SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Implementing Distributed
Novell Sentinel Environments
                   ®
                            ™


A Customer Case Study



Christine Deger           Norbert Klasen
Department Manager        Senior Consultant
IT Security               nklasen@novell.com
christine.deger@gavi.de
Overview

    •   What is GaVI?
         –   A short introduction

    •   Data retention
         –   Legal requirements

    •   How to get there
         –   Planning / decision / implementation

    •   Demonstration
    •   Lessons Learned

2   © Novell, Inc. All rights reserved.
GaVI – IT Full Service …
… for public insurance companies in Germany
GaVI

    History
    •   Gavi was founded in 2003 as subsidiary company
        of three insurance companies
    •   Customers
         –   Insurance holding organizations which represent 33
             insurance companies

    •   Offered Services
         –   As a full service provider gavi offers all required IT services



4   © Novell, Inc. All rights reserved.
Assignment and Claim

    •   Supply or provision of all required IT services
    •   Coverage and increase of the economic efficiency and
        quality of our (and our customers‘) IT business
    •   Develop synergies
    •   Optimisation and homogenisation
    •   Structuring of technological strategies
    •   Consulting in all business areas

            As measured by its full service customers‘ gross premium income, GaVI is
             THE leading IT service supplier of the public insurance sector (71%)
             Germany‘s third largest IT service supplier within the insurance business
              (behind ASI C and ITErgo, on par with AMB Informatik Services)

5   © Novell, Inc. All rights reserved.
6




    Business Figures



                                                    2009
            Business figures
                                                    (in 1.000 EUR)

            Turnover exposure, thereof              176.000
            - Shareholders and their subsidiaries   174.400
            - other customers                         1.600


            Personnel costs                          42.000


            Material expenses (incl. services)      122.000




6   © Novell, Inc. All rights reserved.
GaVI - Facts and Figures
    Employees                             490
    Locations                             7 main locations
                                          5 secondary locations
    Business volume                       180 mio EUR (2008)
    Host system                           13.000 MIPS
    Central print                         260 mio pages p. a.
    Memory                                600 terabyte
    Server (logic)
    - UNIX/Linux                          700
    - others                              2.100
    PC work stations                      31.000
    Mobile devices                        21.000
    Service desk                          300.000 calls p. a.


7   © Novell, Inc. All rights reserved.
Data Retention
Legal Requirements

    •   EU Directive 2006/24/EC
         –   Retention of data generated or processed in connection with
             the provision of publicly available electronic communications
             services or of public communications networks
    •   German law
         –   Gesetz zur Neuregelung der Telekommunikationsüberwachung
             und anderer verdeckter Ermittlungsmaßnahmen sowie zur
             Umsetzung der Richtlinie 2006/24/EG
         –   2nd of march 2010 arrived a press release from the german
             federal consitutional court that contains that parts of the
             existing law are not in line with the consitutional requirements.
             This means, that all personal data had to be deleted from the
             databases.

9   © Novell, Inc. All rights reserved.
Legal Obligations

     •   For fixed telephony, (mobile telephony), Internet
         access, Internet email and Internet telephony
     •   Retain, for a period of 6 months, necessary data
          –   To trace and identify the source of a communication

          –   To identify the destination of a communication

          –   To identify the date, time and duration of a communication

          –   To identify the type of communication

     •   No data revealing the content of the communication
         may be retained
10   © Novell, Inc. All rights reserved.
Arguments On Data Retention

     •   Data retention is an invasion of privacy
     •   Disproportionate response to the threat of terrorism
     •   Costs of retaining data
     •   Several lawsuits have been filed by individuals and
         organizations
     •   Use of retained data has been restricted by BVerfG
     •   Some providers need not retain data until courts
         have reached final judgement


11   © Novell, Inc. All rights reserved.
Does the Law Apply to GaVI?

