SANS Top 20 Critical Controls for Effective Cyber Defense
|
|
|
- Geraldine Summers
- 10 years ago
- Views:
Transcription
1 WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014
2 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a rapidly evolving threat landscape, organizations must protect their entire IT environment against both external and internal attacks. Threats and risks arrive from many angles, requiring security professionals to use a wide variety of methods to defend against attacks. As a result, many organizations are now adopting the 20 Critical Security Controls developed by the SANS Institute. These controls help organizations prioritize the most effective methods and policies for safeguarding their assets, information and infrastructure. This paper outlines how LogRhythm s Security Intelligence Platform maps directly to each of the 20 Critical Security Controls. The LogRhythm Platform has been specifically designed to provide real-time, continuous monitoring at the log layer. LogRhythm collects, normalizes and analyzes all available log and machine data in real time. All data is immediately forwarded to the AI Engine, LogRhythm s patented Machine Analytics technology, for advanced behavioral and statistical analysis to deliver true visibility into all activity observed within the environment. By combining machine data with both external and internal context such as geographic location and user logins, LogRhythm is able to establish normal behavioral patterns, thus enabling real-time detection of abnormal behavior. And LogRhythm goes beyond monitoring and detection by providing automated, intelligent remediation capabilities via SmartResponse TM. This combination of capabilities delivers greater accuracy in threat detection and automates key components of the response process, accelerating remediation times. LogRhythm empowers organizations to manage risk more effectively while also reducing the Total Cost of Ownership for their Security Intelligence program. organizations maintain a secure network. Alerts can be sent to groups or individuals, and can also be suppressed for a configurable period of time while investigations are carried out. Reports for manual review can be generated either on-demand or scheduled for delivery. For additional ease of deployment and streamlined administration, multiple list management templates are provided that enable organizations to simplify the process of aligning specific components to individual organizational requirements. The SANS Critical Controls are listed in the table below, with an outline of how LogRhythm can support the implementation of each control. This document has been created based on version 4.1 of the Critical Controls. Protecting Critical Information LogRhythm provides a broad range of out-of-the-box advanced alerts, investigations, and reports that map directly to various components of the SANS Critical Controls in an effort to help PAGE 1
3 SANS Top 20 Critical Controls for Cyber Security 1 Inventory of Authorized and Unauthorized Devices prevent/correct network access by devices (computers, network components, printers, anything with IP addresses) based on an asset inventory of which devices are allowed to connect to the network. LogRhythm can import from asset databases, and correlate actual devices present on the network against lists of approved devices. LogRhythm can also collect logs from DHCP servers to help detect unknown or unauthorized systems. LogRhythm supports the Control 1 Metric by identifying new unauthorized devices being connected to the network in near real time (for example via DHCP logs). LogRhythm offers the ability through SmartResponse TM to automatically isolate the system from the network (for example by disabling the appropriate switch port) once an approval process has been completed. 2 Inventory of Authorized and Unauthorized Software 3 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4 Continuous Vulnerability Assessment and Remediation The processes and tools organizations use to track/control/prevent/correct installation and execution of software on computers based on an asset inventory of approved software. The processes and tools organizations use to track/control/prevent/correct security weaknesses in the configurations of the hardware and software of mobile devices, laptops, workstations, and servers based on a formal configuration management and change control process. The processes and tools used to detect/ prevent/correct security vulnerabilities in the configurations of devices that are listed and approved in the asset inventory database. LogRhythm monitors for the installation or execution of unauthorized software. LogRhythm can also create and maintain dynamic lists of approved software based on behavioral monitoring that may be operated in the environment. LogRhythm supports the Control 2 Metric by identifying attempts to install unauthorized software (for example via Windows application logs), by identifying attempts to execute unauthorized software (by monitoring process startups). LogRhythm offers the ability through SmartResponse TM to automatically terminate execution of unauthorized software, or otherwise quarantine the affected system