Security Administration Tools and Practices Amit Bhan Usable Privacy and Security Agenda • • • • Security Administration Purpose of Security Tools Examples of Security Tools Security Incident Manager (SIM) – Security Monitoring • Cases from the Field • Problems with Security Administration • Improvements Security Administration? • is the process of maintaining a safe computing environment. • Purpose? Need? • Security Administrator • Responsibilities? Purpose of Security Tools • • • • • Combining text and visuals Reporting Monitoring Correlating Simplify the life of a Security Administrator Combining Text and Visuals • Size and complexity of networks • A System Administrator has a variety of responsibilities: install, configure, monitor, debug and patch • Visualization vs. Perl Scripts • VisFlowConnect-IP (who is connecting to whom on my network?) • Other tools (discuss later) Reporting • Many security tools have an in built capability for reporting • Why is reporting important? • Examples: – Nessus (vulnerability information) – SIM (security incidents information) Monitoring • Some security tools have live data feed for the network • Different types of monitoring – Network monitoring – Security event monitoring – Network Security Incident monitoring Correlation • Correlation integrates the key security factors that are critical in determining the potential for significant damage within an organization. These factors are: – Real time events from heterogeneous devices – Results of vulnerability scans and other sources of threat data – The value of the host, database or application to the organization. Life of a Security Administrator • According to the paper “Combining Text and Visual Interfaces for SecuritySystem Administration”, Security administrators are very conservative when it comes to technology adoption. • Why? Security Admin Tools • Mentioned in Text: – Bro – Nessus – Symantec Anti-virus – Tripwire – Rootkit – Sebek Bro • Bro (http://www.bro-ids.org/) is a NIDS. • Bro supports signature analysis, and in fact can read Snort signatures. (Snort is one of the most popular NIDS available.) • Bro also performs (a limited form of) anomaly detection, looking for activity that resembles an intrusion. Structure of Bro QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Nessus • Nessus is a free comprehensive vulnerability scanning software. • Its goal is to detect potential vulnerabilities on the tested systems Nessus Screenshot - 1 Nessus Screenshot - 1 Nessus Screenshot - 2 Nessus Screenshot - 2 Nessus Screenshot - 3 Nessus - Screenshot 3 Other tools • Security Incident Management System – ArcSight – Novell e-Security Sentinel • Network Incident Management System – Whatsup Gold – IBM Tivoli ArcSight • Large Enterprises and Governments infrastructures are growing increasingly dynamic and complex • ArcSight ESM is an event management tool • Different capabilities: filters, correlation, reporting, threat monitor, vulnerability knowledge base, asset information, risk management, zones, etc. Architecture - ArcSight ESM • SmartAgents (residing on remote systems or on a separate layer) • Devices or Remote Systems (Firewalls, IDSs etc.) • Correlation engine • Central database • ArcSight Manager (console/browser) Testing ArcSight • Real strength - analyzing huge volumes at data • When tested at an ISP that provided managed services to many corporate clients, generating millions of events a day (stress test), ArcSight had no hiccups. • Biggest advantage: Scaling ArcSight screenshot 1 ArcSight screenshot 2 ArcSight screenshot 3 e-Security Sentinel • Competitor of ArcSight, Network Intelligence, Symantec Security Information Manager • Event collector • Analyses and correlates events to determine if an event violates a predetermined condition or acceptable threshold. • Control Center & Correlation Engine • Unlike Arcsight, e-Security Sentinel has an iScale Message Bus that is based on the Sonic JMS* bus architecture. – Highly scalable – Doesn’t rely on a relational database E-Sentinel Screenshot 1 QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. E-Security Screenshot 2 QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Cases from the Field • Security Checkup – Latest fixes/patches – Use of IDS + regular scanning of network – Security Engineers need to be well informed (discussions on forums) Case 1 - virus/worm/spyware on the network Case 2 - false alarms Case 3 - Real time network security monitoring Case 4 - Security Scans Problems with Security Administration • Integration is required – From firewalls to IDSs to Websense to vulnerability information to KB • Challenges – Too much to look at – No single standard data format – Out of sync system clocks • Correlation becomes difficult Problems cont. • Information asymmetry – Use of manual tools (location, address books, information directories) • Process is slow because of very little integration – A problem in times of actual attacks • Critical factor - “Time” • New vulnerabilities - proactive work pays • Administrator motto - “Know Thy Network” Improvements • New tools to help security administrators need to be developed – Standardization of event formats for easier integration – Application of data mining in event classification, analysis and noise reduction – Automated event stream processing – Improved information management tools Questions ? ? ? ? ? ? ? ? ? ?