T1M1: Management Plane Security Standard (T1.276)
|
|
|
- Arnold Moore
- 10 years ago
- Views:
Transcription
1 T1M1/ R3 July 9, 2003 T1M1: Management Plane Security Standard (T1.276) Presentation Contributors and Liaison Representatives: Mike Fargano - T1M1 Chair, [email protected] Jim Stanco - T1M1 Vice Chair (previous), [email protected] Lakshmi Raman - T1M1.5 Chair, [email protected] Mike McGuire - T1M1 Security Team Lead, [email protected] Rod Wallace - T1M1 Security SME, [email protected] Chris Lonvick - T1M1 Security SME, [email protected] Note: This presentation is for general information sharing purposed only refer to T1.276 American National Standard (and/or latest draft proposed ANS) for details and clarifications. 1
2 Outline Why Care? T1M1 Overview OAM&P Simplified Reference Model T1M1 History in Security Management Plane Security: Business Drivers/Case and Motivation Objective Driving Principles Network Mgt Security Reference Model Summary/Status, Challenges, Contributors 2
3 Why Care? Network Management Security Risk From ATIS/T1 Press Release on T1M1 Security Work ( A security breach of a NE or OSS at the Management Plane could include a major incursion into the network by an intruder, leading to loss of integrity and service of the elements and a major network outage or disruption. 3
4 T1M1 - Overview Telecom Network Management Operations, Administration, Maintenance, and Provisioning (OAM&P); Technical Subcommittee of Committee T1 ANSI Accredited USA SDO Major Programs: Common OAM&P Functionality and Technology Inter-Administration OAM&P (OSS Interconnect) Network Technology-Specific OAM&P OAM&P Security: Part of each major program; bulk of work in Common OAM&P Functionality and Technology program 4
5 OAM&P Simplified Systems Interface Reference Model Core OSSs Q EMSs Q X CORBA, tml (XML), Suite of standard telecom B2B (interconnect) interfaces tml(xml), EDI, CORBA,... Q SNMP, CORBA, TL1, MML, Network 5
6 T1M1 History in Security Network Management Security Areas: NEs and OSSs OAM&P interfaces NS/EP, Emergency Telecom Services (ETS), Lawfully Authorized Electronic Surveillance 1980 s to 2001: Many standards per above (see document T1M1/ for history to 2001 ftp://ftp.t1.org/t1m1/m1.0/2002/2m pdf) 2002/2003: Management Plane Security Standard Collaboration with T1M1, NSTAC NSIE, Gov NSIE, + liaisons 6
7 Mgt Plane Sec Business Drivers Net Mgt Security Standard Business Drivers: Efficiency: Reduced costs via commonality - economies of scale Effectiveness: Common baseline for security functionality - reasonable risk management Common baseline network management security requirements for NEs and OSSs to build network technology specific OAM&P security specifications and standards upon (e.g., optical network OAM&P security) 7
8 Mgt Plane Sec Business Case The general business rational to implement the Management Plane Security Standard is that it: 1. Raises the baseline OAM&P security requirements to meet the new (current) realized security risks and; 2. Provides for the new minimum cost zone between relatively too little security and too much security (with the relative high costs that come with these two extremes). 8
9 Mgt Plane Sec Business Case Framework High Total Cost (risk based plus direct & indirect costs) Low Generic security business case is Risk Management based. A given curve represents the cost/security tradeoffs given a set of realized (i.e., accountable) threats, vulnerabilities, risk based incident/attack costs, and direct/indirect security costs. High risk. High. direct/ based costs indirect costs Cost Savings Opportunity. Minimum cost zone is at the bottom of the curve -between relatively too little security and too much security (with the relative high costs that come with these two extremes). Low Security Level High 9
10 Mgt Plane Sec Business Case with Increased Security Risks High Total Cost (risk based plus direct & indirect costs) Low Old Security Scenario New Security Scenario New curve based on realization of new set of increased threats, vulnerabilities, incident/attack costs, and security costs e.g., post 9/11 Low Security Level High 10
11 Mgt Plane Sec Business Case: Cost Shifts w/ Increased Security Risks High Total Cost (risk based plus direct & indirect costs) Low To capture the new minimum cost zone while the new security scenario is in play the Security Level must be increased. Old. New.. B C A C Cost Savings Opportunity Being at the old minimum cost Security Level while the new security scenario is in play puts an organization in a relatively high Total Cost position. Low A SL B SL Security Level High 11
12 Mgt Plane Sec Motivation A major concern to NSIE and T1M1 is that network infrastructure is a terrorist target, identified as part of National Critical Infrastructure. Our industry is transitioning to converged packet networks resulting in an increased sense of vulnerability. Service providers are specifying similar but different security requirements for products resulting in inconsistent vendor feature sets. System Integration and operations costs increase when dealing with vendors products that have differing security features and functionality. Infrastructure Security adds cost without generating additional revenue for both vendors and service providers alike. 12
