61
Guardium Tech Talk: 10.1.3 Overview - Speed compliance and simplify deployments August 24, 2017 Kathy Zeidenstein Guardium Evangelist and Community Advocate Joann Ruvolo Senior Manager and UI Technical Lead, IBM Security Guardium https://w3-connections.ibm.com/blogs/30f982c3-616f-4b5b-9978- 3b711e1fda79/entry/2017july19?lang=en_us

Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

  • Upload
    others

  • View
    37

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Guardium Tech Talk:10.1.3 Overview - Speed compliance and simplify deployments

August 24, 2017

Kathy ZeidensteinGuardium Evangelist and Community Advocate

Joann RuvoloSenior Manager and UI Technical Lead, IBM Security Guardium

https://w3-connections.ibm.com/blogs/30f982c3-616f-4b5b-9978-

3b711e1fda79/entry/2017july19?lang=en_us

Page 2: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

2 IBM Security

Title: TBA (It’s a surprise!)Date: Tuesday, October 3rd, 2017

Time: 11:00 EDT, 8:00 AM PDT (60 minutes)

Speakers: TBA

Register: TBA

Mark Your Calendars for the Next Tech Talk

Page 3: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

3 IBM Security

Guardium community on developerWorks

bit.ly/guardwiki Right

nav

Page 4: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

z/OS S-TAP Overview

Page 5: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

5 IBM Security

What’s New in V10.1.3 for z/OS Highlights (Tech talk tentatively November, 2017)

• Additional real time data protection option for Db2 – option to block SQL

from specific users to specific tables

• Enhanced event collection and reporting

Data Sets: More detailed member- level event reporting for PDS/PDSE data sets

(replace, copy, delete, etc), report on FTP events through z/OS Unix System

Services

IMS: High availability large database (HALDB) name reporting, filter on trusted

LTERMs and filter by region type beyond BMP

All three S-TAPs:

• Audit CICS Unit of Work ID for correlation of events across subsystems

• Data privacy: Server side control to avoid sending PII to the collector

• Enhance operations and diagnostics – all three S-TAPs

• Ease diagnostics gathering across roles- MUST GATHER can be instigated

from the collector or from the mainframe side

• Simulation mode to test the S-TAP without sending audit records to the

appliance

• z/OS S-TAPS now visible on the Deployment Health Topology in Guardium UI

Page 6: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

6 IBM Security

Db2 for z/OS STAP Enhancements –Real-time blocking

Real• -time data protection for Db2 – option to block SQL from specific users to specific tables

Real -time, as this happens at the S-TAP level and does not require a verdict from the collector (contrast with

STAP TERMINATE)

Uses new access policy rule database type: DB 2 z/OS BLOCKING PROFILE

Authorized applicationAttackers,

vendors, insiders

Page 7: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

7 IBM Security

Db2 for z/OS S-TAP Enhancements

• Enhanced event collection and reporting

Improved auditability to enterprise standards

• Collect Bind and rebind events similar to other events. Not subject to filtering!

• Indicator of whether an event is Dynamic or Static (when LOG FULL DETAILS is used)

Audit CICS Unit of Work ID for correlation of events across subsystems

• Performance and filtering

Db2 objects moved to Stage 1 filtering and other memory management enhancements

Expected to improve event throughput and lower CPU overhead resulting in improved tolerance for heavy SQL Event volumes

Internal lab results show significant decrease in both Db2 Class 2 and address space CPU usage of S-TAP V10.1.3 versus S-TAP V10.0

Important: Your mileage will vary!!! The improvement in CPU will vary under different workloads and environments

• Enhance operations and diagnostics

• Simulation mode to test the S-TAP without sending audit records to the appliance

• z/OS S-TAPS now visible on the Deployment Health Topology in the Guardium UI

Page 8: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

8 IBM Security

z/OS S-TAPs now visible in Deployment Health Topology• All managed units and CM must be at 10.1.3 – S-TAP can be back level

Page 9: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Guardium DAM and VA Overview

Page 10: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

10 IBM Security

Guardium 10.1.3 (GPU 230) - summary

• Quick start deployment (agent and compliance monitoring)

• VA improvements

VA for Cloudera

Mongo 3.4 support and latest mongo CIS benchmark tests

DB2 LUW CIS benchmark

Support for SQL Server on Linux and improved SQL server

• Agent enhancements

Improved discovery processing (better for Oracle RAC)

A-TAP improvements to support scripting

Threading improvements to reduce slowdown on db servers and better support enterprise load balancing

Teradata exit – (Teradata 16.10+) – see release notes for details.

