Jared_Bird_NagiosWorldConference2012

advertisement
Nagios:
Providing Value Throughout
the Organization
JARED BIRD
JAREDBIRD@GMAIL.COM
TWITTER: @JAREDBIRD
Introduction
 Who is Jared Bird?
Nagios
Providing Value
 Provide knowledge
 Assist other departments
 Strengthen inter-department
relationships
 Achieve company wide goals
 Reduce costs
Understanding
 What are the goals of the
other departments?
Infrastructure
 Network, Server, and Desktop
Teams
 Concerns include:




Availability
Capacity
Utilization
Functioning Properly
Security
 Prevent data theft
 Deter identity theft
 Avoid legal issues
 Protect brand
 “CIA Triad”
 Confidentiality
 Integrity
 Availability
Threats
 Default configurations
 Website defacement
 Missing patches
 DNS redirection
 Unauthorized use
 Many, many more
Default Configurations
 Default passwords
 blank sa account
 Once password is set, monitor with new credentials
 XI Auto-discovery check for insecure protocols
 Scheduled scans and output to Nagios
Website
 Monitor for defacement
 check_http –H
www.yoursite.com –s
“sekret”

Checks for “sekret” string
 Check certificate
 check_http –H
www.mysite.com –C 21

Checks certificate for 21
days of validity
Software Installed
 Check url for content (version)
 Ex: http://www.adobe.com/software/flash/about/
 Check for string “11.4.102.265”
DNS
 Have DNS entries
changed?
 DNS hijacked
 High Impact
Unauthorized Use
 LDAP check for account creation
 Syslog output from infrastructure
 SNMP Alerts
Audit & Compliance
 PCI
 SOX
 HIPPA
 Almost every regulation*
* Note: Speaker will not be held responsible if Nagios does not help achieve
compliance with a specific regulation
PCI
 PCI DSS
 Any organization that
processes, stores, or
transmits credit card
data
 Requirements


12 overall requirements
287 individual requirements
PCI
 Reqs 1&2: Build and Maintain a Secure Network
 Auto-discovery to look for services
 Checks to verify that vendor defaults have been changed
 Reqs 3&4: Protect Cardholder Data
 Scan for insecure protocols
 Check for expiration of SSL certificates
 Reqs 5&6: Maintain a Vulnerability Management
Program

Check the anti-virus process to ensure it is running
PCI
 Reqs 7,8,& 9: Implement Strong Access Control
Measures


LDAP checks to ensure LDAP server is functioning
Web Transaction Monitoring can be used to check two factor
 Reqs 10&11: Regularly Monitor and Test Networks
 Check NTP
 Event logs from servers
 Req 12: Maintain an Information Security Program
 Use device listings as well as contact info (incident response
plan)
SOX
 Sarbanes-Oxley or Public Company Accounting
Reform and Investors Protection Act
 Section 404: Assessment of internal control
 Nagios can help management show that controls for
assuring the integrity of the financial reports are
effective.
HIPAA Headlines
HIPAA
 Technical Safeguards:
 Access Control
 Audit Control
 Integrity Controls
 Transmission Security
Questions?
Jared Bird
jaredbird@gmail.com
Twitter: @jaredbird
Thank You
Download