CipherInsight System Reference Guide
CipherInsight System Reference Guide
Table of Contents
1 Introduction. . . . . . . . . . . . . . . . 1 5 Explore. . . . . . . . . . . . . . . . . . . 28
QuantumXC.com #BeQuantumSafe / i i
Table of
1 Introduction Contents
This document describes the features and functionality of the CipherInsights product. The expectation is that the system
has already been installed and configured using the CipherInsights ISO Installation Guide and the CipherInsights Analytics
Hub Configuration and Management Guide.
The CipherInsights application provides a comprehensive automated internal assessment across 7 risk factors from
endpoints and authentication at the edge to the application servers and databases in the network core, along with all the
protocols connecting them.
Each risk factor is scored from 0 to 100, with 100 being the highest risk. The score is derived by assessing the vulnerabilities
associated with each risk factor. Each vulnerability is cataloged, and objective evidence is collected to drive remediation
efforts both internally and on network-connect third parties.
The CipherInsights application also provides a Zero Trust visibility solution for encryption and digital certificate visibility of
encrypted traffic in motion, when the associated license is installed.
• Automatic identification of encrypted and unencrypted traffic, at a macro level, down to session.
• Advanced filtering for the investigation of both encrypted and unencrypted traffic of on-net or off-net traffic in both
cloud and on-prem deployments.
• Discovery of all certificates that are in use inside a company’s infrastructure.
• Identification of certificates that are self-signed, contain wildcards or are expired and still being actively used.
• Reporting of the session usage count of various TLS versions, so older versions can be acted upon and removed,
enabling enforcement of security policy through active visibility.
• Display of all certificate authorities actively being used inside the infrastructure (valid, invalid, unknown).
• A discovery workbench to drill and trace into the session information including:
- List un-encrypted servers on net
- List obsolete TLS 1.0, 1.1 versions in use
- List self-signed certs in use
- List wildcard certs in use
- List expired certs in use
• Real-time processing of TCP sessions enables continuous discovery of all active servers responding to connection
attempts and their associated clients.
• Tabular and visual summaries and drill downs through a web console and an extensive set of analytical reports to
enable alignment of your encryption environment with best practices for securing data.
• Identification of all databases in use in the network.
• Ability to map applications based on certificate use.
This guide assumes the reader is familiar with logging in and navigating through the system. For detailed instructions on
system navigation, see the CipherInsights Analytics Hub Configuration and Management Guide.
QuantumXC.com #BeQuantumSafe / 1
Table of
When the user logs in to the CipherInsights application for the first time, they will be taken to the Cyber Risk page. After
allowing the system to collect data for a short period of time, one week is recommended, the first step of the evaluation
process is to run an assessment to generate the scorecard and dashboard view.
To run a one-week assessment, select a timeframe using Relative to Run Time and then set the start time to feed local
minus seven days.
QuantumXC.com #BeQuantumSafe / 2
Table of
Contents
Description and Timeframe
Run the initial assessment as One-off. Once you have evaluated the overall score you can adjust and then schedule on
a nightly, weekly, or monthly basis.
The left side of the screen provides the company The right side of the dashboard provides the scores for
aggregate score. The default configuration sets the five pillars of the CISA Zero Trust maturity model.
this score as the maximum of the five pillar scores
• Identity Risk
calculated by the system. The reason for this being
your overall security, and associated risk, is only as • Device Risk
strong as the weakest link. • Network Risk
• Application Risk
• Data Risk
Each pillar has one or more risk factors that are evaluated
and averaged to provide a risk score for that pillar.
QuantumXC.com #BeQuantumSafe / 3
Table of
Contents
The score is made up of the average of the User Authentication Risk Score and the User Authorization Risk Score.
QuantumXC.com #BeQuantumSafe / 4
Table of
Contents
User Authentication Risk
The Authentication Risk score is based on insecure vs secure forms of user authentication in the network under
evaluation. The application looks for relationships using LDAP vs LDAPs and Microsoft Global Catalog vs Microsoft
Global Catalog SSL.
The User Authorization Risk score is based on least-privilege, i.e., the number of endpoints accessing internal servers.
This scorer is still under development and is not used in scoring in this version of the software.
