Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.

Slides:



Advertisements
Similar presentations
National Database Templates for the Biosafety Clearing-House Application (NDT-nBCH) Overview of the US nBCH Applications.
Advertisements

State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
NIST Cryptographic Standards Process Review Tim Polk NIST November 7, 2013.
 WELCOME  Welcome to the home page for the Louisiana Mapping Project (LaMP). The LaMP effort is being undertaken by Department of Homeland Security’s.
RBA Securitisation System Technical Delivery Forum
PROCESSING YOUR THESIS Distance Learning Students Thesis Processing Office of the Dean of Research Naval Postgraduate School 1.
EuroCRIS Best Practices & Solutions Members Helping Members Move Forward.
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Tom Sheridan IT Director Gas Technology Institute (GTI)
NSA/DISA/NIST Security Content Automation Program Vulnerability Compliance & Measurement Stephen Quinn & Peter Mell Computer Security Division NIST.
PAGE Agency ATO Quick Guide 1 May 1,
A summary of the PSS-05 URD template
SE Document Document Control Software. SE Document SE Document is a Document Management Software System to help you meet all document control requirements.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Government of Canada Enterprise Licensing Agreement Framework Public Sector Chief Information Officer Council September 18, 2014 Benoît Long Senior Assistant.
Complying With The Federal Information Security Act (FISMA)
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
An Overview of Selected ISO Standards Applicable to Digital Archives Science Archives in the 21st Century 25 April 2007 Donald Sawyer - NASA/GSFC/NSSDC.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
NetHope Confidential. Unauthorized reproduction or use prohibited. NetHope CLOUD SERVICES PORTAL OVERVIEW TECHNOLOGY PROVIDER LAUNCH January 15, 2013.
Microsoft Confidential Building Reusable InfoPath forms for US Government Jonny Chambers WW Lead – SSN Program Microsoft Corp.
Advance and the Electronic Packet Advance and the Electronic Packet April 5,
TECHNOLOGY SOLUTIONS FOR GOVERNMENT AND EDUCATION 1 Senate Bill 20: DIR Implementation STATE AGENCY WEBINAR| AUGUST 12, 2015 Texas Department of Information.
Users' Meeting San Francisco, CA April 18 th, 2006 RCRAInfo Network Exchange.
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
ADC Meeting ICEO Standards Working Group Steven F. Browdy, Co-Chair ADC Workshop Washington, D.C. September, 2007.
What is SMEcollaborate Primarily developed for Small and Medium Companies who wish to collaborate together. It is a:- A resource center for collaborating.
TECHNICAL DOCUMENTATIONPARTNERS DOWNLOAD DATA Download water quality data in MS Excel, CSV, TSV, and KML formats. Learn how to use the portal and data.
TECHNOLOGY SOLUTIONS FOR GOVERNMENT AND EDUCATION 1 Senate Bill 20: DIR Implementation VENDOR WEBINAR| AUGUST 25, 2015 Texas Department of Information.
VGFOA, June 2006 Single Audit and Yellow Book Update VGFOA, June 2006 With Greg L. Akers Senior Manager, Richmond Office.
NSDI Future Directions Initiative Towards a National Geospatial Strategy and Implementation Plan Ivan B. DeLoatch FGDC Staff Director.
Geospatial One-Stop FGDC and GOS: Working as One to Build the NSDI Rob Dollison Geospatial One-Stop Program Office.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Automating STIGs: The Transition to CCI and SRG
Presented by: Masoud Shams Ahmadi February 2007 Enterprise Resource Planning (ERP) Selection Presented by: Masoud Shams Ahmadi
What’s New in the QAD Learning Center? Bernadette Bagley, March 2014 MWUG Spring Conference.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
1 Local Readiness Team Lead Kick-Off Meeting May 16, 2007.
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
U.S. Department of Agriculture eGovernment Program Design Approach for usda.gov April 2003.
United Nations Statistics Division Registry of national Classifications.
AIA RFID Data Exchange Guideline Status AIA / Electronics Enterprise Integration Committee May 10, 2005.
U.S. Department of Agriculture eGovernment Program eGovernment Working Group Meeting February 11, 2004.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Geospatial One-Stop FGDC and GOS: Working as One to Build the NSDI Sharon Shin Federal Geographic Data Committee Geospatial One-Stop Metadata Coordinator.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
UPDATING RIGHT OF WAY MANUALS FLORIDA’S PROCEDURES.
A Net-Centric DoD NII/CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC:
© 2007 Open Grid Forum Enterprise Best (Community) Practices Workshop OGF 22 - Cambridge Nick Werstiuk February 25, 2007.
Making Grants.gov Work for You: U.S. Department of Education International Education Program Service Technical Assistance Workshop January 2009 Find. Apply.
U.S. Department of Agriculture eGovernment Program May 26, 2004 eGovernment Working Group U.S. Department of Agriculture eGovernment Program.
Domain Champion Updates New Mexico Department of Health.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Standard Design Process Overview
ServiceNow Implementation Workshop CMS Self Service Portal.
Penn State University Libraries Initial Content Management Investigation, Spring 2003.
Planning Engagement Kickoff
Security Checklists for IT Products
Office 365 Security Assessment Workshop
Global Grid Forum GridForge
Matthew Christian Dave Maddox Tim Toennies
Standards Development: An Overview
Unit4 Partner Portal for Case Creator
Joint Application Development (JAD)
Presentation transcript:

Security Checklists for IT Products

Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps

Cyber Security Research and Development Act of 2002 Directs NIST to: –Develop, and revise as necessary, a checklist setting forth settings and option selections that minimize the security risks associated with each computer hardware or software system that is, or is likely to become widely used within the Federal Government.

