Measuring Compliance with Tenable Security Center

23
Measuring Compliance with Tenable Security Center Joe Zurba | HUIT IT Security Presentation to FAS Security Liaisons May 23, 2013

description

Measuring Compliance with Tenable Security Center. Joe Zurba | HUIT IT Security Presentation to FAS Security Liaisons May 23, 2013. Agenda:. What is compliance and why is it important? What do we need to comply with? What can we measure? How is measurement accomplished? - PowerPoint PPT Presentation

Transcript of Measuring Compliance with Tenable Security Center

Page 1: Measuring Compliance with Tenable Security Center

Measuring Compliance with Tenable Security Center

Joe Zurba | HUIT IT Security Presentation to FAS Security Liaisons

May 23, 2013

Page 2: Measuring Compliance with Tenable Security Center

2

Agenda:

• What is compliance and why is it important?

• What do we need to comply with?

• What can we measure?

• How is measurement accomplished?

• What are the first steps?

• What are the next steps?

• Questions

Page 3: Measuring Compliance with Tenable Security Center

3

What is Compliance?

• com·pli·ance /kəmˈplīəns/Noun1. The action or fact of complying with a wish or command.

2. The state or fact of according with or meeting rules or standards.

Synonymsagreement - consent - accord - accordance - conformity

• Compliance means conforming to a rule, such as a specification, policy, standard or law.

Page 4: Measuring Compliance with Tenable Security Center

4

Why is Compliance Important?

• Compliance provides a baseline posture from which we can build more mature process and controls

• Compliance provides standards

• Compliance helps to lower risk

• Compliance helps to improve the quality of work

• Compliance helps to mitigate potential penalties

Page 5: Measuring Compliance with Tenable Security Center

5

What Do We Need To Comply With?

• Depending on where you are within Harvard, you may need to comply with one or several of the following policies/standards:

– HIPAA

– FERPA

– PCI

– Massachusetts 201 CMR 17

– Harvard Information Security Policy

– Harvard Research Data Security Policy

– Contractual Obligations

Page 6: Measuring Compliance with Tenable Security Center

6

What Can We Measure?

• Government Compliance– FISMA, NIST, DISA STIG, CERT

• Regulatory Compliance– HIPAA, Sarbanes-Oxley (SOX), FERPA

• Corporate (Institutional) Governance, Risk, and Compliance (GRC)

– Institutional Policy, PCI, ISO 27001

And…• Harvard Security Policy

Page 7: Measuring Compliance with Tenable Security Center

7

How Is Measurement Accomplished?

• Tenable Security Center Vulnerability Scanning– Used to measure systems for vulnerabilities in Operating Systems and

common applications

– Uses credentialed scans to unobtrusively log into systems to analyze patch status

• Tenable Security Center Compliance Scanning– Uses industry standard or custom audit files to measure system

configurations

– Uses credentialed scans to unobtrusively log into systems

Page 8: Measuring Compliance with Tenable Security Center

8

Audit Files

Page 9: Measuring Compliance with Tenable Security Center

9

Audit Files

Page 10: Measuring Compliance with Tenable Security Center

10

Audit Files

Page 11: Measuring Compliance with Tenable Security Center

11

Scan Policy

Page 12: Measuring Compliance with Tenable Security Center

12

Scan Policy

Page 13: Measuring Compliance with Tenable Security Center

13

Scan Policy

Page 14: Measuring Compliance with Tenable Security Center

14

Add a Compliance Scan

Page 15: Measuring Compliance with Tenable Security Center

15

Add a Compliance Scan

Page 16: Measuring Compliance with Tenable Security Center

16

Analyze The Results

Page 17: Measuring Compliance with Tenable Security Center

17

Analyze The Results

Page 18: Measuring Compliance with Tenable Security Center

18

Analyze The Results

Page 19: Measuring Compliance with Tenable Security Center

19

Analyze The Results

Page 20: Measuring Compliance with Tenable Security Center

20

What Are The First Steps?• Measuring systems that store or process HRCI (PII) against 10 points of

the HEISP:– Private IP addressing

– Host-based firewall

– Vulnerability Scanning and Patching program

– External logging (Splunk)

– Active, up-to-date Anti-Virus software

– Unique credentials, default passwords changed, shared accounts disabled

– Password length and complexity

– Brute force credential lock-outs

– Logging of successful and unsuccessful login attempts

Page 21: Measuring Compliance with Tenable Security Center

21

What Are The Next Steps?

• Establish a process for ongoing compliance scanning, reporting and remediation

• Expand the service offering to comply with other regulatory standards

– HIPAA

– PCI

• Define standard build audit files to scan for deviation

Page 22: Measuring Compliance with Tenable Security Center

22

Questions

Page 23: Measuring Compliance with Tenable Security Center

Joe Zurba | HUIT IT Security Presentation to Security Liaisons

May 23, 2013

Thank you.