• No results found

VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE)

N/A
N/A
Protected

Academic year: 2021

Share "VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE)"

Copied!
29
0
0

Loading.... (view fulltext now)

Full text

(1)

VCE Word Template Table of Contents

1

© 2011 VCE Company, LLC. All Rights Reserved.

VBLOCK™ GRC SOLUTION WITH RSA

(GOVERNANCE, RISK, AND COMPLIANCE)

August 2011

(2)

Contents

Executive Summary ... 3

 

The Challenge ... 3

 

The Solution ... 4

 

Governance, Risk, and Compliance (GRC) as a Business Requirement ... 6

 

Growing Need for Internal Governance ... 6

 

Increasing Regulatory Demands ... 6

 

IT GRC as the Foundation ... 6

 

VCE and RSA Approach to Implementing IT GRC ... 8

 

VCE Security Management Approach ... 8

 

RSA Solution for Cloud and Security Compliance ... 9

 

Integrated VCE and RSA Approach to IT GRC ... 10

 

Technology Overview ... 15

 

Vblock

Infrastructure Platforms ... 15

 

RSA Components ... 15

 

Solution Architecture ... 18

 

Creating the RSA Solution for Cloud and Security Compliance ... 18

 

Hardware and Software Resources ... 18

 

Configuration Details ... 19

 

Solution Validation: PCI-DSS Compliance Use Case ... 21

 

Step 1: Implement Phase – Device Discovery ... 22

 

Step 2: Implement Phase – Compliance Checks ... 23

 

Step 3: Validate Phase – Assess Environment ... 23

 

Step 4: Validate Phase - Remediate Findings ... 24

 

Conclusion ... 27

 

Next Steps ... 27

 

Additional References ... 28

 

(3)

Executive Summary

Businesses large and small are moving quickly to take advantage of the financial and operational efficiency of virtualized converged infrastructures. IT departments are now able to transform from a reactive cost center to an agile, proactive, strategic business differentiator.

Security and compliance are repeatedly cited as top concerns for adoption of cloud across all industry verticals. With more and more organizations embracing the move to virtualization, converged

infrastructure platforms, and different cloud deployment models, the need for automated and timely assessment of the virtualized infrastructure's compliance to business and regulatory requirements has never been greater.

IT organizations are being asked to manage and provide visibility into the security and compliance posture of this new environment while seamlessly integrating with existing risk management policies. This shift in the data center demands consolidation, automation, and centralized visibility to ensure those making the decisions see a complete picture within the context of business risk.

There is a growing need for internal governance in the face of increasing regulatory demands. VCE customers leveraging Vblock™ Infrastructure Platforms want the ability to assess their platform and the solutions and services it presents, and to ensure compliance through automated and standardized means.

The Challenge

According to a recent Forbes Insights report (Seeding the Cloud: Enterprises Set Their Strategies for Cloud Computing 2010), 48% of the 235 CIOs and IT executives surveyed stated that they have virtualized at least a quarter of their organization’s servers to reduce infrastructure costs and deliver applications more rapidly. This adoption is not without its concerns and challenges, with security identified as the top concern of 43% of the respondents. Governance, Risk, and Compliance (GRC), specifically IT GRC, addresses this clear demand.

The IT GRC domain focuses on the management of IT-related controls. This is vital to the converged infrastructure provider as surveys indicate security ranks highest amongst the concerns for using cloud-based solutions. The ability to ensure oversight and to effectively report on technical security controls (such as firewalls, hardening configurations, and access management services) and non-technical controls (such as consistent use of processes, background checks for employees, and regular review of policies) is paramount to the provider’s success in ensuring the security and compliance objectives demanded by their customers.

Key benefits of a robust IT GRC solution include:

§ Creating and distributing policies and controls and mapping them to regulations and internal compliance requirements

§ Assessing whether the controls are actually in place and working, and remediating them if they are not

(4)

The Solution

VCE has teamed up with RSA®, the security division of EMC, to define a solution that leverages the power and flexibility of the RSA Solution for Cloud Security and Compliance (based on the RSA Archer eGRC Suite) to manage and govern the virtualization infrastructure components of the Vblock platform. The solution applies VCE’s four-phased security approach of Architect, Implement, Validate, and Govern.