     •   Data Retention is required for publicly available
         services

     •   GaVI is no public internet service provider in the
         general sense

     •   But, some of its customers explicitly allow their
         employees private internet access

     •   Legal advisors determined, that GaVI must indeed
         retain data under the aforementioned laws



12   © Novell, Inc. All rights reserved.
13




     Devices to Monitor

     •   6 firewalls from 3 vendors

     •   13 VPN gateways from 2 vendors

     •   1 fax server

     •   2 mail relays

     •   13 proxy servers from 3 vendors

     •   100 PBXs from 10 vendors


13   © Novell, Inc. All rights reserved.
Solution

     •   GaVI had deployed Novell Audit to fulfill internal
                                           ®



         requirements on File Acess auditing
     •   Novell Audit was superseded by Sentinel , Novell’s award
                                                   ™



         winning general purpose Security Information and Event
         Management (SIEM) product
     •   Sentinel has a flexible Event Source Management that
         ships with a large number of connectors for all different
         kind of devices – from network devices such as firewalls
         and intrusion detection systems to vulnerability scanners,
         databases, and operating systems.
     •   An SDK allows for rapid development of custom connectors.
         This was key in supporting all Fax and Telephony systems
         at GaVI.
14   © Novell, Inc. All rights reserved.
Implementation
16




     Novell Sentinel         ®
                                           ™




      •   Sentinel is based on a message bus architecture that provides
          flexibility and scaling for large deployments


      •   Real-Time Analytics,
          Visualization


      •   Detect and analyze
          trends, threats,
          violations


      •   Drill-down into historical details from seconds to hours in the past

16   © Novell, Inc. All rights reserved.
Implementation
     •   Distributed architecture
          –   three Sentinel instances at major
              branch offices
          –   one central Sentinel instance for data
              retention purposes
     •   Local instances collect from
         event sources
          –   Data normalization
          –   Shot term storage
     •   Events relevant to data
         retention are forwarded to
         central instance
          –   Only allowed fields
          –   Log term storage

17   © Novell, Inc. All rights reserved.
Numbers

     •   Combined from all three
         branch offices
     •   Event Sources
          –   150
     •   Sustained event rate
          –   800 Events/s
     •   Peak event rate
          –   2000 Events/s
     •   Storage
          –   14 TB
     •   90% of events fall under data
         retention law
18   © Novell, Inc. All rights reserved.
Sentinel Link                  ™




     •   Sender
          –   Action and Integrator
          –   Event batch allows for better compression
          –   Reliable transport
          –   Encryption
     •   Receiver
          –   Connector and Collector
          –   Collector is a single thread and thus limited to one CPU core
          –   Limites parsing rate to ~500 eps
          –   Create dedicated connector/collector pairs for each event
              source

19   © Novell, Inc. All rights reserved.
Sentinel Link Demonstration
       ™
Lessons Learned
Project Costs

     •   Hardware
          –   150.000 € (210.000 $)

     •   Licenses
          –   259.000 € (362.600 $)

     •   Internal / External effort
          –   Internal: 52.000 € (72.800 $)

          –   External: 75.000 € (105.000 $)


22   © Novell, Inc. All rights reserved.
Event Forwarding

     •   Using database connector
          –   No good Identifier in event record
     •   Forwarding from Correlation Rules
          –   JavaScript actions are compiled for each event
          –   Allows ~ 20 actions per second
          –   Not fast enough
     •   Forward from Event Router
          –   Events are batched up
          –   Action is called once for a batch of up to 500 events


23   © Novell, Inc. All rights reserved.
Process

     •   Validate Data
          –   Ensure complete and correct forwarding of data

          –   Each event was shifted into the future by one hour

     •   Performance
          –   Always test for performance issues during pilot




24   © Novell, Inc. All rights reserved.
Requirements by BVerfG

     •   If a new a bill is to be passed, it must impose strict
         data security guidelines
          –   Separate storage

          –   Asymmetric encryption

          –   Four-eyes principle

          –   Advanced authentication mechanisms

          –   Non-repudiatable access and deletion logs



25   © Novell, Inc. All rights reserved.
Future

     •   Use deployed infrastructure for IT security monitoring
          –   Expand collection to Windows systems

          –   Correlate events across systems

          –   Track security incidents

          –   Automatically notify on suspicious or illegal activity

     •   Improve Compliance Reporting for IT Controls
          –   Fulfill requirements set forth by internal and external auditors


