Enterprise-Wide Audit-Data Management

Size: px
Start display at page:

Download "Enterprise-Wide Audit-Data Management"

Transcription

1 Enterprise-Wide Audit-Data Management Enterprise Security Management Special Program Office (NSA/I5E) Lloyd E Lutz Jr Booz Allen Hamilton 27 October

2 Enterprise Security Management Overview Enterprise Management Mission Management Defend the GIG Logistics NetCentricity NetCentricity Servers Coordination Managers Command & Control Deployment Apps Lift ISR Fires Interdiction Enterprise Services Users Maneuver Communicatio ns Coalition Synchronizatio n NetOps NetOps Enterprise Security Management? Manage Identities Manage Attributes Authentication Manage Credentials Manage Digital Policies Manage Privileges Manage Cryptographic Keys Manage IA Metadata Manage Security Manage IA Audit Logs Configurations 2 27 October 2009

3 Scope of Audit-Data Management Audit-Data Management is one of 10 Enterprise Security Management Functions Four Key Audit Functions Capture Store Disseminate Control Audit Processes Direction to Devices Policy Direction for Storage of Control Audit Processes Direction Users Needs for Capture Store Pushed User Query Pushed or Pulled Disseminate Users of Audit Data Direction of Dissemination of Overall Management of Processes to Satisfy Users Needs for 3 27 October 2009

4 Hierarchy of Enterprise-Wide Management of Individual Devices Part of LAN or Platform Have Audit Capabilities Detect Device Events Capture Hold Report 4 27 October 2009

5 Hierarchy of Enterprise-Wide Management of Individual Devices Part of LAN or Platform Have Audit Capabilities Detect Device Events Capture Hold Report 5 27 October 2009

6 Hierarchy of Enterprise-Wide Management of Local Audit Node Each Device Is Controlled by One Local Audit Node Individual Devices Part of LAN or Platform Have Audit Capabilities Detect Device Events Capture Hold Report 6 27 October 2009

7 Hierarchy of Enterprise-Wide Management of Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node 7 27 October 2009

8 Hierarchy of Enterprise-Wide Management of Region- Organization Audit (Tier-2) Plan & Direct Regional Audit Actions Direct Sets of Local Audit Nodes Coordinate with Peers (NetOps) Verify Direction Compliance Receive Event Reports Retrieve Store Detect Regional Events Report Regional Events Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node 8 27 October 2009

9 Hierarchy of Enterprise-Wide Management of CC-Service- Agency Audit (Tier-1) Plan & Direct Auditing Coordinate with Peers (NetOps) Assess Audit Effectiveness Audit Capability Development Receive Event Reports Store Event Data Detect CC/S/A & Enterprise Events Report Events Region- Organization Audit (Tier-2) Plan & Direct Regional Audit Actions Direct Sets of Local Audit Nodes Coordinate with Peers (NetOps) Verify Direction Compliance Receive Event Reports Retrieve Store Detect Regional Events Report Regional Events Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node 9 27 October 2009

10 Hierarchy of Enterprise-Wide Management of Enterprise CC-Service- Agency Audit (Tier-1) Plan & Direct Auditing Operations Enterprise Audit Policy Assess Audit Effectiveness Plan & Direct Auditing Coordinate with Peers (NetOps) Assess Audit Effectiveness Audit Capability Development Audit Capability Requirements Receive Reports Federate with Other Enterprises Receive Event Reports Store Event Data Detect CC/S/A & Enterprise Events Report Broad-Scope Events Region- Organization Audit (Tier-2) Plan & Direct Regional Audit Actions Direct Sets of Local Audit Nodes Coordinate with Peers (NetOps) Verify Direction Compliance Receive Event Reports Retrieve Store Detect Regional Events Report Regional Events Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node October 2009

11 Compilation of High-Level Requirements Seeking Current Requirements Documents Initial Allocation to Level Within Enterprise Initial Identification of Policy Change Needs Binning by Capability Area Ongoing Efforts: Collection of Requirements Identification of Conflicts Identification of Needed Policy Community Review & Feedback October 2009