The RSA Solution for Cloud Security and Compliance provides a single pane of glass to manage the security compliance of the Vblock platform. Based on several modules within the Archer eGRC Suite, RSA offers the RSA Solution for Cloud Security and Compliance for VMware® environments, which enables organizations to apply governance policies and control standards to the virtualization infrastructure, perform continuous and automated monitoring, simplify remediation workflows, and centrally view their compliance posture. The solution is intended to provide security and compliance monitoring of virtual and consolidated infrastructures. These infrastructures can be deployed for use as public or private clouds.

In addition to providing a single point to manage compliance activities, RSA Archer eGRC provides powerful and real-time dashboards and reports to allow those in the governance role to quickly and easily view the state of the environment and make decisions based upon the context of business risk. The converged Vblock Infrastructure Platforms provide revolutionary opportunities for standardization and reduced capital and operating expenses through virtualization. The resulting Vblock GRC solution with RSA provides tightly integrated, automated, and consistent processes and provides the

transparency needed by the organization’s decision makers to manage the security and compliance of their converged infrastructure and make informed decisions within the context of business risk.

Scope

This paper demonstrates how to secure and govern the virtualization infrastructure of Vblock

Infrastructure Platforms using the RSA Solution for Cloud Security and Compliance. The specific goal of this paper is to provide the methodical, iterative approach from VCE and RSA in the use of the RSA Archer eGRC Suite and the RSA Solution for Cloud Security and Compliance. The focus is on IT GRC for Vblock platforms.

This document is not intended as a how-to guide for installing and configuring the RSA Archer eGRC Suite or the RSA Solution for Cloud Security and Compliance. For information on those topics, refer to RSA SecurBook: RSA Solution for Cloud Security and Compliance: A Guide for Deploying and

(5)

Audience

This paper is intended for Vblock platform customers in the following roles:

§ Security and compliance managers and analysts responsible for day-to-day management of security and compliance

§ Virtualization administrators

§ Those responsible for IT and Security governance, such as chief information officers, chief information security officers, chief financial officers, chief risk officers, or chief compliance officers

§ Vice-presidents and directors with delegated authority over GRC programs

Terminology

The following table contains terms used throughout this paper.

Term Description

Cloud Computing A model for enabling convenient, on-demand network access to a shared

pool of configurable resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Converged Infrastructure Packages multiple IT components into a single computing solution.

Components of a converged infrastructure include servers, data storage devices, virtualization, networking equipment, and software for IT infrastructure management.

Enterprise GRC (eGRC) Describes how an organization defines the objectives, policies, and

procedures by which it is managed; pursues opportunities while avoiding or managing negative events; and demonstrates adherence to laws,

regulations, policies, and industry standards. Governance, Risk, and

Compliance (GRC) Organizations leveraging GRC processesor internal framework for satisfying governance requirements,  desire to establish a regulatory  evaluate risk across their enterprise, and track how the organization complies with the

established  governance requirements. GRC processes typically fall within

one of four key domains: IT, operations, finance and legal.  

IT GRC A domain of GRC focused on the management of IT related controls.

These may include security controls such as firewalls and or security information management system, system controls, automation and

vulnerability monitoring tools, identity and access management systems, or disaster planning and recovery systems.

Private Cloud The cloud infrastructure is operated solely for an organization. It can be

managed by the organization or a third party and can exist on premise or off premise.

(6)

Governance, Risk, and Compliance (GRC) as a Business

Requirement

This section looks at industry-related governance and compliance requirements.

Growing Need for Internal Governance

The need for internal governance is greater today than ever before. With media attention shifting to companies that fail to protect the sensitive information to which they are obligated, businesses and their executives and board members have to focus on the way they conduct business. Through effective governance, they can ensure that day-to-day operations and compliance aligns with corporate strategy. As they are ultimately accountable, executives and boards of directors need accurate and transparent information to ensure compliance and manage risk in relation to their business requirements.

