SlideShare a Scribd company logo
© Copyright 1/6/2015 BMC Software, Inc1
Protect Your Systems From the Next
Security Scandal
Best Practices Guidance
for Intelligent Compliance
© Copyright 1/6/2015 BMC Software, Inc2
Dominic Wellington
@dwellington
Intelligent Compliance
© Copyright 1/6/2015 BMC Software, Inc3
The Solution is Known
Attacks Patches
Most breaches exploit known vulnerabilities for which patches are available.
Time
More than 80% of attacks
target known vulnerabilities
(source: F-Secure)
79%
30+
days
80%
79% of vulnerabilities have patches
available on day of disclosure
(source: Secunia)
On average, it takes 30+ days to
patch an identified vulnerability
(source: Qualys)
© Copyright 1/6/2015 BMC Software, Inc4
Heartbleed
March 14 2012:
Vulnerable code introduced into OpenSSL library
What happened?
© Copyright 1/6/2015 BMC Software, Inc5
Heartbleed: a timeline
Heartbleed bug
disclosed
heartbleed.com
registered,
logo created
Patch available
(1.0.1g)
309,197
public web
servers remain
vulnerable
318,239
public web servers
remain vulnerable
Community
Health Systems
hack disclosure
April 7April 3 June 21April 1 May 8 August 18
2014
© Copyright 1/6/2015 BMC Software, Inc6
“ ”
[…] the breadth of at-risk machines is going to be
significantly higher with Shellshock than with Heartbleed.
Shellshock
NIST: 10/10
A new bug every week
© Copyright 1/6/2015 BMC Software, Inc7
Security problems are
like vampires
© Copyright 1/6/2015 BMC Software, Inc8
Clone
old VM
template
Reinstall old
vulnerable
software
version
Boot
unpatched
server
Missed the
“unofficial”
IT
How do companies
get bitten?
© Copyright 1/6/2015 BMC Software, Inc9
The SecOps Gap
© Copyright 1/6/2015 BMC Software, Inc10
Intelligent compliance
transforms compliance
from an activity that is
exhausting, risky and
incomplete into one that
is routine, secure and
comprehensive.
© Copyright 1/6/2015 BMC Software, Inc11
Best Practices Guidance for Intelligent Compliance
AD HOC
PROCESS
STANDARDIZED
ADVANCED
TOOLS PATCH
ASSESS
COMPLY
INTELLIGENT
LEVELS
TIME
© Copyright 1/6/2015 BMC Software, Inc12
DISCOVER
REMEDIATE DEFINE
AUDIT
GOVERN
Server
Network
Database
Middleware
Intelligent Compliance
© Copyright 1/6/2015 BMC Software, Inc13
Status Quo Intelligent Compliance
Incomplete data
Out of date – systems provisioned
faster than discovered
Data accuracy you can verify and trust
Effortless continuous mapping of
infrastructure and applications
Discover
© Copyright 1/6/2015 BMC Software, Inc14
You can’t manage what you can’t measure
Replace manual data collection
with automatic inventory &
relationship discovery
Leverage inventory &
relationship data in other IT
processes
Application Mapping: Connect
data center infrastructure to
business applications
© Copyright 1/6/2015 BMC Software, Inc15
Status Quo Intelligent Compliance
Disconnected from operational details
Incomplete specification of
requirements
Pre-defined policies – short time to value
Detailed, actionable definition of desired
state
Define
© Copyright 1/6/2015 BMC Software, Inc16
Regulatory Compliance
Sarbanes-Oxley (SOX) 404
Health Insurance Portability & Accountability
Act (HIPAA)
Payment Card Industry Digital Security Standard
(PCI DSS)
Security Compliance
Defense Information Systems Agency
Security Technical Implementation
Guides (DISA STIG)
Center for Internet Security (CIS)
© Copyright 1/6/2015 BMC Software, Inc17
Status Quo Intelligent Compliance
Based on individual interpretation
Inconsistent and incomplete
implementation and coverage
Granular configuration visibility – avoid
false positives & false negatives
Regular, scheduled and automated
Audit
© Copyright 1/6/2015 BMC Software, Inc18
Identify drift away from desired state
Compare live
configurations to a live
reference system
Troubleshoot issues
caused by configuration
discrepancies
Compare the current state
to known good state from
a week ago
Compare snapshots to
each other to aid
troubleshooting
Different comparison types support different use cases.
Compare the current state
to out-of-the-box policies
Use standard policies as
templates to build
customized operational
policy
LIVE SNAPSHOT POLICY
© Copyright 1/6/2015 BMC Software, Inc19
Status Quo Intelligent Compliance
No way to verify success
Risk of introducing additional issues
No way to roll back changes
Granular configuration changes – co-exist
with other tools and approaches
Built-in rollback in case of failure or
unforeseen consequences
Remediate
© Copyright 1/6/2015 BMC Software, Inc20
Close the SecOps Gap
Automated remediation – no
scripting
Automated rollback in case of
problems
Support for exceptions to
standard policy
44%
Reduction
32%
Reduction
45%
Reduction
© Copyright 1/6/2015 BMC Software, Inc21
Status Quo Intelligent Compliance
Manual entry (time consuming, error prone)
Lack of trust in data
No process enforcement
Consistent audit trail and automatic
documentation of actions & exceptions
Process governance – change approval,
maintenance windows, collision avoidance
Govern
© Copyright 1/6/2015 BMC Software, Inc22
Orchestrate Automation and ITSM
© Copyright 1/6/2015 BMC Software, Inc23
Key takeaways
1. Compliance is a big problem
The consequences of getting it wrong are severe
2. Neither Security nor Operations can fix it alone
Different teams need to work together
3. There is no one size fits all solution
No single product can solve this problem either
4. Tackle this problem in stages
No need to solve the whole problem at once
Dominic Wellington
@dwellington
bmc.com/intelligentcompliance
© Copyright 1/6/2015 BMC Software, Inc24
Thank You.

