Title: Enforcive CPA
1Enforcive CPA Cross Platform Auditing
2Company Profile
- Formed in 1983
- Pioneer in IBM mainframe and midrange security
- Offices in New Jersey, Toronto and Israel
- 80 Resellers in 60 countries
- Global distribution agreement with IBM
- Thousands of installations worldwide, including
Fortune 500 companies - Expertise in Compliance and Event auditing
cross platform
3Customers Around the World
4CPA Customers
5Customers from Many Segments
Banking Finance Insurance
Automotive
Electronics
Pharmaceutical Healthcare
Transportation
Manufacturing
Others
6Enforcive Cross Platform Security Offering
All products work together and can be operated
through a common GUI manager
CPS Cross Platform Security
ES for IBM i Enterprise Security
MF/CICS DB2
CPA Cross Platform Audit
CPC Cross Platform Compliance
PSS Password Self Service
Host Based Security, Audit Compliance for IBM i
GRC
Password Synchronization - SSO
Host Based Security Auditfor IBM mainframe
Log Management Database Activity Monitoring
- Access Management
- Field Encryption
- Log Management
- Compliance Management
- For IBM i
Windows Unix (AIX Solaris) Linux OS400 z/OS MS
SQL Server Oracle DB2 Sybase My
SQL Progess Syslog Flat File Format
Windows AIX IBM i (OS400 DB2) MS SQL
Server Oracle
IBM i Windows
- Access Management
- Field Masking
- Log Management
- for
- z/OS CICS
- VSE CICS
- DB2
- VSAM
6
7Easy Said.Easy Done.
Goodbye Haystacks. Find the needles youve been
looking for.
8What is the Cross-Platform Audit?
- An enterprise-wide Compliance Event Monitor.
- The CPA is all about practical organizational
security. It provides log monitoring for your
computer systems, and databases collecting and
consolidating data from across the enterprise.
Many sources available including Windows,
Mainframe, IBM i, Unix, DB2, SQL, Oracle and
Progress. - The CPA filters then collects the events into a
single database and presents them in an intuitive
GUI for ease of analysis and investigation.
9The Need
- Monitoring of the organization in order to
satisfy regulatory policies in a multi-platform
environment. - Administrators need minimal platform specific
expertise to achieve their goals. - Reduces the need to use local disk to store
historical log files. - Simplifies forensic investigation by correlating
seemingly unconnected events into an audit trail
indicating a possible breach of security.
10Differentiators
- A single Management Console is used to manage the
central repository as well as the individual
systems that are being monitored. - Focus is on critical information, for example the
important data changes performed in the database. - High visibility of changes using before and after
images. - Specialized IBM i logs covering many unique
event categories, with a high level of
granularity. - Specialized IBM Mainframe logs covering a large
amount of event categories, with a high level of
granularity.
11Features of the Cross-Platform Audit
- Collection of diverse data formats into a uniform
database. - Comprehensive monitoring in a multi-platform
environment. - Reporting real user activity utilizing all the
users identities. - Graphical analysis of security information
statistics. - Powerful filtering to pinpoint events with
specific characteristics. - Event information drill-down to the field change
level, incorporating before after images. - Audit information from different systems
available all in one place. - Comprehensive audit information for every
critical event, showing exactly who did what,
when and how.
