Wayne Patterson SYCS 654 Spring 2010. An Emerging Issue  Governments, the private sector, and academic institutions are beginning to focus on the importance.

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

Configuration Management
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Configuration Management Managing Change. Points to Ponder Which is more important?  stability  progress Why is change potentially dangerous?
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Database Management System
Security Controls – What Works
CSC 395 – Software Engineering Lecture 25: SCM –or– Expecting Change From Everything But Vending Machines.
Configuration Management
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Lecture 13: Security Control Issues Wayne Patterson SYCS 654 Spring 2010.
Configuration Management
Software Configuration Management
Software Configuration Management (SCM)
CSSE 375 Software Construction and Evolution: Configuration Management
Configuration Management Avoiding Costly Confusion mostly stolen from Chapter 27 of Pressman.
Michael Solomon Tugboat Software Managing the Software Development Process.
Configuration Management for Transportation Management Systems Establishing and Maintaining System Integrity.
OHT 2.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software Quality assurance (SQA) SWE 333 Dr Khalid Alnafjan
Purpose Program The purpose of this presentation is to clarify the process for conducting Student Learning Outcomes Assessment at the Program Level. At.
See:
Software Configuration Management (SCM)
Configuration Management, Logistics, and Universal CM Issues Larry Bauer Boeing Commercial Airplanes NDIA Conference Miami March 4-5, 2005
SEC835 Database and Web application security Information Security Architecture.
Introduction to Software Quality Assurance (SQA)
Information Systems Security Computer System Life Cycle Security.
Configuration Management T3 Webinar Feb 21, 2008 Chuck Larsen ITS Program Coordinator Oregon Department of Transportation.
Component-level testing – Equivalence partitioning, boundary value analysis, path testing Navigation testing – Testing navigation syntax and semantics.
Concepts of Database Management Sixth Edition
Software Configuration Management (SCM)
Wayne Patterson SYCS 654 Spring An Emerging Issue  Governments, the private sector, and academic institutions are beginning to focus on the importance.
1 Configuration Management “The Cookbook Approach”
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
SENG521 (Fall SENG 521 Software Reliability & Testing Software Product & process Improvement using ISO (Part 3d) Department.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Software Quality Assurance
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Software Project Management
Software Configuration Management (SCM). Product Developer Disciplines One view of the world is that there are three types of activities are required.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Software Configuration Management (SCM) Source: Pressman, R., Software Engineering: A Practitioner ’ s Approach. Boston: McGraw Hill, Inc., 2005; Ghezzi,
Maintaining and Sustaining System Integrity Configuration Management for Transportation Management Systems Configuration management (CM) describes a series.
State of Georgia Release Management Training
Software Quality Assurance. Software Quality Software quality is defined as the quality that ensures customer satisfaction by offering all the customer.
The NIST Special Publications for Security Management By: Waylon Coulter.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Configuration Control (Aliases: change control, change management )
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
TCSEC: The Orange Book.
Configuration Management
Configuration Management
Software Configuration Management
Software Project Configuration Management
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Data and database administration
Chapter 11: Software Configuration Management
Software Configuration Management
Software Engineering (CSI 321)
Configuration Management
How to Mitigate the Consequences What are the Countermeasures?
Chapter 11: Software Configuration Management
DATABASE SECURITY For CSCL (BIM).
HART Technologies Process Overview
Configuration Management
Presentation transcript:

Wayne Patterson SYCS 654 Spring 2010

An Emerging Issue  Governments, the private sector, and academic institutions are beginning to focus on the importance of developing policies for international information sharing as a mechanism for combatting international cybersecurity threats  To indicate Howard University’s role and interest in this process, we have entered into various partnerships regarding the field of cybersecurity domestically with such diverse institutions as George Mason University, Stevens Institute of Technology, the College of Charleston, the University of Texas at El Paso, and several others.  But cyberspace does not respect international boundaries, and so it is equally important to develop such partnerships internationally.  CM for information assurance, sometimes referred to as Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state. For example, configuration requirements may be different for a network firewall that functions as part of an organization's Internet boundary versus one that functions as an internal local network firewall.

SCM  The traditional software configuration management (SCM) process is looked upon by practitioners as the best solution to handling changes in software projects. It identifies the functional and physical attributes of software at various points in time, and performs systematic control of changes to the identified attributes for the purpose of maintaining software integrity and traceability throughout the software development life cycle.  The SCM process further defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. It identifies four procedures that must be defined for each software project to ensure that a sound SCM process is implemented. They are:  Configuration identification  Configuration control  Configuration status accounting  Configuration audits  Computer hardware configuration goes beyond the recording of computer hardware for the purpose of asset management, although it can be used to maintain asset information. The extra value provided is the rich source of support information that it provides to all interested parties. This information is typically stored together in a configuration management database (CMDB). This concept was introduced by ITIL.

Configuration Management  Configuration management is used to maintain an understanding of the status of complex assets with a view to maintaining the highest level of serviceability for the lowest cost. Specifically, it aims to ensure that operations are not disrupted due to the asset (or parts of the asset) overrunning limits of planned lifespan or below quality levels.  In the military, this type of activity is often classed as "mission readiness", and seeks to define which assets are available and for which type of mission; a classic example is whether aircraft on-board an aircraft carrier are equipped with bombs for ground support or missiles for defense.  A theory of configuration maintenance was worked out by Mark Burgess [4] [5] [6], with a practical implementation on present day computer systems in the software Cfengine able to perform real time repair as well as preventive maintenance.

Standards  ANSI/EIA National Consensus Standard for Configuration Management  EIA-649-A 2004 National Consensus Standard for Configuration Management  ISO 10007:2003 Quality management systems - Guidelines for configuration management  Federal Standard 1037C  GEIA Standard Configuration Management Data Exchange and Interoperability  IEEE Std IEEE Standard for Software Configuration Management Plans  MIL-STD-973 Configuration Management (cancelled on September 20, 2000)  STANAG 4159 NATO Material Configuration Management Policy and Procedures for Multinational Joint Projects  STANAG 4427 Introduction of Allied Configuration Management Publications (ACMPs)  CMMI CMMI for Development, Version 1.2 CONFIGURATION MANAGEMENT  IEEE Std IEEE Guide to Software Configuration Management  MIL-HDBK-61A CONFIGURATION MANAGEMENT GUIDANCE 7 February 2001  ISO Quality management - Guidelines for configuration management  GEIA-HB Implementation Guide for Configuration Management  ANSI/EIA National Consensus Standard for Configuration Management  EIA-836 Consensus Standard for Configuration Management Data Exchange and Interoperability  ANSI/EIA Processes for Engineering a System

Separation of Duties  In order to develop a separation of duties, a mechanism such as the creation of compartments is necessary.  Such a separation allows for the implementation of need to know policies.

Need to Know  The term "need to know", when used by government and other organizations (particularly those related to the military or espionage), describes the restriction of data which is considered very sensitive.governmentmilitaryespionage  Under need-to-know restrictions, even if one has all the necessary official approvals (such as a security clearance) to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know; that is, access to the information must be necessary for the conduct of one's official duties.security clearanceread intoclandestine operation  As with most security mechanisms, the aim is to make it difficult for unauthorized access to occur, without inconveniencing legitimate access. Need-to-know also aims to discourage "browsing" of sensitive material by limiting access to the smallest possible number of people.  The implementation of Mandatory Access Controls through a model such as the Bell-Lapadula rules are one way of enforcing need-to-know.