Virtualization offers a powerful new way to manage and use digital information, but it also creates new complexities for organizations in managing risk, threats, and compliance. In virtualized environments, static, physical perimeters give way to dynamic, logical boundaries defined by information and transactions. Information, virtual machines (VMs), and entire networks relocate in the blink of an eye in virtual environments, so GRC measures must be just as adaptive and closely monitored.

Increasing Regulatory Demands

An increasing number of regulations and industry requirements are being imposed on companies globally to ensure that they safeguard the data they process and store and follow the required processes. Non-compliance is no longer an option, as enforcement entities are imposing penalties, sometimes for multiple millions of dollars, and even imprisonment for those in responsible positions. More frequently, these regulations and requirements are defining outcomes instead of outlining the methods to achieve them.This leaves companies with the task of developing compliance programs, documenting how to achieve these outcomes, and producing evidence to that end.

As companies move through their action plans to satisfy their compliance objectives, they are expected to integrate with risk management practices. The days of a simple checklist are fading quickly.

IT GRC as the Foundation

Historically, IT’s role was to take charge of what needed to be done to meet internal, regulatory, and industry requirements. Faced with today’s new and ever-changing requirements, IT is expected to manage the technical and compliance challenges to align with company strategy. The daunting task of mapping the governing policies and standards to technical controls and processes are falling increasingly on IT.

(7)

The IT GRC domain focuses on the management of IT-related controls. This ability to ensure oversight and report on security controls (such as firewalls, hardening configurations, and identity access management) and non-technical controls (such as consistent use of processes, employee background checks, and regular review of policies) is paramount to the success of the organization in ensuring the security and compliance demanded by customers.

By extending practices and solutions into additional domains, organizations can build a strong IT GRC foundation into enterprise GRC.

(8)

VCE and RSA Approach to Implementing IT GRC

This section examines the VCE security and RSA solution-enabled approach to implementing IT GRC for the VMware components of Vblock Infrastructure Platforms.

VCE Security Management Approach

VCE addresses information security management comprehensively. By using an iterative, methodical approach to both overall product security and the development of each solution, VCE ensures a holistic approach and a complete solution to address its customers’ security and compliance challenges and requirements.

The VCE multi-phased approach of Architect, Implement, Validate, and Govern is based on the industry-proven quality control cycle of Plan, Do, Check, Act (Deming Cycle), as used in the

internationally accepted standard ISO 27001. This ensures a consistent, standardized approach in the management of security and compliance for Vblock platforms.

Figure 1. VCE Security Approach

This cycle consists of four phases, defined as follows. Phase Description

Architect Clearly identify the business need or challenge needing to be solved. Design an

approach to align and prioritize business requirements with centrally documented policies, standards, and procedures.

Implement Implement a solution to solve the business need of the challenge. Configure the

solution to discover VMware devices and check VMware-based controls with both automated measurements and electronic questionnaires.

(9)

Phase Description

Validate Regularly monitor the VMware-based controls and manage non-compliant findings

through remediation or exception management processes.

Govern Use the dashboard and reporting features to provide transparency and visibility to

both IT administrators and the business decision makers on the security and compliance posture of the Vblock platform.

RSA Solution for Cloud and Security Compliance

RSA has developed a solution that enables organizations to meet their security and compliance requirements as they move toward virtualization and the cloud. The RSA Solution for Cloud Security and Compliance enables end-user organizations and service providers to orchestrate and visualize the security of their VMware virtualization infrastructure and physical infrastructure from a single management console. The solution includes software that discovers new virtual infrastructure devices and substantially automates the assessment of whether security controls have been implemented correctly.

By mapping both the controls found in the VMware vSphere Security Hardening Guide and additional controls based on RSA best practices to global regulations and industry standards, organizations can quickly assess their Vblock platform against the requirements mandated by today’s ever-changing regulatory requirements.

The solution provides a security management process, simplified by a cycle that includes VMware security-policy implementation and management, security and compliance measurement, issue remediation, and reporting – all from a single console.

