Vulnerabilities from the outside. Common Vulnerabilities and Exposures (CVEs) Building Security In with BSIMM
|
|
|
- Jemimah Lamb
- 10 years ago
- Views:
Transcription
1 Outline Introduction Secure Programming Lecture 2: Landscape David Aspinall, Edinburgh 16th January 2014 Vulnerabilities from the outside Common Vulnerabilities and Exposures (CVEs) Building Security In with BSIMM Summary This lecture introduces some of the industry context behind software security. timeline of attacks, notifications, responses security advisories and CVE-IDs implementing a software security strategy in an organisation Vulnerability and attacks timeline Security advisories Security advisory format Security advisories (aka bulletins) are issued by software vendors public feeds, also private at earlier stages advance notification to high-value customers, security companies maybe before patches are available public advisory usually when update available may be coordinated among vendors and upstream developers People (users, system administrators, developers of downstream software,... ) act on advisories. Each vendor has own format. Typical information: Name, date, unique identification Criticality Affected products Solution Varying amounts of information given: enough information to construct an exploit? if not, attackers may reverse engineer patches/updates anyway disclosure has to be planned carefully
2 Advisory we saw last time Jan. 7, Stack buffer overflow in parsing of BDF font files in libxfont CVE : An authenticated X client can cause an X server to read a font file that overflows a buffer on the stack in the X server, potentially leading to crash and/or privilege escalation in setuid servers. The fix is included in libxfont See the advisory for more details. Advisory on xorg-announce X.Org Security Advisory: CVE : Stack buffer overflow in parsing of BDF font files in libxfont Alan Coopersmith alan.coopersmith at oracle.com Tue Jan 7 08:43:23 PST 2014 X.Org Security Advisory: January 7, CVE Stack buffer overflow in parsing of BDF font files in libxfont ============================================================== Description: ============ Scanning of the libxfont sources with the cppcheck static analyzer included a report of: [lib/libxfont/src/bitmap/bdfread.c:341]: (warning) scanf without field width limits can crash with huge input data. Advisory on Red Hat enterprise-watch-list -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libxfont security update Advisory ID: RHSA-2014: Product: Red Hat Enterprise Linux Advisory URL: Issue date: CVE Names: CVE ===================================================================== 1. Summary: Updated libxfont packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libxfont packages provide the X.Org libxfont runtime library. X.Org is an open source implementation of the X Window System. A stack-based buffer overflow flaw was found in the way the libxfont library parsed Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server. (CVE ) Users of libxfont should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running X.Org server instances must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at 5. Bugs fixed ( CVE libxfont: stack-based buffer overflow flaw when parsing Glyph Bitmap Distribution Format (BDF) fonts
3 Example: HP Data Protector 7. References: 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): 8. Contact: Source: The Red Hat security contact is <secalert redhat com>. More ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5client/en/os/srpms/libxfont el5 contact details_10.src.rpm at i386: libxfont el5_10.i386.rpm Copyright 2014 Red Hat, Inc. libxfont-debuginfo el5_10.i386.rpm -----BEGIN PGP SIGNATURE Version: GnuPG v1.4.4 (GNU/Linux)... id8dbqfsz8hsxlsag2unwiiravo5aj4976atngp8mmoyrgobdfncvop4zacfywjc f9vhkwpgze3y3jtsd9fupvg= =T7Wm -----END PGP SIGNATURE----- What is HP Data Protector? What is HP Data Protector? How was this vulnerability found? Zero Day Initiative, started by TippingPoint, a network security company Idea of crowd-sourcing vulnerability discovery Finding many vulnerabilities in enterprise software part of 3Com, now HP HP, Microsoft, CISCO,... Incentive programme rewarding participants $ reward, bonuses like DEFCON attendance advantages: independence, wider knowledge and presumably cheaper than direct employment
4 What is CVE? Vulnerabilities versus Exposures CVE Identifiers Started in 1999, originally at CERT CVE = Common Vulnerability Enumeration Aim: standardise identification of vulnerabilities before CVE, each vendor used its own scheme confusing multiple advisories for same problem Each vendor/distributor has own advisory channel CVE allows cross referencing, public standard ID Users or customers can check how CVEs are handled Moved to MITRE, a US R& D outfit CVE = Common Vulnerabilities and Exposures ITU-T adopted in 2011 as international recommendation, X.CVE Vulnerability A mistake that can be used by a hacker to violate a reasonable security policy for a system (e.g., executing commands as another user, violating access restrictions, conducting a DoS attack) Example: smurf vulnerability (ping server responds to broadcast address) Exposure A system configuration issue or mistake in software that can be used by a hacker as a stepping-stone into a system or network, e.g., gathering information, hiding activities. Example: running open finger service; allows attacker to probe network Consist of: CVE ID (number): **CVE ** Brief description of vulnerability or exposure References, e.g., to reports or advisories CVE IDs New CVE ID format Creating CVE Identifiers CVE-ID Syntax Changing on January 1, 2014 Due to the ever increasing volume of public vulnerability reports, the CVE Editorial Board and MITRE determined that the Common Vulnerabilities and Exposures (CVE ) project should change the syntax of its standard vulnerability identifiers so that CVE can track more than 10,000 vulnerabilities in a single year. 1. Discover a potential V or E 2. Get a CVE Numbering Authority to give a number MITRE, big vendors (Apple, Google, MS, Ubuntu,... ) Numbers reserved in blocks; instantly available 3. CVE ID number shared among disclosure parties 4. Advisory published, including CVE-ID number 5. MITRE updates master list Only published CVE-ID Numbers are kept in master list.