12Collection Flow
13All Sources
System Audit File and Field Audit
Alerts Application Audit SQL Statement IP
Filter Compliance Message Queue History
Log View Data
-
- SMF TELNET
- SMF FTP
- SMF VSAM
- SMF RACF
- TCP/IP Application Audit (FTP and Telnet)
- DB2 SMF
- DB2 LOG (Data Audit)
- DB2 CICS (SQL Data Capture)
- DB2 BATCH (SQL Data Capture)
System Audit UNIX DB2
Audit Connect Query Prepare Execute
Shutdown Quit No audit Init DB Other
SQL Statements SQL System Audit SQL Data
Audit
SQL Statements Oracle System Oracle
Admin Oracle Profiles/Users Oracle
Procedures Data Audit
System Audit
System Audit X86 System Audit 86_64 System
Audit IA64 System Audit PPC64 System Audit
PPC System Audit S390X System Audit S390
- DB2 SMF MF
- DB2 LOG (Data Audit) MF
- DB2 CICS (SQL Data Capture) MF
- DB2 BATCH (SQL Data Capture) MF
- DB2 System Audit i, AIX, LUW
- DB2 SQL Statement Audit i, AIX, LUW
System Audit Data Audit
Windows Event Logs Security, Application,
DNS, and more Windows Active Directory
Compliance ISA Server logs DHCP logs IIS
Web Server logs Exchange Server
SYSLOG Sources Routers Firewalls
Antivirus Other SYSLOG senders
System Audit
14Event Sources (click category to expand)
- IBM Systems
- Open Systems
- Databases
- Microsoft Servers
- Syslogs
- (view all)
15IBM Systems
- IBM System i (AS/400)
- IBM System z (Mainframe)
- IBM System p (AIX)
- ltReturn
16IBM Systems
- Operating system V5R1M0 and above
- System Audit
- File and Field Audit
- Alerts
- Application Audit
- SQL Statement
- IP Filter
- Compliance
- Message Queue
- History Log
- View Data
- IBM System i (AS/400)
- IBM System z (Mainframe)
- IBM System p (AIX)
- ltReturn
17IBM Systems
- Operating system z/OS v 1.9 and above
- SMF TELNET
- SMF FTP
- SMF VSAM
- RACF (according to operating system)
- SMF RACF
- Communication Server (TCP/IP) (according to
operating system) - TCP/IP Application Audit (FTP and Telnet)
- DB2 v8, v9 and above
- DB2 SMF
- DB2 LOG (Data Audit)
- DB2 CICS (SQL Data Capture)
- DB2 BATCH
- IBM System i (AS/400)
- IBM System z (Mainframe)
- IBM System p (AIX)
- ltReturn
18IBM Systems
- IBM System i (AS/400)
- IBM System z (Mainframe)
- IBM System p (AIX)
- ltReturn
- Operating system IBM AIX 5.3
- System Audit
- UNIX DB2
19Open Systems
- Linux
- Solaris Coming Soon
- ltReturn
20Open Systems
- Operating system Linux all distributions (Red
Hat, CentOS) Kernel version gt 2.6 - System Audit X86
- System Audit 86_64
- System Audit IA64
- System Audit PPC64
- System Audit PPC
- System Audit S390X
- System Audit S390
- Linux
- Solaris Coming Soon
- ltReturn
21Cross-Platform SecurityEnterprise-wide
Compliance Event MonitorUpdated October, 2013
22Open Systems
- Linux
- Solaris Coming Soon
- ltReturn
23DatabasesAgentless collection
- SQL Server
- Oracle Server
- Progress OpenEdge
- DB2
- Sybase
- ltReturn
24DatabasesAgentless collection
- SQL Server 2005/2008
- SQL Statements
- SQL System Audit
- SQL Data Audit
- SQL Server 2000
- SQL Data Audit
- SQL Server
- Oracle Server
- Progress OpenEdge
- DB2
- Sybase
- ltReturn
25DatabasesAgentless collection
- V10 and up
- SQL Statements
- Oracle System
- Oracle Admin
- Oracle Profiles/Users
- Oracle Procedures
- Data Audit
- SQL Server
- Oracle Server
- Progress OpenEdge
- DB2
- Sybase
- ltReturn
26DatabasesAgentless collection
- SQL Server
- Oracle Server
- Progress OpenEdge
- DB2
- Sybase
- ltReturn
- V10, V11
- System Audit
- Data Audit
27DatabasesAgentless collection
- DB2 v8, v9 and above
- DB2 SMF
- DB2 LOG (Data Audit)
- DB2 CICS (SQL Data Capture)
- DB2 BATCH
- DB2 LUW (Linux UNIX Windows)
- DB2 System Audit
- DB2 SQL Statement Audit
- SQL Server
- Oracle Server
- Progress OpenEdge
- DB2
- Sybase
- ltReturn
28DatabasesAgentless collection
- SQL Server
- Oracle Server
- Progress OpenEdge
- DB2
- Sybase
- ltReturn
29Microsoft ServersAgentless collection
- Windows Server 2008
- Windows Server 2003
- Windows Server 2000
- Windows 7
- Windows XP
- ltReturn
30Microsoft ServersAgentless collection
- Windows Event Logs Security, Application, DNS,