(10)

Integrated VCE and RSA Approach to IT GRC

VCE and RSA have collaborated to provide a tightly integrated approach to security compliance, management, and governance. The approaches from each company complement and align with the other to address the need for a standardized, compliance-ready solution. Figure 3 shows how each phase of the VCE iterative approach maps to the RSA solution-enabled approach.

(11)

Architect Phase

This section looks at the Architect phase.

Define Policies

It is vital to have a clear understanding of the policies and requirements to which the environment must be governed. Organizations must comply with different regulatory requirements, based on their industry, business, and the data being processed and stored. The RSA Archer Library supports these regulatory requirements by providing more than 130 control procedures written specifically against RSA best practices and the VMware vSphere Security Hardening Guide and mapped to security policies and authoritative sources such as PCI-DSS, COBIT, NIST, HIPAA, NERC, Basel II, and EU Privacy Regulations.

The VMware-specific control procedures provide instructions for configuring and hardening the VMware infrastructure in the following areas:

§ Access control § Platform security § Information security § Operational security

RSA Archer can simultaneously evaluate the automated and manually collected compliance data against multiple authoritative sources, allowing for management against different requirements using the same data.

Establish Structure

To ensure transparency on the security and compliance posture of the VMware environment, it is important to define clear ownership of the various devices. The RSA Archer eGRC Suite provides the ability to map business data to the technical data collected automatically by the solution. This

business data helps ensure accountability and provides the foundation for the reporting structure used in the Govern phase. By populating RSA Archer with the appropriate business units, owners, and so forth, new devices will associate with their respective business data upon import.

(12)

Implement Phase

This section looks at the Implement phase.

Discovery and Compliance Check Configurations

After defining the policies, regulatory requirements, and business structure within RSA Archer eGRC, use the information to configure the RSA Automated Measurement Agent.

Install and configure the Automated Measurement Agent on a device having access to the VMware components of the Vblock platform. As this device has read-only credentials and network connectivity to the environment, it is important that it be controlled to maintain the confidentiality and integrity of the information.

N

Noottee:: The Automated Measurement Agent output files must be stored locally to the RSA Archer eGRC Suite to ensure successful import of the collected data.

Once the Automated Measurement Agent is creating output files, use the Data Feed Manager within the RSA Archer eGRC Suite to schedule the import of the collected data. Analyze the time required for each Automated Measure Agent to finish to ensure the Data Feed Manager import schedules allow time for the Automated Measurement Agent to complete.

(13)

Validate Phase

This section looks at the Validate phase.

Assess the Environment

With the Automated Measurement Agent configured and scheduled to run against the VMware environment, new devices and compliance findings against the devices will be automatically added to the solution.

N

Noottee:: It is recommended to run the discovery and compliance checks on a daily basis to ensure continuous visibility into the environment.

Newly populated devices require assessment against all the controls. Some cannot be assessed through automated means. Facilitate a manual assessment against each device by creating a web-based VMware questionnaire within RSA Archer to be answered by the device owners. Based on the responses to the questionnaire and the settings collected through automated means, RSA Archer automatically presents the status of the device as compliant or non-compliant.

Remediate Findings

After completing the questionnaire and populating the devices with the compliance issues found by the automated checks, generate Findings to engage the technical subject matter experts to remediate. Findings provide the subject matter experts with consistent, detailed information to remediate the compliance issues through step-by-step instructions and validation processes. RSA Archer tracks the completion progress of these Findings on the dashboard reports, providing transparency to those in the governance role.

(14)

Govern Phase

This section looks at the Govern phase.

Report and Govern

The RSA Solution for Cloud Security and Compliance provides Archer dashboard graphs and detailed reporting for those in the governance role. The RSA Archer eGRC Suite allows for customization of the reports and graphs and the addition and removal of reports, graphs, and so forth to meet the needs of those in the responsible role. The dashboard graphs and reports provide real-time access to the compliance status of the environment.

(15)

Technology Overview

Together VCE and RSA offer a robust and flexible solution based on industry-leading technology to business users needing visibility into the security and compliance posture of their virtualized infrastructure.

