Many different security tools on the market –NGFWs, IPS, vulnerability scanners, etc. –They all have their own way of evaluating a threat
Managed by National Institute of –Standards and Technology (NIST) http://scap.nist.gov
Allows tools to identify and act on the same criteria –Validate the security configuration –Confirm patch installs –Scan for a security breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Using SCAP
A
SCAP content can be shared between tools –Focused on configuration compliance –Easily detect applications with known vulnerabilities
Especially useful in large environments –Many different operating systems and applications
This specification standard enables automation –Even between different tools
Automation types –Ongoing monitoring –Notification and alerting –Remediation of noncompliant systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Benchmarks
A
Apply security best-practices to everything –Operating systems, cloud providers, mobile devices, etc. –The bare minimum for security settings
Example: Mobile device –Disable screenshots, disable screen recordings, prevent voice calls when locked, force encryption backups, disable additional VPN profiles, configure a “lost phone” message, etc.
Popular benchmarks - Center for Internet Security (CIS) –https://www.cisecurity.org/cis-benchmarks/
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Agents/agentless
A
Check to see if the device is in compliance –Install a software agent onto the device –Run an on-demand agentless check
Agents can usually provide more detail –Always monitoring for real-time notifications –Must be maintained and updated
Agentless runs without a formal install –Performs the check, then disappears –Does not require ongoing updates to an agent –Will not inform or alert if not running
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
SIEM
A
Security Information and Event Management –Logging of security events and information
Log collection of security alerts –Real-time information
Log aggregation and long-term storage –Usually includes advanced reporting features
Data correlation –Link diverse data types
Forensic analysis –Gather details after an event
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Anti-virus and anti-malware
A
Anti-virus is the popular term –Refers specifically to a type of malware –Trojans, worms, macro viruses
Malware refers to the broad malicious software category –Anti-malware stops spyware, ransomware, fileless malware
The terms are effectively the same these days –The names are more of a marketing tool –Anti-virus software is also anti-malware software now –Make sure your system is using a comprehensive solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Data Loss Prevention (DLP)
A
Where’s your data? –Social Security numbers, credit card numbers, medical records
Stop the data before the attacker gets it –Data “leakage”
So many sources, so many destinations –Often requires multiple solutions –Endpoint clients –Cloud-based systems –Email, cloud storage, collaboration tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
SNMP
A
Simple Network Management Protocol –A database of data (MIB) - Management Information Base –The database contains OIDs - Object Identifiers –Poll devices over udp/161
Request statistics from a device –Server, firewall, workstation, switch, router, etc.
Poll devices at fixed intervals –Create historical performance graphs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
SNMP traps
A
Most SNMP operations expect a poll –Devices then respond to the SNMP request –This requires constant polling
SNMP traps can be configured on the monitored device –Communicates over udp/162
Set a threshold for alerts –If the number of CRC errors increases by 5, send a trap –Monitoring station can react immediately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
NetFlow
A
Gather traffic statistics from all traffic flows –Shared communication between devices
NetFlow –Standard collection method –Many products and options
Probe and collector –Probe watches network communication –Summary records are sent to the collector
Usually a separate reporting app –Closely tied to the collector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Vulnerability scanners
A
Usually minimally invasive –Unlike a penetration test
Port scan –Poke around and see what’s open
Identify systems –And security devices
Test from the outside and inside –Don’t dismiss insider threats
Gather as much information as possible –We’ll separate wheat from chaff later