SLES 12 S390x

• Limited use license of Privileged Identity Manager

• Cloud images offerings

• Classification privilege script

• ISO image available on PPA

Page 11: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

11 IBM Security

VA Enhancements

• New Cloudera Hadoop VA tests (first in the industry)

Over 100 tests including CVEs, security configs, roles, OS file permissions Hive and Impala privilege

tests, configurations for HDFS, Sentry, Hive etc. .

2 datasources – Hive and Cloudera Manager

Datasource authentication support:

• Cloudera Manager - Native and LDAP authentication with SSL

• Hive – no-auth and LDAP/SSL, Kerberos

• CAS-based tests: SSL and Kerberos

Page 12: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

12 IBM Security

VA Enhancements

SQL Server•Usability for SQL Server: CVE Tests recognize fixes in all service packsSupport for SQL Server on Linux (SQL Server 2017) (currently in preview)

New tests for MongoDB with the latest benchmarks •VA coverage for CIS_MongoDB_Benchmark_v 1.0.0.pdf benchmark. https://www.cisecurity.org/benchmark/mongodb/MongoDB 3.4 supportLDAP/SSL connection ( 10.1.2)Kerberos connection ( 10.1.3)

Latest CIS Db• 2 LUW benchmarksVA coverage for CIS_IBM_DB 2_10_Benchmark_v1.1.0.pdf latest benchmark.

https://www.cisecurity.org/benchmark/ibm_db• 2/There are 10 new tests, plus 2 test enhancements. Now over 260 tests for Db2 LUW.New tests required additional privileges for VA.• /var/log/guard/gdmmonitor_scripts/gdmmonitor-db2.sql

Page 13: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

13 IBM Security

Kerberos authentication

• Setup>Tools and Views>Kerberos

Configurations

• Datasource builder

For more information:

https://www.ibm.com/support/knowledgecenter/SSMP

HH_10.1.0/com.ibm.guardium.doc/discover/kerberos_

configuration.html

Page 14: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

14 IBM Security

Limited Use License of IBM Privileged Identity Manager

What is PIM? A brokerage of privileged shared IDs

Value of the integration with Guardium:

• Leverage richer user information for forensic analysis of privileged user access to data

• Identify who was using the shared ID at the time of an incident

What do you get?

Only for use with Guardium•

For each collector up to • 50 authorized users

mapped to shared IDs in PIM

Try it:

https://www.ibm.com/developerwork

s/library/se-manage-audit-privileged-

users-pim-guardium/index.html

Page 15: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

15 IBM Security

Enterprise Load Balancing enhancement to support failover groups

• Benefits Provides additional controls over load distribution by enabling use of failover groups. (Currently, failover

only happens within an MU group)

Separate collector pools for primary and failover use cases.

Automatic relocation of S-TAPs from failover to primary collectors once primary collector is active again.

• This feature requires only CM to be upgraded to 10.1.3 (no S-TAP changes are required)

Page 16: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

16 IBM Security

Recommended procedure

1. On the CM, create groups of collectors you want to use as Primary and groups of collectors

you want to use for Failover (Manage>Central Management>Managed Unit

Groups)

2. On the CM, create S-TAP groups using the Group Builder UI or from here: Manage>Central

Management>Enterprise Load Balance>Associate S-TAPs and Managed Units (click on

the plus icon)

3. Associate groups of S-TAPs to Primary Groups (Manage>Central Management>Enterprise

Load Balance>Associate S-TAPs and Managed Units)

4. Then assign Primary Groups to failover groups in the same UI.

5. Enable the ‘Failover Groups’ support (Manage>Central Management>Enterprise Load

Balance>Enterprise Load Balance Properties )

6. Install a new S-TAP (or restart an existing one) ELB will allocate collector(s) from the Primary collector groups associated with this S-TAP

If ELB can’t find collector(s) from the Primary group (e.g. All loaded or not available), It will allocate collector(s) from the failover

group(s) associated with that S-TAP.

Periodically(and if ENABLE_RELOCATION is enabled) ELB will look for S-TAPs currently assigned to collectors from Failover

groups and relocate them to vacant collector(s) from a Primary group.

Page 17: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

17 IBM Security

Enable enterprise load balancing with failover walkthrough

1. Create managed unit groups

2. Create S-TAP groups

Page 18: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

18 IBM Security

Enable enterprise load balancing with failover, continued.

3 and 4. Associate S-TAPs to primary group. Then optionally to failover group.

