File Integrity Monitoring
Agenda
§ Qualys Compliance Solutions
§ Integrity Monitoring Overview
§ FIM Activation & Setup
§ Qualys FIM Application
§ FIM & Qualys Policy Compliance
2 Qualys, Inc. Corporate Presentation
Course Prerequisites
• Windows or Linux host with Qualys agent already installed.
• Complete the Qualys Cloud Agent Training Course to
successfully deploy a Windows or Linux agent.
3
Qualys Compliance Solutions
4 Qualys, Inc. Corporate Presentation
Qualys Compliance Solutions
IT Compliance PCI DSS IT Compliance File
CloudView Out-of-band
Technical Compliance Administrative Integrity Configuration
Controls Controls Monitoring
Automate PCI Generate inventory Assessment
compliance testing, Automate risk of assets across
Define and monitor IT Log and track file
reporting and management process for changes across public clouds
security standards Extract configuration
submission third parties like vendors, global IT systems
aligned to regulations data from host assets.
suppliers and Detect and respond
Benefit from the contractors. Out-of-the-box to misconfigurations
Out-of-the-box content For disconnected or
Approved Scanning profiles to meet and non-standard
to fast-track assessments air-gapped networks.
Vendor (ASV) Create campaigns deployments using
using industry best common
requirements that with pre-built and Cloud Security
practices compliance and
Qualys PCI fulfils custom templates audit requirements Assessment
5
Integrity Monitoring Overview
6 Qualys, Inc. Corporate Presentation
Principals of Data Security
• CONFIDENTIALITY – Protect data from
ITY
unauthorized disclosure.
IAL
INT
NT
EG
• INTEGRITY – Detect data alterations
IDE
RIT
and modifications. DATA
NF
Y
CO
• AVAILABILITY – Protect data from
obstruction.
AVAILABILITY
7
Types of Change
Accidental Change Control Violations Malicious Changes
Data Corruption Ignoring Policies Malware
Unexpected Configuration Replication Emergency Response System Compromise
Human Error Automation TCB Attacks
8
Hashing Algorithm
9
Business Use-Cases for File Integrity Monitoring
• Regulations & Standards - Some regulations, standards and mandates
(such as PCI DSS 10.5.5 & 11.5) require integrity monitoring and alerting.
• Change Control Management - Integrity monitoring helps to validate
scheduled and expected changes, while also detecting changes that violate
existing company guidelines and policies.
• Security (IoC) - Comparing file, directory and object hash values plays an
important role in detecting security breaches and compromised systems.
10
What You Need To Monitor
§ Critical Operating System Binaries
§ OS and Application Configuration Files
§ Web source content and other critical, custom files
§ Data stores and log files containing security events and audit trails
- Content checks here would generate much noise
- Focus on name changes, deletions, and changes to attributes and
security settings
11
Activation & Setup
12 Qualys, Inc. Corporate Presentation
Currently Supported OS
Technologies
Qualys Cloud Agent must be running
on:
§ Microsoft Windows
§ Red Hat Enterprise Linux
§ CentOS
§ Oracle Enterprise Linux
§ SUSE Linux Enterprise Server
§ Ubuntu
§ Amazon Linux
§ Amazon Linux 2
o https://www.qualys.com/docs/qualys-cloud-agent-getting-started-guide.pdf
13
Qualys FIM Workflow
1. Install Cloud Agent on target host.
2. Assign target agent host to a CA Configuration Profile that has FIM
enabled.
• Configuration Profile downloaded to agent host.
3. Activate FIM module on target agent host.
4. Assign target agent host to an “active” FIM Monitoring Profile.
• FIM Manifest downloaded to agent host.
• File and directory integrity monitoring begins.
5. Deactivate FIM module
FIM Workflow Diagram
Assign Target Host Configuration
to CA Config. Settings
Profile with FIM Downloaded to
enabled Target Host
Install Qualys Activate FIM Deactivate FIM
Cloud Agent on Module on Target Module on Target
Target Host Agent Host Agent Host
Assign Target Host FIM Manifest FIM Agent Begins
to an active FIM Downloaded to Monitoring Target
Monitoring Profile Target Agent Host Host
CA Configuration Profile
§ Assign target host to CA
Configuration Profile
that has FIM enabled
(within CA application).