12 High-Level Architecture Developing Operational and later Systems Architectures Building upon Functional Decomposition Audit Management from ESM Working Group Initial Top Level Operational Activity Model Drafted Ongoing Steps: Increased Detail for Operational Activity Model Obtain Community Feedback Refine Operational Architecture Later: System Architectures for Selected Design Alternatives A3: Capture Audit & Environment Data Draft Operational Activity Model Device Configuration Commands Update Configuration On Devices A3.1 Observation Instructions Occurrences & Environment Data Observe Situations to Begin Collecting Data A3.2 Collection Action Collect Audit A3.3Data Audit Parameter Collection Instructions Raw Data Audit Log Format Instructions Write Audit Data to Audit Logs A3.4 Audit Log Legend Purpose: Display decomposition of Capture Audit & Environment Data function. Scope: Portions of enterprise that collect audit data. Viewpoint: From an enterprise level Send Audit Data For Transfer Preparation A3.5 Dissemination Instructions Alert/Event Data Audit Log Data October 2009

13 Top-Level Model of Enterprise-Wide Audit Audit Needs Situational Awareness from Others Policy Direct Security Audit Management A1 Management Draft Operational Activity Model Response to Audit Needs Situational Awareness for Others Instructions for Audit Legend Purpose: Display high-level functions of Audit Log Management Scope: All facets of Audit Log Management from a high level management perspective Viewpoint: From an enterprise level Current Configuration Configuration Change Acknowledgement Generate Configuration For Devices A2 Audit Log Management Configuration Change Request Queries Configuration Status Occurrences & Environment Data Capture Audit & Environment Data A3 Alert/Event Data Audit Log Data Transfer Data to Subscribers A4 Manage Storage A5 Alerts/Events (Transfer to Subscribers) Pattern Match Information Discovery Metadata (to Discovery Service) Query Response October 2009

14 High-Level Design of Enterprise Audit Components Based on Requirements, Identifying Trade Space for Enterprise Audit Components Cost to Implement, Cost to Operate, Training, Bandwidth Store at Local Level vs Store at Enterprise Level Identifying Set of Alternative Designs for Audit Components Management & Direction Storage Upcoming Actions: Flesh out design alternatives Solicit community feedback on trade-space & alternative designs October 2009

15 Concept of Operations (CONOPS) Explanations of How to Use Addresses Non-Materiel Aspects Procedures Anticipating a Family of CONOPS Separate CONOPS for distinct Roles Separate CONOPS same role at different Levels Upcoming Actions: As Audit Components are Designed, Prepare CONOPS for Applicable Roles & Levels Examples of Likely CONOPS Enterprise Audit Manager Service/Agency Audit Manager Repository Manager Tier-3 Repository Manager Tier-2 System Manager Management LAN Administrator Management October 2009

16 Schemas for Management Schema for Common Event Expression (CEE) Addresses: Audit Events Audit Records Audit Logs May be applicable to results of analysis of audit data. Capture Store Pushed Pushed or Pulled Schema for Directing Devices that Capture Common Command Language Other Schema Control Audit Processes Capture Direction October 2009

17 Enterprise-Wide Management Four Key Functions Capture Store Disseminate Control Audit Processes Policy Control Audit Processes Direction Users Needs for Capture Store Pushed User Query Pushed or Pulled Disseminate Users of Audit Data Ongoing Efforts are Addressing: Requirements & Policy Architectures & Design Alternatives Variety of Trade Spaces Allocation of Functions to Tiers of the Enterprise Family of Concept of Operations CONOPS by Role and Organizational Level Schema for Standard Data Flows October 2009

18 Enterprise-Wide Audit-Data Management Enterprise Security Management Special Program Office (NSA/I5E) 18

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Bridging the Digital Divide with Net-Centric Tactical Services

Bridging the Digital Divide with Net-Centric Tactical Services Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: crane_scott@bah.com 1. Abstract The DoD

More information

3SL. Requirements Definition and Management Using Cradle

3SL. Requirements Definition and Management Using Cradle 3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification

More information

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING

More information

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information

More information

Integration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004

Integration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004 Copyright (c) 2004 Booz Allen Hamilton. All rights reserved 1 Integration of Information Assurance (IA) into DoDAF Architectures Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004

More information

Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions

Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This course provides SharePoint

More information

Architecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)

Architecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track) A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)

More information

Taking the Open Source Road

Taking the Open Source Road The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489

Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key aspects of the apps

More information

Build Your Knowledge!

