STIGs,, SCAP and Data Metrics
|
|
|
- Jasmine Nicholson
- 10 years ago
- Views:
Transcription
1 Defense Information Systems Agency A Combat Support Agency STIGs,, SCAP and Data Metrics Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation Division DISA Field Security Operations July 2010
2 Agenda STIG Overview Challenges faced in using STIGs and Checklists Security Content Automation Protocol (SCAP) Overview Reinventing STIGs using SCAP Metrics supported by SCAP 2
3 A Combat Support Agency What is a STIG? Security Technical Implementation Guide: A Compendium of DOD Policies, Security Regulations and Best Practices for Securing an IA or IA-Enabled Device (Operating System, Network, Application Software, etc.) A Guide for Information Security Mandated in DODD , DODI Endorsed by CJCSI , AR 25-2, and AFI Goals Intrusion Avoidance Intrusion Detection Response and Recovery Security Implementation Guidance 3
4 Policy References DODD Paragraph 4.18 All IA and IA-enabled IT products incorporated into DoD information systems shall be configured in accordance with DoD-approved security configuration guidelines. Paragraph DISA will develop and provide security configuration guidance for IA and IA-enabled IT products in coordination with Director, NSA. DODI E3.2.6 Security Configuration Specification. DISA and NSA support the Defense IA program through the development and dissemination of security implementations for the configuration of IA- and IA-enabled IT products. Examples of such specifications include Security Technical Implementation Guidelines (STIGS) and Security Recommendation Guides (SRG). DCCS1/DCCS2 A DOD reference document such as a security technical implementation guide or security recommendation guide constitutes the primary source for security configuration or implementation guidance for the deployment of newly acquired IA- and IA-enabled It products that require use of the product s IA capabilities. If a DOD reference document is not available, the system owner works with DISA or NSA to draft configuration guidance for inclusion in a Departmental reference guide. CJCSI E, Enclosure C, 18a(7) Ensure STIGs or security recommendation guides are used as the baseline requirements being applied. AR f.(6) The minimum baseline configuration for ISs will be the published Security Technical Implementation Guide (STIG) requirements or the common criteria protection profiles for IA products, as available or supplemented and published by DOD and NETCOM/9th SC (A), with any changes documented. AFI Configuration Specifications. IA reference documents, such as National Institute of Standards and Technology (NIST) Special Publications, DoD Security Technical Implementation Guides (STIG), NSA Security Configuration Guides (SCG), AFI and/or AFMAN procedures, Air Force specialized publications (AFSSI, AF Technical Orders, etc.), AFCA guidance and other relevant publications represent a collection of resources for security configuration and implementation on the deployment of newly acquired IA- and IA-enabled IT products that require use of the product's IA capabilities. Ensure these reference documents are applied to establish and maintain a minimum baseline security configuration and posture. 4
5 Available STIGs NETWORK/PERIMETER Backbone Transport V2R1, 9 Jul 07 Blackberry V1R1, 23 Apr 10 Data Center Enclave V4R4, 10 Feb 10 DATMS V1R1, 30 Mar 04 DoD Internet-NIPRNet DMZ, - V1R2 26 Feb 10 DNS V4R1, 17 Oct 07 DRSN V1R1, 28 Mar 06 DSN V2R3, 30 Apr 06 Enclave V4R4, 18 Feb 10 Firewall STIG V8R1 24 Mar 10 IDS-IPS STIG V8R1, 24 Mar 10 Infrastructure Router L3 Switch STIG V8R1, 24 Mar 10 L2 Switch STIG V8R1, 24 Mar 10 Other Devices STIG V8R1, 24 Mar 10 Network Policy STIG V8R1, 24 Mar 10 Perimeter Router L3 Switch STIG V8R1, 24 Mar 10 Secure Remote Computing, V2R1, 2 Oct 09 SPAN (Peripheral) V1R1, 28 Jul 05 VOIP V3R1, 23 Dec 09 Wireless V6R1, 6 Aug 09 OPERATING SYSTEM LPAR V2R2, 4 Mar 05 MAC (APPLE) Tandem V2R2, 4 Mar 05 Unisys V7R2, 28 Aug 06 UNIX V5R1, 28 Mar 06 VM V2R2, 4 Mar 05 Win 2003/XP/2000/Vista Addendum V6R1, 21 May 07 Win NT (NSA) Win 2000 V6R1.16, 26 Feb 10 Win XP V6R1.16, 26 Feb 10 Win2003 V6R1.16, 26 Feb 10 Win Vista V6R1.16, 26 Feb 10 Win Server 2008 (MS) V6, R1.9, 26 Feb 10 Windows 7 V1,R1 26 Apr 10 zos ACF2, V6R2, 25 Dec 09 zos RACF V6R2, 25 Dec 09 zos TS V6R2, 25 Dec 09 5