§ Configure FIM Options:
1. Max event log size
2. Payload threshold time
3. Max. disk usage for
FIM data
Asset Tags & FIM Agent Configuration
• Add agent assets to their appropriate Configuration Profile, using Asset Tags.
Activate FIM Module for Target Host
• Deploy Cloud
Agent Activation
Key with FIM
module already
enabled.
OR
• Use the “Quick Actions” menu to
activate FIM for any agent host or
use the Qualys Cloud Agent API.
Linux “Audit-Compatible” Mode
o https://discussions.qualys.com/docs/DOC-7087
Asset Tags & FIM Monitoring Profiles
Operating System
• Windows
• Linux
• Debian
• Amazon Linux AMI
Application
• Internet Information Server (IIS)
• Apache Tomcat on Windows
• Web Server on Linux
• Create dynamic OS and application tags for “FIM Monitoring Profile” assignments.
20
20
FIM Configuration Alert
ü Watch for the FIM “alert” icon
within the CA application; FIM
configuration is incomplete.
ü Ensure that agent host assets are members of an ”activated”
FIM Monitoring Profile.
21 Qualys, Inc. Corporate Presentation
LAB
FIM Activation & Setup
22 Qualys, Inc. Corporate Presentation
Monitoring Profile
23 Qualys, Inc. Corporate Presentation
Assign Hosts
• Assign your host assets to one or more FIM Monitoring Profiles.
24 Qualys, Inc. Corporate Presentation
Out-of-Box FIM Monitoring Profiles
Operating System
• Windows
• Linux
• Debian
• Amazon Linux AMI
Application
• Internet Information Server (IIS)
• Apache Tomcat on Windows
• Web Server on Linux
25
25
Monitoring Profile Rules
Windows
§ Use the Windows “SET” command to display environment variables.
Linux
26 Qualys, Inc. Corporate Presentation
Directory & File Monitoring Options
§ Each separate rule will allow you to target and monitor changes to directory or file names,
content, attributes, and security settings, as well as directory or file creation/removal.
27 Qualys, Inc. Corporate Presentation
Data Stores and Log Files
• Content checks on files that are continuously updated would
generate much noise.
• Instead, focus on Changes to Attributes, Changes to Security
Settings, Name Changes, and File Removal
28 Qualys, Inc. Corporate Presentation
Advanced Options
§ Inclusion and Exclusion filters help to control the scope of “Directory” rule types,.
§ BEST PRACTICE: Tune rules for accuracy and efficiency using Inclusion and Exclusion
filters.
29 Qualys, Inc. Corporate Presentation
Inclusion Filter
§ Directory rule types allow for the INCLUSION of specific files or directories.
30 Qualys, Inc. Corporate Presentation
Exclusion Filter
§ Directory rule types allow for the EXCLUSION of specific files or directories.
31 Qualys, Inc. Corporate Presentation
LAB
FIM Monitoring Profile
32 Qualys, Inc. Corporate Presentation
Events
33 Qualys, Inc. Corporate Presentation
Events Section
1. All events detected across all your assets (excluding ignored events).
2. Events waiting to be reviewed; your options include:
• Ignore events
• Create incidents
3. Ignored events.
34 Qualys, Inc. Corporate Presentation
Finding Events
35
Event Details
File Security Event:
1. User, process
and file involved
in the event.
2. Permissions
before and after
event.
3. Monitoring
Profile and Rule
that triggered the
event capture.
4. Potential actions
to be taken.
36 Qualys, Inc. Corporate Presentation
Find Similar Events
When viewing the details
of any event, use the
“Actions” button to find
other events that have the
same:
1. Process
2. User
3. Filename
4. Path
5. Rule
37 Qualys, Inc. Corporate Presentation
Ignore and Whitelist
§ When you “whitelist” an
event, its originating
Profile/Rule is updated
with an Exclusion Filter.