Build Your Knowledge! About this Course This 3-day Instructor led course Explore several advanced topics of working with SharePoint 2013 sites. Topics include SharePoint Server site definitions (Business Intelligence, Document

More information

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

Appendix A Core Concepts in SQL Server High Availability and Replication

Appendix A Core Concepts in SQL Server High Availability and Replication Appendix A Core Concepts in SQL Server High Availability and Replication Appendix Overview Core Concepts in High Availability Core Concepts in Replication 1 Lesson 1: Core Concepts in High Availability

More information

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February

More information

Oracle Data Integrator: Administration and Development

Oracle Data Integrator: Administration and Development Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Department of Defense Net-Centric Services Strategy

Department of Defense Net-Centric Services Strategy Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion

More information

SharePoint Training DVD Videos

SharePoint Training DVD Videos SharePoint Training DVD Videos SharePoint 2013 Administration Intended for: Prerequisites: Hours: Enterprise Content Managers / Administrators Planners / Project managers None 16 hours of video + 18 hours

More information

Active Directory Installation on Windows Server 2012

Active Directory Installation on Windows Server 2012 Active Directory Installation on Windows Server 2012 What really active directory is..? Active Directory Domain Services (AD DS) is an extensible and scalable directory service you can use to efficiently

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007

US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007 US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007 Draft Enterprise Data Management Data Policies Final i Executive Summary This document defines data

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course

More information

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information

MS-55052: SharePoint 2013 End User Level II

MS-55052: SharePoint 2013 End User Level II MS-55052: SharePoint 2013 End User Level II Description This 3-day Instructor led course Explore several advanced topics of working with SharePoint 2013 sites. Topics include SharePoint Server site definitions

More information

elearning Content Management Middleware

elearning Content Management Middleware elearning Content Management Middleware Chen Zhao Helsinki 18.2.2004 University of Helsinki Department of Computer Science Authors Chen Zhao Title elearning Content Management Middleware Date 18.2.2004

More information

D83167 Oracle Data Integrator 12c: Integration and Administration

D83167 Oracle Data Integrator 12c: Integration and Administration D83167 Oracle Data Integrator 12c: Integration and Administration Learn To: Use Oracle Data Integrator to perform transformation of data among various platforms. Design ODI Mappings, Procedures, and Packages

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

10972B: Administering the Web Server (IIS) Role of Windows Server

10972B: Administering the Web Server (IIS) Role of Windows Server 10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Sample Usage of TAXII

Sample Usage of TAXII THE MITRE CORPORATION Sample Usage of TAXII Version 1.0 (draft) Mark Davidson, Charles Schmidt 11/16/2012 The Trusted Automated exchange of Indicator Information (TAXII ) specifies mechanisms for exchanging

More information

www.basho.com Technical Overview Simple, Scalable, Object Storage Software

www.basho.com Technical Overview Simple, Scalable, Object Storage Software www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Microsoft Project Server Integration with SharePoint 2010

Microsoft Project Server Integration with SharePoint 2010 Microsoft Project Server Integration with SharePoint 2010 Microsoft Project Server 2010: brings together the business collaboration platform services of SharePoint Server 2010 with structured execution

More information

HP Universal CMDB. Software Version: 10.22. Data Flow Management Best Practices

HP Universal CMDB. Software Version: 10.22. Data Flow Management Best Practices HP Universal CMDB Software Version: 10.22 Data Flow Management Best Practices Document Release Date: December 2015 Software Release Date: December 2015 Legal Notices Warranty The only warranties for HP

More information

Kit Rowley. Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif. Plan content types. Plan content types

Kit Rowley. Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif. Plan content types. Plan content types Kit Rowley Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif Content type and workflow planning (SharePoint Server 2010) Published: May 12, 2010 This article

More information

Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW

Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions

Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key

More information

Chemical, Biological, Radiological, and Nuclear (CBRN) and Medical Communities of Interest (COI) Information Sharing

Chemical, Biological, Radiological, and Nuclear (CBRN) and Medical Communities of Interest (COI) Information Sharing Chemical, Biological, Radiological, and Nuclear (CBRN) and Medical Communities of Interest (COI) Information Sharing Doug Hardy JPM IS SSA Manager douglas.hardy@navy.mil (619) 553-5410 1 CBRN COI Medical

More information

DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions

DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions Summary Duration Vendor Audience 5 Days Microsoft Developer Published Level Technology 21 November 2013 300 Microsoft SharePoint