and more - Windows Active Directory Compliance
- ISA Server logs
- DHCP logs
- IIS Web Server logs
- Windows Server 2008
- Windows Server 2003
- Windows Server 2000
- Windows 7
- Windows XP
- ltReturn
31Microsoft ServersAgentless collection
- Windows Event Logs Security, Application, DNS,
and more - Windows Active Directory Compliance
- ISA Server logs
- DHCP logs
- IIS Web Server logs
- Windows Server 2008
- Windows Server 2003
- Windows Server 2000
- Windows 7
- Windows XP
- ltReturn
32Microsoft ServersAgentless collection
- Windows Event Logs Security, Application, DNS,
and more - Windows Active Directory Compliance
- ISA Server logs
- DHCP logs
- IIS Web Server logs
- Windows Server 2008
- Windows Server 2003
- Windows Server 2000
- Windows 7
- Windows XP
- ltReturn
33Microsoft ServersAgentless collection
- Windows Event Logs Security, Application, DNS,
and more - Windows Active Directory Compliance
- Windows Server 2008
- Windows Server 2003
- Windows Server 2000
- Windows 7
- Windows XP
- ltReturn
34Microsoft ServersAgentless collection
- Windows Event Logs Security, Application, DNS,
and more - Windows Active Directory Compliance
- Windows Server 2008
- Windows Server 2003
- Windows Server 2000
- Windows 7
- Windows XP
- ltReturn
35Syslogs
- Routers
- Firewalls
- Antivirus
- Other Syslog senders
- ltReturn
36Syslogs
Standard Syslog messages can be picked up by the
Enforcive Syslog Connector, then forwarded to the
CPA Manager. If required CPA can act as a SYSLOG
server.
- Routers
- Firewalls
- Antivirus
- Other Syslog senders
- ltReturn
37Syslogs
Standard Syslog messages can be picked up by the
Enforcive Syslog Connector, then forwarded to the
CPA Manager. If required CPA can act as a SYSLOG
server.
- Routers
- Firewalls
- Antivirus
- Other Syslog senders
- ltReturn
38Syslogs
Standard Syslog messages can be picked up by the
Enforcive Syslog Connector, then forwarded to the
CPA Manager. If required CPA can act as a SYSLOG
server.
- Routers
- Firewalls
- Antivirus
- Other Syslog senders
- ltReturn
39Syslogs
Standard Syslog messages can be picked up by the
Enforcive Syslog Connector, then forwarded to the
CPA Manager. If required CPA can act as a SYSLOG
server.
- Routers
- Firewalls
- Antivirus
- Other Syslog senders
- ltReturn
40Feature CPA as SYSLOG Server
41- Our Goal
- Simplicity in implementation
- and daily use.
42Implementation Simple Steps
43Examples Using CPA
- Make a change to table contents in SQL
- View that event locally
- View that event in the Central Repository
- Defining an audit policy
- How to define which events are collected
- How to alert on critical events
- Investigating a global users activities
- Visual analysis
- Correlation Reporting
441 Make a change to table contents in SQL
- This example demonstrates how the CPA Repository
will monitor critical events within a database A
user executes an SQL statement to change the
salary field in an employee record.
452 View that event locally
- The change appears locally, both in the SQL
Statement Audit and in the Data Audit - SQL Statement Audit
-
Data Audit
Current
Previous
463 View that event in the Central Repository
- Once collected into the Repository the
information can be filtered by date, platform and
user. The event will appear both as an SQL
statement and a Data Audit event showing the
changes
Current
Previous
474 Defining an Audit Policy
484 Defining an Audit Policy
494 Defining an Audit Policy
504 Defining an Audit Policy
514 Defining an Audit Policy
525. How to define which events are collected.
536 How to alert on critical events.
547 Investigating a Global Users Activities
IBM z IBM i Windows AIX DB2
558 Visual Analysis
568 Visual Analysis
579 Correlation Reporting
589 Correlation Reporting
- Database contents before and after image report
599 Correlation Reporting
- Mainframe Violations in both RACF and DB2
609 Correlation Reporting
- Oracle Logon Failure Report
619 Correlation Reporting
62Sneak Peek User Identification Functionality