venafi. All Rights Reserved. 52

Working with SSH Key Policies Lock or suggest values* Settings inherited down the tree Agents represented in Policy structure Permission assignment Find policy violations *Unlike Certificate Policy, some locked values are just for reporting. For example multiple private key instances when locked to not allowed.

Configuring SSH Policy Done in Aperture Configuration > Policies Opens Policy tree view Click on folder icon to expand

SSH Policy - General

SSH Policy - General

SSH Policy - General

SSH Policy - General Let's you allow or deny user access to one or more remote IP addresses or host names Setting will be added to authorized_keys

SSH Policy - General Using forced commands, you can limit user accounts SSH access and usage Instead of the client's deciding which command will run, the Policy forces the command

SSH Policy - General Login options in authorized_keys for example: no-user-rc no-x11-forwarding no-agent-forwarding More found in documentation

SSH Policy Device Connection

Dashboard

Dashboard

SSH Keysets Inventory > SSH Keys

Orphan keys SSH Keys > Orphans Shows keysets where we don t know about the matching private or public key We can see that some one has root access to multiple systems

Keyset details

Keyset details

Devices Inventory > Devices View Device status, no need to check each keyset separately

Looking at a Device Overview SSH Client info SSH Host info Permissions

SSH Client Outgoing Access Shows client keyset instances on this host Show a warning when something is out of compliance

SSH Client Trusted Server Shows discovered known_hosts keys

SSH Server Authorized Clients Shows keys that grant access to the system

SSH Server Host Keysets Shows Host Keysets

SSH Server Configuration Shows SSHd Configuration info

Lab: SSH Policy Lab Configure Policies for SSH View SSH Key Discovery results

Review 1. What can we do through SSH Policy? 2. Can SSH Policy be configured through WebAdmin? 3. What is the difference between SSH Host and Client keyset?

SSH Remediation Responding to SSH Key Threats

SSH Remediation SSH Remediation Overview Enabling SSH Remediation Working With Keysets Resolving Key Risks 2018 Venafi. All Rights Reserved. 78

SSH Remediation In order to prevent lateral attacks on your critical servers and related network resources, you must be able to find, identify, organize, and renew your SSH key assets. Remediation allows us to rotate existing keys and provision new ones.

Enable Remediation Configuration > Folders Only available through Policy (not on specific keyset)

Remediation - Workflow Approved on Key Instance in Aperture Define Approver through SSH Policy or specific Approver per Workflow object Stage Code Friendly Name Description 10100 SSH Key Provisioning Before the key is added on the device. 10200 SSH Key Edit Before the key is edited on the device. 10900 SSH Key Removal Before the key is removed from the device. 2018 Venafi. All Rights Reserved. 81

Remediation Enabled Private Keys

Remediation Enabled Auth Keys

Working with Keysets Inventory > SSH Keys Create New Keyset

Creating New Keysets

Creating New Keysets

Adding Key Instances Adding a Public Key instance to a Keyset Adding a Private Key instance to a Keyset

Removing Key Instances Removing a key instance

Add Public Key instance

Making changes to Key instances Editing a Public key instance

Making changes to Key instances Make changes and click Save

Rotating Keys Start key rotation

Rotating Keys Host Key rotation will pause and go into a Reconfigure stage Chance to manually restart/reconfigure SSHd if needed

Changes To Keys Outside TPP Detect Remote Add: - Detect: Add to TPP - Remediate: Add to TPP Remote Delete: - Detect: Delete from TPP - Remediate: Restore on remote Remediate Remote Edit: - Detect: Edit in TPP - Remediate: Restore on remote

Resolving Common SSH Key Risks Resolving Orphans Track the status of Orphan Keys Resolving Shared Private Keys Weak Keys

Resolving Orphans Mapping to an External Key No corresponding private key instance Creates proxy of the private key Deleting Orphans Would allow administrator or root access to system Cannot discover or verify the owner of a key Use Mark As feature if not 100% sure

Tracking the status of orphans To keep track of the work we have done with each keyset, we can use the Mark As option Mark As lets us set the status of each keyset to either Reviewed As OK or Reviewed Needs Action Lets you identify which keysets have already been reviewed

Mark As Reviewed As OK Indicates that you have already resolved an orphan Reviewed Needs Action Unauthorized User Trust Rogue Suspect Owned by Former Employee Generates an event

Resolving Shared Private Keys Compliant shared keys No needed Non-compliant Remove non-compliant instances

Resolving Accessible Root Accounts Root accounts at the server level are typically to be avoided or kept to a minimum Remove Public Key instance from authorized_keys Add a User-access only public key

Weak Key Lenghts Small key length keys introduce risk Rotate keys to comply with policy, typically to RSA 2048 or DSA 1024 keys (suggested minimum sizes per algorithm)

Lab: SSH Remediation Lab Reviewing a keyset and mark as External key access Rotate a Private Key Remove a Key instance Provision a new Keyset to grant alice access from ServerA to ServerB

Review 1. Why would you create a new Keyset? 2. Can you set SSH keys to auto-renew? 3. Can keys be downloaded from Aperture? 4. Can you upload an SSH Private Key to Aperture?