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Mainframe Databases Reviewed Met Security Requirements; However, Automated Security Scans Were Not Performed September 30, 2011 Reference Number: 2011-20-099

More information

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp. Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

An Esri White Paper June 2010 Tracking Server 10

An Esri White Paper June 2010 Tracking Server 10 An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2010 Esri All rights

More information

Service Oriented Architecture (SOA) for DoD

Service Oriented Architecture (SOA) for DoD Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number

More information

Real World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com

Real World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com Real World Enterprise SQL Server Replication Implementations Presented by Kun Lee sa@ilovesql.com About Me DBA Manager @ CoStar Group, Inc. MSSQLTip.com Author (http://www.mssqltips.com/sqlserverauthor/15/kunlee/)

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions

Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction

More information

Goverlan Remote Control

Goverlan Remote Control Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope

More information

2003 Patricia Ensworth Page 1

2003 Patricia Ensworth Page 1 1 1 Sample software development project 2 1.1 Start project 3 1.2 Initiation phase 4 1.2.1 Develop project charter 5 1.2.2 Project charter approved 6 1.3 Planning phase 7 1.3.1 Product activities 8 1.3.1.1

More information

OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way

OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience

More information

Audit Logging. Overall Goals

Audit Logging. Overall Goals Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing

More information

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration

More information

QMX ios MDM Pre-Requisites and Installation Guide

QMX ios MDM Pre-Requisites and Installation Guide QMX ios MDM Pre-Requisites and Installation Guide QMX System Requirements The following requirements apply to the system that QMX will be installed on. This system will host the QMX MDM Service. These

More information

ANSYS EKM Overview. What is EKM?

ANSYS EKM Overview. What is EKM? ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes

More information

Digital Policy Management Framework for Attribute-Based Access Control

Digital Policy Management Framework for Attribute-Based Access Control Digital Policy Management Framework for Attribute-Based Access Control Contract Milestone Task 12.1 19 December 2014 The Johns Hopkins University Applied Physics Laboratory Table of Contents Executive

More information

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6 CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Department of Defense Net-Centric Data Strategy

Department of Defense Net-Centric Data Strategy Department of Defense Net-Centric Data Strategy May 9, 2003 Prepared by: Department of Defense Chief Information Officer (CIO) TABLE OF CONTENTS 1. PURPOSE... 1 2. INTRODUCTION... 1 2.1 DOD DATA VISION...

More information

Content Management System (CMS)

Content Management System (CMS) Content Management System (CMS) What is a CMS? What is a CMS? o A Content Management System (CMS) is software that makes it easier to create, edit and publish content on a web site. The features of a CMS

More information

E-SPIN's Planning, Deploying and Managing Microsoft System Center Configuration Manager (7 Day)

E-SPIN's Planning, Deploying and Managing Microsoft System Center Configuration Manager (7 Day) Class Schedule E-SPIN's Planning, Deploying and Managing Microsoft System Center Configuration Manager (7 Day) Date: Specific Pre-Agreed Upon Date Time: 9.00am - 5.00pm Venue: Pre-Agreed Upon Onsite/Offsite

More information

A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities

A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities Numerous roles and responsibilities will need to be acceded to in order to make data warehouse

More information

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for

More information

Microsoft SQL Server Beginner course content (3-day)

Microsoft SQL Server Beginner course content (3-day) http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft SQL Server Beginner course content (3-day) Course Description This three-day Microsoft SQL Server Beginners

More information

The DoD CIO Charter:

The DoD CIO Charter: George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive

More information

Enterprise Audit Management Instruction for National Security Systems (NSS)

Enterprise Audit Management Instruction for National Security Systems (NSS) UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED

More information

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010 Course: 10174B: Configuring and Administering Microsoft SharePoint 2010 Description: This five-day instructor-led course teaches students how to install, configure, and administer Microsoft SharePoint

More information

Cúram Business Intelligence Reporting Developer Guide

Cúram Business Intelligence Reporting Developer Guide IBM Cúram Social Program Management Cúram Business Intelligence Reporting Developer Guide Version 6.0.5 IBM Cúram Social Program Management Cúram Business Intelligence Reporting Developer Guide Version

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401

SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 LEARNING POINTS Learn about Crystal Reports for HANA Glance at the road map for the product Overview of deploying