The score is made up of the average of the Encryption Quality, Certificate Trust, Certificate Validation, Segmentation,
and Volatility Risk scores.
QuantumXC.com #BeQuantumSafe / 5
Table of
Contents
Encryption Quality
The Encryption Quality scorer evaluates SSL and TLS usage in the network. Use of modern encryption – TLS1.2 and
TLS1.3 are scored positively. Use of obsolete encryption including SSLv3, TLS1.0, and TLS1.1 put the network at risk
and are identified for potential remediation.
QuantumXC.com #BeQuantumSafe / 6
Table of
Contents
Trust Risk
The Trust Risk scorer evaluates certificates to identify self-signed vs trusted third party certificate usage in the network.
Hackers use self-signed certificates to encrypt data for exfiltration from customer networks.
Validation Risk
The Validation Risk scorer evaluates certificates and certificate chains. The CipherInsights system attempts to validate
certificate chains to the root certificate of trust. If the root certificate cannot be found or identified, then the certificate
chain is invalid.
Segmentation Risk
The Segmentation Risk scorer is still under development at this time and is not used in risk scoring at this time.
Volatility Risk
The Volatility Risk scorer is still under development at this time and is not used in risk scoring at this time.
QuantumXC.com #BeQuantumSafe / 7
Table of
Contents
The score is made up of the average of the Availability Risk, Third-Party Risk, and SaaS Risk scorers.
Availability Risk
The Availability Risk score evaluates the use of expired certificates in the cyber environment. If an application is properly
configured to not allow the use of expired certificates, then that application will shut down when the server certificate expires.
Third-Party Risk
The Third-Party scorer is still under development at this time and is not used in risk scoring at this time.
SaaS Risk
The SaaS Risk scorer is still under development at this time and is not used in risk scoring at this time.
QuantumXC.com #BeQuantumSafe / 8
Table of
Contents
The score is made up of the average of the Privacy, Database, and Recovery Risk scorers.
Privacy Risk
The Privacy Risk scorer evaluates the protocols used to move data throughout the cyber environment.
QuantumXC.com #BeQuantumSafe / 9
Table of
Contents
Database Risk
The database risk evaluates the database traffic to determine if that traffic is encrypted.
Recovery Risk
The Recovery Risk scorer is still under development at this time and is not used in risk scoring at this time.
To adjust an existing assessment, click the Make Adjustments button at the bottom of the Company Aggregate pane:
You can adjust any assessment that has already been run. Select the assessment and then make adjustments on the
right side of the screen. For example, we can see the same assessment but with weighted average of all scores for the
company aggregate rather than the maximum value:
QuantumXC.com #BeQuantumSafe / 10
Table of
Contents
Select Weighted Average and Run Risk Assessment. When the assessment is complete, you will get a message
and a button to view the adjusted scores:
In this example, changing the Company Aggregate score to Weighted Average results in an overall score of 88 vs 100.
QuantumXC.com #BeQuantumSafe / 11
Table of
The Zero Trust pages of the CipherInsights product provide dashboard views into the nature of network traffic with respect
to encryption and digital certificates. In addition to collecting and evaluating session, traffic, and node data the system
evaluates digital certificates and will alert on possible violations such as untrusted, self-signed, or wild card certificates, and
definite violations in the form of expired certificates. The Zero Trust tab has two dashboard pages.
QuantumXC.com #BeQuantumSafe / 12
Table of
Contents
Hovering over and clicking either the Session or Traffic bar graph and clicking the encrypted or unencrypted portion will
filter the entire page with the associated information.
Clicking the View button takes you to the Discover page and displays the pre-defined Violations detailed report. Clicking
any individual option, such as “Self-Signed,” takes you to the same page and automatically enters the appropriate filter.
The Nodes Monitored modal provides information on both database and server nodes. Clicking the View button takes you
to the Discover page and displays the pre-defined Nodes detailed report. Clicking on either Database Nodes or Server
Nodes will take you to the Nodes report with the associated filter automatically configured.
QuantumXC.com #BeQuantumSafe / 13
Table of
Contents
Detailed session information is displayed at the bottom of the screen in tabular form, based on the selections entered in
the search criteria.