6 A Combat Support Agency Available STIGs (cont.) APPLICATIONS CROSS DOMAIN SOLUTIONS AntiSpyware General V4R1, 3 Dec 09 Application Services V1R1, 17 Jan 06 Application Security & Development V3R1, 10 May 10 CITRIX XenApp, V1R1, 23 Jul 09 ESX Server - V1R1, 22 Apr 08 Database V8R1, 19 Sep 07 Desktop Applications General V4R1, 3 Dec 09 Directory Services V1R1, 24 Aug 07 ERP V1R1, 7 Dec 06 ESM V1R1, 5 Jun 06 HBSS STIG V2R5, 22 Feb 10 IM V1R2, 15 Feb 08 InTFOT - V1R1, 2 Oct 09 ISA Server 2006 OWA STIG, V1R1 5 Feb 10 McAfee Antivirus V4R1 3 Dec 09 Microsoft Exchange 2003 V1R1, 6 Aug 09 MicrosoftIE6 V4R1, 3 Dec 09 MicrosoftIE7 V4R1, 3 Dec 09 MicrosoftIE8 V1R1, 26 Apr 10 Microsoft Office 2003 V4R1, 3 Dec 09 Microsoft Office 2007 V4R1, 3 Dec 09 Mozilla Firefox V4R1, 3 Dec 09 Symantec Antivirus V4R1, 3 Dec 09 SunRay4 Thin Client V1R1 26 Mar 09 VTC STIG V1R1 08 Jan 08 Web Server V6R1, 11 Dec 06 JVAP Admin Procedures & Checklist C2G Procedures & Checklist Data Sync Procedures & Checklist DII Procedures & Checklist ISSE Procedures & Checklist MLTC Procedures & Checklist MLChat Procedures & Checklist OWL Procedures & Checklist RM Procedures & Checklist SOWI Procedures & Checklist TDX Procedures & Checklist TGS Procedures & Checklist USER Access Control V2R1, 17 Oct 07 STIGs are available at: DKO: IASE: 6
7 STIG Development Cycle 7
8 Bi-Monthly Release Lifecycle 8
9 Customer Challenges Limited resources available to assess compliance with numerous requirements Manual efforts Impacts of different approaches for different technologies Understanding what documents apply (STIGs, checklists, varying technologies) Need for guidance in new technologies Support for new releases of technologies used Ability to extract information into other databases or products 9
10 A Combat Support Agency Maintenance Challenges High demand from the user community for new and updated security guidance Rapid pace of new technology Limited resources to develop guidance and tools to evaluate compliance Development and maintenance of varying tools/techniques for supporting compliance check Gold Disk (Windows) Security Readiness Review Scripts (Unix, some DB) 10
11 General Challenges Secure Product Development No master list of all requirements for products Vendors do not know, in detail, what requirements they have to meet Not knowing when they are done IA Compliance Reporting Determining compliance statistics Inability to validate that all requirements are addressed in current checklists Inconsistent reporting of findings and compliance status Security Guide Development High Demand for New & Updated Security Guidance Duplication of requirements Interpretation of DoD IA Controls Requirements not written in a measurable format Inconsistency in documents from different sources 11
12 SCAP: Our Way Ahead Security Content Automation Protocol (SCAP) is a collection of specifications Specifications originally developed by the government which are now being adopted as the industry standard Supports a standards based approach to develop and publish IA configuration guidance, assess assets, and report compliance Benefits of SCAP Enables vendor community to develop standardized guidance once for use by all communities Allow more commercial assessment tools to utilize DoD configuration guidance Requires less time to develop and publish additional guidance More information on SCAP can be found at 12
13 SCAP Specifications CVE - Common Vulnerabilities and Exposures Common naming of emerging vulnerabilities CCE - Common Configuration Enumeration Common naming of configuration (STIG) vulnerabilities CPE - Common Platform Enumeration Language to describe Operating Systems/Platforms CVSS - Common Vulnerability Scoring System Scoring System to describe severity of a vulnerability XCCDF - Extensible Configuration Checklist Description Format XML definition of a checklist OVAL - Open Vulnerability and Assessment Language Common language for assessing status of a vulnerability OCIL Open Checklist Interactive Language (draft standard) Common language to express questions to be presented to a user and interpret responses CCI Control Correlation Identifiers (proposed by DISA) Common identifier for policy based requirements Currently not under SCAP umbrella 13