More information

126 SW 148 th Street Suite C-100, #105 Seattle, WA 98166 Tel: 877-795-9372 Fax: 866-417-6192 www.seattlepro.com

126 SW 148 th Street Suite C-100, #105 Seattle, WA 98166 Tel: 877-795-9372 Fax: 866-417-6192 www.seattlepro.com SharePoint 2010 Bootcamp This five-day course is designed to equip Systems Administrators, Integrators and Developers with a strong foundation for implementing solutions on Microsoft SharePoint 2010. Attendees

More information

The Webcast will begin at 1:00pm EST. www.gig-werks.com

The Webcast will begin at 1:00pm EST. www.gig-werks.com SharePoint 2013 & SharePoint Online Security, Compliance & ediscovery The Webcast will begin at 1:00pm EST Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with SharePoint Office

More information

Taking EPM to new levels with Oracle Hyperion Data Relationship Management WHITEPAPER

Taking EPM to new levels with Oracle Hyperion Data Relationship Management WHITEPAPER Taking EPM to new levels with Oracle Hyperion Data Relationship Management WHITEPAPER This document contains Confidential, Proprietary, and Trade Secret Information ( Confidential Information ) of TopDown

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration 1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333

More information

ENTERPRISE DOCUMENT MANAGEMENT SYSTEM

ENTERPRISE DOCUMENT MANAGEMENT SYSTEM A Scalable Document Management for all businesses EDMS is a powerful and cost effective document management that allows businesses to centralize management, storage, collaboration, retrieval and archiving

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

MongoDB Developer and Administrator Certification Course Agenda

MongoDB Developer and Administrator Certification Course Agenda MongoDB Developer and Administrator Certification Course Agenda Lesson 1: NoSQL Database Introduction What is NoSQL? Why NoSQL? Difference Between RDBMS and NoSQL Databases Benefits of NoSQL Types of NoSQL

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager

Managing Enterprise Devices and Apps using System Center Configuration Manager Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8410.03 August 29, 2012 DoD CIO SUBJECT: Network Management (NM) References: See Enclosure 1 1. PURPOSE. This Instruction, issued under the authorities of DoD Directive

More information

Unified Messenger 4.0 changes to the Windows 2000 Active Directory Schema

Unified Messenger 4.0 changes to the Windows 2000 Active Directory Schema Introduction This document discusses the changes made to the schema during the installation of Unified Messenger 4.x, to address the customer concern: what is this product going to do to my schema?. This

More information

Configuring and Monitoring Citrix Branch Repeater

Configuring and Monitoring Citrix Branch Repeater Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

Data Management Roadmap

Data Management Roadmap Data Management Roadmap A progressive approach towards building an Information Architecture strategy 1 Business and IT Drivers q Support for business agility and innovation q Faster time to market Improve

More information

Software configuration management

Software configuration management Software Engineering Theory Software configuration management Lena Buffoni/ Kristian Sandahl Department of Computer and Information Science 2015-09-30 2 Maintenance Requirements System Design (Architecture,

More information

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,

More information

Data Management Maturity Model. Overview

Data Management Maturity Model. Overview Data Management Maturity Model Overview SEPG Tysons Corner May 6, 2014 Who Needs Better Data Management? Every organization in business. Why? Collection of data assets developed over time legacy application

More information

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version

More information

Product Comparison List

Product Comparison List Product Comparison List Data Center Size Site Solution / Feature

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

Module 1: Introduction to Active Directory Infrastructure

Module 1: Introduction to Active Directory Infrastructure Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19

More information

Microsoft SQL Server 2005 Reporting Services Step by Step

Microsoft SQL Server 2005 Reporting Services Step by Step Microsoft SQL Server 2005 Reporting Services Step by Step Stacia Misner; Hitachi Consulting To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/9153.aspx 9780735622500

More information

Microsoft Project Server 2010 Administrator's Guide

Microsoft Project Server 2010 Administrator's Guide Microsoft Project Server 2010 Administrator's Guide 1 Copyright This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references,

More information

RDS Building Centralized Monitoring and Control

RDS Building Centralized Monitoring and Control RDS Building Centralized Monitoring and Control 1. Overview This document explains the concept and differing options for the monitoring and control of RDS replication over your network. The very basic

More information

Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments

Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments 1 Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments Part 2: Managing E-mail Compliance and Discovery Challenges Kelly Ferguson Michael Brown 2 Agenda Compliance

More information

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam 1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives

More information