More Related Content

PPTX
Analyzing Your Government Contract Cybersecurity Compliance
PPTX
Cybersecurity Compliance in Government Contracts
PPTX
Analyzing Your GovCon Cybersecurity Compliance
PPTX
Security at velocity dc cap one
PPT
Lunch and Learn: June 29, 2010
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPTX
Performing One Audit Using Zero Trust Principles
PDF
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Analyzing Your Government Contract Cybersecurity Compliance
Cybersecurity Compliance in Government Contracts
Analyzing Your GovCon Cybersecurity Compliance
Security at velocity dc cap one
Lunch and Learn: June 29, 2010
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Performing One Audit Using Zero Trust Principles
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security

What's hot (20)

PPT
It Audit Expectations High Detail
PPTX
Integrated Compliance – Collect Evidence Once, Certify to Many
PPTX
IS audit checklist
PPTX
IT Compliance in 2015 - Beyond the “v” model
PPTX
Continous Audit and Controls with Brainwave GRC
PPTX
Identifying critical security controls
PDF
Why Medical Devices Are So Vulnerable
PPT
Information Systems Security Review 2004
PDF
CISA Domain 4 Information Systems Operation | Infosectrain
PPT
Industry Reliability and Security Standards Working Together
PDF
Physical Security Information Management Solution for the Enterprise
PPTX
Developing a Continuous Monitoring Action Plan
PDF
Hipaa checklist - information security
PPTX
Docker container webinar final
PPTX
Continuous Compliance Monitoring
PPTX
Managing Multiple Assessments Using Zero Trust Principles
PPT
Why Use Wes Tech Solutions
PPT
Why Use Westech Solutions
PPTX
Geist Presentation
PPTX
I.T. Geeks Can't Talk to Management
It Audit Expectations High Detail
Integrated Compliance – Collect Evidence Once, Certify to Many
IS audit checklist
IT Compliance in 2015 - Beyond the “v” model
Continous Audit and Controls with Brainwave GRC
Identifying critical security controls
Why Medical Devices Are So Vulnerable
Information Systems Security Review 2004
CISA Domain 4 Information Systems Operation | Infosectrain
Industry Reliability and Security Standards Working Together
Physical Security Information Management Solution for the Enterprise
Developing a Continuous Monitoring Action Plan
Hipaa checklist - information security
Docker container webinar final
Continuous Compliance Monitoring
Managing Multiple Assessments Using Zero Trust Principles
Why Use Wes Tech Solutions
Why Use Westech Solutions
Geist Presentation
I.T. Geeks Can't Talk to Management
Ad

Viewers also liked (7)

PDF
Self Service Workload Automation
PPTX
Have your own Ticker Tape Parade—Promote Solution Success
PPTX
How to Manage MLC Costs to Optimize the Mainframe
PPTX
Remedyforce Localization and Translation
PDF
Constech SIAM
PDF
Aligning BPM and EA
PPTX
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Self Service Workload Automation
Have your own Ticker Tape Parade—Promote Solution Success
How to Manage MLC Costs to Optimize the Mainframe
Remedyforce Localization and Translation
Constech SIAM
Aligning BPM and EA
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Ad

Similar to Best Practices for Intelligent Compliance (20)