Vblock™ Infrastructure Platforms

Vblock Infrastructure Platforms are enterprise- and service provider-class IT infrastructure units that are pre-engineered, tested, and validated with pre-defined performance, capacity, and availability service levels. The standardized converged infrastructure of the Vblock platform is a foundational building block for cloud computing that helps customers to realize the benefits of applications running in a virtualized environment.

Vblock platforms are characterized by:

§ Repeatable units of construction based on matched performance, operational characteristics, and discrete requirements of power, space, and cooling

§ Repeatable design patterns that facilitate rapid deployment, integration, and scalability § An architecture that can be scaled for the highest efficiencies in virtualization

§ An extensible management and orchestration model based on industry-standard tools, APIs, and methods

§ A design that contains, manages, and mitigates failure scenarios in hardware and software environments

N

Noottee:: Refer to the Vblock Infrastructure Platforms Technical Overview for detailed information on the Vblock platform architecture.

RSA Components

RSA components include:

§ RSA Archer eGRC Suite (Enterprise, Compliance, and Policy Management modules) § RSA Solution for Cloud Security and Compliance

RSA Archer eGRC Suite

The RSA Archer eGRC Suite supports business-level management of governance, risk, and

compliance with a customizable and flexible solution. Organizations derive significant value from being able to apply governance policies and control standards to VMware infrastructure, performing

continuous compliance monitoring, simplifying workflows, and centrally viewing their compliance posture within the context of business risk.

(16)

The RSA Archer eGRC Suite provides a comprehensive library of policies, control standards, procedures, and assessments mapped to current global regulations and industry guidelines. Control procedures are written specifically against the VMware vSphere Security Hardening Guide and mapped to security policies and authoritative resources such as PCI-DSS, COBIT, NIST (FIPS, FISMA, and so forth), HIPAA, and NERC.

When compliance issues are identified, the Archer library provides the technical details and step-by-step remediation and assessment instructions to successfully bring the device back to a compliant state.

Using automated workflow with RSA Archer eGRC, a project manager can distribute security policies and control procedures to appropriate administrators for both physical and virtual infrastructure and then track the implementation of those control procedures from a single dashboard interface. The RSA Archer eGRC Suite consists of three logical layers that are deployed on two physical tiers.

Logical Layers

The RSA Archer eGRC Suite architecture is divided into three logical layers:

§ Interface: A collection of ASP .NET pages that invoke the application layer to retrieve and manipulate data.

§ Application: A collection of C# objects that communicate with the database through a common database object that encapsulates stored procedure calls.

§ Database: A collection of stored procedures that act upon the underlying data model of the platform.

Physical Tiers

The RSA Archer eGRC Suite architecture is deployed on two physical tiers. Depending on the needs of your organization, these tiers can be hosted on a single server or deployed across multiple servers.

§ Web tier: Hosts the logical interface and application layers. The application server is installed on Microsoft Windows Server and requires Microsoft Internet Information Server (IIS) and .NET Framework.

§ Database tier: The database server is Microsoft SQL Server and consists of the framework database for platform content and the configuration database for web server configuration information.

(17)

Configurations

Organizations can deploy the RSA Archer eGRC Suite in a variety of configurations, based on the expected user load, utilization, and availability requirements. As business needs evolve, the environment can adapt and scale to meet the new demands.

The following table describes the most common deployment configurations. Configuration Description

Single host In a basic deployment scenario, the Archer eGRC Suite is run on a single

server, with the application and database components running on the same server. This configuration is suitable for organizations:

§ With fewer than 50 concurrent users

§ That do not require a high-performance or high-availability solution

Multi-host The multi-host configuration separates the database and web application on

different servers. This configuration provides greater flexibility, as the database layer can be scaled out separately from the application layer. In many instances, organizations can leverage existing SQL servers or clusters. For enhanced security, the multi-host configuration can incorporate a double-firewall. This configuration places a firewall in front of the web server and another between the web and database servers.

High-availability

multi-host For high-availability environments, the Archer eGRC Suite deploys on a minimum of two web/application servers and two database servers. Incoming HTTP(s) requests are directed across the web servers via a load balancer, using a “sticky” session load balancing approach that distributes loads based on server availability.