In Response… NIST is developing a method for IT vendors, consortia, industry, government organizations, and others in the public and private sectors to voluntarily submit checklists in a standardized format to be placed in a public web accessible database maintained by NIST NIST is –Creating a checklist development and description framework –Hosting a checklist web site for checklist users –Facilitating user demand for checklists –Becoming an ambassador to vendors for checklists

What is a Checklist? Often called lockdown guides, benchmark configurations, hardening guides, other terms In simple terms, a document or list of procedures to secure a system or application Checklists are implementation guides used to provide security controls to the information system Could include scripts, add-on templates, or executables

Why Checklists Most products are insecure out of the box Most users need assistance in configuring security controls due to complexity of the technology Demand for easy-to-understand checklists for improving security Demand for checklists tailored to different environments, such as home, small office, enterprise, or higher security Checklists can have a large impact on security with relatively small upfront investment

Goals of the Checklist Program To significantly improve out of the box security To be a portal for checklists in general To encourage primarily vendors to submit and support their checklists To encourage vendors to develop checklists as part of their products To leverage existing checklist development work

NIST Checklist Process Submit the Checklist Review and Post as a Candidate Provide Feedback and comments Respond to Comments and Maintain Review and Post the Checklist ProducerNISTConsumerProducerNIST Timeframe Goal = 2 Weeks

NIST Checklist Template An XML template used to describe a checklist Fields include: –IT product name –Environment (high security, enterprise, SOHO) –How the checklist was tested –Revision dates Cataloged in the web-searchable database A user searches the fields of the templates to locate appropriate checklists

Security Checklists for Commercial IT Products About Checklists Search the Security Checklist Database Under the Cyber Security Research and Development Act, NIST is charged with developing security checklists. These checklists describe security settings for commercial IT products. Security Environment Security environments are SOHO, Enterprise, High Security, or Custom. Checklists can also be associated with the security as contained in FIPS 199. Partners The checklists provided on this website are provided by a wide variety of vendors, government agencies, consortia, non-profit organizations, and user organizations. For a complete list, click here. NIST gratefully acknowledges their contributions and assistance in providing this security service. Disclaimer The contents of each checklist is the responsibility of the submitting organization. We encourage users to send comments on specific checklists to the appropriate author. Search By specific product name Microsoft Windows 2000 By security environment High Security By product type Operating System Results (list of checklists) NIST Windows 2000 Special Publication NSA Windows 2000 Security Guide DISA Windows 2000 Security Configuration Guide CIS Windows 2000 Guide – Level 2

Checklist Categories Under review - out for public review Final – completed review, issues addressed Supported – support for the checklist available, e.g., from the submitter Non-supported – no support available General – non-product specific, applies to a technology or a class of products

Participation Requirements Create a checklist and submit the XML template Agree to respond checklist-related to questions/comments – must provide a POC For certain checklists, agree to update the checklist on timely basis or else withdraw the checklist Agree to test the checklist and describe how the checklist was tested

Reviewing Checklists For all checklists, NIST will review for format, readability, general quality, requirements NIST will perform a limited technical review in cases where it has expertise in the technology NIST will post candidate checklists for public review Comments will be provided to the submitter Issues will be addressed by the submitter before final posting of the checklist

Current Status Workshop completed 9/03, enthusiastic response from attendees Workshop final report 2 nd Qtr, FY04 Drafting internal procedures, 2 nd Qtr, FY04 Checklist Special Pub 1 st draft ready for public review 2 nd Qtr, FY04 Comments accepted for 30 days

Status Continued Workshop for common checklist formats with configuration vendors 3 rd Qtr, FY04 Final release of Checklist Special Pub, 3 rd Qtr, FY04 DISA STIG checklists mapped to checklist framework, 3 rd, 4 th Qtr, FY04 Windows XP checklists 4 th Qtr, FY04 Commitment for some vendors to participate

Next Steps for FY05, FY06 Continue working on common checklist formats Encourage vendors to support checklists on products as released Encourage other agencies, consortia, and forums to submit checklists Continue posting checklists and operating checklist web site

Contact Information Tim Grance Murugiah Souppaya John Wack NIST

Acknowledgements NIST gratefully acknowledges support for the checklist program from the Department of Homeland Security NIST also recognizes important contributions from civilian and DoD agencies, vendors, and organizations