This data can be sorted by any of the columns in the display. The initial click will sort from lowest to highest, a second click
reverses the order.
QuantumXC.com #BeQuantumSafe / 14
Table of
Contents
The Certificate Authorities modal can be displayed either by connection count or client count. Selecting the “more”
count at the bottom of the page takes you to the Discover page and displays the Certificate Authority report which
displays all certificate authorities captured by the system.
The center portion of the display includes the encryption summary graph and a bar graph of certificate expirations.
Clicking any of the bars in the Expirations graph takes you to the Discover page and displays the certificate page, filtered
according to the graph you select.
The bottom of the page includes a list of certificate chains identified by the application, sorted by traffic volume.
QuantumXC.com #BeQuantumSafe / 15
Table of
Contents
Selecting an individual certificate from the list, by using the arrow button on the right side of the row, will take
you to the Certificate detail page. The system will provide an overview of the certificate, including Subject,
Issuer, Root CA, and Expiration. It also includes the Validation status and offers the user the ability to look at the
detailed certificate, text, and the mesh of the certificate chain.
QuantumXC.com #BeQuantumSafe / 16
Table of
Contents
QuantumXC.com #BeQuantumSafe / 17
Table of
4 Discover Contents
The Discover tab provides a rich search engine that allows you to query the system data lake and build reports derived
from all the data the system collects. The language is SQL-like, but specific to the CipherInsights system.
The system provides a pre-configured set of reports that can be viewed by clicking the saved search button on the left
side of the filter line. These reports are described later in this section.
QuantumXC.com #BeQuantumSafe / 18
Table of
Contents
Selecting one of the reports will provide an example of the language used to develop that report. For example,
the Nodes report will display:
The items included in the report are shown at the top of the page.
The box on the right is the sort order. If a field is sortable, it will be displayed in the drop-down box.
You can limit the amount of data in the report by using the filter bar at the top, and you can select previously saved queries
to filter the data. As in the case of other screens, the filter must be applied to adjust the results of the displayed report.
QuantumXC.com #BeQuantumSafe / 19
Table of
Contents
You can use the drop-down button to build a new report. When you click that button the list of options is
displayed. Click on an item to include it in the report.
When the items selected and filter are correct, the system will prompt you to click Apply to execute the report.
QuantumXC.com #BeQuantumSafe / 20
Table of
Contents
The system allows you to create a report from a properly formatted discovery search for use later in the Reports page.
Select the Apply button on the top right of the screen and then select Save Query to open the report creation tool.
QuantumXC.com #BeQuantumSafe / 21
Table of
Contents
The Description will be used on the reports page as the name of the report. The Report Title is displayed on the report
when run. The string entered in the Unique component output file name field will be added to the report each time it
is run and is important when multiple reports will be run and downloaded on the same day. The name must not contain
spaces or special characters other than dash (-) or underscore (_).
Check the appropriate box for pdf and/or csv file generation. To get the complete report in pdf, set the Maximum rows
to show in pdf report to zero. The system limits PDF reports to a maximum of 500 rows of data.
Each report created in the Discover page will be available in the Reports > DTA Report page, described in Section 6.
Items that can be grouped for display are listed in Table 4-1.
QuantumXC.com #BeQuantumSafe / 22
Table of
Contents
Traffic Volume Number of total bytes seen for the object in the report Number
Number of bytes destined for the client that were seen for
Traffic Volume to Client Number
the object in the report
Number of bytes destined for the server that were seen for
Traffic Volume to Server Number
the object in the report
QuantumXC.com #BeQuantumSafe / 23
Table of
Contents
4.1 Violations
The Violations page provides a tabular list of all sessions in which certificate violations were detected. The display
includes the number of connections and traffic volume. This data can be sorted by any of the columns in the display.
The initial click will sort from lowest to highest, a second click reverses the order.
4.2 Sessions
The Sessions page displays the complete detail for each session detected in tabular form. This includes both encrypted and
unencrypted sessions. The search criteria line can be used to narrow the display, and the data can be sorted by any of the
columns in the display. The initial click will sort from lowest to highest, a second click reverses the order.