14 Moving Ahead for the Future Migrating our tools and processes to take advantage of SCAP s benefit The Policy Auditor Component of HBSS already supports assessing vulnerabilities using SCAP content Developing Security Requirements Guides (SRGs) that address overarching requirements for a technology (e.g. operating systems, network devices, applications, policy) Promotes structure mapping of the STIGs to the new DoD Control Set Expanding work with operating system and software vendors to leverage content and standards 14
15 A Combat Support Agency Leveraging SCAP (XCCDF) Publication of DoD content (STIGs) using the extensible Configuration Checklist Description Format (XCCDF) Provides a standardized look for STIGs Supports customers request to extract data for import into another database XCCDF benchmarks can be used by SCAP capable tools to automate the assessment of vulnerabilities Note that OVAL is required for true automation of a check 15
16 Control Correlation Identifiers (CCIs) A Control Correlation Identifier (CCI) is: A decomposition of an IA Control or an IA industry best practice into single, actionable statements A foundational element of an IA policy or standard, written with a neutral position on an IA practice so as not to imply the specifics of the requirement Not specific to a product or a Common Platform Enumeration (CPE). The CCI List is: A collection of CCI Items, which express common IA practices or controls The CCI data specification is: Proposed to work in conjunction with the National Institute of Standards and Technology (NIST) Security Content Automation Protocol (SCAP) 16
17 Security Requirements Guide (SRGs) Similar to what a STIG is today Prose discussion of requirements Planned SRGs include Operating System, Application, Network, Policy Initial focus on Operating Systems to support UNIX development efforts Will be expressed in XCCDF with the ability to produce a human readable version A method to convey additional technology specific details about the Common Control Identifiers (CCI) to product vendors SRGs are not intended for use by Security Tool Vendors for assessments! 17
18 SRGs and CCIs DoD Policy Document NIST SP v3 Control Correlation Identifier (CCI) Security Requirements Guide Applications Operating Systems Network Infrastructure Devices Organizational Policy 18
19 STIG Content SCAP Enabled Control Correlation Identifiers 19
20 SCAP Content Status Windows STIG Content Windows XP, Vista, 2003, 2008 published using XCCDF with OVAL Many of the automatable configuration checks (e.g. STIG checks) have OVAL content available to support assessment of the vulnerability using SCAP compliant tools such as HBSS Policy Auditor UNIX STIG Content UNIX Technical Interchange Meeting occurred in May 2010 Adopting approach of identifying SRG requirements to allow both inhouse and vendor supported assessment of requirements Other STIG Content 20 different products supported with XCCDF Benchmarks OVAL content not available IAVM Content Working with the JFCC/NW-JTFGNO combined staff and NSA to determine best approaches for publishing IAVM content 20
21 Metrics Ongoing metrics analysis to identify trends/challenges observed throughout DoD Goal to generate recommendations/approaches for material and/or non-material solutions or process enhancements Correlation and trending of vulnerability related information difficult given varying standards and repositories Leveraging industry standard approaches for identifying vulnerabilities is critical Supported by existing SCAP standards Efforts underway to advance the reporting formats used as part of SCAP 21
22 A Combat Support Agency Summary Adoption of a standards-based approach using SCAP addresses many of the key challenges that DoD faces today Increased speed in publishing guidance to the IA community Increased reliability of results based on industry standard checking mechanisms Improved metrics and trending information relative to asset and vulnerability status 22
