icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Data Access and Integrity

by Megan Daudelin
January 22, 2016

Monitoring data access and integrity is essential to the risk management process. By understanding where sensitive or valuable information is kept and who has access to it, security teams can better ensure file security and integrity. SecurityCenter is able to integrate with Nessus, the Passive Vulnerability Scanner (PVS), and the Log Correlation Engine (LCE) to monitor file access and signs of data leakage.

The Data Access and Integrity dashboard monitors data access and related vulnerabilities on the network. Specific plugins are used to indicate the presence of sensitive, proprietary, or questionable data. Specific events and vulnerabilities related to data access, leakage, and integrity are listed for review. Plugin IDs are used to filter for vulnerabilities related to file access and sharing, copyrighted files, and data storage. By monitoring data access, security teams can remediate vulnerabilities and adjust access policies as necessary to improve the security of their environment.

The components in the Data Access and Integrity dashboard present vulnerabilities and events related to data access and potential leaks. Indicators are used to show the presence of potentially questionable or high-risk data, such as torrent files or malware. Lists of events related to file access and data leak allow security teams to determine whether data integrity may be compromised. Counts of events by IP address are tracked to show which hosts generate the greatest counts of file integrity events so that necessary steps can be taken. All of the components can be modified to focus on specific subnets or assets that hold data of particular concern. Organizations can use the information provided to better understand the accessibility and vulnerability of data within their network.

This dashboard and its components are available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. This dashboard can be easily located in the SecurityCenter Feed under the category Monitoring. The dashboard requirements are:

  • SecurityCenter 4.8.2
  • Nessus 6.5.4
  • PVS 4.4.0
  • LCE 4.6.0

SecurityCenter Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. The Passive Vulnerability Scanner (PVS) performs deep packet inspection to enable discovery and assessment of operating systems, network devices, hypervisors, databases, tablets, phones, web servers, cloud applications, and critical infrastructure. The Log Correlation Engine (LCE) performs deep log analysis and correlation to continuously discover and track systems, applications, cloud infrastructure, trust relationships, and vulnerabilities. By integrating with Nessus, PVS, and LCE, SecurityCenter CV’s continuous network monitoring is able to detect systems and vulnerabilities across the enterprise.

Listed below are the included components:

  • Sensitive Data – Potential Sensitive Information: An indicator-based component triggers when certain elements are detected by an active Nessus scan. Such as material that may contain copyright information, office files, or NFS exports.
  • Data Access and Integrity – Data Access Vulnerabilities: The Data Access Vulnerabilities table lists the top ten vulnerabilities related to data access by count.
  • Questionable Hosting – Questionable Content Hosted: This component presents indicators of possible questionable content hosted on web servers on the network, including hosting .ini files, torrent files, archive files (which might contain sensitive data), media files (which might be copyrighted), and malware, as well as linking to malicious content, and serving possibly malicious script and iFrame tags.
  • Data Access and Integrity – File Access Events: The File Access Events table lists the most common events related to file access over the past 24 hours.
  • File Integrity Monitoring – IP Addresses With File Integrity Events: The IP Addresses with File Integrity Events table lists the IP addresses that have file change events attributed to them in the past 15 days.
  • Data Access and Integrity – Data Leak Events: The Data Leak Events table lists the most common events related to potential data leaks over the past 24 hours.