once an approval process has been completed. LogRhythm monitors the use of privileged or generic accounts, the startup of services, the use of ports, and the application of patches. LogRhythm can also detect changes to key files through its File Integrity Monitor. LogRhythm supports the Control 3 Metric by identifying changes to key files, services, ports, configuration files, or software installed on the system. LogRhythm has the ability through SmartResponse TM to automatically respond to file or service changes, or otherwise quarantine the affected system. LogRhythm collects logs from vulnerability scanners. It is able to correlate event logs with data from vulnerability scans. LogRhythm can monitor the use of the account that was used to perform the vulnerability scan. LogRhythm supports the Control 4 Metric by collecting logs and data from vulnerability scans. This enables LogRhythm to correlate both the data from the scan and the logs about the scan, providing the basis to report on progress of the vulnerability scan, and of any devices where the scan did not take place. LogRhythm can also collect logs relating to patch installation, and can trigger an alert based on successful completion. PAGE 2
4 5 Malware Defenses The processes and tools used to detect/prevent/ correct installation and execution of malicious software on all devices. LogRhythm collects logs from malware detection tools and correlate those logs with other data collected in real time to eliminate false positives and detect blended threats. LogRhythm can also collect logs from and web-content filtering tools. Via its advanced Agent, LogRhythm can detect and report data copied to removable storage devices. LogRhythm is tightly integrated with industry-leading security vendors including FireEye, Sourcefire, Fortinet and Palo Alto among many others. LogRhythm supports the Control 5 Metric by continually collecting and monitoring logs from a wide variety of malware detection tools, in addition to its own agent technology. LogRhythm has the ability through SmartResponse TM to automatically terminate the execution of unauthorized software and quarantine any affected systems. 6 Application Software Security The processes and tools organizations use to detect/prevent/correct security weaknesses in the development and acquisition of software applications. LogRhythm collects logs from web application firewalls, and from vulnerability scanners. LogRhythm also offers a built-in Web Application Defense Module via its knowledge base. LogRhythm supports the Control 6 Metric through the LogRhythm Web Application Defense Module which is designed to leverage web log data with a focus on detection, identification, and prevention of security related issues. By design, this module can be used in combination with Intrusion Detection Systems and Web Application Firewalls or on its own. Because of LogRhythm s ability to correlate across various applications and device logs at once, it is especially well positioned to create meaningful, relevant alerts around suspicious web log data. The Web Application Defense Module provides out-of-the-box alerts for detecting Suspicious URL Characters and malicious user agent strings, in addition to automatically populating an attacking IPs list. This list enables reporting to be done on source IPs that are attacking web applications. LogRhythm collects logs from WAFs and IDS/IPS systems, in addition to vulnerability scanners. All security event logs are correlated in real time. LogRhythm has the ability through SmartResponse TM to automatically push a new configuration to a firewall (for example via the Palo Alto API), or otherwise quarantine the affected system. 7 Wireless Device Control prevent/correct the security use of wireless local area networks (LANS), access points, and wireless client systems. LogRhythm collects logs from a variety of wireless devices and management systems. In conjunction with logs collected from DHCP servers, wireless clients may be detected connecting to the organization s network. LogRhythm supports the Control 7 Metric by collecting logs from wireless devices, wireless management systems, and DHCP. Real time correlation of these logs enables the identification of unauthorized wireless devices or configurations. LogRhythm has the ability through SmartResponse TM to automatically isolate the system from the network (for example by disabling the appropriate switch port). PAGE 3
