Nagios:
Providing Value Throughout
     the Organization

             Jared Bird
        jaredbird@gmail.com
         Twitter: @jaredbird
Introduction




      Who is Jared Bird?
Nagios
Providing Value


Provide knowledge
Assist other departments
Strengthen inter-department
 relationships
Achieve company wide goals
Reduce costs
Understanding




      What are the goals of the
       other departments?
Infrastructure


Network, Server, and Desktop
 Teams
Concerns include:
    Availability
    Capacity
    Utilization
    Functioning Properly
Security


    Prevent data theft
    Deter identity theft
    Avoid legal issues
    Protect brand
    “CIA Triad”
         Confidentiality
         Integrity
         Availability
Threats

Default configurations
Website defacement
Missing patches
DNS redirection
Unauthorized use
Many, many more
Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organization
Default Configurations

Default passwords
blank sa account
    Once password is set, monitor with new credentials
XI Auto-discovery check for insecure protocols
Scheduled scans and output to Nagios
Website

   Monitor for defacement
        check_http –H
         www.yoursite.com –s
         “sekret”
            Checks for “sekret” string
   Check certificate
        check_http –H
         www.mysite.com –C 21
            Checks certificate for 21
             days of validity
Software Installed

Check url for content (version)
Ex: http://www.adobe.com/software/flash/about/
    Check for string “11.4.102.265”
DNS



 Have DNS entries
  changed?
 DNS hijacked
 High Impact
Unauthorized Use

LDAP check for account creation
Syslog output from infrastructure
SNMP Alerts
Audit & Compliance

PCI
SOX
HIPPA
Almost every regulation*




  * Note: Speaker will not be held responsible if Nagios does not help achieve
                     compliance with a specific regulation
PCI

 PCI DSS
 Any organization that
  processes, stores, or
  transmits credit card
  data
 Requirements
     12 overall requirements
     287 individual requirements
PCI

Reqs 1&2: Build and Maintain a Secure Network
    Auto-discovery to look for services
    Checks to verify that vendor defaults have been changed
Reqs 3&4: Protect Cardholder Data
    Scan for insecure protocols
    Check for expiration of SSL certificates
Reqs 5&6: Maintain a Vulnerability Management
 Program
    Check the anti-virus process to ensure it is running
PCI

Reqs 7,8,& 9: Implement Strong Access Control
 Measures
    LDAP checks to ensure LDAP server is functioning
    Web Transaction Monitoring can be used to check two factor
Reqs 10&11: Regularly Monitor and Test Networks
    Check NTP
    Event logs from servers
Req 12: Maintain an Information Security Program
    Use device listings as well as contact info (incident response
     plan)
SOX

Sarbanes-Oxley or Public Company Accounting
 Reform and Investors Protection Act
Section 404: Assessment of internal control
Nagios can help management show that controls for
 assuring the integrity of the financial reports are
 effective.
HIPAA Headlines
HIPAA



  Technical Safeguards:
      Access Control
      Audit Control
      Integrity Controls
      Transmission Security
Questions?




     Jared Bird
jaredbird@gmail.com
 Twitter: @jaredbird



    Thank You

More Related Content

PPTX
HIPAA 101 Compliance Threat Landscape & Best Practices
PDF
Making Threat Intelligence Actionable Final
PDF
TA505: A Study of High End Big Game Hunting in 2020
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
Application Security - Your Success Depends on it
PDF
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
PDF
Achieving Defendable Architectures Via Threat Driven Methodologies
PDF
Extend Network Visibility and Secure Applications and Data in Azure
HIPAA 101 Compliance Threat Landscape & Best Practices
Making Threat Intelligence Actionable Final
TA505: A Study of High End Big Game Hunting in 2020
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Application Security - Your Success Depends on it
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Achieving Defendable Architectures Via Threat Driven Methodologies
Extend Network Visibility and Secure Applications and Data in Azure

What's hot (20)

PDF
When Insiders ATT&CK!
PDF
Présentation ELK/SIEM et démo Wazuh
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
PPTX
Using m365 defender to protect against solorigate
PDF
State of the ATT&CK - ATT&CKcon Power Hour
PDF
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
PPTX
McAfee - Enterprise Security Manager (ESM) - SIEM
PDF
Putting Cyber Attackers on the Defensive
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
How to Test for The OWASP Top Ten
PDF
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
PPTX
Mcas log collector deck
PDF
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PDF
Soc analyst course content
PDF
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
PDF
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
PPTX
Overview of Microsoft Sql Server Security
PPTX
Seculert presentation
When Insiders ATT&CK!
Présentation ELK/SIEM et démo Wazuh
Automation: The Wonderful Wizard of CTI (or is it?)
Using m365 defender to protect against solorigate
State of the ATT&CK - ATT&CKcon Power Hour
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
McAfee - Enterprise Security Manager (ESM) - SIEM
Putting Cyber Attackers on the Defensive
Defend Your Data Now with the MITRE ATT&CK Framework
How to Test for The OWASP Top Ten
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
Mcas log collector deck
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
How Google Protects Its Corporate Security Perimeter without Firewalls
Soc analyst course content
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Overview of Microsoft Sql Server Security
Seculert presentation
Ad