5 CVE Compatibility BSIMM BSIMM: Building Security In Maturity Model Standard for interoperability or comparability For products and services Has some official requirements certified by MITRE ownership by legal entity responsibility, answering to reviews Capability required for tools, web sites CVE searchable Use standard document formats BSIMM is a Maturity Model for real-world best practices in software-producing companies examines Software Security Initiatives (SSIs) provides a measuring stick, state-of-the-art Introduced by Gary McGraw and others Author of Software Security: Building Security In Inspired by Capability Maturity Model (CMM) (late 80s-90s) model of software development processes maturity = degree of formality/rigour of process 5 Levels: chaotic, repeatable, defined, managed, optimizing Now at BSIMM-V, October About 70 orgs. BSIMM goals Implementing a SSI The BSIMM Software Security Framework For organisations starting/running a Software Security Initiative, BSIMM aims to: Inform risk management decisions Clarify right thing to do for those involved Reduce costs via standard, repeatable processes Improve code quality This is done by planning a Software Security Initiative, implementing activities selected from BSIMM. Activities can be roled out according to the maturity level of the organisation. May be a serious effort for a large organisation to implement, and require a big budget. Large companies can have: Thens of thousands of software developers hundreds or thousands of applications in development similarly many applications in deployment or sale Systematic, explicit organisation of security goals are needed to mange software security effectively. BSIMM defines a Software Security Framework which describes 12 practices organised into 4 domains Governance, Intelligence, Development, Deployment Each practice involves numerous activities Each practice split into maturity levels 1 3 each maturity level has several activities BSIMM-V covers 112 activities New activities added when they appear in >1 org
6 The BSIMM Software Security Framework The BSIMM Software Security Framework The BSIMM Software Security Framework Governance Management, measurement, training. SM Strategy and Metrics CP Compiliance and Policy T Training Intelligence Collecting data, issuing guidance, threat modelling AM Attack Models SFD Security Features and Design SR Standards and Requirements Secure Software Design Lifecycle (SSDL) Touchpoints Software development artifacts and processes AA Architecture Analysis CR Code Review ST Security Testing The BSIMM Software Security Framework Deployment Configuration, maintenance, environment security PT Penetration Testing SE Software Environment CMVM Configuration Management and Vulnerability Management Governance: Example maturity levels Strategy and Metrics (SM) maturity levels: 1. Common understanding of direction, strategy everyone involved in creating software understands written software security goals company management understand strategy for achieving 2. Align behaviour with strategy software security leadership roles filled 3. Risk-based portfolio management top-level management learns about risk for each application Governance: Example activities SM 1.4: Identify gate locations, gather necessary artifacts The software security process will involve release gates/ checkpoints/milestones at one or more points in the SDLCs. First steps: 1. identify gate locations that are compatible with existing development practices and 2. begin gathering the input necessary for making a go/no go decision. Importantly at this stage, the gates are not enforced. For example, the SSG can collect security testing results for each project prior to release, but stop short of passing judgment on what constitutes sufficient testing or acceptable test results.