PPTX
How to Close the SecOps Gap
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPT
Fusion - BMC Service Assurance & Automation
PDF
Avoiding Data Breaches in 2016: What You Need to Kow
PDF
Avoiding Data Breaches in 2016: What You Need to Know
PPTX
2019 08-13 selecting the right security policy management solution
PDF
Ad Hoc Automation is an Expensive Mistake
PDF
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
PPT
58466507 event-management-best-practices-1-488
PPTX
IT Cost Transparency with Capacity Optimization
PPTX
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
PDF
Avoiding the Pitfalls of Hunting - BSides Charm 2016
PPTX
Security Automation Quick Wins - Siemplify Webinar
PPT
Managing IT Infrastructure And Applications Proactively For Performance And U...
PPTX
BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
PDF
Database monitoring - First and Last Line of Defense
PDF
What’s the State of Your Endpoint Security?
PDF
Proactive Project Management w/Machine Learning
PPT
Selecting the right security policy management solution for your organization
PPTX
BMC Helix Discovery_Master_1911.pptx
How to Close the SecOps Gap
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Fusion - BMC Service Assurance & Automation
Avoiding Data Breaches in 2016: What You Need to Kow
Avoiding Data Breaches in 2016: What You Need to Know
2019 08-13 selecting the right security policy management solution
Ad Hoc Automation is an Expensive Mistake
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
58466507 event-management-best-practices-1-488
IT Cost Transparency with Capacity Optimization
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
Avoiding the Pitfalls of Hunting - BSides Charm 2016
Security Automation Quick Wins - Siemplify Webinar
Managing IT Infrastructure And Applications Proactively For Performance And U...
BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
Database monitoring - First and Last Line of Defense
What’s the State of Your Endpoint Security?
Proactive Project Management w/Machine Learning
Selecting the right security policy management solution for your organization
BMC Helix Discovery_Master_1911.pptx

More from BMC Software (20)

PDF
The Accelerator's Guide to Digital Transformation
PDF
Flip the Switch On Continuous Delivery
PDF
Peer Into the Bright Future on the Service Desk Horizon
PDF
Remedyforce helps General Dynamics meet ever-changing user needs
PDF
BMC Software Remedyforce Case Study
PDF
Mission: Launch a Digital Workplace
PPTX
How Will Your Cloud Strategy Impact Your Cyber Strategy?
PDF
The Power of Monitoring Studio in TrueSight
PDF
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
PPTX
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
PPTX
Salesforce Lightning Process Builder IS the next-generation workflow tool
PDF
What Do Executives Need to Do to Go Digital?
PDF
Curating Your Digital Workplace: Key Steps for IT
PDF
Delivering the Digital Workplace Without the Chaos
PPTX
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
PPTX
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
PDF
Next Generation Technology Utility Benchmarks
PPTX
User Creation and Authentication in Remedyforce
PDF
IT Managers Answer Questions about the Future of the Digital Economy
PDF
BMC Remedyforce vs Other IT Service Management
The Accelerator's Guide to Digital Transformation
Flip the Switch On Continuous Delivery
Peer Into the Bright Future on the Service Desk Horizon
Remedyforce helps General Dynamics meet ever-changing user needs
BMC Software Remedyforce Case Study
Mission: Launch a Digital Workplace
How Will Your Cloud Strategy Impact Your Cyber Strategy?
The Power of Monitoring Studio in TrueSight
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
Salesforce Lightning Process Builder IS the next-generation workflow tool
What Do Executives Need to Do to Go Digital?
Curating Your Digital Workplace: Key Steps for IT
Delivering the Digital Workplace Without the Chaos
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Next Generation Technology Utility Benchmarks
User Creation and Authentication in Remedyforce
IT Managers Answer Questions about the Future of the Digital Economy
BMC Remedyforce vs Other IT Service Management