13 Mgt Plane Sec - Network (NGN) Security Challenges Then Now Isolated Network Public Network Management Control/Signaling Management Control/Signaling Bearer/Data Bearer/Data Public Network Public traffic and management/control traffic were sent on separate networks. Threats in Public network were insulated from network management and control Management and Control network was easier to secure e.g., known users. Public traffic and management/control traffic are sent on the same network. Threats in Public network are now threats to network management and control Management and Control network now needs higher security level, e.g., security level that is applied to secure Public traffic. 13
14 Mgt Plane Sec - Objective Define a consistent and standardized set of baseline network element and network management security requirements. Standardize this set of security requirements within standards organizations such as T1M1 and ITU-T (SG4). These requirements will: Ensure a minimal baseline of security throughout the industry. Provide vendors with a standard set of design objectives in relation to product and network security features. Make it easier for service providers to procure & build a secure infrastructure comprised of multiple vendor platforms. 14
15 Mgt Plane Sec - Key Principles Secure management traffic with strong encryption and authentication. Authenticate and attribute all management actions. Maintain secure logs for all of the above. 15
16 Network Management Security Reference Model 4. Remote Operator To NMS 12. EMS to EMS Network Management System 1. NMS to EMS 7. Local Operator To NMS 2. NMS to NE Remote Operator 6. Remote Operator To NMS 5. Remote Operator To EMS Element Management Element Management System System 3. EMS to NE Network Element Local Operator 8. Local Operator To NMS 9. Local Operator To NE 10. NE to NE 11. NE to Foreign NE Network Element Multi-Vendor Network Element 16
17 Mgt Plane Sec - Summary/Status Started work in NSIE with intent to make OAM&P security best practice recommendations public. NSIE and T1M1 agreed that T1M1 adoption was an effective means to make document public and standard. Status: Draft Standard (T1.276) Letter Ballot process completed - see document T1M1.5/ R5 Final (official) publication version should be available by end of July Recommendations brought to the NRIC VI Workgroup 1B for inclusion in Cyber-security OAM Best Practices. Submitted to the ITU-T (SG4) for adoption as an International Standard (ITU-T Recommendation). 17
18 Mgt Plane Sec Challenges To have the standard used and implemented - ASAP There is evidence that this is happening. Wide spread adoption of the standard. Vendors and Service Provider contributors are working this now. 18
19 Mgt Plane Sec Key Contributors BellSouth BT DoD/NorAD Lucent Qwest Siemens Verizon Booz-Allen Hamilton Cisco Harris Nortel Networks SBC Telcordia Worldcom 19
20 Management Plane Security Appendix: Backup Slides 20
21 Security Framework Model Application Security VULNERABILITIES Service Security Access Management Authentication Non - repudiation Data Security Communication Security Integrity Availability Privacy THREATS Interruption Interception Modification Fabrication Infrastructure Security ATTACKS End User Plane Control Plane Security Dimensions Management Plane 21
22 Document Contents 0 FOREWORD 1 INTRODUCTION 2 SCOPE, PURPOSE, AND APPLICATION Framework and Model Design Guidelines Applicability of this document to the TMN 3 NORMATIVE REFERENCES 4 DEFINITIONS, ABBREVIATIONS, ACRONYMS, AND SYMBOLS 5 SECURITY REQUIREMENTS 5.1 Cryptographic Algorithms and Keys Symmetric Encryption Algorithms Asymmetric Encryption Algorithms Data Integrity Algorithms Keys for Cryptographic Algorithms Cryptographic Key Management 5.2 Authentication Server-to-Server Process Authentication User Authentication, Static Passwords, and User IDs 5.3 Administration Security Administration Authentication Defaults Security Audit Logging 5.4 NE/MS Use and Operation Login Process Logout Process Applications Appendix ARCHITECTURAL CONSIDERATIONS AND EXAMPLES Background and Scope 59 Mandatory Security Requirements Examples 22
23 Document Annex B ADDITIONAL SECURITY CONSIDERATIONS B.1 Applicability to Enterprise OAM&P B.2 CORBA, SNMP, XML, and SOAP B.2.1 CORBA B.2.2 SNMP Security B.2.3 XML B.2.4 SOAP B.3 Communications Assistance to Law Enforcement Act B.4 Physical Security Considerations B.4.1 Physical Premises Security B.4.2 Building Services B.4.3 Environmental and Geographical Threats B.4.4 Co-location Procedures B.5 Development Process B.5.1 Bootstrapping, Installation, and Failure Modes B.5.2 Patching Process B.5.3 Development Life Cycle Security B Personnel Management B Security Awareness and Training B Risk Management B Requirements B Design B Separation of Duty B Implementation B Documentation B Operating System B Secure Installation, Configuration, and Operation Additional Security Considerations (Informational, outside the scope of the detailed security requirements) 23