5. Enable failover groups

Page 19: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

19 IBM Security

UNIX S-TAP Discovery Improvements

Guardium, with auto-discovery enabled, enables S-TAP to discover

running instances on that server, including the information that

you need to automatically populate the inspection engine

definitions.

Now uses more reliable methods of determining DB

configuration Better handling of zones

Rewritten with Oracle RAC in mind Success! 10.1.2 Unix S-TAP Discovery failed to generate inspection

engines for an Oracle Exadata (cloud RAC) instance. We had

customer try 10.1.3 Unix S-TAP Discovery and it successfully

generated the inspection engines for the Exadata instance.

Page 20: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

20 IBM Security

A-TAP Changes

A-TAP provides the functionality to intercept traffic after it is decrypted. A-

TAP also provides interception for shared memory, depending on database

and platform. Activated/deactivated using guardctl utility.

Scripting around guardctl can hide unfamiliar Guardium concepts from the DBAs

Changes in 10.1.3 to support scripting much better:

Well-defined error codes representing unique problem states

Eliminates the need to process the text output to determine corrective action

https://www.ibm.com/support/knowledgecenter/SSMPHH_10.1.0/com.ibm.guard

ium.doc.stap/stap/atap_guardctl_reference_return_codes.html

New options to avoid printing to stdout (-q),and to print name/value pairs and return

value of command (-v)

-qv together allows a wrapper script to use guardctl as a utility interface to A-

TAP and provide its own user experience

Repair option automates the manual steps required when a bad thing happens:

The database was upgraded while A-TAP was active (don’t do this).

guardctl ….. --db-instance=<name> repair

Page 21: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

21 IBM Security

Example of output

Page 22: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

22 IBM Security

IBM Guardium

Multi-Cloud

Data Protection

Data Protection

Encryption

Key Management

Ready for Cloud - Discover, monitor and protect data in cloud and hybrid environments

• Guardium has ready to use and easily

shareable VMs for all major cloud

vendors

IBM, AWS, Azure, Google, Oracle

(soon)

• New Licensing exclusively for Cloud-

based Appliances on Major Cloud

Platforms

Deployment guides: http://www-

01.ibm.com/support/docview.wss?uid=s

wg27049576

Hardware Requirements for Appliances:

http://www-

01.ibm.com/support/docview.wss?uid=s

wg27047802

See previous tech talk with live demo:

http://ibm.biz/GuardMCDP

Protect cloud environments

GuardiumMulti-Cloud

Data Protection

On-Prem

Page 23: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

23 IBM Security

Classification privilege scripts

In 10.1.3, use the same scripts for both entitlement reporting and Vulnerability

Assessment tests since the entitlements script is no longer being updated.

New in 10.1.3 is a new set of scripts for classification (sensitive data finder).

Important: Each DBMS script has very specific instructions in the script

header that must be followed.

1. From the CLI, run the following command:

fileserver <your desktop IP> 3600

2. Then go to a browser and enter the URL for the type of scripts you want to

upload and choose the file that matches your database type.

Vulnerability Assessment and Entitlements:

http://<appliance ip>/log/debug-logs/gdmmonitor_scripts/

Classification:

http://<appliance ip>/log/debug-logs/classification_role/

Page 24: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

24 IBM Security

• High level upgrade roadmap options: http://www-01.ibm.com/support/docview.wss?uid=swg21961114

• There is no direct upgrade from 8.2 to V10.1.3 (GPU 230). You must go through V9!

• Or, use the V10.1.3 ISO and rebuild/restore (take advantage of larger root partition (25GB) and new file format (EXT4)

• The upgrade process usually cannot be done simultaneously on all appliances and all S-TAPs. Therefore it requires multi-staged upgrade approach.

• During transition period, Guardium environment will operate in hybrid mode with Version 9.5 and Version 10.1.3 Guardium software (Mixed environment).

• Upgrade IBM Guardium environment in top-down order

• Upgrade of large enterprise environments requires thorough planning and preparation.

Upgrade strategy and logistics

Scope (be conservative)

Change control management

Required personnel availability

Contingency planning

Enterprise Upgrade Strategy (tech talk tentatively October 24th)

Page 25: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Quick Start Agent Deployment

Page 26: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

26 IBM Security

When can I use Quick Start agent deployment?

The purpose of Quick Start agent deployment is to automate S-TAP

installation. It uses existing capabilities such as GIM listener. It is not

intended for highly customized environments. Consider this feature

when:

• You use GIM agents in listener mode on the database servers

• You are not using database encryption or other capabilities that

require A-TAP or exits.

