Simplifying Virtualization and Cloud Management

Download Report

Transcript Simplifying Virtualization and Cloud Management

Protecting and Auditing
Windows Networks
Adrian DUMITRESCU
Senior Technical Consultant | Q-East Software
www.quest.com
© 2010 Quest Software, Inc. ALL RIGHTS RESERVED
Why Protect and Audit Active Directory
 Active Directory is the core of enterprise IT; for this reason,
comprehensive protection and auditing of AD changes is critical
 Key components for protection and auditing of Active Directory
 Third-party systems integration (Identity and Access
Management)
 Change tracking (real-time monitoring, reporting, secure audit
trail, security event management and correlation)
2
Third-party Systems Integration (IAM)
3
What is IAM?
People
Resources
Permanent
employees
Contractors
Temporary
employees
Partners
Customers
Suppliers
File data
Car/phone/PC
Door access
Software
Installs
Application
access
Projects
ACCESS
ACCESS
ACCESS
4
The Seven IAM Projects
Directory Consolidation
Directory Content Management
& Provisioning
Password Management
Single Sign On
Strong Authentication
Privileged Account Management
Audit & Compliance
5
Directory Consolidation
6
So, you’ve got AD
Auth.
Roles
Policy
Access
7
Add some UNIX and Linux
Auth.
Auth.
Auth.
Roles
Roles
Roles
Policy
Policy
Policy
Access
Access
Access
8
Mix in Macintosh and Java apps
Auth.
Auth.
Auth.
Auth.
Auth.
Roles
Roles
Roles
Roles
Roles
Policy
Policy
Policy
Policy
Policy
Access
Access
Access
Access
Access
9
Sprinkle in SAP and Databases
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Roles
Roles
Roles
Roles
Roles
Roles
Roles
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Access
Access
Access
Access
Access
Access
Access
10
Finish with Mainframes and cloud
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Auth.
Roles
Roles
Roles
Roles
Roles
Roles
Roles
Roles
Roles
Roles
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Access
Access
Access
Access
Access
Access
Access
Access
Access
Access
11
Integrate where you can
Auth.
Auth.
Auth.
Auth.
Roles
Roles
Roles
Roles
Policy
Policy
Policy
Policy
Access
Access
Access
Access
12
But what about the others? …
Auth.
Auth.
Auth.
Auth.
Roles
Roles
Roles
Roles
Policy
Policy
Policy
Policy
Access
Access
Access
Access
13
Directory Content Management
& Provisioning
14
Password Management
15
Single Sign On
16
Strong Authentication
17
Privileged Account Management
18
Audit & Compliance
•
•
•
•
Everything audited
Actionable items
OOTB reporting
Plug-in Solution
19
The “strategic” approach
• Platform agnostic – meta-directory
approach
• Business tool for use by business people
• Supplying business intelligence such as …
–
–
–
–
–
–
Who works for me?
What do they do?
What can they see?
What do they have?
What have they done?
How much do they cost?
20
Web IT-Shop – Built for the “business”
21
Self-service Shopping Cart
22
Attestation
23
What Does This Mean For You?
• Identity and Access Management means different things to
different people.
• It requires different approaches based on YOUR customer’s
needs
– Help your customers with “tactical” solutions to their IT problems.
– Put them on a trusted path to grow with the Quest One Identity
Management Solution.
– Provide their business with a “strategic” IAM solution for their business
problem.
– Extend this with the “tactical” tools to provide unparalleled, complete,
coverage.
• Developing tools and solutions for your customer’s needs today,
and also for the future.
24
Informatii
Active Directory
Servere, Statii si alte
Echipamente
Aplicatii
Server de fisiere
Baze de date
Manageri
Auditori
Ofiteri de Securitate
Administratori
Compliance Lifecycle
SOX, FISMA, ITIL
Alertare Real-Time
25
Change Tracking
 AD change tracking can be implemented using a uniform process
that works no matter what type of object is changed
 The key elements to any AD change event should include the:







Time of change
Object modified
User that modified the object
Operation performed
Propertied modified and their values before and after the change
Domain controller where the change was made
IP address of the workstation or client machine from which the change
originated
26
Providing Comprehensive Audit and
Protection for Active Directory
27
Integrated Audit and Compliance
Gathering Correlation
Reporting
IT
Management
“Powered by Quest InTrust©”
28
The solution must cover the entire infrastructure
1. All operating system in the enterprise
2. AD and integrated platforms
3. Messaging systems
4. Database platforms
5. Web servers and enterprise applications
6. Hardware and software firewall infrastructures
7. Network equipments and workstations
29
A unified console for all audit requirements
30
Built-in compliance
with audit standards
 Structured reports
 “Out-of-the-box” compliance
31
Covering the entire IAM environment
Identity Management
and ODBC compliant
systems tracking
reports
32
Covering the entire IAM environment
Custom applications
reports
33
Agregated reports
34
To address additional change audit requirements
1. Extended audit for Active Directory and AD LDS
Tracking the entire AD activity: who, what, where, when and
how produced the change, plus changed value before and
after the change
2. Extended audit for Microsoft Exchange
Tracking the entire Exchange activity: non-owner access,
configuration and permissions changes for mail servers and
mailboxes
3. Extended audit for File Access
Tracking user and administrator activity on folders, files and
shared resources, without the need to activate native audit
35
Native Audit Limitations
 Audit events are not centralized
 There is no support for analysis and reporting
 High volumes of audit data
 Performance risks
 Missing or limited information
 There is no real-time monitoring engine
 There is no protection against privileged administrators
36
Criptic data in Windows access events
 Who is “Logon ID 0x3e7”?
 Which file was accessed?
 What action was performed
on the file?
 What other actions performed
that Logon ID?
Conclusion:
Although event logs exist and follow everything happening inside the file system, they
cannot be used for internal or external security requirements
37
Providing Unified Security over Boundary
Enterprise
Security
Detect / Monitor / Enforce

Detection:
• NIDS, WIDS, HIDS
• Vulnerability Scanning
• Anomaly

Monitoring:
• Network Profiling
• Availability
• Inventoryy

Enforcement:
• NAC, IPS, DLP

Enterprise Security
• Correlation
• Risk Assessment
• IDM
• Reporting
• Dashboard
• Compliance

Log Management
• Unlimited Storage
• Legal Evidence
38
Boundary Audit and Compliance
 SIEM appliances provides real-time analysis of security alerts
generated by network hardware and applications
 SIEM appliances are a valuable asset for monitoring boundaries
against attacks and intrusions
 Integrating AD/IAM audit and compliance capabilities with SIEM
adds to overall protection against threats:
 Real-time analysis, risk measurement and correlation of boundary
threat evidences
 Situational intelligence for intrusion attempts (cross correlation,
contextual analysis
 Extended detection of threats (IDS, vulnerability scanning, HIDS)
39
Integration with SIEM architectures
– SIEM appliances process data and produce Intelligence
– Sensor appliances collect and produce data
– Logger appliances forensically store data
40
Multi Dimensional Threat Identification
 A complete analysis of a threat must include all available
information defining the context of the attack!
• Integrated capture,
normalization and
correlation of events for
deep security analysis
Threats
Vulnerabilities
Inventory
!
Alerts
Network
41
42