RSA Solution for Cloud Security and Compliance

The RSA Solution for Cloud Security and Compliance enables end-user organizations and service providers to orchestrate and visualize the security of their virtualization infrastructure and physical infrastructure from a single console. The solution extends the Enterprise, Compliance, and Policy modules within the RSA Archer eGRC Suite with content from the Archer Library, dashboard views, questionnaires, and continuous compliance monitoring to provide a solution for cloud security and compliance. It features an easy to use dashboard based on the RSA Archer eGRC Suite; the dashboard integrates with a library of more than 100 VMware-specific controls that map to the most current global regulations to ensure best practices for deployment.

(18)

Solution Architecture

VCE and RSA have collaborated to provide a solution architecture that is scalable and easy to deploy. Although the solution was validated on Vblock Series 700, it applies to all Vblock Infrastructure Platforms.

Creating the RSA Solution for Cloud and Security Compliance

After installing and configuring the RSA Archer eGRC Suite using the deployment approach best suited for your organization, the next step is to create the RSA Solution for Cloud Security and Compliance using the solution package available from RSA Archer Customer Support to licensed RSA Archer customers. This package contains all files and instructions required to successfully create and configure the solution in the RSA Archer eGRC Suite. An RSA SecurBook provides guidance for deploying and operating this solution.

Organizations that require assistance with creating the RSA Solution for Cloud Security and

Compliance or that want to customize the solution to meet business requirements should contact RSA Sales (https://www.rsa.com/go/contactsales.asp) to schedule RSA Archer Professional Services. N

Noottee:: It is recommended that the RSA Archer eGRC Suite and RSA Solution for Cloud Security and Compliance be deployed in a manner supporting segregation from the infrastructure being monitored and managed. VCE vArchitects and RSA Professional Services can help determine the best manner for deployment to meet an organization’s requirements.

Hardware and Software Resources

The following table lists the hardware and software resources used to validate this solution.

Resource Description

Vblock 700 § Cisco UCS blade pack (2 chassis)

- 16 x B200 M1 (2 blades with 96 GB RAM, 14

blades with 48 GB RAM)

- 4 x 4 port UCS Extender card

§ Cisco Fabric Interconnect 6140

§ Cisco MDS 9506

§ EMC Symmetrix VMAX

§ VMware vSphere (version 4.1)

§ VMware vCenter Server (version 4.1)

RSA Archer eGRC Suite: Enterprise,

Compliance, and Policy modules Version 5.xxxx.xxx

RSA Solution for Cloud Security and

Compliance Version 1

Microsoft SQL Server 2005

Microsoft PowerShell Version 2

(19)

Configuration Details

In this validated solution, each VMware vSphere Hypervisor (ESXi) server was configured using service profiles on the Cisco UCS, per standard Vblock platform configuration practice. Additionally, nearly 50 virtual machines were configured based on different virtual machine templates and requirements.

Figure 4 shows a logical representation of the validation environment.

Figure 4 Validation Environment Diagram

The Automated Measurement Agent was installed and configured within the RSA Archer virtual machine to query the Vblock platform VMware vCenter servers – for the Advanced Management Pod (AMP) and for the Vblock platform, itself. The Automated Measurement Agent was configured to use read-only credentials in the VMware vCenter servers.

User accounts were created within RSA Archer and provided with rights and permissions through role-based controls. To categorize the VMware infrastructure components during discovery by the Automated Measurement Agent, several business units were created under the fictional company IT Unicorn, Inc. The business units and accounts are shown in the organizational chart in Figure 5.

(20)
(21)

Solution Validation: PCI-DSS Compliance Use Case

This solution demonstrates how the RSA Archer eGRC Suite manages and governs the VMware components of the Vblock Infrastructure Platforms using VCE’s four-phased approach of Architect, Implement, Validate, and Govern. By following the iterative approach outlined in this paper,

organizations can achieve continuous compliance against regulatory requirements such as PCI-DSS. The following scenario uses the fictional company IT Unicorn, Inc. and the business units and

accounts created during validation to show the automated solution described in this document. The scenario illustrates the ease with which devices can be brought under inspection for continued compliancy against PCI-DSS requirements, and how issues can be easily identified and remediated. N

Noottee:: The Architect phase was addressed during the set up of the organization structure and the defining of policies, as described in Configuration Details.

