0% found this document useful (0 votes)
102 views21 pages

02 Security

sec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views21 pages

02 Security

sec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Risk Mitigation Requires

Remediation at Scale
Eric Anderson
Chief Architect DSO
Cyber Security – Two different worlds

Vulnerability Management Cloud Security & Governance


• Traditional scanning of VMs or • Ignorance - Misconfigured cloud
systems services

• Zero Days, CVE’s identified, • Education, time to value, rapid


Patch Management pace of change

“We just can’t keep up with the “We didn’t realize this was an
volume of vulnerabilities found” issue … until now.”

© Copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only


VULNERABILITY
MANAGEMENT
View of the Customer
Vulnerability Reactive Cybersecurity Skills
Management is Critical Not Proactive Shortage

58% 60% 51%


Reported a data Focus on response, Cybersecurity
breach last year not prevention skill shortage is
problematic

© Copyright 2018 BMC Software, Inc.


Current Situation:
Unrelenting pressure to patch vulnerabilities

Vulnerabilities
Common by Year
Vulnerabilities and Exposures
Average number of days to
16000
14000
(CVEs) by Year
84 patch vulnerabilities
12000 14,712
10000
8000
Median days to first exploit
6000
4000
5,297
7,946
6,480 6,447 30 of a known vulnerability
3,392
2000
2013 2014 2015 2016 2017 2018
0
(MAR)
2001 CVEdetails.com
Source: 2004 2010 2014 2017
Of exploited vulnerabilities
Nearly 15K CVEs in 2017 and on 99% will be known by Security and
pace to surpass that in 2018 IT for over 1 year - Gartner
Security vs Ops
“Problem” Security - Find vulnerabilities
- Prevent Intrusion

Qualys
Rapid 7
Tenable

Operations – Fix vulnerabilities

Patch
Configure

50,000 vs 5,000
What/Who/When/How?
CURRENT STATE: VULNERABILITY MANAGEMENT
PROCESS IT Typical Vulnerability Mgmt. Process Highlights
Security Operations
Weekly / Scanners do weekly or monthly scans but might not pick up all resources, leading to
Monthly Vuln.
scanners blind spots.

Scan results
Ops receives, May contain thousands of lines of data with no more context than IP address and
analyzes and vulnerability. Manual analysis can take weeks.
sent Ops
plans work

Change
ticket Manual tickets can take 30 minutes to open, including all documentation required.
SecOps Gap

opened

CAB
approval due CAB approvals can involve tens of people spending hours discussing and approving
to risk

Remediation Matching remediation tasks to vulnerabilities can be onerous. WannaCry had over
analysis and
planning
40 patch variants based on OS. Companies can have hundreds of maintenance
windows.
Remediation May include configuration changes or patches. Application owners might delay or
Execution control execution.

Rescan for Change By the time the remediation cycle is complete, new scan data might be arriving that
verification ticket closed include remediations already in process.

Security step Semi-Automated step


Ops step Manual step © Copyright 2018 BMC Software, Inc.
REQUIRED CAPABILITIES

Multi-Tier Remediation
Vulnerability Management
Automated Remediation
Automated Discovery The ability to automatically remediate
The ability to automatically discover vulnerable devices or cloud services across
infrastructure, applications and dependencies Servers and Network and multi-cloud
within an ecosystem without needing agents

Integrated Vulnerability Assessment Operational Context


The ability to integrate data from3rd party The ability to incorporate business
vulnerability scanners with other business context and maintenance windows into
contextual data to identify business risk remediation planning and execution

Real-Time Visualization
The ability for security and operations REQUIRED
CAPABILITIES
teams to visually assess the ecosystem
for vulnerabilities and non-compliance
Configuration Compliance
Continuous Policy Based Compliance
Vulnerability Lifecycle Management The ability to continuously assess and
The ability to track the status of identified report upon network or server
vulnerabilities through the remediation to compliance automatically through use of
ensure compliance with governance processes defined standards and policies
Automation At Scale
Public Cloud Private Cloud

Change – Closed Loop Patch


Catalog

Enrichment – Operational Intelligence

Discovery – Blind Spot Analysis Scan Patch


Maturity

Change
Mgmt
TS Server
Multi Tiered – Synergies Automation TS Orch
Change
Mgmt
Schedule
TS Vuln Mgmt
SecOps – Align Security and Ops Patch

Remedy
Vulnerabilities
Enrichment

Remediation – Increase Velocity


Discovery

Scanning – Understand Vulnerability Security


Tracking
Prioritization
TrueSight Vulnerability Management
Identify blind spots to ensure that
all systems are being analyzed

Combine security and operations


data for more accurate and
actionable analysis

Prioritize and fix the most critical


flaws first

© Copyright 2018 BMC Software, Inc.


