Paul Green –President and Founder of G2, Inc –We are trusted security advisors to the Federal Government and Fortune 500. –We are recognized as having.

Slides:



Advertisements
Similar presentations
The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Advertisements

OWASP Secure Coding Practices Quick Reference Guide
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST.
Bill McClanahan – Principal Business Consultant LPS Integration.
System Hardening … Made Easy Security Configuration Management Michael Betti, Sr. SE, Tripwire.
I NDULGENC E There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
NSA/DISA/NIST Security Content Automation Program Vulnerability Compliance & Measurement Stephen Quinn & Peter Mell Computer Security Division NIST.
The State of Security Management By Jim Reavis January 2003.
Peter Mell and Stephen Quinn Computer Security Division NIST
Standardizing and Automating Security Operations Presented by: National Institute of Standards and Technology.
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
FDCC 1 August 2007 Update Matt Barrett National Institute of Standards and Technology.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Stephen S. Yau CSE , Fall Security Strategies.
Vulnerability Assessments
Executive Overview. PLEASE READ (hidden slide) To deliver this presentation effectively, you need to be familiar with Windows Server 2008 R2 management.
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Patch Management Strategy
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
© 2011 The MITRE Corporation. All rights Reserved. Approved for Public Release: Distribution Unlimited You’re Not Done (Yet) Turning Securable.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
How To Apply Quality Management
Security and Privacy Services Cloud computing point of view October 2012.
Security Assessments FITSP-A Module 5
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Automating STIGs: The Transition to CCI and SRG
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Engineering Essential Characteristics Security Engineering Process Overview.
Paul Butterworth Management Technology Architect
Security Automation May 26th, Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Configuration Management for Digital Upgrades Configuration Management Benchmarking Group 2008 Conference Scott Patterson Program Manager for I&C Obsolescence.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Trusting your organisation UK Card Fraud Conference 2012 Keith Dewey, 28 March 2012.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
SQA project process standards IEEE software engineering standards
Security Checklists for IT Products
Identity & Access Management Services
How To Apply Quality Management
Security Standard: “reasonable security”
SQA project process standards IEEE software engineering standards
Compliance with hardening standards
Introduction to the Federal Defense Acquisition Regulation
KEY INITIATIVE Internal Control and Technical Accounting
Modernizing Risk Management to Support Evolution of IT
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Paul Green –President and Founder of G2, Inc –We are trusted security advisors to the Federal Government and Fortune 500. –We are recognized as having subject matter expertise in the implementation security compliance monitoring software.

Our Clients

Still True in 2006 “Through 2005, 90 percent of cyber attacks will continue to exploit known security flaws for which a patch is available or a preventive measure known.” Gartner Group, May 6, 2002

1.What is Security Automation (XCCDF/OVAL)? Let’s Address Two Questions. 2.How can security automation improve the system security configuration lifecycle?

What is Security Automation?

Conceptual Analogy

Outsource In-House Conceptual Analogy

Outsource In-House a.) Troubleshoot/Analyze Conduct Testing Is there a problem? Cause of error condition? Is this check reporting correctly? b.) Document/Report Findings c.) Recommendations d.) Remediate Conceptual Analogy

Outsource In-House a.) Troubleshoot/Analyze Conduct Testing Is there a problem? Cause of error condition? Is this check reporting correctly? b.) Document/Report Findings c.) Recommendations d.) Remediate Standardize & Automate a.) Troubleshoot/Analyze Is there a problem? Cause of error condition? Is this check reporting correctly? More DATA Conceptual Analogy

BeforeAfter Error Report Problem: Air Pressure Loss Diagnosis Accuracy: All Sensors Reporting Expected Cost: $25.00 Diagnosis: Replace Gas Cap Conceptual Analogy

XML Made Simple XCCDF - eXtensible Car Care Description Format OVAL – Open Vehicle Assessment Language 1997 Ford Contour Gas Cap = On <> Oil Level = Full <> Side of Car <> Turn <> Hood <> … <>