7 Governance: Example activities SM 2.2: Enforce gates with measurements and track exceptions SDLC security gates are now enforced: in order to pass a gate, a project must either meet an established measure or obtain a waiver. Even recalcitrant project teams must now play along. The SSG tracks exceptions. A gate could require a project to undergo code review and remediate any critical findings before release. In some cases, gates are directly associated with controls required by regulations, contractual agreements, and other business obligations and exceptions are tracked as required by statutory or regulatory drivers. In other cases, gate measures yield key performance indicators that are used to govern the process. Personal experience (2009-): mixed evidence Selling Software Quality tool for safety/security Java static analysis for concurrency Went into a number of large financial services orgs Found range of maturity levels... BSIMM-V survey 67 organisations interviewed (over past 24 months) Range of industry sectors financial services independent software vendors cloud, retail, security, healthcare, media,... Results confidential. Some companies named, e.g.: Adobe, Intel, McAfee, Microsoft Bank of America, Capital One, Goldman Sachs, HSBC PayPal, Visa Marks and Spencer All orgs operate a Software Security Group responsible for carrying out software security mix of roles essential first step: management buy-in SSGs quite young (ave 5 years) BSIM-V results: score card BSIM-V results: average best practice BSIM-V results: top 10 uses spider diagram to show the high watermark in each of the 12 practices, i.e., the highest maturity level achieved for set of companies, take average high watermark
8 BSIM-V results: sector comparison BSIM-V results: core activity in each practice SM1.4 identify gate locations, to establish SSDL gates CP1.2 identify Personally Identifiable Information (PII) T1.1 provide security awareness training to promote culture of security AM1.2 create data classification scheme and inventory, to prioritise applications SFD1.1 build and publish security features to create guidance, proactively SR1.1 create security standards to meet demand for security features AA1.1 perform security feature review to get started with architecture analysis CR1.4 use automated tools along with manual review to drive efficiency/consistency ST1.3 drive tests with security requirements and security features to start security testing in familiar functional territory PT1.1 use external penetration testers to find problems to demonstrate that your organization s code needs help too SE1.2 ensure host and network security basics are in place to provide a solid host/network foundation for software CMVM1.2 identify software bugs found in operations monitoring and feed them back to development to use ops data to change dev behavior BSIM-VI new activity What was covered Next time CMVM 3.4: Operate a bug bounty program The organization solicits vulnerability reports from external researchers and pays a bounty for each verified and accepted vulnerability received. Payouts typically follow a sliding scale linked to multiple factors, such as vulnerability type (e.g., remote code execution is worth $10,000 versus CSRF is worth $750), exploitability (demonstrable exploits command much higher payouts), or specific services and software versions (widely-deployed or critical services warrant higher payouts). Ad hoc or short-duration activities, such as capture-the-flag contests, do not count. From the outside: the vulnerability and attack process security advisories and CVEs From the inside: BSIMM: a best-practice model for a Software Security Initiative some of the activities in BSIMM state-of-the-art: results of the BSIMM-V survey In later lectures we ll return to CVEs and some of the SSDLC and Deployment activities in BSIM. Next time we ll start looking at some overflow vulnerabilities in more detail.
112 BSIMM Activities at a Glance
112 BSIMM Activities at a Glance (Red indicates most observed BSIMM activity in that practice) 6 Level 1 Activities Governance Strategy & Metrics (SM) Publish process (roles, responsibilities, plan), evolve
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Security Vulnerability Management. Mark J Cox
Security Vulnerability Management Mark J Cox Responsibility & Accountability Unique challenges Many vendors all ship the same thing The vulnerabilities are there. The fact that somebody in the middle of
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center http://twitter.com/k8em0 (that s a zero) Session ID: ASEC-T18
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Secure Programming Lecture 9: Secure Development
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
JBoss security: penetration, protection and patching. David Jorm [email protected]
JBoss security: penetration, protection and patching David Jorm [email protected] Contents The problem Background Historical vulnerabilities JBoss worm Security response for products The solution The Problem
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management
Scanless Vulnerability Assessment A Next-Generation Approach to Vulnerability Management WHITEPAPER Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network
EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.
Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
IT Security Testing Services
Context Information Security T +44 (0)207 537 7515 W www.contextis.com E [email protected] IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
Scaling a Software Security Initiative: Lessons from the BSIMM
Scaling a Software Security Initiative: Lessons from the BSIMM GARY MCGRAW, PH.D. SEPTEMBER 29, 2014 @cigitalgem Gary McGraw, PH.D. Chief Technology Officer, Cigital Email: [email protected] Cigital Providing
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
PCI Vulnerability Validation Report
Friday, March 9, 013 PCI Vulnerability Validation Report Introduction This report shows the results of a vulnerability validation tests conducted by CORE Impact Professional Professional in support of
State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard
State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Product Documentation. Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)
Product Documentation Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1) Contents Contents Copyright... 3 Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)...
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
System Center Configuration Manager
System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW Len Kleinman Director ATO Trusted Access Australian Taxation Office Session ID: DAS-W01 Session Classification: General Interest What
How To Manage A System Vulnerability Management Program
System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
defense through discovery
defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst
Continuous Delivery and Risk Management
Continuous Delivery and Risk Management SESSION ID: SEC-T10 Shaik Mokhinuddeen Director, Software Engineering CA Technologies Ravindra Rajaram Principal Software Engineer CA Technologies Development Deployment
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Network Configuration Management
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
Complete Patch Management
Complete Management Targeted, Reliable and Cost-efficient In- Depth CSI Corporate Software Inspector Empower your IT-Operations and Security Teams with the most reliable Vulnerability & Management solution
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
"Service Lifecycle Management strategies for CIOs"
"Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?
Application Security Manager ASM. David Perodin F5 Engineer
Application Security Manager ASM David Perodin F5 Engineer 3 Overview BIG-IP Application Security Manager (ASM) a type of Web application firewall ASM s advanced application visibility, reporting and analytics
The Leader in Cloud Security SECURITY ADVISORY
The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Secure Software Development Lifecycle. Security... Not getting better
Secure Software Development Lifecycle This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007 This lecture material is copyrighted by
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
