View
1.357
Download
6
Category
Tags:
Preview:
DESCRIPTION
Citation preview
Measuring SecuritySecurity Metrics for PCI DSS Compliance
Sergey Gordeychik
Security Lab by Positive Technologies
What is PCI DSS?
QSA audits?
ASV scans?
Pentests?
Web applications security assessment?
What is PCI DSS?
Building up the process of maintaining IS in secure (and compliant) condition!•The process of monitoring and audit (ISO 27001 A.15.2…)
QSA audits?ASV scans?Pentests?Web applications security assessment?
What is PCI DSS?
Building up the process of maintaining IS in secure (and compliant) condition!•The process of monitoring and audit (ISO 27001 A.15.2…)
QSA audits?ASV scans?Pentests?Web applications security assessment?
Black-and-white approach
Technical orientation of PCI provokes auditors into black-and- white (red-and-yellow) resultNot in compliance!In compliance!
Reality is much more complicated…
Example: Updating Oracle
Auditor: There are some problems with Oracle
Company:Consultation with developersWaiting for approvalTestingDeployment
Example: Updating Oracle. What to do?!!
Speed up the process?
Update at one’s own risk?
Restrict access to firewall?
Migrate the application to terminal?
Implement customized IPS?
What is good and what is bad?
How to measure the current level of compliance in nonbinary format?
How to divide the process of compliance maintenance into measurable tasks?
How to assess planned and current expenses?
Security metrics
Explicitly measured, no "expert opinion"
Available for calculations and analysis (automatically, if possible)
Rendered quantitatively (not just "high", "medium", "low")
Measured in units that fit for analysis (such as "errors", "hours", "cost")
Comprehensible and pointing to the problem area and possible solutions (the "So what?" test)
Compliance
With respect to requirements
Compliance
With respect to hosts
Compliance
With respect to hosts and requirements
Compliance
How many PCI requirements do we violate?
What violations are the most common?
What issues should be addressed in the first place?
Good, but not enough!
Allows you to trace a course of action
Allows you to observe the dynamics
Unable to provide a comprehensible engineering estimate!
Labor input metrics
Allow you to assess planned and current labor input in achieving the goal• Labor input in making the system match the
compliance• Justification of chosen compensatory security
measures•Assessment of spent resources
Differentiation of types of modifications•Patch installation•Version update•Configuration modification•Code change…
Labor input metrics
Process metrics
Are generated on the basis of Compliance and the derivatives•Quantity and percentage of workstations with anti-
virus software installed•Quantity and percentage of hosts that comply with
patch-management requirements•Quantity and percentage of DBMS servers that
comply with password requirements•Quantity and percentage of network devices that
comply with security requirements
Process metrics
Example with Oracle•Convergence on hosts: from 20 days to eternity
•Maximum compliance level: 23%
Perhaps it’s better not to think of installation of Oracle patches at all?
Comparison with the world level
What about others?
Is my level acceptable?
Perhaps I needn’t do anything?
Web applications vulnerability research, 2008.
Scope of research:•Automatic mode – approximately 10000 hosts•Detailed analysis – approximately 1000 hosts
Results:•Most websites security level is low•Detection of vulnerabilities and their exploitation
methods is automated
Web Application Security Consortium preliminary data
Distribution of websites according to the amount of detected vulnerabilities (the year 2008)
The most common vulnerabilities
To compromise a website attackers usually exploit…
Analysis of a compromised website exposes a pack of vulnerabilities, one third of which could be exploited by an attacker
How soon can these issues be solved?
Whitehat Security
Thank you for your attention!
Sergey Gordeychikhttp://gordeys.blogspot.com www.ptsecurity.comgordey@ptsecurity.com
Recommended