Upload
tripwire
View
2.896
Download
2
Tags:
Embed Size (px)
DESCRIPTION
System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with: Recognized best practices; vendor hardening guidelines; custom security polices; industry standards or benchmarks. Security Configuration Management is an automated, security-focused set of capabilities that makes system hardening: Repeatable and enterprise-scalable; continuous with real-time or periodic capabilities as needed; flexible and aligned with business needs, workflows and exceptions; self-correcting and self-remediating. Here's where the rubber meets the road...
Citation preview
System Hardening Made Easy… Security Configuration Management from Tripwire
MICHAEL THELANDER, PRODUCT MARKETING DIRECTOR 1.29.2013
System Hardening … Made EasySecurity Configuration Management from TripwireMichael Thelander, Product Marketing Director 1.29.2013
IT SECURITY & COMPLIANCE AUTOMATION3
What Is It?
System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with:
• Recognized Best Practices
• Vendor Hardening Guidelines
• Custom Security Polices
• Industry Standards or Benchmarks
Security Configuration Management is an automated, security-focused set of capabilities that makes system hardening:
• Repeatable and enterprise-scalable
• Continuous, with real-time or periodic capabilities as needed
• Flexible, and aligned with business needs, workflows and exceptions
• Self-correcting and self-remediating
IT SECURITY & COMPLIANCE AUTOMATION4
“The management and control
of configurations for an
information system with the
goal of enabling security and
managing risk”
NIST says SCM is:
IT SECURITY & COMPLIANCE AUTOMATION5
SCM: Tripwire Definition
The ability to create, edit and manage
IT security hardening policies in a way that
fits real-world business processes and
continually balances risk and productivity
IT SECURITY & COMPLIANCE AUTOMATION6
On Many Short-term Buying Lists
© 451 Group 2013
IT SECURITY & COMPLIANCE AUTOMATION7
Gartner says SCM is the #1 priority in creating a server protection strategy
1
IT SECURITY & COMPLIANCE AUTOMATION8
Securosis says configuration hardening is the 2nd most effective
data security control2
IT SECURITY & COMPLIANCE AUTOMATION9
SANS says SCM is the 3rd most important security control you can implement
3 (& 10)
IT SECURITY & COMPLIANCE AUTOMATION10
GCHQ’s New Cyber Security Guidance
GCHQ released new “10 Steps to CyberSecurity” in Fall 2012
Focused on executive
and board
responsibility
Names Secure
Configurations as one
of the most critical
steps to achieving
an objective measure
of cybersecurity
IT SECURITY & COMPLIANCE AUTOMATION11
What’s the Reality When It Comes to SCM? It’s Hard To Do:
IT SECURITY & COMPLIANCE AUTOMATION12
Configuration Drift Is A Constant Enemy
“Configuration drift is a natural condition in every data center environment due to the sheer number of ongoing hardware and software changes.” – Continuity Software blog
“In less than a week, all the configuration controls, permissions and entitlements that IT spends time testing are useless.” – ITPCG blog
IT SECURITY & COMPLIANCE AUTOMATION13
How Does Tripwire Help?
Tripwire’s solution monitors and assesses critical configurations in:
• File systems of all kinds: Windows, Linux, Solaris, AIX, HP-UX
• Databases like MS-SQL, Oracle, IBM DB2 and Sybase
• Directory services and network devices
Tripwire’s SCM is built on the world’s best integrity solution, assuring:
• Immediate detection of changes to critical, defense-dependant configurations
• Efficient, change-triggered configuration assessment
• Continuous risk reduction
Tripwire’s system hardening solutions are enterprise-scalable, with:
• Automated deployment and setup
• A complete system of waiver and workflow management
• Automated or assisted remediation options for failed or weak configurations
• The industry’s largest , most customizable policy library
IT SECURITY & COMPLIANCE AUTOMATION
Time
Secure& CompliantState
Sec
urity
Pos
ture
TRIPWIRE’s SCM ENFORCES SECURITY POLICIES…CONTINUOUSLY
Continuous Monitoring
14
Tripwire’s solutions continually assess and remediate insecure configurations, insuring always-hardened, always-ready information
systems and network devices
IT SECURITY & COMPLIANCE AUTOMATION15
Tripwire Enterprise: Key SCM Features
Broadest Platform & Device Support Harden all operating systems: Windows,
Linux, Solaris, AIX, HP-UX, Cent OS, more
Assess and harden applications like Microsoft IIS and Exchange
Assess and harden directory servers: MS Active Directory, Novell eDirectory, more
Harden database servers like MS SQL, IBM DB2, Oracle, Sybase ASE
Support For Real-World Environments Easy policy editing and customization
Customizable weights and severities give security teams power over policies
Waiver and exception management fits real-world workflows and constraints
Industry-Recognized Expertise SC Magazine’s Best Policy Manager, 2012
More CIS security software benchmark certifications than any competitor
World’s Largest Policy & Content Library Over 250 out-of-box policy / platform
combinations, with ISO, CIS, MAS, PCI, NERC, HIPAA, DISA STIGS & more
Vendor hardening guidelines for vmWare, Microsoft, Solaris, Cisco, Oracle, & more
Import polices to meet your needs, with SCAP support for content automation
Operations Gets Rapid Repair Built-in remediation guidance provides
instant, detailed configuration advice Detailed forensics assist in analysis and
show Who? What? When? information Role-based Remediation Manager can
automate and streamline repairs
Built On the Industry’s Best FIM Enables true continuous monitoring Change-triggered policy checking
provides real-time configuration hardening
IT SECURITY & COMPLIANCE AUTOMATION16
Configuration Hardening Reports to Meet Every Need
Automated dashboards and reports
IT SECURITY & COMPLIANCE AUTOMATION17
Connect Security Hardening to the Business: VIA Data Mart
Optional VIA Data Mart extracts and abstracts security data from Tripwire’s SCM solution to:
• Make risk visible and actionable
• Add critical business context
Translates system hardening into concepts the businesses understands:
• Risk and relevance
• Cost and efficiency of security
• Trends over time and projections
Transforms raw security data into meaningful business intelligence
www.tripwire.comTripwire Americas: 1.800.TRIPWIRETripwire EMEA: +44 (0) 20 7382 5420Tripwire Japan: +812.53206.8610Tripwire Singapore: +65 6733 5051Tripwire Australia-New Zealand: +61 (0) 402 138 980
System Hardening Made Easy, By Tripwire