26   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...SWITCHPOINT NV/SA
 
Is Your Network Ready?
Is Your Network Ready?Is Your Network Ready?
Is Your Network Ready?Brocade
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Servicessmtmarketing
 
SDN Network virtualization, NFV & MPLS synergies
SDN Network virtualization, NFV & MPLS synergiesSDN Network virtualization, NFV & MPLS synergies
SDN Network virtualization, NFV & MPLS synergiesHector.Avalos
 
Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...
Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...
Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...TELECOM I+D 2011
 
#IBMEdge: Flash Storage Session
#IBMEdge: Flash Storage Session#IBMEdge: Flash Storage Session
#IBMEdge: Flash Storage SessionBrocade
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Servicessmtmarketing
 
Lon cv network_10072013
Lon cv network_10072013Lon cv network_10072013
Lon cv network_10072013nmeadows
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGrant Swanson
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit
 
Silver peak acceleration, agility and velocity
Silver peak   acceleration, agility and velocitySilver peak   acceleration, agility and velocity
Silver peak acceleration, agility and velocityresponsedatacomms
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityRed Hat India Pvt. Ltd.
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media NetworksAmine Choukir
 
Satcom for National Security and Intelligence Gathering Solution Overview
Satcom for National Security and Intelligence Gathering Solution OverviewSatcom for National Security and Intelligence Gathering Solution Overview
Satcom for National Security and Intelligence Gathering Solution OverviewST Engineering iDirect
 
SAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivitySAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivityADVA
 
Rambus corporate-overview
Rambus corporate-overviewRambus corporate-overview
Rambus corporate-overviewRambus
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTMark Ryan Castellani
 

Was ist angesagt? (20)

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
Is Your Network Ready?
Is Your Network Ready?Is Your Network Ready?
Is Your Network Ready?
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Services
 
SDN Network virtualization, NFV & MPLS synergies
SDN Network virtualization, NFV & MPLS synergiesSDN Network virtualization, NFV & MPLS synergies
SDN Network virtualization, NFV & MPLS synergies
 
Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...
Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...
Tutorial: "SmartSantander: Punto de encuentro entre la investigación en la In...
 
#IBMEdge: Flash Storage Session
#IBMEdge: Flash Storage Session#IBMEdge: Flash Storage Session
#IBMEdge: Flash Storage Session
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Services
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Lon cv network_10072013
Lon cv network_10072013Lon cv network_10072013
Lon cv network_10072013
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
Silver peak acceleration, agility and velocity
Silver peak   acceleration, agility and velocitySilver peak   acceleration, agility and velocity
Silver peak acceleration, agility and velocity
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media Networks
 
Satcom for National Security and Intelligence Gathering Solution Overview
Satcom for National Security and Intelligence Gathering Solution OverviewSatcom for National Security and Intelligence Gathering Solution Overview
Satcom for National Security and Intelligence Gathering Solution Overview
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
SAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivitySAN and FICON Long Distance Connectivity
SAN and FICON Long Distance Connectivity
 
Rambus corporate-overview
Rambus corporate-overviewRambus corporate-overview
Rambus corporate-overview
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
 

Ähnlich wie Implementing Distributed Novell Sentinel Environments: A Customer Case Study

Living objects network performance_management_v2
Living objects network performance_management_v2Living objects network performance_management_v2
Living objects network performance_management_v2Yoan SMADJA
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomGeorg Knon
 
SplunkLive! Wien 2016 - Use Case Swisscom
SplunkLive! Wien 2016 - Use Case SwisscomSplunkLive! Wien 2016 - Use Case Swisscom
SplunkLive! Wien 2016 - Use Case SwisscomSplunk
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunk
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
Meeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.EMeeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.ENuvollo
 
Nuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.ENuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.ENuvollo
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedAlan Percy
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...Haidee McMahon
 
Seize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderSeize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderCA Nimsoft
 
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Kenneth de Brucq
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoThousandEyes
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationNovell
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
Iconnyx - Making Cloud Systems a Reality for the Recruitment Industry
Iconnyx - Making Cloud Systems a Reality for the Recruitment IndustryIconnyx - Making Cloud Systems a Reality for the Recruitment Industry
Iconnyx - Making Cloud Systems a Reality for the Recruitment IndustryIconnyx
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsRon Batra
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 