Similar to Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organization (20)

PDF
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
PPT
Information Security
PDF
Security Awareness Training
PDF
Data Integrity Protection
PPTX
Moving to the Cloud: A Security and Hosting Introduction
PPTX
Retail IT 2013: Data Security & PCI Compliance Briefing
PPTX
A guide to Sustainable Cyber Security
PPTX
Adv Sec part onesakjslkajslkjakljssasa.pptx
PDF
Solutions for PCI DSS Compliance
PDF
Si InfoSecMiddleEastLR0516
PDF
Cyber security for manufacturers umuc cadf-ron mcfarland
PDF
Ccna sec 01
PDF
Axxera Security Solutions
PPTX
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
PPTX
E Commerce basic concepts and fundamentals
PDF
Data Power For Pci Webinar Aug 2012
PPTX
crisc_wk_5.pptx
PPT
ES EL SOC LA HERRAMIENTA QUE CUBRE TODA SU RED
PDF
IBM InfoSphere Guardium overview
PPTX
Provide Network System Administrationa.pptx
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Information Security
Security Awareness Training
Data Integrity Protection
Moving to the Cloud: A Security and Hosting Introduction
Retail IT 2013: Data Security & PCI Compliance Briefing
A guide to Sustainable Cyber Security
Adv Sec part onesakjslkajslkjakljssasa.pptx
Solutions for PCI DSS Compliance
Si InfoSecMiddleEastLR0516
Cyber security for manufacturers umuc cadf-ron mcfarland
Ccna sec 01
Axxera Security Solutions
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
E Commerce basic concepts and fundamentals
Data Power For Pci Webinar Aug 2012
crisc_wk_5.pptx
ES EL SOC LA HERRAMIENTA QUE CUBRE TODA SU RED
IBM InfoSphere Guardium overview
Provide Network System Administrationa.pptx
Ad

More from Nagios (20)

PPTX
Nagios XI Best Practices
PDF
Jesse Olson - Nagios Log Server Architecture Overview
PDF
Trevor McDonald - Nagios XI Under The Hood
PDF
Sean Falzon - Nagios - Resilient Notifications
PDF
Marcus Rochelle - Landis+Gyr - Monitoring with Nagios Enterprise Edition
PDF
Janice Singh - Writing Custom Nagios Plugins
PDF
Dave Williams - Nagios Log Server - Practical Experience
PDF
Mike Weber - Nagios and Group Deployment of Service Checks
PDF
Mike Guthrie - Revamping Your 10 Year Old Nagios Installation
PDF
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
PDF
Matt Bruzek - Monitoring Your Public Cloud With Nagios
PDF
Lee Myers - What To Do When Nagios Notification Don't Meet Your Needs.
PDF
Eric Loyd - Fractal Nagios
PDF
Marcelo Perazolo, Lead Software Architect, IBM Corporation - Monitoring a Pow...
PDF
Thomas Schmainda - Tracking Boeing Satellites With Nagios - Nagios World Conf...
PPTX
Nagios World Conference 2015 - Scott Wilkerson Opening
PDF
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
PDF
Nagios Log Server - Features
PDF
Nagios Network Analyzer - Features
PPTX
Nagios Conference 2014 - Dorance Martinez Cortes - Customizing Nagios
Nagios XI Best Practices
Jesse Olson - Nagios Log Server Architecture Overview
Trevor McDonald - Nagios XI Under The Hood
Sean Falzon - Nagios - Resilient Notifications
Marcus Rochelle - Landis+Gyr - Monitoring with Nagios Enterprise Edition
Janice Singh - Writing Custom Nagios Plugins
Dave Williams - Nagios Log Server - Practical Experience
Mike Weber - Nagios and Group Deployment of Service Checks
Mike Guthrie - Revamping Your 10 Year Old Nagios Installation
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
Matt Bruzek - Monitoring Your Public Cloud With Nagios
Lee Myers - What To Do When Nagios Notification Don't Meet Your Needs.
Eric Loyd - Fractal Nagios
Marcelo Perazolo, Lead Software Architect, IBM Corporation - Monitoring a Pow...
Thomas Schmainda - Tracking Boeing Satellites With Nagios - Nagios World Conf...
Nagios World Conference 2015 - Scott Wilkerson Opening
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
Nagios Log Server - Features
Nagios Network Analyzer - Features
Nagios Conference 2014 - Dorance Martinez Cortes - Customizing Nagios

Recently uploaded (20)