TrueSight Server Automation
Provisioning
– Bare metal, virtual
Configuration Management
– Remote administration
– Access Management
– Snapshot/Audit/Live Browse
– File and Software deploy
Security and Regulatory Compliance TrueSight

– PCI/DISA/CIS/SOX/HIPPA
– Open Standard – SCAP1.2
– Vulnerability management
Patching
– Scan & Patch Deployment
Analytics and Dashboard
© Copyright 2014 BMC Software, Inc. Internal Use Only 11
TrueSight Network Automation
Vulnerability Remediation: Combine with TrueSight Vulnerability Out of In Band
Management for an unprecedented visibility and remediation Band Change
planning. Out-of-box content for Cisco® security advisories. Change
Router VPN
Compliance: Use the compliance engine to apply standards for
regulatory and security rules such as SOX, PCI-DSS, HIPAA, NIST,
DISA, and CIS.

Configuration: Implement a policy-based approach to configure Network


or change network devices with templates based on best Switch Firewall
practices to simplify administration and ongoing maintenance.

OS Image Management: Manage OS images with built-in OS


image library and deploy actions. Content Load
Switch Balancer

Wireless
Administration: Fine-grained RBAC, engineering and executive
reporting, heterogeneous management,

© Copyright 2018 BMC Software, Inc.


Strategic Direction – Vulnerability Management

Current 2019
TS Vulnerability Management Patch Orchestration Self Service Patching
 Fix SecOps Gap • Orchestrate Patches • Service based Risk
 Increased visibility • Dev/QA/Prod lifecycle Scoring
 Operational Intelligence • Automate for • Self-Service Remediation
 Automate for velocity complexity • Lifecycle aware
CLOUD
GOVERNANCE
AND SECURITY

© Copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only


© Copyright 2017 BMC Software, Inc. 14
*Through 2020, 95 percent of cloud security failures will
be the customer’s fault. “Gartner Predicts 2016 and Beyond”: Cloud Security”

Massive Verizon data breach exposes 14 million user records due to


an unsecured S3 bucket

60,000 sensitive DOD files left on publicly accessible AWS Service

Dow Jones became the latest organization affected by an AWS


cloud data leakage due to misconfiguration and user error

Time Warner Hacked – AWS Config exposes 4 Million subscribers’ data

Bitcoin miners hacked Tesla’s AWS and GCP Kubernetes clusters

© Copyright 2017 BMC Software, Inc. 15


AWS Account

IAM

IAM
Lambda Lambda Lambda

IAM

RDS
Elastic Search
Your Policies
IAM

Glacier S3

© Copyright 2017 BMC Software, Inc. 16


AWS Account
AWS Pre-Prod

AWS Quality

Your Policies
AWS Development

© Copyright 2017 BMC Software, Inc. 17


AWS
AWS Azure
AWS Azure Softlayer
AWS Azure GCP Softlayer

VMWare
VMWare Hyper-V

© Copyright 2017 BMC Software, Inc. 18


BMC Truesight Cloud Security – Core
Capabilities
 SaaS Delivery: Get started quickly, rapid time-to-value

 Cloud and On-Premise Connectors: Multiple feeds, single dashboard

 OOTB Connectors/Policies: Easily extended or customized as code

 Continuous or On-Demand Scans: Monitor resources as needed

 Auto Remediation: Fix non-compliant cloud resources in one step

 Secure #MultiCloud Resources: EC2, S3 buckets, ElasticSearch, etc

 Secure Containers: Kubernetes, Docker Host, daemon and images

 Secure Applications: Embed compliance in DevOps processes

 RESTful API: Utilize service from scripts or applications

© Copyright 2017 BMC Software, Inc.


© Copyright 2017 BMC Software, Inc. 19
Strategic Direction – Cloud Management Services

Cloud Management Platform


KEY VALUE CASES
Cloud Security Cloud Cost Optimization Guard Rails Automation Cloud Performance
(Today) (Dec 2018) (2018) & Orchestration

Cloud Platform Services


User & Tenant
UI Portal Policy Engine Remediation Cloud Compliance
Management
& Actions Connectors

CLOUD NATIVE APPLICATIONS | AWS | AZURE | GCP | CONTAINERS | KUBERNETES

© Copyright 2017 BMC Software, Inc. 21


© Copyright 2017 BMC Software, Inc.

You might also like