2. Agenda
•Budget challenges beyond CapEx/OpEx
•Foundations: The big picture and where to start
•Specific free & open-source tools to help at each step
•Real-World Experiences and Fun Stories*
*Randomly dispersed throughout
3. whoami – Kyle Bubp
• Just a dude trying to make things better.
4. Security: What’s the “True Cost”?
• Security = People + Processes + Products
People
• Salary
• Training
• Personal Dev
• Management
Processes
• Plan (policy)
• Build (tech)
• Test
• Improvement
Products
• CapEx/OpEx
• Support
• Time to Value
• Labor:Value
5. Why FOSS?
Not just for people with budget constraints!
It’s about time and control.
6. Commercial
1. Google search
2. Choose three
3. Contact vendors
4. Proof of concept
5. Wine & dine
6. Procurement
7. Implementation
Elapsed time: weeks/months
FOSS
1. Google search
2. Download
3. Configure
Elapsed time: minutes/hours
Why FOSS?
10. Foundational Blueprints and Frameworks
•NIST Standards and Frameworks
•CIS Critical Security Controls
•ISO 27000
•MITRE ATT&CK
11.
12. Document everything!
A core documentation repository is critical
•Policy, procedure, how-tos, etc:
• MediaWiki
• Atlassian Confluence ($10 for up to 10 users)
•Incident Response Ticketing/Documentation:
• RTIR (https://bestpractical.com/download-page)
• The Hive (https://thehive-project.org/)
13. Build from the ground up
1. Identify
2. Protect and Harden
3. Detect
4. Respond
5. Recover
14.
15. The Asset Discovery Dilemma
Active Scanning? Nmap? Vuln Scanner? No. Ask your network!
NetDB https://netdbtracking.sourceforge.net/
.ova available at https://www.kylebubp.com/files/netdb.ova
16. Other network mapping approaches
•nmap + ndiff/yandiff
• Not just for red teams.
• Export results, diff for changes.
• Alert if something changed.
•Netdisco
• https://sourceforge.net/projects/netdisco
• Uses SNMP to inventory your network devices
18. OpenVAS
•Fork of Nessus
•Still maintained
•Default vuln scanner in AlienVault
•Does a great job in comparison w/ commercial products
19. Web Apps too!
•Arachni Framework (arachni-scanner.com)
•OWASP ZAP (Zed Attack Proxy)
•Nikto2 (more of a server config scanner)
•Portswigger Burp Suite (not free - $350)
•For a comparison – sectoolmarket.com
20. In addition to fixing vulnerabilities…
•Build in some additional security on your web servers.
(also part of a secure configuration)
•Fail2ban
Python-based IPS that runs off of Apache Logs
•Modsecurity
Open source WAF for Apache, IIS, & nginx
21. Build from the ground up
1. Identify
2. Protect and Harden
3. Detect
4. Respond
5. Recover
26. Secure Configuration
•CIS Benchmarks / DISA Stigs
•Configuration Management, while not exciting, is important
•Deploy configs across your enterprise using tools like GPO, Chef, Puppet,
or Ansible
•Change Management is also important
• Use git repo for tracking changes to your config scripts
30. Build from the ground up
1. Identify
2. Protect and Harden
3. Detect
4. Respond
5. Recover
31. What’s happening on the endpoint?
•Facebook-developed osquery is effectively free EDR
• Agents for MacOS, Windows, Linux
• Deploy across your enterprise w/ Chef, Puppet, Ansible, or SCCM
• Do fun things like, search for IoCs (hashes, processes, etc.)
• Pipe the data into ElasticStack for visibility & searchability
•If you only need Windows, check out Microsoft Sysinternals Sysmon
32. What’s happening on the network?
•Elkstack
•Suricata
•Bro
•Snort
•SecurityOnion: put it all together
33. Logging and Monitoring
•Central logging makes detection and analysis easier
•Many options here, such as Windows Event Subscription, rsyslog
•Can also pipe to one central location with dashboards, such as ElasticStack
•Good idea to include DNS logs!
38. Parting thoughts…
• Build versus Buy
• Security Requirements don’t change, regardless of budget.
• Build a strong foundation and branch out.
• Consider scenarios – solve one scenario at a time, NOT all at once!
• Stay curious and contribute to projects you like.
• Community! Share ideas – learn from others
• DOCUMENT EVERYTHING