5 8 Data Recovery Capability The processes and tools used to properly back up critical information with a proven methodology for timely recovery of it. LogRhythm collects logs from Windows and other backup systems. Through the AI Engine, LogRhythm can detect backups that did not successfully complete, or backups that did not start. 9 Security Skills Assessment and Appropriate Training to Fill Gaps The process and tools to make sure an organization understands the technical skill gaps within its workforce, including an integrated plan to fill the gaps through policy, training, and awareness. There is no Metric for Control 8. SANS Control 9 is policy based and focuses on skills and training. LogRhythm is able to monitor user compliance with policy and send alerts in real time where credentials are used in an abnormal manner. Since all user activity is logged and collected, correlation and reporting are effective methods for monitoring adherence to policy. There is no Metric for Control Secure Configurations for Network Devices such as Firewalls, Routers, and Switches prevent/correct security weaknesses in the configurations in network devices such as firewalls, routers, and switches based on formal configuration management and change control processes. LogRhythm collects logs from any network device that generates syslog or SNMP. LogRhythm supports the Control 10 Metric by collecting logs from network devices and correlating changes against a change control system to identify and alert on any unauthorized changes. LogRhythm has the ability through SmartResponse TM to automatically shut down any services performing unauthorized changes. 11 Limitation and Control of Network Ports, Protocols, and Services prevent/correct use of ports, protocols, and services on networked devices. By collecting logs from port scanners, LogRhythm is able to detect open ports on the network. LogRhythm can also collect logs on protocols in use and services starting up on individual devices. LogRhythm supports the Control 11 Metric by collecting logs from across the environment and baselining the behavior patterns observed over a period of time. Using this baseline, deviations from normal or expected behavior can be detected and alerts generated. LogRhythm s AI Engine and list management capabilities can alert on the use of non-authorized ports in the environment in real time. 12 Controlled Use of Administrative Privileges prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications. LogRhythm collects logs from almost any device and can monitor the use of default, generic, service and other privileged accounts. LogRhythm supports the Control 11 Metric by collecting logs on administrative activity from across the infrastructure. LogRhythm offers an out-of-the-box Privileged User Monitoring Module, which simplifies the task of tracking and monitoring accounts with elevated privileges and automates a number of tasks that are generally done manually. By design, this module can be used in combination with multiple operating systems (various Linux distributions, Windows, Solaris, etc.) in addition to MS Exchange server 2007 and LogRhythm s unique ability to simultaneously correlate data across multiple applications and devices strengthens privileged user monitoring and exposes suspicious activity performed by administrative accounts. PAGE 4
6 13 Boundary Defense The processes and tools used to detect/prevent/ correct the flow of information transferring networks of different trust levels with a focus on security-damaging data. LogRhythm collects logs from a wide variety of boundary defense devices for correlation or compliance purposes. LogRhythm supports the Control 12 Metric by collecting logs from boundary defense devices in addition to NetFlow data. LogRhythm can build trends of data flows based on observed behavior and alert on deviations from normal behavior. By understanding the internal network infrastructure, internal and external context can be added to alerts, helping identify unexpected traffic flows such as a website in the DMZ communicating directly with a SQL database, rather than communicating via the application layer. LogRhythm also offers out-of-the-box support for third party threat lists and custom IP address blacklists and can alert in real- time when connections are made to any blacklisted IP address or host. 14 Maintenance, Monitoring, and Analysis of Audit Logs The processes and tools used to detect/prevent/ correct the use of systems and information based on audit logs of events that are considered significant or could impact the security of an organization. LogRhythm provides a comprehensive platform for the maintenance, monitoring and analysis of audit logs. LogRhythm supports the Control 14 Metric by collecting all events from across the network. LogRhythm offers silent log source detection in order to validate that devices are still generating logs, and has comprehensive time normalization abilities to ensure that the SIEM engine sees the logs in the actual order they occurred. LogRhythm performs extensive processing of every log that is collected, assigning a common event and establishing a risk based priority for each log. LogRhythm s patented real-time analytics technology, the AI Engine, can baseline behavior of users, hosts and data from across the network. Once a baseline is established, abnormal behavior can be detected and alarmed on. 15 Controlled Access Based on the Need to Know prevent/correct secure access to information according to the formal determination of which persons, computers, and applications have a need and right to access information based on an approved classification. LogRhythm collects audit logs from across the network. Fully integrated File Integrity Monitoring capabilities monitor for and alert on a variety of malicious behaviors, including improper user access of confidential files to botnet related breaches and transmittal of sensitive data. LogRhythm supports the Control 15 Metric by collecting logs of all attempts by users to access files on local systems or network accessible file shares without the appropriate privileges. LogRhythm s File Integrity Monitor can also be used to establish a baseline of normal behavior against a file or fileset, and can alert on deviations from that behavioral baseline. PAGE 5
