Why Vulnerability Assessment
Download
Report
Transcript Why Vulnerability Assessment
®
QualysGuard
Vulnerability Analysis – The
new Frontier of Security
by
Tom Clare
Director, Channel Marketing
Dataway Seminar
San Francisco, 26 June 2002
Securing Your Network
Agenda
Company Background/Team
Vulnerability Assessment
QualysGuard
-
Product Family
Internet Scanner
Live Demonstration
Product Enhancements
Q&A
Securing Your Network
Qualys Company Background
Single focus on Vulnerability Assessment
Highly Scalable Web Service Platform
Most Comprehensive Vulnerability Database – Daily Updates
Live since May 2000, run rate of 32,000+ scans per month
525+ customers growing at 25+ per month, includes:
Adobe, Apple, HP, Siebel, Agilent, Cartier, L’Oreal, Bank of the West,
First State Bank, Cincinnati Children’s Hospital, VeriSign, Web Power
Associates, Tower Records, Broadwing, BASF, Generali…
Founded in March 1999
90 Employees, 45 in R&D
Global offices in US, France, Germany and UK
$40M in funding
Trident Capital, Deutch Bank ABS Ventures, Mercury Interactive and
VeriSign
Headquartered in Redwood Shores,CA
Securing Your Network
Why Does This Happen?
Attack
Firewall
IDS
Anti-Virus
Securing Your Network
Why Vulnerability Assessment ?
“99% of intrusions result from
exploitation of known vulnerabilities
or configuration errors where
countermeasures were available”
Source: 2001 CERT, Carnegie Mellon University
“In 2001, more than 30 vulnerabilities
were discovered each week”
(compared to 5 vulnerabilities discovered per week in 1998)
Source: 2001 Forrester Research
Securing Your Network
The worm.sdsc.edu Project
Experiment: Attaching and monitoring a
“default installed” system on the Internet
After 8 hours first probe for rpc vulnerabilities
was detected
Within a few days over 20 exploit attempts
A few weeks later the system was completely
compromised and a network sniffer was
installed by an attacker
Securing Your Network
Vulnerability & Exploit Lifecycle
Early availability of detection
capabilities is key to prevent
intrusion and compromise
Vulnerability Scanners
adding detection signature
Widespread
Awareness
First
Discovery
Selective
Awareness
Advisory Release
Securing Your Network
Recent outbreaks of NIMDA
and Code Red could have
been prevented
Compromise is Costly
Compromised systems may not be immediately
identified
To fully recover a compromised system, it must
be taken offline
Downtime of critical servers
Time invested by administrators
To restore the integrity of the system it must be
validated
Forensics may take days to complete
Reinstall operating system and applications & all security
patches
Back-ups may contain altered data making it
useless during recovery activities
Securing Your Network
Frequency Shift
Automated worms, malicious code and multi-part
viruses are making “security through obscurity”
a bygone
Vulnerability Assessment offers the most value to
customers for today’s security threats
-
Closes open doors that viruses frequently enter
Verifies what firewall policy changes expose
Provides an inventory of affected systems for IDS alerts
Scans web site applications daily with latest VA tests
Detects unknown rogue systems on networks
Tools are evolving into online service
architectures, constantly updated and ready
Detection is shifting to prevention
Securing Your Network
Advancing VA
Topic
Freeware
Tools
Service
Updates
Provisioning
~monthly
Manual download
~monthly/weekly
Manual download
Daily (2-4 times)
Auto-update
Expertise to
use product
High
Medium
Low
~one week
~2-3 days
< 1 Hour
Difficult
Moderate
Easy
Scalability for
dist. & large
networks
Low
Low
High
Commitment
None
3-5 years
1 year
(both sides)
(perpetual purchase)
(annual subscription)
Learning
curve/start-up
Knowledge
transfer
Securing Your Network
QualysGuard Product Family
QualysGuard
Trial
System
Browser
Check
Automated
online trials
with partner
co-branding
FREE Internet
Explorer browser
checks for over
400M users of IE
Internet
Scanner
Firewall
Plug-in
Intranet
Enterprise
Scanner Report Server
True outside-in