§ This option is
unavailable for events
already added to an
Incident, or events
triggered by the “File”
rule type.
38 Qualys, Inc. Corporate Presentation
Restore Ignored Events
§ Any “Ignored” event can be restored, returning it to the ”All
Events” and “Event Review” tabs.
39 Qualys, Inc. Corporate Presentation
LAB
FIM Events
40 Qualys, Inc. Corporate Presentation
Incidents
41 Qualys, Inc. Corporate Presentation
Managing Events
1. Ignore and Whitelist Events*
2. Add Events to an Incident*
• An “Incident” contains related events (e.g., patching, log rotation,
suspicious activity, malicious activity, etc...).
• Incidents can be approved or unapproved
* FIM ”Responses” can alert you to events or incidents you have singled-out or deemed critical.
42 Qualys, Inc. Corporate Presentation
Event Review
§ Select available check boxes and use the “Actions” menu to ignore events in bulk, or
§ Search for targeted events and click the “Create Incident” button
• The “Create Incident” button does not work with check boxes.
43
Correlation Rules
§ Automate the creation of incidents.
§ Use queries (i.e., QQL) to identify targeted events.
§ Are scheduled to run during a specified time
window and frequency.
• All targeted events captured during this time window are added to a
single incident.
§ Provide the option to approve/disapprove
incidents, either manually or automatically.
44 Qualys, Inc. Corporate Presentation
Correlation Rules
§ Are designed to automatically create incidents.
§ Use queries (i.e., QQL) to target specified events.
§ Are scheduled to run during a specified time window.
• All targeted events captured during this time window are added to a single incident.
45
Correlation Rule Incident Approval Types
§ A Correlation Rule can be configured to create incidents that must be
approved/disapproved manually, or
§ It can be configured to automatically approve/disapprove incidents it creates.
46
LAB
FIM Incidents
47 Qualys, Inc. Corporate Presentation
Responses
48 Qualys, Inc. Corporate Presentation
Rules
• Build rules to alert you, when:
1. Events are captured, or
2. Incidents are created
49 Qualys, Inc. Corporate Presentation
Sample Queries
• Construct your own
custom queries
OR
• Use the sample
Event and Incident
queries provided.
50 Qualys, Inc. Corporate Presentation
Trigger Criteria
1. Generate an alert for each matching Event or Incident.
2. Generate an alert, when a specified number of matches occur within a given time
window (any time of day).
3. Generate an alert for matches occurring between a specific start-time and end-
time, on a daily, weekly, or monthly schedule.
51 Qualys, Inc. Corporate Presentation
Actions
• Send to PagerDuty
• Send Email (via Qualys)
• Post to Slack
52 Qualys, Inc. Corporate Presentation
LAB
FIM Responses
53 Qualys, Inc. Corporate Presentation
FIM & Policy Compliance
54 Qualys, Inc. Corporate Presentation
Cloud Agent & FIM Module OS Support
§ Host OS must be supported by both Qualys Cloud Agent and the FIM
module.
§ The Qualys Policy Compliance module provides additional OS coverage.
55
55
User Defined Control (UDC)
§ Qualys Policy Compliance has four “User Defined Control” types that
perform file and directory integrity checks.
User Defined Control (UDC) - custom controls created by users.
System Defined Control (SDC) - controls provided by Qualys.
56
Scan Parameters
57
Use Scan Data as Expected Hash Value
§ “Use scan data as expected value” to compare the hash value from the
previous scan to the hash value of the latest scan.
58 Qualys, Inc. Corporate Presentation
Additional OS Support
and more...
59
Policy Compliance Training
qualys.com/learning
60
Data Collection Comparison
Policy Compliance FIM
Qualys Sensor(s) Scanner Appliance and Cloud Agent, only.
Cloud Agent.
Timing & Frequency File and directory integrity Continuous collection of
checks are performed at file and directory changes,
scheduled frequencies. as they occur.
61
Thank You
[email protected]
62 Qualys, Inc. Corporate Presentation