Ähnlich wie Implementing Distributed Novell Sentinel Environments: A Customer Case Study (20)

Living objects network performance_management_v2
Living objects network performance_management_v2Living objects network performance_management_v2
Living objects network performance_management_v2
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
 
SplunkLive! Wien 2016 - Use Case Swisscom
SplunkLive! Wien 2016 - Use Case SwisscomSplunkLive! Wien 2016 - Use Case Swisscom
SplunkLive! Wien 2016 - Use Case Swisscom
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Meeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.EMeeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.E
 
Nuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.ENuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.E
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
 
Seize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderSeize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service Provider
 
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel Implementation
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
Iconnyx - Making Cloud Systems a Reality for the Recruitment Industry
Iconnyx - Making Cloud Systems a Reality for the Recruitment IndustryIconnyx - Making Cloud Systems a Reality for the Recruitment Industry
Iconnyx - Making Cloud Systems a Reality for the Recruitment Industry
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 

Mehr von Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Mehr von Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Implementing Distributed Novell Sentinel Environments: A Customer Case Study

  • 1. Implementing Distributed Novell Sentinel Environments ® ™ A Customer Case Study Christine Deger Norbert Klasen Department Manager Senior Consultant IT Security nklasen@novell.com christine.deger@gavi.de
  • 2. Overview • What is GaVI? – A short introduction • Data retention – Legal requirements • How to get there – Planning / decision / implementation • Demonstration • Lessons Learned 2 © Novell, Inc. All rights reserved.
  • 3. GaVI – IT Full Service … … for public insurance companies in Germany
  • 4. GaVI History • Gavi was founded in 2003 as subsidiary company of three insurance companies • Customers – Insurance holding organizations which represent 33 insurance companies • Offered Services – As a full service provider gavi offers all required IT services 4 © Novell, Inc. All rights reserved.
  • 5. Assignment and Claim • Supply or provision of all required IT services • Coverage and increase of the economic efficiency and quality of our (and our customers‘) IT business • Develop synergies • Optimisation and homogenisation • Structuring of technological strategies • Consulting in all business areas As measured by its full service customers‘ gross premium income, GaVI is  THE leading IT service supplier of the public insurance sector (71%)  Germany‘s third largest IT service supplier within the insurance business (behind ASI C and ITErgo, on par with AMB Informatik Services) 5 © Novell, Inc. All rights reserved.
  • 6. 6 Business Figures 2009 Business figures (in 1.000 EUR) Turnover exposure, thereof 176.000 - Shareholders and their subsidiaries 174.400 - other customers 1.600 Personnel costs 42.000 Material expenses (incl. services) 122.000 6 © Novell, Inc. All rights reserved.
  • 7. GaVI - Facts and Figures Employees 490 Locations 7 main locations 5 secondary locations Business volume 180 mio EUR (2008) Host system 13.000 MIPS Central print 260 mio pages p. a. Memory 600 terabyte Server (logic) - UNIX/Linux 700 - others 2.100 PC work stations 31.000 Mobile devices 21.000 Service desk 300.000 calls p. a. 7 © Novell, Inc. All rights reserved.
  • 9. Legal Requirements • EU Directive 2006/24/EC – Retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks • German law – Gesetz zur Neuregelung der Telekommunikationsüberwachung und anderer verdeckter Ermittlungsmaßnahmen sowie zur Umsetzung der Richtlinie 2006/24/EG – 2nd of march 2010 arrived a press release from the german federal consitutional court that contains that parts of the existing law are not in line with the consitutional requirements. This means, that all personal data had to be deleted from the databases. 9 © Novell, Inc. All rights reserved.
  • 10. Legal Obligations • For fixed telephony, (mobile telephony), Internet access, Internet email and Internet telephony • Retain, for a period of 6 months, necessary data – To trace and identify the source of a communication – To identify the destination of a communication – To identify the date, time and duration of a communication – To identify the type of communication • No data revealing the content of the communication may be retained 10 © Novell, Inc. All rights reserved.
