Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.

Slides:



Advertisements
Similar presentations
FDCC Implementation Efforts at Idaho National Laboratory Justin Hansen NLIT 2009.
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893)
Deploying GMP Applications Scott Fry, Director of Professional Services.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Paul Green –President and Founder of G2, Inc –We are trusted security advisors to the Federal Government and Fortune 500. –We are recognized as having.
Cyber Security: Past and Future John M. Gilligan CERT’s 20 th Anniversary Technical Symposium Pittsburgh, PA March 10, 2009.
Lumension: Because Hope is no Strategy Andreas Müller Regional Sales Manager D/A/CH.
Secure Configuration Management (SCM)
SCAP: Automating Our Way Out Of The Vulnerability Wheel Of Pain AppSec DC Ed Bellis VP, CISO Orbitz Worldwide
NSA/DISA/NIST Security Content Automation Program Vulnerability Compliance & Measurement Stephen Quinn & Peter Mell Computer Security Division NIST.
The State of Security Management By Jim Reavis January 2003.
Peter Mell and Stephen Quinn Computer Security Division NIST
Standardizing and Automating Security Operations Presented by: National Institute of Standards and Technology.
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
FDCC 1 August 2007 Update Matt Barrett National Institute of Standards and Technology.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Information System Continuous Monitoring (ISCM)
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
© 2011 The MITRE Corporation. All rights Reserved. Approved for Public Release: Distribution Unlimited You’re Not Done (Yet) Turning Securable.
Information System Continuous Monitoring (ISCM) FITSP-A Module 7.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
HIPAA COMPLIANCE WITH DELL
A Model for Exchanging Vulnerability Information draft-booth-sacm-vuln-model-01 David Waltermire.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
Agency Security Update Service (ASUS) Mike Bolger KSC CIO.
Federal IT Security Professional - Auditor
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Automating STIGs: The Transition to CCI and SRG
Module 14: Configuring Server Security Compliance
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
A Combat Support Agency Rapid Access Computing Environment (RACE) 17 August 2011 A Combat Support Agency Defense Information Systems Agency.
Update on IPv6 Transition U.S. Federal IPv6 Task Force Jane Coffin Co-Chair of the U.S. Federal IPv6 Task Force August 2011 – CITEL PCC.I, Mar del Plata,
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Synergy of the SCAP Program and IETF Activities BOF
Security Automation May 26th, Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSCE 548 Secure Software Development Security Operations.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
“Provide best value for customer agencies and taxpayers” 1 Software Asset Management Fred Allen - SAM Program Manager General Services Administration Interagency.
FDCC Shelly Bird Architect Microsoft Public Sector Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Federal Desktop Core Configuration FDCC NLIT 2008 May 2008 Stan Hall Cyber Technology Development Technical Project Manager Sandia is a multiprogram laboratory.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Clouding with Microsoft Azure
Secure Configuration Management (SCM)
Discussion Topics for Exploring OMG UPDM Way-ahead
BruinTech Vendor Meet & Greet December 3, 2015
Security Checklists for IT Products
Welcome Presented by Marc D’Aloisio and Frank Ward DOIT IT Security
Day 1 – Conference Presentations
Compliance with hardening standards
Putting It All Together
Putting It All Together
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893)
Metrics-Focused Analysis of Network Flow Data
I have many checklists: how do I get started with cyber security?
Matthew Christian Dave Maddox Tim Toennies
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893)
CVE.
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Presentation transcript:

Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards and Technology John Banghart, Booz Allen Hamilton Ensuring Secure Computer Configurations within the Federal Government

Federal Desktop Core Configuration (FDCC) Standardized security configuration for Windows XP and Windows Vista OMB and the CIO council seek to reduce federal systems vulnerability to individual and state sponsored cyber terrorism “OMB Deep Dive” (Office of President initiative) New government wide program (DOD, Intel, Civilian) that leverages existing components Deadline for deployment is February, 2008 Scope of program requires automation

Information Security Automation Program (ISAP) Interagency (NIST, NSA, DISA, OSD, DHS) response to the need for consistent standards-based vulnerability management in the federal government and private industry. Automate the implementation of information system security controls in the IT systems through security-data sharing in standard formats. Security Content Automation Protocol (SCAP) is the technical implementation of ISAP

Security Content Automation Protocol (SCAP) Enables standardized and automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA and DoD /8510 compliance) Enumeration of vulnerabilities, misconfigurations, platforms, and impact Machine readable security configuration checklists

SCAP Components Six open XML standards: Common Vulnerabilities and Exposures (CVE) Dictionary of security related software flaws Common Configuration Enumeration (CCE) Dictionary of software misconfigurations Common Platform Enumeration (CPE) Standard nomenclature and dictionary for product naming eXtensible Checklist Configuration Description Format (XCCDF) Standard XML for specifying checklists Open Vulnerability Assessment Language (OVAL) Standard XML for checking machine state Common Vulnerability Scoring System (CVSS) Standard for scoring the impact of vulnerabilities

Software Flaw Management CVE CPE CCE SCAP OVAL CVSS Compliance Management XCCDF Asset Management Configuration Management SCAP Interoperability

SCAP Vendors Currently Asserting SCAP Compatibility Planned SCAP Compatibility - FDCC Scanning Capable

SCAP Checklists SCAP Checklists: Windows Vista (FDCC Profile) Windows XP (FDCC Profile) Windows Vista Firewall (FDCC Profile) Windows XP Firewall (FDCC Profile) Windows Server 2003 Red Hat Linux Internet Explorer 7 (FDCC Profile) Microsoft Office 2007 Symantec Antivirus

SCAP Compliance Program Ensuring security tools comply to the NIST Security Content Automation Protocol (SCAP) enable agencies to continuously monitor systems against OMB mandated configuration settings (results mapped to FISMA) Supports Multiple Initiatives: OMB FDCC Secure Configuration Effort NIST FISMA Implementation Phase II (also applies to NIST HIPAA work) Information Security Automation Program (ISAP): OSD, DISA, NSA, DHS, NIST OSD Computer Network Defense Pilot NIST Checklist Program NIST National Vulnerability Database

SCAP and FISMA SCAP checklists have NIST mappings for the recommended configuration settings SCAP compliant tools report on the compliance of the setting to FDCC and to the corresponding technical control(s) Report provides evidence chain for due diligence.

Putting It Together Procurement Agencies require vendor assertion of FDCC compliance using language from OMB Memo M Agency Software Acceptance Testing Agencies verify accuracy of vendor assertion using SCAP compliant tools Routine Monitoring Continuous monitoring of agency computer configurations Ensure that configuration hasn’t been altered through patches, software installation, or human interaction NIST FISMA Phase II Certification FISMA reporting through mappings in SCAP checklists

Moving Forward Peter Mell, National Vulnerability Database National Institute of Standards and Technology John Banghart, Booz Allen Hamilton