PPTX
Internet of Everything -Basic concepts details
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
Internet of Everything -Basic concepts details
Auditboard EB SOX Playbook 2023 edition.
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Advancing precision in air quality forecasting through machine learning integ...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
4 layer Arch & Reference Arch of IoT.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
LMS bot: enhanced learning management systems for improved student learning e...
MuleSoft-Compete-Deck for midddleware integrations
Training Program for knowledge in solar cell and solar industry
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Module 1 Introduction to Web Programming .pptx
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Data Virtualization in Action: Scaling APIs and Apps with FME
Rapid Prototyping: A lecture on prototyping techniques for interface design

Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organization

  • 1. Nagios: Providing Value Throughout the Organization Jared Bird [email protected] Twitter: @jaredbird
  • 2. Introduction Who is Jared Bird?
  • 4. Providing Value Provide knowledge Assist other departments Strengthen inter-department relationships Achieve company wide goals Reduce costs
  • 5. Understanding What are the goals of the other departments?
  • 6. Infrastructure Network, Server, and Desktop Teams Concerns include:  Availability  Capacity  Utilization  Functioning Properly
  • 7. Security Prevent data theft Deter identity theft Avoid legal issues Protect brand “CIA Triad”  Confidentiality  Integrity  Availability
  • 8. Threats Default configurations Website defacement Missing patches DNS redirection Unauthorized use Many, many more
  • 10. Default Configurations Default passwords blank sa account  Once password is set, monitor with new credentials XI Auto-discovery check for insecure protocols Scheduled scans and output to Nagios
  • 11. Website Monitor for defacement  check_http –H www.yoursite.com –s “sekret”  Checks for “sekret” string Check certificate  check_http –H www.mysite.com –C 21  Checks certificate for 21 days of validity
  • 12. Software Installed Check url for content (version) Ex: http://www.adobe.com/software/flash/about/  Check for string “11.4.102.265”
  • 13. DNS Have DNS entries changed? DNS hijacked High Impact
  • 14. Unauthorized Use LDAP check for account creation Syslog output from infrastructure SNMP Alerts
  • 15. Audit & Compliance PCI SOX HIPPA Almost every regulation* * Note: Speaker will not be held responsible if Nagios does not help achieve compliance with a specific regulation
  • 16. PCI PCI DSS Any organization that processes, stores, or transmits credit card data Requirements  12 overall requirements  287 individual requirements
  • 17. PCI Reqs 1&2: Build and Maintain a Secure Network  Auto-discovery to look for services  Checks to verify that vendor defaults have been changed Reqs 3&4: Protect Cardholder Data  Scan for insecure protocols  Check for expiration of SSL certificates Reqs 5&6: Maintain a Vulnerability Management Program  Check the anti-virus process to ensure it is running
  • 18. PCI Reqs 7,8,& 9: Implement Strong Access Control Measures  LDAP checks to ensure LDAP server is functioning  Web Transaction Monitoring can be used to check two factor Reqs 10&11: Regularly Monitor and Test Networks  Check NTP  Event logs from servers Req 12: Maintain an Information Security Program  Use device listings as well as contact info (incident response plan)
  • 19. SOX Sarbanes-Oxley or Public Company Accounting Reform and Investors Protection Act Section 404: Assessment of internal control Nagios can help management show that controls for assuring the integrity of the financial reports are effective.
  • 21. HIPAA Technical Safeguards:  Access Control  Audit Control  Integrity Controls  Transmission Security
  • 22. Questions? Jared Bird [email protected] Twitter: @jaredbird Thank You

Editor's Notes

  • #2: Nagios: Providing Value Throughout The Organization  This talk will discuss how Nagios can be used to provide value to several areas of an organization. Providing value to areas such as security, audit and compliance in additition to the traditional infrastructure teams including ways that Nagios can assist in achieving compliance with several standards/regulations such as PCI, SOX, HIPAA, etc. will be discussed.
  • #3: Married 1yr old & 3yr old 10+ year experience Work as a Security Engineer for a large healthcare provider Jared Bird currently works during the day maintaining a respectable level of security at a large local healthcare organization in the Minneapolis/St Paul area. He has a passion for everything security related and in his spare time he enjoys breaking things, bending the rules, and developing a plot for world domination.
  • #4: Flexibility allows endless possibilities Use these capabilities to provide value to other areas of the organization
  • #10: Quote from FBI Director Robert Mueller ’s 2012 RSA Keynote
  • #15: Infrastructure == vmserver
  • #17: The PCI Data Security Standard represents a common set of industry tools and measurements to help ensure the safe handling of sensitive information.
  • #18: Autodiscovery – find insecure services
  • #20: SOX was enacted to ensure that financial reports were accurate. All annual financial reports must include an Internal Control Report stating that management is responsible for an "adequate" internal control structure, and an assessment by managemnt of the effectiveness of the control structure.  - sarbanes-oxley-101.com
  • #22: Access control – Only allow authorized persons to access ePHI Audit control – Record and examine access to systems containing ePHI Integrity Controls – ePHI is not improperly altered or destroyed Trasmission Security – Guard against unauthroized access to ePHI