25
Building a Business Case for Credentialed Vulnerability Scanning

Building a Business Case for Credentialed Vulnerability Scanning

Embed Size (px)

Citation preview

Page 1: Building a Business Case for Credentialed Vulnerability Scanning

Building a Business Case for Credentialed Vulnerability

Scanning

Page 2: Building a Business Case for Credentialed Vulnerability Scanning

2

OutlineWhy are we here?

What is Deep Reflex Testing (DRT) How do we configure DRT DRT Benefits

Page 3: Building a Business Case for Credentialed Vulnerability Scanning

3

What is DRT?Authenticated, Credentialed, DRT?

Tripwire IP360 DRT – Deep Reflex Testing Alternate Terms: Credentialed, Authenticated, Local Credential Types:

Windows

SSH Key

SSH

SNMPv1/v2

Web – Form

Web - HTTP

Page 4: Building a Business Case for Credentialed Vulnerability Scanning

4

DRT SpecificsWhat can you access?

SSH-DRT Full CLI

Windows DRT Registry

File System

Partial WMI

SNMP Cisco IOS

Versions

sysDescr

Web - Form Basic HTML Forms

Forms Require one text and one password input

Web - HTTP HTTP Based

Authentication

» Basic, Digest, & NTLM

Page 5: Building a Business Case for Credentialed Vulnerability Scanning

5

VERT Insider Tip #1Additional Credential Capabilities

Added by VERT for Testing Not officially supported Configured and stored in plaintext Redis and IPMI supported Configuration

Discover

Networks

Configuration

<network>

Virtual Hosts

Page 6: Building a Business Case for Credentialed Vulnerability Scanning

6

Configuration OptionsHow do you configure DRT?

Credential Configuration Individual Credential Configurations

Page 7: Building a Business Case for Credentialed Vulnerability Scanning

7

Credential ConfigurationAdding Credentials

Page 8: Building a Business Case for Credentialed Vulnerability Scanning

8

Windows Authentication

Page 9: Building a Business Case for Credentialed Vulnerability Scanning

9

SSH-DRT Key-Based Authentication

Page 10: Building a Business Case for Credentialed Vulnerability Scanning

10

SSH-DRT Password Authentication

Page 11: Building a Business Case for Credentialed Vulnerability Scanning

11

SNMP Authentication

Page 12: Building a Business Case for Credentialed Vulnerability Scanning

12

Web – Form Authentication

Page 13: Building a Business Case for Credentialed Vulnerability Scanning

13

Web – HTTP Authentication

Page 14: Building a Business Case for Credentialed Vulnerability Scanning

14

VERT Insider Tip #2Missing Required Field Indicator

Page 15: Building a Business Case for Credentialed Vulnerability Scanning

15

Network BindingDiscovery -> Credentials Management

Page 16: Building a Business Case for Credentialed Vulnerability Scanning

16

Scan Profile OptionsWhat control do you have?

Special Note Scan Profile -> Basic Scan Profile -> Advanced

Page 17: Building a Business Case for Credentialed Vulnerability Scanning

17

Special NoteTo Authenticate or Not

You can run unauthenticated scans. These provide a remote view of the host. You cannot run authenticated scans only. The unauthenticated portion of the scan

always run.

Page 18: Building a Business Case for Credentialed Vulnerability Scanning

18

Scan Profile – Basic TabEnabling Credentials

Page 19: Building a Business Case for Credentialed Vulnerability Scanning

19

Scan Profile – Advanced TabCommon Mistake

Page 20: Building a Business Case for Credentialed Vulnerability Scanning

20

Benefits of DRTWhy enable credentials?

DRT by the Numbers DRT Accuracy DRT Automation

Page 21: Building a Business Case for Credentialed Vulnerability Scanning

21

DRT By the NumbersFinding Value in the Numbers

CVEs Covered Remotely: 4176 Windows DRT CVEs: 9712 SSH-DRT CVEs: 17,121 SNMP CVEs: 432

Total CVE Coverage (Remote Only): 4176 Total CVE Coverage (with Credentials): 24,288

Coverage Gain: ~20,000 CVEs

Page 22: Building a Business Case for Credentialed Vulnerability Scanning

22

DRT AccuracyIs DRT Better?

DRT Rules have direct access to the system. File version comparison

Direct Package Manager queries

Remote Rules require service interrogation Non-Invasive Remote detection can be difficult

Often the remote service looks like an older version due to source patching

» This can lead to Remote scanning false positive issues

Page 23: Building a Business Case for Credentialed Vulnerability Scanning

23

DRT AutomationTime to Delivery

Development time for DRT detection is greatly reduced. Linux Coverage is Delivered Weekly

Coverage is generated for: RHEL, Fedora, CentOS, SUSE, OEL, Debian, and Ubuntu

24 Hour Patch Tuesday SLA Full DRT Windows Coverage within 24 hours of Bulletin Release

Many other local platforms are automated for rapid delivery OS X

Java

Mozilla Firefox / Thunderbird

Google Chrome

Adobe Flash

Page 24: Building a Business Case for Credentialed Vulnerability Scanning

24

Wrap UpPutting it all Together

Tripwire IP360 makes credential configuration easy. 500% coverage increase when using DRT across your environment.

Page 25: Building a Business Case for Credentialed Vulnerability Scanning

tripwire.com | @TripwireInc

Thank you!