VA tests &
remedies with
Network
mapping
Check Point
OPSEC
Integration to
scan visible
systems after
each firewall
policy change
LAN based
inside scanning
from self
updating
appliance
(Beta June 2002)
Internal report
server database
for large
networks
(Beta Q3)
Centralized Vulnerability Assessment knowledge base
leveraged for different users and locations,
updated multiple times per day
Securing Your Network
QualysGuard Internet Scanner
Distributed, Secure & Scalable Infrastucture
Distributed
Scanners
New
Vulnerabilities
APIs
APIs
Target
Servers
Internet
Data Base
Servers
Hacker
APIs
Web Application
Servers
QualysGuard
Data Center
Browser
Reports
Mgt
Console
Securing Your Network
Target
Servers
Distributed
Scanners
Inference Based
Vulnerability Scanning
Set Of Facts
Knowledge Base
Test
Test
New Facts
Test
Non-intrusive with no impact on
the availability or integrity of a
host being scanned
Modular, inference-based
scanning with over 100 specific
modules
Scans 300+ applications on 20+
platforms and operating
systems (commercial and open source)
Over 1700+ Internet vulnerability
tests, growing at 18-25+ per
week
Securing Your Network
Live Demonstration
- Network Mapping
- Vulnerability Scanning
- Detail Reporting
- Dynamic Reports
- CVE Database
- Configuration Options
- Account Maintenance
Securing Your Network
QualysGuard Features
Scalability, Reliability and Speed
Enterprise level scanning – Class C & B Networks
Comprehensive database of vulnerabilities with
aggregated signatures and patches
Graphical and Actionable Reporting
Network Discovery for Large Networks
90+% OS detection correctness
Minimizing false positives
Full set of extensible XML APIs to fully integrate
into the security process
Securing Your Network
Extending the Platform: Intranet Scanner
Distributed
Scanners
Intranet
Database
Servers
Customers
Servers
Interne
t
Firewall
Web Application
Servers
Intranet
Scanner
Browser
QualysGuard
Platform
Distributed
Scanners
Securing Your Network
QualysGuard for Check Point
Monitors firewall policy changes
Automatically scans updated firewalls
Analyzes results with previous assessment
Produces trend analysis results (+/-)
Results/Reports
Email with trend summary & URL report links
Firewall log entries including trend summary
Online Detail & Differential HTML reports
Securing Your Network
How it Works
QualysGuard for Check Point
Admin
GUI
Scan Engines
VPN-1/FireWall-1
Management Enforcement
Server
Point
4
1
Internet
1
Log
2
5
QualysGuard
Firewall Plug-In
1
FireWall-1
Admin
4
3
Firewall
Policy
Analysis
Qualys Platform
1 Firewall policy change
Email
2 Detect change & signal scan
Company Network
Remote Office Network
3 Scan & analyze results
4 Email & log summary results
OPSEC Integration into the
firewall policy change cycle
Securing Your Network
5 Online reports
Graphical HTML Reports
Report Type
Summary
Trend Analysis
Severity Scale,
Vulnerability Title,
First & Last Detected,
Duration (Lifespan)
Status (Active/Fixed)
Securing Your Network
OPSEC Integration
OPSEC Framework
Policy
Editor
OMI – Object Management Interface
Ability to read policy status information
ELA – Event Logging API
Ability to write log entries to firewall log
VPN-1
FireWall-1
VPN-1
FireWall-1
MGMT
Server
Policy
DB
OMI
Firewall
Log
VPN-1
FireWall-1
ELA
VPN-1 / FireWall-1
Securing Your Network
QG.conf
- Mgmt Server IP
Firewall
Plug-In
Windows NT/2000
Summary
Vulnerability Assessment offers the most value to
customers for today’s security threats
-
Closes open doors that viruses frequently enter
Verifies what firewall policy changes expose
Provides an inventory of affected systems for IDS alerts
Scans web site applications daily with latest VA tests
Detects rogue systems unknown to administrators
In 2001, 99% of incidents and exposures utilized a
known vulnerability where a counter measure
was available (CERT)
Tools are evolving into online service
architectures, constantly updated and ready
Detection is shifting to prevention
Securing Your Network
Q&A
[email protected]
www.qualys.com
Securing Your Network