QuantumXC.com #BeQuantumSafe / 24
Table of
Contents
4.3 Nodes
The Nodes page displays information on the nodes discovered by the product. The page can be filtered by
time and search criteria, like prior pages. The table can be sorted by any column displayed on the page.
QuantumXC.com #BeQuantumSafe / 25
Table of
Contents
4.5 Certificates
The Certificates page provides a tabular list of all certificates detected by the system. The data can be filtered using
the search bar and the amount of data can be adjusted based on the date, in the same manner as other pages. The
data can be sorted by clicking on the associated column.
The page includes an option to add or remove columns from the page display by editing the options at the top of the page.
Delete columns by clicking the x next to the item to remove and selecting Apply.
To add columns, use the drop-down arrow on the right side of the list and select the option you wish to display.
Certificate details such as subject, issuer, validation dates, subject key identifier, and authority key identifier are
displayed. You can click to view the certificate and PEM. The validation status of self-signed, wildcard, and certificate
authority are also displayed.
QuantumXC.com #BeQuantumSafe / 26
Table of
Contents
Finally, the current trust status is displayed. If the Trust identifier is “Infer,” it is being validated using the system
trusted certificate store. You may set the trust status of individual certificates on the Certificate Validation page. See
Section 7, Certificate Validation for details.
All certificate authorities are initially displayed; each column can be used to sort the display.
QuantumXC.com #BeQuantumSafe / 27
Table of
5 Explore Contents
The explore page provides a graphical view of server, client, and certificate interactions. The tool allows a user to map
applications and evaluate certificate usage.
Depending on the amount of traffic captured, the system will typically display “Too Many Data Points” if no search
criteria is entered.
The information button provides help for entering search criteria, including the format of the command. One simple
view is to select a specific server IP to evaluate:
QuantumXC.com #BeQuantumSafe / 28
Table of
Contents
The system defaults to displaying the session view, including servers, clients, and all certificates in use. Clicking
on the certificate view button in the top right of the screen will change the display to focus on the display on the
interactivity of the certificate.
Clicking on each of the datapoints in the graph will display detailed information about that entity.
The server display shows a list of all sessions, including the client IP, certificates, and certificate chains in use for each session.
Clicking a session will take you to the session detail page which includes encryption, traffic volume, and traffic rate information,
along with details on the certificate chain.
QuantumXC.com #BeQuantumSafe / 29
Table of
6 Reports Contents
The Reports page of the application provides access to pre-built reports on a variety of activity recorded by the system,
along with any reports you have built using the Dta discovery page.
All reports run on the system then downloaded to a local machine for viewing. The page includes a summary of the most
recently run reports on the right side of the screen. Those reports that have run will remain in the system until manually
deleted. All reports provide details on the top five of each category reported.
QuantumXC.com #BeQuantumSafe / 30
Table of
Contents
The report can be edited prior to running using the edit button and run on a schedule:
QuantumXC.com #BeQuantumSafe / 31
Table of
Contents
The reports can be run against traffic for All Time, End of Current Quarter, Weekly, Weekly on External network
connections, and Weekly on Internal network connections.
Each report can be edited prior to running using the edit button:
QuantumXC.com #BeQuantumSafe / 32
Table of
Contents
The reports can be run against traffic for All Time, End of Current Quarter, Weekly, Weekly on External network
connections, and Weekly on Internal network connections.
The report can be edited using the edit button and has several options:
QuantumXC.com #BeQuantumSafe / 33
Table of
Contents
The report can be downloaded as a PDF or CSV. The CSV contains the details from the top five of each
category in the report.
QuantumXC.com #BeQuantumSafe / 34
Table of
Contents
The report can be edited using the edit button and has several options:
QuantumXC.com #BeQuantumSafe / 35
Table of
Contents
Each report can be edited using the edit button and has the same options as those used to create the report originally.
QuantumXC.com #BeQuantumSafe / 36
Table of
Contents
QuantumXC.com #BeQuantumSafe / 37
Table of
Contents
Advanced options for the report include:
QuantumXC.com #BeQuantumSafe / 38
6.8 Recent Database or Client Activity Table of
Contents
The Recent Database or Client Activity report can be used to send nightly alerts when new databases are discovered,
or new clients are identified connecting to a database. Run the report nightly to send the alert. In addition, the email
alert settings must be configured via the shell or command line and include an alert name that is entered into the
report configuration.