The scenario uses three roles, each with their own level of access and responsibilities in the IT GRC program.

Role Scenario

Name Description

Responsible leadership Tom Fergus C-level leader responsible for ensuring security and

compliance of the Vblock platform.

Security project manager Matt Wolfe Responsible for the administration and management of the

RSA Archer GRC framework. Ensures the collection of data into the solution and engages the appropriate system administrators for non-automated collections.

Virtualization administrator Sam Avery Responsible for the administration and management of the

VMware infrastructure for the Vblock platform. Figure 6 shows the steps performed in the validation process.

(22)

Figure 6. Validation Process

Step 1: Implement Phase – Device Discovery

During a scheduled query of the VMware vCenter Server managing the Vblock platform, the device Automated Measurement Agent discovers a newly created virtual machine named GlobalFin-Server1.

This device is identified as “Not Assessed” until the automated and manual assessment processes begin.

(23)

Step 2: Implement Phase – Compliance Checks

The configuration Automated Measure Agent queries the virtual machine and identifies settings found in the VMware vSphere Security Hardening Guide. The agent writes the findings of these compliance checks to an output file ready to be imported into the RSA Archer eGRC Suite and associated with the virtual machine.

Figure 7 shows the raw data findings for the GlobalFin-Server1 virtual machine.

Figure 7. Raw Data Findings

Step 3: Validate Phase – Assess Environment

The security program manager, Matt Wolfe, logs into the RSA Archer eGRC Suite and sees a new, non-compliant device in the Finance business unit. He begins the manual portion of the assessment by creating a VMware Questionnaire against the GlobalFin-Server1 virtual machine and assigns it to the device manager, Sam Avery, as shown in Figure 8.

(24)

Step A: Govern Phase - Dashboard View of Compliance

To ensure transparency and oversight of the process, Tom Fergus, the executive responsible for the GRC program for IT Unicorn, Inc. views the progress at both a granular and high-level view by business unit from the dashboard within the RSA Cloud Security and Compliance workspace. With the ability to view the compliance process as it progresses, Tom is able to understand the state of the

GlobalFin-Server1 virtual machine at any point in time.

Figure 9. Dashboard View of Compliance Findings

Step 4: Validate Phase - Remediate Findings

The final configuration item to bring GlobalFin-Server1 to a fully compliant state is the remediation of CP-107551 Remote Administrator’s Console Privacy. If left unattended, this non-compliant

configuration setting would allow a non-administrator to connect to the virtual machine console and observe an administrator’s session and actions.

(25)

Figure 10. Checking the Archer Library

Matt Wolfe engages the device manager, Sam Avery, with a remediation task. Sam Avery follows established change management processes and obtains the appropriate approvals; he then logs into the VMware vCenter Server and accesses the configuration parameters of the GlobalFin-Server1

virtual machine. He corrects the configuration values, as shown in Figure 11. Shortly after, Sam Avery completes the VMware Questionnaire for the GlobalFin-Server1 virtual machine.

(26)

Step B: Govern Phase - Dashboard View of Compliance

The next scheduled run of the Automated Measurement Agent reports the configuration setting for

GlobalFin-Server1 as Pass, which updates the status of the device to “Compliant.”

During his daily review of the environment, Tom Fergus sees that the VMware infrastructure for the Vblock 700 is in a compliant state against PCI-DSS requirements.

(27)

Conclusion

Organizations are undergoing a transformation to cloud computing. Brought on by the introduction of virtualization, this transformation is leading enterprises to reengineer their GRC management programs and methodologies to meet the demands and increasingly stringent expectations of both regulating authorities and a more informed public. At the same time, shareholders expect a reduction in capital and operating expenses as these requirements are being met.