XCCDF & OVAL Made Simple XCCDF - eXtensible Checklist Configuration Description Format OVAL – Open Vulnerability Assessment Language NIST SP /22/ Windows XP Password >= 8 <> FIPS Compliant <> … <> 8 … <>

The Connected Path Security Control Security Guidance NVD Produced in XML Format COTS Tool Ingest API Call Result

RegQueryValue (lpHKey, path, value, sKey, Value, Op); If (Op == ‘>” ) if ((sKey < Value ) return (1); else return (0); Result AC-7 Unsuccessful Login Attempts AC-7: Account Lockout Duration AC-7: Account Lockout Threshold - HKEY_LOCAL_MACHINE Software\Microsoft\Windows AccountLockoutDuration - 5* lpHKey = “HKEY_LOCAL_MACHINE” Path = “Software\Microsoft\Windows\” Value = “5” sKey = “AccountLockoutDuration” Op = “>“ Security Control Security Guidance NVD Produced in XML Format COTS Tool Ingest API Call The Connected Path

For each OS/application Required technical security controls Low Level Checking Specification Security Specifications for Platforms And Application - Vulnerabilities - Required Configurations - Necessary Security Tools List of all known vulnerabilities Secure Configuration Guidance

How Does This Change the Lifecycle?

What Are My SSCL Goals? To facilitate easy-to-manage, consistent server compliance monitoring Evolve server security strategy from reactive to proactive Reduce attack surface and minimize operational risk Near-real-time, verifiable server compliance documentation These products will automate and change the way we validate and test our high-level requirements

Adopt & Adapt Compliance & Correction Develop & Deploy Review & Revise SSCL The System Security Configuration Lifecycle

Review existing industry and government configuration checklists and standards (CIS, NIST, NSA, Vendors, etc.) –Checklists are often prose documents or spreadsheets and are not machine readable Difficult to manage these files, AND, nearly impossible to compare “side-to-side” Adopt & Adapt

Customize standard/checklist based on compatibility and risk assessment –These are often conglomerations of various checklists creating N number of “custom” baselines When we account for operational issues we end up with NN variations. In the end, how does your “custom” implementation compare to the original standards? Adopt & Adapt

We now have a framework that provides traceability between our customized checklists and high level requirements. (e.g , 8500) Educate our clients that a machine readable format for checklists allows us to spend less time on document management and more time focused on other activities in the lifecycle. NSAP Adopt & Adapt

Develop & Deploy Develop configuration scripts (address all standard OS’s and builds) based on standards/checklists from A&A Customize standard/checklist based on compatibility and risk assessment Incorporate standards/checklists into automated auditing toolset

A larger number of man hours can now be saved by using tools that accept the machine readable XCCDF format by directly importing the policies into the security tools Develop & Deploy NSAP We want to create build scripts that interpret standardized XML inputs and configure build scripts We can now convert the current organization’s custom checklists into standardized XML format. (XCCDF/OVAL) Learn how to express “customer specific checks” that are may not be included in CCE Develop & Deploy

Report and communicate results –In many cases this process is still paper- based, are the results produce 1000’s of pages of information. Compliance & Correction Analyze output from each of the scanning tools, in certain cases this includes manual cross referencing of findings Remediate (initial cycles will produce large amounts of remediation)

A machine readable format can support a seamless integration with XCCDF compatible tools. Using CCE, we now also have a common reference that allows us to map the configuration results between different security tools. Compliance & Correction We can develop scripts to compare the standardized XML output from each of the scanning tools. Now we begin the decision process of determining and implementing the appropriate remediation path. NSAP This can include the analysis of compensating controls. Compliance & Correction

What’s Available Today? NIST Windows XP Configuration Guide (SP ) Policy statement represented in XCCDF Configuration checks represented in OVAL Covers: registry settings, file permission checks, password policies, account lockout policies, audit policies Download at: Alpha-rev1.ziphttp://checklists.nist.gov/NIST WinXPPro-XML- Alpha-rev1.zip

So Why Should You Care? The adoption of this process will provide the first ever hard linkage between a high- level guidance document and specific security configuration settings. This could be the beginning of a process of connecting the dots between regulations and security settings.