Use Application Settings > Reports SMTP to configure the SMTP server that will process the report emails. See the
CipherInsights Configuration and Management Guide for details.
The time window for comparison of previously seen vs new databases or client activity is configurable; the report is
preconfigured to compare the previous day with the prior week leading up to that day.
To configure the report to run nightly, adjust the time range for viewing, set the alert for email or syslog notification,
and determine if the report will include new databases or new clients connecting to an existing database, use the
screens below.
QuantumXC.com #BeQuantumSafe / 39
Table of
Contents
The report includes details on top 5 servers and clients running encryption levels below NIST recommended levels
(SSL/V3, TLS1.0, and TLS1.1).
The report can be edited using the edit button and has several options:
QuantumXC.com #BeQuantumSafe / 40
Table of
Contents
The report can be edited using the edit button and has several options:
QuantumXC.com #BeQuantumSafe / 41
Table of
Contents
The report can be edited using the edit button and has several options:
QuantumXC.com #BeQuantumSafe / 42
Table of
The Application Settings > Certificate Sources page lists the validation settings and pre-programmed certificate sources
(trust stores) and that can be used by the system to validate certificates.
You can choose to Import additional certificates that you want to include as trusted or build your own trust store. Create a
file with the PEM of each certificate that you wish to be added to the system. Upload that file to the system using System >
File Management.
Once the file is on the system, you may then use the Import button to add the new trust store to the system.
The file must be tarred and zipped so that it has a file extension of .gz for the system to recognize it. The file name structure
must be xxx.pem.tar.gz.
QuantumXC.com #BeQuantumSafe / 43
Table of
Contents
The options for validation, with explanation and defaults, are listed in the table below.
QuantumXC.com #BeQuantumSafe / 44
Table of
Contents
Automatic validation of certificates Tells the system whether to validate certificates Yes
The default validation setting for each certificate is “Infer,” which means it will use the system certificate sources to determine if
a certificate is valid. That configuration can be adjusted on a per-certificate basis using this screen.
Select the Trust option drop down and select the option you wish to set.
QuantumXC.com #BeQuantumSafe / 45
Table of
The application can send alerts on a scheduled basis for a pre-determined set of activity identified by the software.
These alerts are found on the Reports page.
These reports/alerts can be run manually with the Run Report button, or automatically by configuring the alert to run
on a scheduled basis using the configuration button. Options for alert timing include half-hour, hourly, morning,
evening, or nightly.
QuantumXC.com #BeQuantumSafe / 46
Table of
Contents
The alerts are configured with windows of time relative to the current feed time. The application compares the current
window with the history window to determine if any new item has been identified, and alerts if it finds something new.
In the example shown, the system looks at data starting one day prior (feed now minus 1 day) up to the current time
(feed now), then compares that to 30 days (feed now minus 30 days) prior up to one day prior (feed now minus 1 days).
Those windows will be adjusted if the alerts are scheduled on a more frequent (half-hour, hourly) basis.
The Alert option determines how the alert will be delivered. The application creates a set of default alerts that sends
the message via syslog. For example, the expired certificate alert uses:
The system can be configured to send the alerts via email by changing the alert to “reports” and configuring the
Application Settings > Reports SMTP page.
QuantumXC.com #BeQuantumSafe / 47
Table of
Contents
Certificate of Compliance
Conditions of issuing:
Holly A Neiweem 1. Quantum Xchange has issued this certificate to indicate that
the company's user authentication environment has been
validated against industry cryptographic standard for strong
Holly A Neiweem as of the Date of Compliance stated below.
2. This certificate is valid through the expiration of the risk
Quantum Xchange, CFO assessment license.
3. The assessment shall not warrant or guarantee to any third
party that the company's environment is invulnerable to
Certificate ID: attack or compromise.
65cf65e5bfaea8413738bead459b0945 4. This certificate is issued by Quantum Xchange as a
commercial representation of work completed.
Issued On: 2023-07-13T20:37:52.184Z
Filter: No Filter
QuantumXC.com #BeQuantumSafe / 48