  • 11. Arguments On Data Retention • Data retention is an invasion of privacy • Disproportionate response to the threat of terrorism • Costs of retaining data • Several lawsuits have been filed by individuals and organizations • Use of retained data has been restricted by BVerfG • Some providers need not retain data until courts have reached final judgement 11 © Novell, Inc. All rights reserved.
  • 12. Does the Law Apply to GaVI? • Data Retention is required for publicly available services • GaVI is no public internet service provider in the general sense • But, some of its customers explicitly allow their employees private internet access • Legal advisors determined, that GaVI must indeed retain data under the aforementioned laws 12 © Novell, Inc. All rights reserved.
  • 13. 13 Devices to Monitor • 6 firewalls from 3 vendors • 13 VPN gateways from 2 vendors • 1 fax server • 2 mail relays • 13 proxy servers from 3 vendors • 100 PBXs from 10 vendors 13 © Novell, Inc. All rights reserved.
  • 14. Solution • GaVI had deployed Novell Audit to fulfill internal ® requirements on File Acess auditing • Novell Audit was superseded by Sentinel , Novell’s award ™ winning general purpose Security Information and Event Management (SIEM) product • Sentinel has a flexible Event Source Management that ships with a large number of connectors for all different kind of devices – from network devices such as firewalls and intrusion detection systems to vulnerability scanners, databases, and operating systems. • An SDK allows for rapid development of custom connectors. This was key in supporting all Fax and Telephony systems at GaVI. 14 © Novell, Inc. All rights reserved.
  • 16. 16 Novell Sentinel ® ™ • Sentinel is based on a message bus architecture that provides flexibility and scaling for large deployments • Real-Time Analytics, Visualization • Detect and analyze trends, threats, violations • Drill-down into historical details from seconds to hours in the past 16 © Novell, Inc. All rights reserved.
  • 17. Implementation • Distributed architecture – three Sentinel instances at major branch offices – one central Sentinel instance for data retention purposes • Local instances collect from event sources – Data normalization – Shot term storage • Events relevant to data retention are forwarded to central instance – Only allowed fields – Log term storage 17 © Novell, Inc. All rights reserved.
  • 18. Numbers • Combined from all three branch offices • Event Sources – 150 • Sustained event rate – 800 Events/s • Peak event rate – 2000 Events/s • Storage – 14 TB • 90% of events fall under data retention law 18 © Novell, Inc. All rights reserved.
  • 19. Sentinel Link ™ • Sender – Action and Integrator – Event batch allows for better compression – Reliable transport – Encryption • Receiver – Connector and Collector – Collector is a single thread and thus limited to one CPU core – Limites parsing rate to ~500 eps – Create dedicated connector/collector pairs for each event source 19 © Novell, Inc. All rights reserved.
  • 22. Project Costs • Hardware – 150.000 € (210.000 $) • Licenses – 259.000 € (362.600 $) • Internal / External effort – Internal: 52.000 € (72.800 $) – External: 75.000 € (105.000 $) 22 © Novell, Inc. All rights reserved.
  • 23. Event Forwarding • Using database connector – No good Identifier in event record • Forwarding from Correlation Rules – JavaScript actions are compiled for each event – Allows ~ 20 actions per second – Not fast enough • Forward from Event Router – Events are batched up – Action is called once for a batch of up to 500 events 23 © Novell, Inc. All rights reserved.
  • 24. Process • Validate Data – Ensure complete and correct forwarding of data – Each event was shifted into the future by one hour • Performance – Always test for performance issues during pilot 24 © Novell, Inc. All rights reserved.
  • 25. Requirements by BVerfG • If a new a bill is to be passed, it must impose strict data security guidelines – Separate storage – Asymmetric encryption – Four-eyes principle – Advanced authentication mechanisms – Non-repudiatable access and deletion logs 25 © Novell, Inc. All rights reserved.
  • 26. Future • Use deployed infrastructure for IT security monitoring – Expand collection to Windows systems – Correlate events across systems – Track security incidents – Automatically notify on suspicious or illegal activity • Improve Compliance Reporting for IT Controls – Fulfill requirements set forth by internal and external auditors 26 © Novell, Inc. All rights reserved.
  • 27.
  • 28. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.