Evolution of Security Management

47
Security Management Evolution and solutions Christophe Briguet [email protected] © 2008 Exaprotect

description

Presentation done at les Assises de la Sécurité 2008 at Monaco

Transcript of Evolution of Security Management

Page 1: Evolution of Security Management

Security Management Evolution and solutions

Christophe Briguet [email protected] © 2008 Exaprotect

Page 2: Evolution of Security Management

Why infrastructures are

evolving?

Page 3: Evolution of Security Management

60% of the IT budget is allocated to operation *

* Gartner 2007

Page 4: Evolution of Security Management

 Sarbanes-Oxley Act  European Directives  ISO 27001  PCI-DSS  FSA  HIPAA

Page 5: Evolution of Security Management

62% of security incident are

human error *

* Verizon 2008 Data Breach Investigation Report

Page 6: Evolution of Security Management

1 molecule / 1000 succeed on the market

10 years of R&D

5 years of exclusive

rights

Page 7: Evolution of Security Management

~1 admin for 50 servers in 2000

Page 8: Evolution of Security Management

~1 admin for 200 servers in 2008

Page 9: Evolution of Security Management

100 000 000 users - 70 employees

Page 10: Evolution of Security Management

54 000 000 users - 200 employees

Page 11: Evolution of Security Management

Water-Based Data Center

Page 12: Evolution of Security Management

50%

of the carbone footprint of air transportation

Page 13: Evolution of Security Management

ZZZZZZZ

50% of the time*

* IDC 2008

Page 14: Evolution of Security Management

12/1

80%

Page 15: Evolution of Security Management

Virtual firewall

+100 Daily changes

+10 000 Access list

100

Page 16: Evolution of Security Management

External Vs Internal

Page 17: Evolution of Security Management

Why security best practices have changed?

Page 18: Evolution of Security Management

* Diversity

*

Page 19: Evolution of Security Management

53% of company merged parts of their

physical and logical security * * Gartner

Page 20: Evolution of Security Management

9.1.1 Use video cameras or other access control mechanisms to monitor individual physical access to sensitive areas. Review collected data and correlate with other entries…

Page 21: Evolution of Security Management

Logs are like cars …

Page 22: Evolution of Security Management

each two years X2

Page 23: Evolution of Security Management

You can't defend. You can't

prevent. The

only thing you

can do is detect

and respond.”

- Bruce Schneier

Page 24: Evolution of Security Management

From disorganization to process ...

40% of organization are thinking about ITIL *

Page 25: Evolution of Security Management

From disorganization to process ...

Incident management Problem management Change management Release management Capacity management Availability management Service level management Configuration management Security management Etc.

Page 26: Evolution of Security Management

From process to tools...

Page 27: Evolution of Security Management

Products & solutions

Page 28: Evolution of Security Management

LogManager & EventManager S e c u r i t y I n f o r m a t i o n a n d E v e n t M a n a g e m e n t

Page 29: Evolution of Security Management
Page 30: Evolution of Security Management

Solsoft ChangeManager Network Configuration and C h a n g e M a n a g e m e n t

Page 31: Evolution of Security Management
Page 32: Evolution of Security Management

Example of security best practices

Page 33: Evolution of Security Management

BP #1 Get a clear picture of your network topology

Page 34: Evolution of Security Management

BP #2 Use a central rules management system

smtp

Page 35: Evolution of Security Management

BP #3 Test before implementing a new configuration

A rules may hide another one

Compilation results

Page 36: Evolution of Security Management

BP #4 Collect and consolidate logs

Page 37: Evolution of Security Management

BP #5 Automate t rea th detec t ion

Authentication

Authentication

Login success

Page 38: Evolution of Security Management

User authenticated User logging sucess

Same time window and same user account and differente network

Correlation

EventManager

Aggregation and Normalization 2 x Success authentication user Wilcox

Potential Identity Hijacking on user account Wilcox

Page 39: Evolution of Security Management

overlooking the obvious

Page 40: Evolution of Security Management

BP #6 Remediate in a collaborative way

EventManager ChangeManager

Remediation Order

Incident Case

Page 41: Evolution of Security Management

Plan « B » ?

Page 42: Evolution of Security Management

Virutal Machine hyperviseur

New Virtual Machine

EventManager

New VM deployed

Adjust security policies

B P # 7 A u t o m a t c h a n g e m a n a g e m e n t

Page 43: Evolution of Security Management

New Virtual Machine

EventManager

… to the log management process

… to compliance reports

Add the new Virtual Machine …

Page 44: Evolution of Security Management

New Virtual Machine

ChangeManager

… to the network filtering policy

… to the NAT configuration

… to the VPN configuration

Add the new Virtual Machine …

Page 45: Evolution of Security Management

Change management

ChangeManager

Regulatory compliance

Security monitoring

LogManager EventManager

Process and best practice

Page 46: Evolution of Security Management

Thank you ! [email protected]

Page 47: Evolution of Security Management