Risk and compliance burdens are not going away. The globalization of business introduces significant risk with more points of vulnerability and exposure. The time is now for organizations to define and implement an eGRC strategy that drives accountability, consistency, security, and transparency. By selecting VCE as the vendor for converged infrastructure and RSA as the vendor for GRC, organizations can embrace virtualization knowing they can maintain compliance and manage risk through the consolidated, comprehensive, transparent approach this solution provides. With an easy to use web-enabled interface, the RSA Solution for Cloud Security and Compliance (based on the RSA Archer eGRC Suite) provides a consolidated framework to manage the security and compliance of the Vblock platform. With 130 virtualization-specific controls mapped to industry regulations, providers operating a Vblock platform can successfully monitor and manage their environment against different business requirements and regulatory mandates to satisfy the security and compliance concerns of their customers.

The need for automated and timely assessment of the virtualized infrastructure’s compliance to regulatory requirements has never been greater. The ability of the RSA Solution for Cloud Security and Compliance to regularly assess the environment for new or changed devices fills this need by enabling IT organizations to quickly provision virtualized devices in a matter of minutes versus days. With this business challenge met, organizations can now leverage their investments in the deployment of mission critical applications.

Next Steps

To learn more about this and other solutions, contact a VCE representative or visit http://www.vce.com.

(28)

Additional References

For additional information, see the documents listed below. § Vblock Infrastructure Platforms Technical Overview

http://www.vce.com/vblock/

§ RSA SecurBook: RSA Solution for Cloud Security and Compliance: A Guide for Deploying and Administering the RSA Solution for Cloud Security and Compliance

http://www.rsa.com/go/Securbook/Securbook_cloud_land.htm § VMware vSphere Security Hardening Guide

(29)

© 2011 VCE Company, LLC. All Rights Reserved. ABOUT VCE  

VCE, the Virtual Computing Environment Company formed by Cisco and EMC with investments from VMware and Intel, accelerates the adoption of converged infrastructure and cloud-based computing models that dramatically reduce the cost of IT while improving time to market for our customers. VCE, through the Vblock platform, delivers the industry's first completely integrated IT offering with end-to-end vendor accountability. VCE's prepackaged solutions are available through an extensive partner network, and cover horizontal applications, vertical industry offerings, and application development environments, allowing customers to focus on business innovation instead of integrating, validating and managing IT infrastructure.

For more information, go to www.vce.com. ABOUT RSA  

RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption and key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated.

For more information, go to www.rsa.com.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." VCE MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OR MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Copyright © 2011 VCE Company, LLC. All rights reserved. Vblock and the VCE logo are registered trademarks or trademarks of VCE Company, LLC. and/or its affiliates in the United States or other countries. All other trademarks used herein are the property of their respective owners.

Figure

Figure 1. VCE Security Approach
Figure 2. RSA Archer GRC Solution Cycle
Figure 3. Integrated Approach to IT GRC
Figure 4 shows a logical representation of the validation environment.
+7

References

Related documents

AT-A-GLANCE This course provides an overview of the concepts, processes, and procedures to effectively use RSA Security Operations Management Solution in a Security

In this project we first concentrate on the implementation and optimization of an ASIP using an ADL known as Language for Instruction Set Architecture (LISA) and CoWare

*Research Fellow, Sheffield Institute for International Development, The University of Sheffield, UK, School of Natural Resources and Environment, The University of Michigan, USA

Devido os índices de acidentes nos resultados encontrados representarem uma porcentagem baixa e os padrões de subnotificações no Brasil serem altos chegando a 95% e

Or, leverage an integration solution the same way we leverage SaaS software, as an Internet delivered, on-demand Service.. Thank you for reading

In contrast, the Logsmart IPDB architecture requires less storage than the incoming message data: its DE factor is 0.29, including all IPDB and analysis overhead as well as

In each step effect of molar ratio (methanol/oil) and the reaction time (45, 60, 75 and 90min) on acid value of the crude rice bran oil was studied.. A 500 ml sample of rice bran

This white paper explores scenarios in which RSA Archer and RSA Via Lifecycle and Governance (RSA Via L&G) solutions can be used together to provide higher levels of