• The default GIM parameters meet your requirements.

Page 27: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

27 IBM Security

Deploying S-TAP on DB server - Comparison

1.Upload modules

2.GIM Auto-detect

3.Remote Activation

4.Setup-by Client or Setup-by

Modules

• Manual selection of clients and

modules

• Scroll through a overwhelming list of

parameters

5.Track the status of installed modules

by “GIM Client Status” report

Automatic flow:

1. Upload modules

2. Discover and Deploy Agents

Interactive flow:

1. Upload modules

2. Discover

3. Confirm db servers and deploy

Traditional flowQuick Start flows

Page 28: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

28 IBM Security

A visual representation of the simplified approachTraditional

Quick start

Page 29: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

29 IBM Security

Prerequisite steps

1. Upload the installation bundles to the GIM Server machine (eg Central

Manager).

Behind the scenes, Deploy Monitoring Agents will pick the latest matching bundle in

the list.

2. Install GIM clients in listener mode on the database servers.

Default installation port for deployment UI is 8445. Can be customized.

3. Make sure databases are started. Behind the scenes, the Deploy Monitoring agents will run the database discovery and create

inspection engines.

Knowledge Center:

https://www.ibm.com/support/knowledgecenter/SSMPHH_10.1.0/com.ibm.guardium.doc.st

ap/gim/deploy_monitoring_agents.html#concept_n2f_3zn_gz

Page 30: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

30 IBM Security

How to find it?

Search “quick start” or

“Deployment Monitoring Agents”

Page 31: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

31 IBM Security

Two flows in the deployment

Discovery and deployment in two steps.

• Lets you exclude any DB servers for

deployment from the discovered list.

Automatic Interactive (recommended)

Discovery and deployment all in one click.

Page 32: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

32 IBM Security

Interactive Flow: Discover the Database Servers

You can input multiple ranges for the GIM

discovery

Page 33: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

33 IBM Security

Interactive Flow: Confirm the Database servers

Confirm the list of DB servers to install S-TAPs.

Page 34: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

34 IBM Security

Interactive Flow: Confirm the default params of installation

You can use enterprise load balancing or associate a specific collector for these S-TAPs.

Page 35: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

35 IBM Security

Monitor the installation status on same screen

Page 36: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

36 IBM Security

Created Inspection Engines on S-TAP

Created inspection engines •

can be viewed in same

grid.

No need to go to each •

collector

Page 37: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

37 IBM Security

Verify the installations in deployment health topology view

Before install

After Install

Quick Start agent deployment demo on YouTube: https://youtu.be/S1Xbat4pmLk

Page 38: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Quick Start Compliance Overview

Page 39: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

39 IBM Security

Quick Start compliance monitoring

Compliance type

Groups

Security policies

Discover sensitive

data scenarios

Reports

Compliance MonitoringDatabases on DB servers

with S-TAPs installed

Configure and demonstrate compliance quickly for new deployments with minimal input

Page 40: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

40 IBM Security

When could I use this?

New deployments•

New or existing customers

New database servers or existing database servers for new compliance monitoring (e.g., GDPR, PCI)

Positioning with respect to accelerators•

The intent for both Quick Start Compliance Monitoring and the Accelerators is to jump start customers in the

compliance space

Compliance Monitoring leverages the accelerators

New security policies were created, based on the accelerator (compliance type) policies•

Reports for the compliance type are accessed via the • Accelerator navigation menu

Compliance Monitoring goes beyond the accelerators

Facilitates actual monitoring, by installing security policies and defining the policy installation schedule•

Simplifies the population of key groups used in the security policies•

Facilitates finding sensitive data by creating discovery scenarios and their associated audit process schedule•

Supports (bulk) • datasource creation (required for discovering sensitive data) with minimal input

Integrated and centralized views from a compliance and database perspective •

Page 41: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Demo time

Page 42: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Questions?