7 16 Account Monitoring and Control prevent/correct the use of system and application accounts. LogRhythm collects audit logs from across the network for both local and network accounts. LogRhythm supports the Control 16 Metric by collecting logs of all user activity and correlating this with lists of privileged, generic, and service accounts, and also with lists of accounts for users that are terminated. Using a SmartResponse TM plug-in, lists can be automatically maintained when changes take place in the environment. LogRhythm can alert when the use of terminated accounts are observed, and offers extensive reporting capabilities in this area. LogRhythm can also establish baselines of normal account behavior. For example, LogRhythm can track which servers a user normally connects to, and alert on deviation from that norm. 17 Data Loss Prevention prevent/correct data transmission and storage, based on the data s content and associated classification. LogRhythm collects logs from both endpoints and network perimeter devices in order to assist in the detection of data loss incidents. LogRhythm also provides basic Data Loss Detection functionality in its advanced agent technology. LogRhythm supports the Control 17 Metric by collecting logs from endpoints, authentication systems, boundary defense devices, proxies and servers amongst others. LogRhythm is able to detect abnormal activity (e.g. upload of large number of files to Internet based file sharing facilities) in real time and take immediate action via a SmartResponse TM plug-in that can block user access, or terminate the process that is exfiltrating the data. LogRhythm s patented real-time analytics technology, the AI Engine, is able to establish baselines of behavior. For example, AI Engine can observe how users work with a certain set of documents, and alert on deviations from that behavior. 18 Incident Response and Management The process and tools to make sure an organization has a properly tested plan with appropriate trained resources for dealing with any adverse events or threats of adverse events. SANS Control 18 is policy based and focuses on having a clear Incident Response policy. LogRhythm has an integrated incident management capability providing real-time updates on an incident s status (i.e., working, closed, etc.). Status and commentary can be attached to each alert and progress reports can be generated on demand. There is no Metric for Control Secure Network Engineering The process and tools used to build, update, and validate a network infrastructure that can properly withstand attacks from advanced threats. SANS Control 19 is focused on the design of the network. By bringing understanding of the internal network design into LogRhythm, this information can be used to identify unexpected traffic flows such as sensitive systems being accessed directly from the Internet. There is no Metric for Control 19. PAGE 6
8 20 Penetration Tests and Red Team Exercises The process and tools used to simulate attacks against a network to validate the overall security of an organization. LogRhythm collects logs from across the environment. It is a valuable monitoring tool during any penetration test, or red team exercise. LogRhythm enables the accounts used in the penetration test to be automatically monitored for legitimate use. LogRhythm also enables the detection of unusual behavior and may be used to detect the attempts to exploit the enterprise systems during penetration testing. There is no Metric for Control 20. [email protected] PAGE LogRhythm Inc. Whitepaper - SANS Top 20 Critical Controls for Cyber Defense
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Controls Book
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program s Book Cyber-security s Summary Council on Cyber-security Critical Security s (CSC) CSC-01 CSC-02 CSC-03 CSC-04 CSC-05 IT Asset
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
The Role of Security Monitoring & SIEM in Risk Management
The Role of Security Monitoring & SIEM in Risk Management Jeff Kopec, MS, CISSP Cyber Security Architect Oakwood Healthcare Jeff Bell, CISSP, GSLC, CPHIMS, ACHE Director, IT Security & Risk Services CareTech
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
SIEM is only as good as the data it consumes
SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Implementing SANS Top 20 Critical Security Controls with ConsoleWorks
Implementing SANS Top 20 Controls with ConsoleWorks The following whitepaper summarizes TDi Technologies interpretation of the SANS Top 20 Controls and how ConsoleWorks, developed by TDi Technologies,
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Endpoint Security for DeltaV Systems
DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements The benefits of QRadar for protective monitoring of government systems as required by the UK Government Connect
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
