21
The logging company BalaBit IT Security

DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Embed Size (px)

Citation preview

Page 1: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

The logging

company

BalaBit IT Security

Page 2: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

External Challenges:

Security Breaches

Page 3: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

External Challenges:

Compliance Pressure to Monitor Users

SOX→ COBIT

DS5.5 Security monitoring

DS9.2 Config.changes

DS11.6 Securing Data

PCI-DSS

Chapter 7, 8 Implement Strong Access Control

Chapter 10 Audit Access to Cardholder Data

Chapter 12 Maintain sec.policy for personnel

ISO27002

A.10.2 Third-party service mngmnt

A.10.10 Monitoring user activities

A.13.2 Mgmt of Security Incidents

HIPAA, Basel II, GPG13…

Similar requirements!

Page 4: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Internal Challenges:

„Superuser” Fraud

Source: BalaBit IT professionals survey, 2011

Page 5: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

How to control?

• Identity-management

• Logging

• Activity monitoring

Page 6: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

BalaBit IT Security

„The syslog-ng company”

• 2011 revenue: $10.3 M (35% annual growth)

• Number of employees: 120

• Number of customers - global:

– commercial customers: 800

– open source users: 850.000

• 12 years experience in IT Security

• Global partner network, 80+ partners in 30+ countries

• Awarded to Deloitte Technology Fast 500 and Fast 50 Lists (2010)

Page 7: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

8

syslog-ng Description

• IT environments constantly generate

important data in log messages

• syslog-ng

• Collects

• Filters

• Classifies

• Normalizes

• Stores

• Transfers

• syslog-ng is not a log analysis tool but it is

essential to analysis

Page 8: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

9

Product Family

• syslog-ng Open Source Edition

• Leader since 1998, de facto standard in 2001

• Large, world-wide community

• syslog-ng Premium Edition

• Commercial version

• Additional features

• Professional support

• syslog-ng Store Box

• Turnkey appliance

• Index, search, reporting

• Professional support

Page 9: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

10

syslog-ng Open Source Edition

• Key Features

• Flexible message filtering and re-writing

• Pattern-based classification

• Secure log transfer via SSL/TLS

• Flow-control – adaptive message rate control

• High speed processing > 650k/sec

• Community

• 100,000s of users worldwide

• Well know by system admins

• Included in 3rd party devices

• Custom add-ons

Page 10: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

11

syslog-ng Premium Edition

• Additional Features

• Zero Message Loss

• Reliable Log Transfer Protocol (RLTP)

• Client side failover

• Disk buffer

• Encrypted log storage

• SQL source and destination support

• Windows support

• Support for more than 50 server

platforms

• Professional Support

Page 11: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Customers

Page 12: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

The User Monitoring „Pyramid”

Activity Records -security camera

System logs -snapshots

Logging is not enough…

1. Several security events are not logged!

2. Logs typically do not show what was done.

3. Logs often show only obscure techn. details.

Page 13: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Key questions to answer…

Can you ensure the accountability of your IT staff?

Can you monitor the actions of your „superusers”?

Can you reliably control your outsourcing partners?

Do you really know „who access what” on servers?

Can you conduct quick and cheap audits at your company?

Can you present bullet-proof evidence in legal proceedings?

Are you sure you’d pass audits concerning user monitoring?

Page 14: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

IT Staff

Outsourcing partners

Managers

• Firewall, • Network devices, • Databases, • Web/file servers, • Citrix server…

Privileged Activity Monitoring by Shell Control Box

VDI users

Page 15: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Privileged Activity Monitoring by

BalaBit Shell Control Box

Shell Control Box (SCB) is an appliance that controls privileged access to remote systems and records the activities into searchable and re-playable movie-like audit trails.

Page 16: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Access Control

Security & compliance benefits:

• Central access control gateway

• Multi-protocol support - SSH, RDP, VNC, Telnet, Citrix, etc.

• Sub-channel control (e.g. file transfer)

• Access by time policy

• 4-eyes authorization

• Real-time access monitoring

Key Benefit: GRANULAR ACCESS POLICY ENFORCEMENT!

Page 17: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Real-time alerting (& blocking)

Security & compliance benefits:

• Alerts for monitoring tools

• Alerts for supervisors

Coming in :

• Terminates session if risky action

• Risky actions are customizable (e.g. failed login, program execution, credit card number…)

Key Benefit: IMMIDIATE REACTION ON CRITICAL EVENTS!

Page 18: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Audit & Forensics

Security & compliance benefits:

• Real-time activity monitoring

• Tamper-proof, HQ audit trails

• Movie-like playback & search

• File transfer audit

• Independent, transparent audit device

Key Benefit: INDEPENDENT TOOL FOR QUICK AUDITS & FORENSICS!

Page 19: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Big SCB Users

Page 20: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Conclusion Benefits for business

Faster ROI • Faster and higher quality audits

• Lower troubleshooting and forensics costs

• Centralized authentication & access control

• Complete solution for user monitoring

Lower risk • Improved regulatory and industry compliance

• Better employee/partner control

• Improved accountability of staff

• Bullet-proof evidence in legal proceedings

• Setting technical and psychological barrier

Page 21: DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Thank you for your attention!

Gábor Paróczi

Sales Manager

[email protected]

25