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4

Best Practices for Intelligent Compliance

  • 1. © Copyright 1/6/2015 BMC Software, Inc1 Protect Your Systems From the Next Security Scandal Best Practices Guidance for Intelligent Compliance
  • 2. © Copyright 1/6/2015 BMC Software, Inc2 Dominic Wellington @dwellington Intelligent Compliance
  • 3. © Copyright 1/6/2015 BMC Software, Inc3 The Solution is Known Attacks Patches Most breaches exploit known vulnerabilities for which patches are available. Time More than 80% of attacks target known vulnerabilities (source: F-Secure) 79% 30+ days 80% 79% of vulnerabilities have patches available on day of disclosure (source: Secunia) On average, it takes 30+ days to patch an identified vulnerability (source: Qualys)
  • 4. © Copyright 1/6/2015 BMC Software, Inc4 Heartbleed March 14 2012: Vulnerable code introduced into OpenSSL library What happened?
  • 5. © Copyright 1/6/2015 BMC Software, Inc5 Heartbleed: a timeline Heartbleed bug disclosed heartbleed.com registered, logo created Patch available (1.0.1g) 309,197 public web servers remain vulnerable 318,239 public web servers remain vulnerable Community Health Systems hack disclosure April 7April 3 June 21April 1 May 8 August 18 2014
  • 6. © Copyright 1/6/2015 BMC Software, Inc6 “ ” […] the breadth of at-risk machines is going to be significantly higher with Shellshock than with Heartbleed. Shellshock NIST: 10/10 A new bug every week
  • 7. © Copyright 1/6/2015 BMC Software, Inc7 Security problems are like vampires
  • 8. © Copyright 1/6/2015 BMC Software, Inc8 Clone old VM template Reinstall old vulnerable software version Boot unpatched server Missed the “unofficial” IT How do companies get bitten?
  • 9. © Copyright 1/6/2015 BMC Software, Inc9 The SecOps Gap
  • 10. © Copyright 1/6/2015 BMC Software, Inc10 Intelligent compliance transforms compliance from an activity that is exhausting, risky and incomplete into one that is routine, secure and comprehensive.
  • 11. © Copyright 1/6/2015 BMC Software, Inc11 Best Practices Guidance for Intelligent Compliance AD HOC PROCESS STANDARDIZED ADVANCED TOOLS PATCH ASSESS COMPLY INTELLIGENT LEVELS TIME
  • 12. © Copyright 1/6/2015 BMC Software, Inc12 DISCOVER REMEDIATE DEFINE AUDIT GOVERN Server Network Database Middleware Intelligent Compliance
  • 13. © Copyright 1/6/2015 BMC Software, Inc13 Status Quo Intelligent Compliance Incomplete data Out of date – systems provisioned faster than discovered Data accuracy you can verify and trust Effortless continuous mapping of infrastructure and applications Discover
  • 14. © Copyright 1/6/2015 BMC Software, Inc14 You can’t manage what you can’t measure Replace manual data collection with automatic inventory & relationship discovery Leverage inventory & relationship data in other IT processes Application Mapping: Connect data center infrastructure to business applications
  • 15. © Copyright 1/6/2015 BMC Software, Inc15 Status Quo Intelligent Compliance Disconnected from operational details Incomplete specification of requirements Pre-defined policies – short time to value Detailed, actionable definition of desired state Define
  • 16. © Copyright 1/6/2015 BMC Software, Inc16 Regulatory Compliance Sarbanes-Oxley (SOX) 404 Health Insurance Portability & Accountability Act (HIPAA) Payment Card Industry Digital Security Standard (PCI DSS) Security Compliance Defense Information Systems Agency Security Technical Implementation Guides (DISA STIG) Center for Internet Security (CIS)
  • 17. © Copyright 1/6/2015 BMC Software, Inc17 Status Quo Intelligent Compliance Based on individual interpretation Inconsistent and incomplete implementation and coverage Granular configuration visibility – avoid false positives & false negatives Regular, scheduled and automated Audit
  • 18. © Copyright 1/6/2015 BMC Software, Inc18 Identify drift away from desired state Compare live configurations to a live reference system Troubleshoot issues caused by configuration discrepancies Compare the current state to known good state from a week ago Compare snapshots to each other to aid troubleshooting Different comparison types support different use cases. Compare the current state to out-of-the-box policies Use standard policies as templates to build customized operational policy LIVE SNAPSHOT POLICY
  • 19. © Copyright 1/6/2015 BMC Software, Inc19 Status Quo Intelligent Compliance No way to verify success Risk of introducing additional issues No way to roll back changes Granular configuration changes – co-exist with other tools and approaches Built-in rollback in case of failure or unforeseen consequences Remediate
  • 20. © Copyright 1/6/2015 BMC Software, Inc20 Close the SecOps Gap Automated remediation – no scripting Automated rollback in case of problems Support for exceptions to standard policy 44% Reduction 32% Reduction 45% Reduction
  • 21. © Copyright 1/6/2015 BMC Software, Inc21 Status Quo Intelligent Compliance Manual entry (time consuming, error prone) Lack of trust in data No process enforcement Consistent audit trail and automatic documentation of actions & exceptions Process governance – change approval, maintenance windows, collision avoidance Govern
  • 22. © Copyright 1/6/2015 BMC Software, Inc22 Orchestrate Automation and ITSM
  • 23. © Copyright 1/6/2015 BMC Software, Inc23 Key takeaways 1. Compliance is a big problem The consequences of getting it wrong are severe 2. Neither Security nor Operations can fix it alone Different teams need to work together 3. There is no one size fits all solution No single product can solve this problem either 4. Tackle this problem in stages No need to solve the whole problem at once Dominic Wellington @dwellington bmc.com/intelligentcompliance
  • 24. © Copyright 1/6/2015 BMC Software, Inc24 Thank You.

Editor's Notes

  • #12: Here’s a quick refresh on the value path.