Version 6 Discussion Brian Russell, Leidos Member 20 Critical Controls Editorial Panel & Chair, Cloud Security Alliance (CSA) IoT WG 20 Critical Security.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
System and Network Security Practices COEN 351 E-Commerce Security.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security: Principles and Practice
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Payment Card Industry (PCI) Data Security Standard
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Module 8: Implementing Administrative Templates and Audit Policy.
Incident Response Updated 03/20/2015
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 14: Configuring Server Security Compliance
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Module 5: Configuring Internet Explorer and Supporting Applications.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Evaluating & Maintaining a Site Domain 6. Conduct Technical Tests Dreamweaver provides many tools to assist in finalizing and testing your website for.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 10: Implementing Administrative Templates and Audit Policy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Module 7: Designing Security for Accounts and Services.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Information Security tools for records managers Frank Rankin.
Applying the CIS Critical Security Controls to the Cloud
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
International Planetary Data Alliance Registry Project Update September 16, 2011.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Enhancing Network Security
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Security Standard: “reasonable security”
Leverage What’s Out There
ServiceNow Implementation Knowledge Management
Introduction to System Administration
Introduction to System Administration
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Drew Hunt Network Security Analyst Valley Medical Center
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Version 6 Discussion Brian Russell, Leidos Member 20 Critical Controls Editorial Panel & Chair, Cloud Security Alliance (CSA) IoT WG 20 Critical Security Controls

1. New Control: and Web Browser Protection 2. Deleted Control: Secure Network Engineering 3. Re-ordered control: Controlled Use of Administrative Privileges 4. Spreadsheet version of Controls 5. New Companion Guides −Metrics and Measures Companion Guide −IoT Companion Guide −Mobile Security Companion Guide −Privacy Companion Guide Summary Changes for Version 6 of the 20 CSC

CSC 7 and Web Browser Protections ControlControl Description 7.1Ensure that only fully supported web browsers and clients are allowed to execute in the organization, ideally only using the latest version of the browsers provided by the vendor in order to take advantage of the latest security functions and fixes 7.2Uninstall or disable any unnecessary or unauthorized browser or client plugins or add-on applications. Each plugin shall utilize application/URL whitelisting and only allow the use of the application for pre-approved domains 7.3Limit the use of unnecessary scripting languages in all web browsers and clients. This includes the use of languages such as ActiveX and JavaScript on systems where it is unnecessary to support such capabilities 7.4Log all URL requests from each of the organization’s systems where onsite or a mobile device, in order to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems. Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and systems.

CSC 7 and Web Browser Protections (continued) ControlControl Description 7.5Deploy two separate browser configurations to each system. One configuration should disable the use of all plugins, unnecessary scripting languages, and generally be configured with limited functionality and be used for general web browsing. The other configuration should allow for more browser functionality but should only be used to access specific websites that require the use of such functionality. 7.6The organization shall maintain and enforce network based URL filters that limit a system’s ability to connect to websites not approved by the organization. The organization shall subscribe to URL categorization services to ensure that they are up-to-date with the most recent website category definitions available. 7.7To lower the chance of spoofed messages, implement the Sender Policy Framework (SPF) by deploying SPF records in DNS and enabling receiver-side verification in mail servers. 7.8Scan and block all attachments entering the organization’s gateway if they contain malicious code or file types that are unnecessary for the organization’s business. This scanning should be done before the is placed in the user’s inbox. This includes content filtering and web content filtering.

 IMO weakest control from Version 5  Outputs of control actions should be covered in other controls Deleted Control – Secure Network Engineering

Reflects the need to focus on securing high value administrative credentials Streamlined sub-controls within CSC5 Minimizing administrative privileges Using automated tools to inventory administrative accounts Changing default passwords Logging/alerting on the addition/removal of admin accts Logging/alerting on unsuccessful logins to admin accts Use MFA for admin access or long (14+ char) passwords if MFA not supported Use Sudo/RunAs, etc to elevate to admin privileges Use dedicated machine for admin tasks Promoted Controlled Use of Administrative Privileges from CSC 12 to CSC 5

 Needed a clear and concise recommendation for assessing and reporting on current state of implementation  Adopted terminology from NIST (Cyber Security Metrics and Measures): −“A measure is a concrete, objective attribute, such as the percentage of systems within an organization that are fully patched, the length of time between the release of a patch and its installation on a system, or the level of access to a system that a vulnerability in the system could provide.” −“A metric is an abstract, somewhat subjective attribute, such as how well an organization’s systems are secured against external threats or how effective the organization’s incident response team is. An analyst can approximate the value of a metric by collecting and analyzing groups of meaures.” Metrics & Measurements Companion Guide

 Each control includes a list of Measures with a unique ID for tracking  For each Measure, we present Metrics consisting of three “Risk Threshold” values −Enterprise adopters of the 20 Controls can choose a specific threshold that becomes a benchmark against which progress can be measured  Each control also includes an Effectiveness Test, which are suggested ways to independently verify the effectiveness of the control implementations Using the Metrics & Measurements Companion Guide

Focused on supporting a privacy impact assessment of the implementation of the 20 Controls 1. Overview: Outline the purpose of each Control and provide justification for any actual or potential intersection with privacy- sensitive information. 2. Authorities: Identify the legal authorities or enterprise policies that would permit or, conversely, limit or prohibit the collection or use of information by the Control. 3. Characterizing Control-related Information: Identify the type of data the Control collects, uses, disseminates, or maintains 4. Uses of Control-related Information: Describe the Control’s use of PII or privacy protected data. Describe how and why the Control uses this data 5. Security: Complete a security plan for the information system(s) supporting the Control Privacy Companion Guide

6. Notice: Identify if any notice to individuals must be put in place regarding the implementation of the Control, PII collected, the right to consent to uses of information, and the right to decline to provide information (if practical) 7. Data Retention: Will there be a requirement to develop a records retention policy, subject to approval by the appropriate enterprise authorities, to govern information gathered and generated by the Control? 8. Information Sharing: Describe the scope of the information sharing within and external to the enterprise that could be required to support the Control. 9. Redress: Enterprises should have in place procedures for invidiuals to seek redress if they believe their PII may have been improperly or inadvertently disclosed or misued through implementation of the Controls. 10. Auditing and Accountability: Describe what technical and policy safeguards and security measures might be needed to support the Control. Include an examination of technical and policy safeguards, such as information sharing protocols, special access restrictions, and other controls. Privacy Companion Guide (continued)

 IoT Companion Guide −A first effort to map IoT applicability to the 20 Controls  Mobile Security Companion Guide −A mapping of mobile security topics to the IoT We expect that these companion guides will feed into future updates to the 20 Controls Other Companion Guides