Page 43: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

43 IBM Security

Prerequisites

• Only supported on Guardium systems running

v10.1.3 or later

Not dependent on v10.1.3 S-TAPs

• Only accessible from a Central Manager or

standalone system

• Only accessible when logged-in as a userid

with admin role

• Quick Start security policies can only be

installed with existing policies if the existing

policies have the following settings:

• Only works with these supported databases

Active traffic

• Only TCP net protocol traffic, no encrypted traffic,

no local traffic

Discovered instances

• No databases with a port range

• MIN_PORT and MAX_PORT must be the same

Active Traffic Discovered Instances

Informix x x

MS SQL SERVER x x

MySQL x x

Oracle x x

Sybase x x

TERADATA x x

DB2 LUW x

Netezza x

PostGreSQL x

Knowledge Center:

https://www.ibm.com/support/knowledgecenter/SSMPHH_10.1.0/com.ibm.guardium.doc/monitor/compliance_monitoring.html

Page 44: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Backup slides for Quick Start Compliance Monitoring

Page 45: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Quick Start Scenarios

Page 46: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

46 IBM Security

Scenario 1: set up compliance monitoring in 4 easy steps

1

2

3

4

Page 47: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

47 IBM Security

Scenario 2: populate key groups in Quick Start security policy

Page 48: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

48 IBM Security

Three new approaches for populating groups

Only available in Quick Start or other new UI pages

Page 49: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

49 IBM Security

Scenario 3: set up sensitive data discovery in 3 easy steps

1

2

3

Page 50: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

50 IBM Security

Results of sensitive data discovery setup

Page 51: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

Population of groups

Page 52: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

52 IBM Security

Population of groups

Goal is to ensure meaningful monitoring, therefore the policy groups should be populated•No traffic is captured for empty groups

Design points•Raise the awareness of empty groups

Make it easy to populate groups

Approach•The groups and whether they should be populated are displayed from the compliance dashboard with a link to populate

Four ways for user to populate groups

Manually add•

Import from csv•

Copy from another group•

Import from external database•

Server IP group will automatically be populated upon database(s) being associated with compliance type

Sensitive objects group will automatically be populated by discover sensitive data scenario

Hierarchical groups are not supported

Page 53: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

53 IBM Security

Import from CSV

Page 54: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

54 IBM Security

Import from external datasource

Only input required from user: datasource, table name, and column name from external database.

Use Group type and group description from group to be populated.

Page 55: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

55 IBM Security

Artifacts are automatically created / updated with generated names as follows

• Automatically created based on input Custom table

Custom domain

Custom query

Populate from query in Group Builder

• Data uploaded / copied from External datasource to custom table

Custom table to group

• Naming conventions

UI screen Artifact Naming convention for generated name (caps) Naming example Scheduled

Custom Table Builder -> Edit Data Custom table tableName_columnName_datasourceId USERS_ADMIN_20014

Custom Table Builder -> Upload Data

Custom table

Custom datasource

tableName_columnName_datasourceId

datasourceName_datasourceType(CustomDomain)

USERS_ADMIN_20014

user_repository_DB2(Custom Domain) Yes

Custom Domain Builder Custom domain groupType_tableName_columnName_datasourceId USERS_USERS_ADMIN_20014

Custom Query Builder Custom query groupType_tableName_columnName_datasourceId USERS_USERS_ADMIN_20014

Group Builder -> Populate from Query Group PCI Admin Users Yes

Page 56: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

56 IBM Security

Members from external datasource uploaded

Click OK to add members to group

Page 57: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

57 IBM Security

Group is now populated from external datasource

Page 58: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

58 IBM Security

Policy installation: approach

• Policy installation will occur automatically the first time a Quick Start policy is successfully installed on a target system

On standalone, Quick Start policy will be installed

On CM, Quick Start policy will be pushed down to all collectors

• Order of installed policies Quick Start policy will be installed after all the other installed policies (i.e., “Install last”

option)

However, if the default policy is the only policy installed, Quick Start will install its security policy over the default policy (i.e., “Install and Override” option)

• After a Reset to default

On standalone, original (hidden) Quick Start policy is automatically reinstalled

In CM deployment, there is no change to installed policy

• Policy installation schedule On standalone, Quick Start will schedule the policy installation, if one is not already

scheduled (scheduled and active or scheduled and paused)

From CM, Quick Start will schedule the policy installation on the collectors, even if one is already scheduled

Default schedule is daily at 10:30 AM

Page 59: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

59 IBM Security

User Activity Audit Trail

New audit trail records introduced:

• Install Policy

• Setup compliance

• Uninstall policy

Page 60: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

60 IBM Security

Compliance

dashboard

Databases

view

Note: New databases are

included in compliance

monitoring periodically and

not in real-time

Page 61: Guardium Tech Talk - IBM · 2017-08-24 · 10 IBM Security Guardium 10.1.3 (GPU 230) - summary • Quick start deployment (agent and compliance monitoring) • VA improvements ̶VA

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,

express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products

and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service

marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your

enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.

No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,

products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products

or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU