The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Size: px
Start display at page:

Download "The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems."

Transcription

1 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood of exploitable software weaknesses appearing in a delivered system or software product. This presentation assumes that you have some experience with creating software system requirements to meet business needs and an understanding of system development lifecycle phases.

2 2

3 3 The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

4 4 Cyber-attacks have significantly changed over the last 10 years. In the late 1900s, the success of an attack might be measured in the number of sites compromised. Today, an attacker might devote weeks, if not months, to find a way to compromise a specific site. Well-resourced, highly skilled, and persistent attackers have compromised organizations such as Google and the highlyrespected security supplier RSA. RSA was a secondary target. The primary objective was information at a Lockheed Martin site on the F-35 aircraft. Lockheed Martin used software from RSA to authenticate its employees for access to its computing systems. The attackers compromised RSA to obtain copies of employee authentication data so they could log into the Lockheed Martin site. While the consequences of recent attacks have been significant in terms of the loss of intellectual property and trade secrets, those attacks obtained sufficient access to adversely affect the operations of the compromised organizations. The same kind of attacks could degrade the operations of government systems. Attacks frequently exploit a software weakness inadvertently created during development, which is what we call a vulnerability. We refer to them as software weaknesses rather than software

5 5 errors, because the system behaves as expected under normal operating conditions but can be adversely affected under unexpected conditions created by an adversary. Reducing the frequency and severity of such weaknesses requires improved supplier development practices and acquisitions that select suppliers with such capabilities.

6 6 Moat-like defenses that use external security controls such as firewalls and encryption can be effective defenses for attacks that target the network. But attack targets change as weaknesses are eliminated. Application software is now a popular attack target. An analysis of successful software attacks identified over 900 kinds of software weaknesses. The capabilities of highly skilled adversaries who can exploit known weaknesses or find new ones in increasingly complex computer systems have surpassed the defensive capabilities of external security controls. We have a situation similar to rollover risks for early models of sports-utility vehicles or SUVs. There are no significant problems driving a SUV under normal conditions, but there are circumstances such as swerving to avoid an accident where a SUV because of its higher center of gravity has a greater risk of rolling over than a sedan has. The rollover risk cannot be mitigated by adding controls after a SUV is manufactured. The risk is reduced by a redesign where electronic vehicle controls intervene when sensors report conditions that could lead to a rollover. In a similar fashion, we need to reduce the likelihood and severity of exploitable software weaknesses during development rather than by adding controls later. Such a change in strategy

7 7 is reflected in the latest version of the NIST security control document. Security is now a combination of building it right and implementing specific security controls. Building it right or Building security in means that compromises and defenses are considered during all phases of the development lifecycle. We cannot verify that a system was built right after development is completed. Rather we need to find ways to assess the system at various points during the lifecycle so we are confident that development is on track to meet the build it right objective at completion.

8 8 We show how an objective to build it right affects acquisitions and, in particular, show that activities in the early phases of an acquisition lifecycle can support that objective. Software assurance in general considers conditions that could lead to unexpected behavior. We concentrate on those conditions that could lead to a security failure which are described by the trustworthiness component of software assurance. The most important objective is to show that knowing how to analyze security threat using a practice called threat modeling can improve system requirements and supplier selection criteria.

9 9 The NIST Risk Management Framework can help acquirers analyze the consequences of risks and possible mitigations for them. The top tier can address strategic risks by defining policies to govern the implementation and design of the work processes and the associated information system. Tier 1, for example, could establish certification requirements for acquisitions involving critical information systems. The bottom tier is the operational layer, which contains the computing systems and manages the tactical risks that only affect that level. A critical aspect of a risk assessment is to understand the interactions between Tiers 2 and 3. The work processes inherit the computing system risks, but the computing requirements for the work process can increase system security risks.

10 10 Let s expand on the connection between tiers 1 and 2. Acquirers and suppliers both do risk assessments. The acquirer is concerned about the business impact of a compromise and the threat agents that could target a system. A supplier concentrates on system risks and monitors the software weaknesses that have been exploited by successful attacks. Acquirer risks include poor supplier development practices which increase the risk of a compromise. But a supplier s development risks can be increased by an acquirer s functional and operational requirements. Thus, we have a feedback loop between acquirers and suppliers. We describe a practice called threat modeling can be used by a supplier to analyze and mitigate security risks inherited from requirements. A general understanding of threat modeling can also help acquirers understand how their actions can affect the development of secure software.

11 11 In this section, we discuss threats and threat modeling.

12 12 Threats are used in two ways for security. A threat can refer to the agent that executes an attack or to the consequences of an attack, that is, the attacker's objective. The Microsoft STRIDE threat model identifies six consequences of an attack. This presentation considers the three threats that are most closely associated with software vulnerabilities. We cover data tampering, disclosure of information, and an elevation of privilege. The last one is often the most important one to an adversary.

13 13 An elevation of privilege does not directly damage a system, but it often provides an attacker with the necessary privileges to access or modify data. In this slide and the next one, we describe an elevation of privilege that was the first step in the RSA compromise. The objective of the RSA attack was to obtain employee authentication data for organizations that purchased RSA software. Assume the data is not Internet accessible and managed by the application in the upper-right corner of this slide. The first step in the attack is to access the internal RSA network. The RSA attack started with a well-crafted message to an employee in business services. That included a link to what appeared to be useful business information. Of course, the employee should have ignored such an , but a mail message created by an expert using specific employee information obtained from sites such as LinkedIn can be very convincing. The link in the was to a malicious website. When the employee s browser accessed that web page, a vulnerability in a browser add-on for videos let the attackers install their own programs and become insiders with the same access to data and programs as the employee had.

14 14 Most likely, multiple attempts had been made to access the network, and the one described in this example was the first one that worked. If it had failed, a persistent attacker would have tried other options, and with an attacker with expertise and patience would likely succeed. Most likely, multiple attempts had been made to access the network, and the one described in this example was the first one that worked. If it had failed, a persistent attacker would have tried other options, and, with sufficient expertise and patience, such an attack would likely succeed.

15 15 If we are considering the design of a home security system, the thief is now in the house, and sensors should have reported that entry. But in this example, intruders use the identity of a trusted employee to avoid being reported. Internal software systems frequently assume a safe computing environment. But an attacker with access to the internal network can apply sophisticated and likely unanticipated attacks to compromise internal software components and obtain access to additional accounts. Each compromised account could provide access to additional systems and data. The attack does not have to compromise the targeted system if one of the compromised accounts has access to it. Securing a system requires more than just security of the critical components. A weakness in a secondary component can give an attacker a sufficient foothold to eventually compromise the system.

16 16 Threat modeling refers to the threat analysis that is done during design in Microsoft s Secure Development Lifecycle. Its objective is to identify how a design could be compromised before the code is written. The details for how to do that vary among developers, but it is a common objective among organizations that incorporate security into their full development lifecycle. Identifying weaknesses early with threat modeling can result in better security than improving development reviews or security testing. Such reviews and tests only attempt to identify such weaknesses after they have been created. An acquirer does not have to do threat modeling. So what are the benefits for having a general understanding of it? Say you ask a contractor about delays in task completion and the response from the contractor is a query such as Do you really need to do this? For security, this response could mean that the security risks associated with a functional requirement cannot be fully mitigated or that the implementation of the required mitigation will increase costs or delay delivery. If your response is no, that requirement can be removed, but a response of yes, may require you to accept the security risks in order to have the desired system feature. Or it might force you to make changes in the schedule, costs, or other requirements so the design can be revised to reduce the security risk to an acceptable level. An acquirer, who recognizes early in the

17 17 acquisition lifecycle that the requirements could lead to problems with the security analysis, can tailor the source selection criteria to identify suppliers with the security capabilities needed to manage the anticipated complexity. That complexity also requires an acquisition to have a source for security expertise to monitor and evaluate the security aspects of system development.

18 18 There are multiples ways to respond to a risk. A commercial organization might accept a computing risk associated with a business practice where the increased sales compensate for higher risk. An organization can use an insurance policy to transfer a risk to its provider. Unfortunately, a supplier could also transfer the risk of exploitable software weaknesses it created to those organizations that follow it in a supply chain and eventually to the acquirer. In this presentation we consider how risks could be mitigated.

19 19 We now introduce threat modeling as one way for an acquirer to better understand the feedback loop between acquirers and suppliers that we have described. In the next few slides, we describe three risk factors that are analyzed using threat modeling and show how acquirer requirements can affect those factors. Acquirers who understand these interactions can anticipate the security issues that could arise during development.

20 20 The left side of this diagram lists the steps involved in Microsoft s threat modeling. We numbered the steps we cover in this presentation. Steps 1, 2, and 3 are the risk factors considered by threat modeling. Steps 4, 5, and 6 analyze those threats to determine the system risks and feasible mitigations. We start with step 1, then steps 2 and 3, and finally steps 4, 5 and 6, and we alternate between a developer s and an acquirer s perspective.

21 We start with business requirements. 21

22 22 A use case is a way of writing a business requirement. It describes system behavior when it responds to an external request, that is, it can describe an information exchange between a user and a system. We will apply threat modeling to the use case shown on this slide. Customer information is managed by a database server. A database record includes a customer identifier, a 5-digit numeric value, and customer information such as a name and phone number. The business requirement described by the use case is that the input of a 5-digit numeric value CLICKS displays a web page with the ID, name, and phone number for the customer with that ID. A use case is a risk factor because a software weakness in its implementation could provide an adversary with access to business resources such as the customer database in this example. Thus, this use case increases the risk for threats such as data tampering or information disclosure that target that database. Thus a key question for the acquirer is whether the use case as implemented by the supplier can be compromised.

23 23 The developer develops an information flow that meets the business requirements described by a use case.

24 24 In the next two slides, we show an implementation of an information flow for our use case and then describe how that implementation could be compromised. Access to customer information is managed by the database server. That server accepts queries to access or modify data that are written in a special-purpose programming language. Many commercial database products use what is called the Standard Query Language with the acronym SQL. A software application on the web server accepts the user input and uses it to create a SQL command that retrieves the ID, name, and phone number for the record with that ID. Such a query might look like this statement where the user input is inserted at the end. The database server executes that command and returns a table with the desired values. An attacker will attempt to exploit the connectivity created by this implementation of the use case.

25 25 A misuse case is a sequence of actions that can harm a system. Whereas a use case describes what a system should do, a misuse case describes what it should not do, that is, a misuse case is a security requirement. The misuse case for this example is a vulnerability called a SQL Injection, which frequently is at the top of lists of the most dangerous vulnerabilities. A misuse case for this example is a data exchange that starts with the value shown. Why would attackers try such a value? An attacker knows the implementation could create a database query written in SQL that includes the submitted value. The attacker s objective is to modify that query by inserting valid SQL constructs into the input. That s why it s called a SQL injection. The expression or(1=1) that has been inserted for this misuse case is a valid SQL expression. A SQL injection succeeds only if the software application fails to verify that the input is free of SQL expressions or, in this case that the input consists of 5 numeric digits. Maybe the programmer did not verify the input values as it was assumed that the database server respond with a record not found message for invalid ID values. But the command constructed by the software application using this input value is a valid query. Since the where condition is always true, the database server returns a table that contains the ID, name, and phone number for all entries. Variants of this compromise have been used to retrieve credit card data. Skilled attackers

26 26 have used SQL injections to change database entries. This misuse case is an example of an attacker using the connectivity with the user to exploit and compromise the database server.

27 27 We have a tug of war between security and system features where the outcome can help the attacker. A feature we call extensibility is a prime example. On the web, extensibility lets Yahoo and Google develop separate applications and retail vendors design interfaces to their own sales systems. An extensible industrial process control computer can be used by the purchaser to control an assembly line, a power generator, or traffic lights. But such extensibility also enabled the RSA compromise and an attack called Stuxnet that damaged more than 1,000 Iranian centrifuges at a nuclear facility. The web is good example of extensibility. When it was first created, a web page had data, instructions on how display that data, and links to other pages. The initial objective was to access information, rather than to read or make purchases. As the use of the web grew, organizations wanted to be able to add functionality without modifying the browser. A solution that s been applied in similar situations is to add processing instructions to the data feed. In other words, the web page contains data and processing

28 28 instructions often written in JavaScript. The browser shows displays the data and executes JavaScript instructions on that page which, for example, creates a drop-down menu for the user. We can change the items on the menu by changing the JavaScript on the web page rather than changing the browser. The processing instructions for an extensible military system or an industrial process controller are not on a web page but instead in a data file that is part of the configuration. The organization can update an extensible system by changing a data file rather than installing a new system. Smart phones also involve a form of extensibility. A user can customize a smart phone by installing applications rather than modifying that phone s core software. Extensibility is a great feature for almost everyone except those concerned with security. If a user can change a system by changing a data file, an adversary might be able to do it too. Extensibility has to be very well designed to avoid compromises. The more features requested in hardware and software products, the more exposure the system could receive as parts, modules, and libraries are acquired and integrated for the final system.

29 29 Analyzing use cases can provide an acquirer with valuable information. As we just showed, any critical business asset on the information flow for a use case is a possible target for an attack. We noted in the last slide that requirements for features such as extensibility increase the risk of a compromise. That risk might be reduced by using a commercial product where the developer explicitly considered how that feature could be compromised. A one-off custom implementation could have software weaknesses that a commercial developer had identified and avoided. The threat knowledge required should be included in the supplier selection criteria. Supplier s often have in-depth knowledge of the potential software weaknesses and attack patterns only for some domains such as financial systems, or for technologies such as those used for mobile access and industrial process controls. For example, the expertise that can avoid web server compromises is not necessarily applicable to a general purpose information system.

30 30 Next, we consider the two other risk factors considered by threat modeling. Compromises can arise from information we do not know about external systems, and system integration may have to contend with mismatches in the security assumptions made by the system components.

31 An adversary can exploit a weakness in an external resource to compromise the targeted system. In particular, external data sources are a significant risk because they provide a way for an attacker to submit values that could compromise a system. A system can depend on existing infrastructure services such as using the operating system to verify that a user is authentic. In our example, the system depends on the integrity and availability of a shared data store. 31

32 32 Secure network communications is an example of a security assumption. All software makes implicit security assumptions, for example by assuming the validity of a user so as to avoid repeated requests for an account name and password. An organization s security policy could require that a user be authenticated at a particular point in an information flow. Attacks frequently exploit unverified assumptions such as data validity which is a security risk as we saw in the SQL injection example. Whereas we only verified a user at selected points in an information flow, data validity has to be repeatedly checked. Invalid data can result from a software error rather than an adversary action. A security assumption that cannot be verified is a significant risk. For example, the designs for systems only used within an organization have often assumed that the internal network would not be accessed by an adversary an assumption we cannot verify. But with the success that expert and well-resourced attackers have had in obtaining network access, an increasing number of organizations assume the internal network will be compromised.

33 33 Next, we consider how an acquirer s requirements can affect the external dependencies and security assumptions that must be managed by the developer.

34 34 We combine the discussions of dependencies and security. Dependencies such as data sources or use of an acquirer s infrastructure services are often system requirements. Those dependencies have their own security assumptions. The required software functionality may be best provided by a commercial product, but the security assumptions for such software are not always known. Commercial off-the-shelf, or COTS, software may not be designed for high-assurance usage. Commercial developers have to balance the effort devoted to the threat resilience with competitive factors such as time to market and cost. The required threat resilience may have to be provided by how that product is integrated into the system. System integration may have to resolve security issues arising from the use of consumer computer devices such as tablets and cell phones. Security assumptions always arise for use cases that require data exchanges among independently developed and managed systems. The security assumptions are often not known and for externally managed systems can change without notice. How trusting should such a data exchange be? Has an external system been compromised? A security assumption such as trusting

35 35 a user whose identity was authenticated on a remote system requires careful analysis. For such data exchanges, the supplier selection criteria should include secure integration capabilities.

36 36 A supplier that is doing threat modeling uses the information collected on the risk factors to identify probably system risks and their mitigations. This step has to involve system stakeholders to prioritize the threats and make trade-off among business consequences, cost of mitigations, and system functionality. A supplier s development decisions have to be consistent with an acquirer s acceptable level of risk.

37 37 How can a supplier mitigate threats? This chart maps threats to the possible targets for that threat. An attacker seeking information might want to monitor network traffic or access a data store. An attacker with access to the network or a data store could modify data. Certainly access to a network or a data store could enable an attacker to limit access to a system.

38 38 We can use external security controls to mitigate threats that target network links or data stores. Examples of external controls include user authentication and access control, encrypted network links, and encrypted data stores.

39 Software can be a threat target. A SQL injection exploits a software weakness to access information and can also be used to modify data. The compromise of the RSA employee is an example of an elevation of privilege enabled by a vulnerability in a browser plug-in Software is a target for all six STRIDE threats, which increases the importance for developing threat resilient software. 39

40 40 An attacker can only exploit vulnerabilities in software on the information flows that process data they can submit, that is, data from external sources. Applications with access to critical assets require attention. But the continued occurrences of SQL injections suggest that such risks are too often ignored during design and implementation. Web browsers are a target because of their extensibility. The most recent web standard for HTML includes a long list of options such as support for multiple video formats. The implementation of a web page that has a data exchanges starts with defining the use cases that describe the exchanges, and the security assumptions and dependencies for the software that implements the use case. That software could reside on the web server or be included in the web page code to be executed by the browser. The number of possibilities can overwhelm threat modeling. An attacker can only exploit vulnerabilities in software on the information flows that process data they can submit, that is, data from external sources. Applications with access to critical assets require attention. But the continued occurrences of SQL injections suggest that such risks are too often ignored during design and implementation. Web browsers are a target because of their extensibility. The most recent web standard for HTML includes a long list of options such as support for multiple video formats. The

41 41 implementation of a web page that has a data exchanges starts with defining the use cases that describe the exchanges, and the security assumptions and dependencies for the software that implements the use case. That software could reside on the web server or be included in the web page code to be executed by the browser. The number of possibilities can overwhelm threat modeling.

42 42 As we noted earlier, external controls such as data encryption and network controls have been used to mitigate the risk of vulnerabilities. But the mitigations for many of the 900 identified software weaknesses must be done by the system software. Identifying threats and their appropriate mitigations must be done as part of the system development lifecycle. A number of organizations have executed security initiatives to reduce the number and severity of software weaknesses that appear in their software. The Build Security in Maturity Model is a joint effort by Cigital and Fortify to catalog the security activities for a collection of large organizations with such an initiative. Fifty-one organizations had been surveyed by the fall of One observation from the analysis of the BSIMM surveys is that the organizations with the most mature development practices had a strategic commitment to delivering secure software. What does that mean? Such a commitment includes incorporating security into the full development lifecycle. For example, design practices consider possible compromises; those doing detailed design and coding are aware of potential threats and recommended mitigations; and test plans include software weaknesses and the effectiveness of the system mitigations.

43 43 But a strategic commitment requires more than improved development practices. An organization with a strategic commitment has allocated sufficient resources to maintain its core knowledge of attacks and mitigations. The software functions with significant security risks might be developed by experts and then be made available in shared libraries to the application development teams. Such organizations incorporate appropriate standards. A key measure of a strategic commitment is reflected in an organization s governance practices and policies. Have all developers received training on writing secure software? Have security checkpoints, milestones, and signoffs been established at various points in the development lifecycle to ensure consistent and effective application of the lifecycle practices? A security signoff at various times during development ensures that someone has accepted responsibility for security.

44 Next, we discuss how to apply aspects of threat modeling to the acquisition lifecycle. 44

45 45 In this section, we show how knowledge of the interactions between requirements and a developer s threat analysis could be used. We use an FAA project done in 2009 as an example. The FAA objective was to create an external web site that provided current commercial flight information to non-government organizations. An internal FAA system was the source of that data.

46 46 Acquisition requirements should consider possible threats. For this example, the data on the web site could be modified. A more serious threat is that an attacker gains access to the web server and uses that access to compromise the internal FAA system. That internal system may have assumed a very trusting operational environment. But for this example, the FAA system should not trust the web server, that is, it should assume that adversaries have accessed it.

47 47 If we have a medical condition that requires surgery, we seek a specialist. The risk of data tampering requires a supplier with knowledge of compromises associated with data exchanges such as SQL injections. There is a very sophisticated attack community that target web servers. Hence, suppliers should be very knowledgeable about known web site compromises. A supplier s staff must be capable of writing secure web applications. The possibility of compromising the FAA internal systems increases the importance of source selection. In addition to having web security expertise, a supplier for this example should know how an information system like the FAA system could be compromised. This aspect of development might require cooperation between the supplier and those who know the design and security assumptions for the FAA system.

48 48 Supplier selection criteria have to identify suppliers with the experience and capabilities needed to test the system. For example, security testing frequently includes penetration tests in which a skilled attack team tries to compromise a system. For this example, a penetration team experienced with web attacks should attempt to compromise the server. But the most significant threat is an attacker with web server access who compromises the internal FAA system. The penetration team now has access to the web server. This team is likely different from the first one because its members should have experience in compromising large information systems rather than web servers. Finally, it is critical for the acquisition strategy, source selection, procurement contracts, and so forth to enable the acquiring organization to access the artifacts produced by the development practices. For example, an acquirer could require that the supplier provide the results and analysis of the penetration tests to confirm that testing considered possible compromises.

49 We conclude with a summary. 49

50 50 The overall objective is to reduce the frequency and severity of unintentional software weaknesses created during development. In this presentation, we suggested several ways that such risks could be identified early in the lifecycle. Building security in includes anticipating threats but also incorporating security into the full development lifecycle so that possible weaknesses are identified early. But risk reduction also depends on understanding the security risks of software features and system usage. The improved development practices that support building security into a system also have their limits. Ross Anderson is a highly respected computer scientist and security engineer. In an interview, he was asked about the progress being made for security engineering. He noted that over the last 30 years, developers have been provided with improved tools and methods for developing systems, but the percentage of development failures has stayed around 30%. Better tools encouraged the development of larger and more complex systems and also created more dramatic failures. We have a similar situation for security engineering. Threat modeling can remove known weaknesses, but having a large set of system requirements also increases the threat factors that must be considered by the supplier. The additional complexity can create new vulnerabilities, increase the possibility that known weaknesses could be missed, and force system stakeholders to accept higher security risks.

51 51 Practices such as threat modeling help us reduce the likelihood of a malicious compromise but cannot eliminate the possibility of one. Continuous monitoring of system behavior is necessary. Attack techniques and exploitable vulnerabilities evolve, but the consequences as described by STRIDE are constant. We need to build security controls into a system such as strong user authentication, encryption, and auditing that reduce the likelihood of an information disclosure and be able to recover from an attack that tampered with critical assets. Security can be improved if we do not focus exclusively on malicious intent. We may only know after an incident that a problem with data integrity was the result of malicious data tampering and not the result of an accidental user action not anticipated by system designers. The intent should be secondary to mitigating and recovering from possible failures. System capabilities such as rapid recovery that increase resiliency to operational, software, and hardware failures also improve resiliency to a security compromise.

52 52

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Software Application Control and SDLC

Software Application Control and SDLC Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to

More information

ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY. Department of Computer Science & IT University of Jammu, Jammu

ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY. Department of Computer Science & IT University of Jammu, Jammu ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY Dr. Deepshikha Jamwal Bhawana Sharma Research Scholar Research scholar jamwal.shivani@gmail.com bhawana32_mca@yahoo.co.in Department of Computer Science

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Cyber Security Risk Management: A New and Holistic Approach

Cyber Security Risk Management: A New and Holistic Approach Cyber Security Risk Management: A New and Holistic Approach Understanding and Applying NIST SP 800-39 WebEx Hosted by: Business of Security and Federal InfoSec Forum April 12, 2011 Dr. Ron Ross Computer

More information

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone)

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone) Threat Modelling for Web Application Deployment Ivan Ristic ivanr@webkreator.com (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /

More information

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government

Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Cutting Edge Practices for Secure Software Engineering

Cutting Edge Practices for Secure Software Engineering Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India khans@amity.edu Abstract Security has become a high

More information

The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.

The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain. The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

QuickBooks Online: Security & Infrastructure

QuickBooks Online: Security & Infrastructure QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Seven Practical Steps to Delivering More Secure Software. January 2011

Seven Practical Steps to Delivering More Secure Software. January 2011 Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience Cloud Standards Customer Council Public Sector Cloud Summit March 24, 2014 Dr. Ron Ross Computer Security Division Information

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The

More information

Board Portal Security: How to keep one step ahead in an ever-evolving game

Board Portal Security: How to keep one step ahead in an ever-evolving game Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, mqiu@vsu.edu Steve Davis, Clemson University, davis@clemson.edu ABSTRACT People considering improvements in database

More information

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. rok.bojanc@zzi.si Abstract: The paper presents a mathematical model to improve our knowledge of information security and

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

Columbia University Web Security Standards and Practices. Objective and Scope

Columbia University Web Security Standards and Practices. Objective and Scope Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015

Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015 WHITEPAPER Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015 Malcolm Orekoya Network & Security Specialist 30 th January 2015 Table of Contents Introduction... 2 Identity Defines

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Security Risk Management For Health IT Systems and Networks

Security Risk Management For Health IT Systems and Networks Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND

More information

Security and Vulnerability Testing How critical it is?

Security and Vulnerability Testing How critical it is? Security and Vulnerability Testing How critical it is? It begins and ends with your willingness and drive to change the way you perform testing today Security and Vulnerability Testing - Challenges and

More information

SIEM is only as good as the data it consumes

SIEM is only as good as the data it consumes SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

The Electronic Arms Race of Cyber Security 4.2 Lecture 7 The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO E MARITIME SAFETY COMMITTEE 95th session Agenda item 4 MSC 95/4/1 5 March 2015 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Industry guidelines on cyber security on board ships Submitted by

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013 Report to the Public Accounts Committee on mitigation of cyber attacks October 2013 REPORT ON MITIGATION OF CYBER ATTACKS Table of contents I. Introduction and conclusion... 1 II. How government bodies

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR

More information

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv. WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers by Dan Sullivan 01_20131025 Think Faster. Visit us at Condusiv.com WITH A RECYCLE BIN FOR FILE SERVERS 2 Article 1:

More information

Standard: Web Application Development

Standard: Web Application Development Information Security Standards Web Application Development Standard IS-WAD Effective Date TBD Email security@sjsu.edu # Version 2.0 Contact Mike Cook Phone 408-924-1705 Standard: Web Application Development

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more

More information

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be

More information

Software Vulnerability Assessment

Software Vulnerability Assessment Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS CIVICA Conference 22 January 2015 WELCOME AND AGENDA Change is here! PCI-DSS 3.0 is mandatory starting January 1, 2015 Goals of the session

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com blog.coresecurity.com Preempting

More information