24 Example Mandatory Requirements Secure management traffic with STRONG ENCRYPTION and authentication: M55: For each physical or logical interface that carries any MANAGEMENT TRAFFIC in an NE/MS, the NE/MS shall be configurable to secure MANAGEMENT TRAFFIC with STRONG AUTHENTICATION and symmetric or asymmetric encryption in order to provide confidentiality and integrity. Authenticate and attribute all MANAGEMENT ACTIONS: M12: Client AUTHENTICATION for logging in, logging, and auditing on each NE/MS shall be at least as strong as a User ID with a COMPLEX PASSWORD over a previously established TRUSTED PATH. Manage security resources and configurations with integrity: M25: On each NE/MS, a SYSTEM SECURITY ADMINISTRATOR shall be able to execute all of the CRITICAL SECURITY MANAGEMENT ACTIONS. Maintain secure logs for all of the above: M31: Each NE/MS shall be able to log each CRITICAL SECURITY ADMINISTRATION ACTION, each login attempt and its result, and each logout or SESSION termination. 24
25 Link to the Draft Standard (T1.276) Final Working Document Number: T1M1.5/ R5 Operations, Administration, Maintenance, and Provisioning Security Requirements for the Public Telecommunications Network: A Baseline of Security Requirements for the Management Plane New File (pre-archived) at: ftp://ftp.t1.org/t1m1/new-t1m1.5/3m pdf Or, moved to archive at: ftp://ftp.t1.org/t1m1/m1.5/2003/3m pdf 25
3GPP TS 32.372 V8.0.0 (2008-12)
TS 32.372 V8.0.0 (2008-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Security services for Integration
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Cisco Prime Optical. Overview
Data Sheet Cisco Prime Optical Overview Service providers face tremendous challenges in managing optical networks. These challenges include accurate capacity planning; maintaining an offline database of
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
ETSI TR 101 303 V1.1.2 (2001-12)
TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 107 Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study Mehdi Jahanirad,
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm)
NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm) Lecture Component: The Telecommunications Management Network Lectures 16-18 Prof. George Pavlou Centre for Communication Systems Research
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
New Systems and Services Security Guidance
New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
whitepaper 4 Best Practices for Building PCI DSS Compliant Networks
4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0
ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS Version 2.0 July 20, 2012 Table of Contents 1 Foreword... 1 2 Introduction... 1 2.1 Classification... 1 3 Scope... 1
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
Snow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS
Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Accelerating PCI Compliance
Accelerating PCI Compliance PCI Compliance for B2B Managed Services March 8, 2016 What s the Issue? Credit Card Data Breaches are Expensive for Everyone The Wall Street Journal OpenText Confidential. 2016
This document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 27033-1 Second edition 2015-08-15 Information technology Security techniques Network security Part 1: Overview and concepts Technologies de l information Techniques de sécurité
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Third Party Network Management Standard Best practice
Third Party Network Management Standard Best practice Issue 1.0 Date: 27/04/2016 Author: BT Security, 3rd Party Security Team SEC/STD/BP003 Contents 1 Introduction... 3 1.1 General... 3 1.2 Objectives...
Society, Law Enforcement and the Internet
Society, Law Enforcement and the Internet Models for Give-and-Take Carter Bullard CEO/President QoSient, LLC 150 E 57th Street Suite 12D New York, New York 10022 ICCS 2010 New York, New York [email protected]
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Vendor Assessment Worksheet:
Vendor Assessment Worksheet: A sample set of IT security controls for evaluation of third party vendors capacity to protect institutional research data 1 Table of Contents Executive Summary... 3 Vendor
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference
SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Automation Suite for. 201 CMR 17.00 Compliance
WHITEPAPER Automation Suite for Assurance with LogRhythm The Massachusetts General Law Chapter 93H regulation 201 CMR 17.00 was enacted on March 1, 2010. The regulation was developed to safeguard personal
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL
OIG OFFICE OF INSPECTOR GENERAL Catalyst for Improving the Environment Audit Report Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center Report No. 2003-P-00011 May
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Nakina Multi-Vendor Security Management Secure Your Network Operations
Nakina Multi-Vendor Security Management Secure Your Network Operations How Service Providers can improve the Security of their Network Operations Security Challenges in Network Operations Service providers
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