23 A Combat Support Agency 23
Federal Desktop Core Configuration (FDCC)
Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007 FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to
DoD Secure Configuration Management (SCM) Operational Use Cases
Defense Information Systems Agency A Combat Support Agency DoD Secure Configuration Management (SCM) Operational Use Cases DISA PEO-MA Computer Network Defense Enclave Security 26 September 2010 This brief
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 8. 24 July 2015
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 8 24 July 2015 Developed by Red Hat, NSA, and for the DoD Trademark Information Names, products, and
FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs
FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day
SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference
SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security
Mark S. Orndorff Director, Mission Assurance and NetOps
Mark S. Orndorff Director, Mission Assurance and NetOps Sustaining US Global Leadership: Priorities for 21 st Century Defense Both state and non-state actors possess the capability and intent to conduct
ACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 04, 2011 Microsoft Certification ID : 483228 KENT NORDSTROM Asbergsvagen 27 Soderhamn, 82637 SW [email protected] ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified Solutions
UNCLASSIFIED. Trademark Information
SAMSUNG KNOX ANDROID 1.0 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 1 3 May 2013 Developed by Samsung Electronics Co., Ltd.; Fixmo, Inc.; and General Dynamics C4 Systems,
ACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 30, 2012 Microsoft Certification ID : 30999 BERT VAN HOVE BARON EMPAINLAAN 68 MECHELEN, 2800 BE [email protected] ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified
Automating Compliance with Security Content Automation Protocol
Automating Compliance with Security Content Automation Protocol presented by: National Institute of Standards and Technology Agenda Information Security Current State Security Content Automation Protocol
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
How To Get A Certificate From Ms.Net For A Server Server
Last Activity Recorded : December 19, 2014 Microsoft Certification ID : 2665612 MARC GROTE Wittorfer Strasse 4 Bardowick, Lower Saxony 21357 DE [email protected] ACTIVE MICROSOFT CERTIFICATIONS:
ACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE [email protected] *Charter- Certification that was achieved
Spine Warranted Environment Specification
Spine Warranted Environment Specification 2015 Richard Trusson June 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents Introduction 3 Scope 3 Intended Audience 4 Approach 4 Changes
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective: 2015-07-01
Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1 Agenda Traditional vs. Modern Cyber Defense แตกต างหร อส งเสร มก นและก น อย างไร? Industry Standard Checklist
https://mcp.microsoft.com/authenticate/mcpcredentials.aspx
M r ic o o s f t e C t r if ic t a io n D I : 1 0 0 5 8 3 6 Seite 1 von 12 Microsoft Certified Professional Transcript Last Activity Recorded : March 15, 2011 UDO HEUSCHMANN ACTIVE MICROSOFT CERTIFICATIONS:
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance
An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance Presented by: John Banghart, Booz Allen Hamilton SCAP Validation Project Lead Thoughts on Current State
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
DoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
http://www.disa.mil/scm
Enclave Security: Secure Configuration Management (SCM) http://www.disa.mil/scm Agenda SCM Introduction SCM Lifecycle SCM Objectives SCM Community Model Current Capability Framework Governance Model Schedule
Continuous Monitoring
Continuous Monitoring The Evolution of FISMA Compliance Tina Kuligowski [email protected] Overview Evolution of FISMA Compliance NIST Standards & Guidelines (SP 800-37r1, 800-53) OMB Memorandums
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
An Enterprise Continuous Monitoring Technical Reference Architecture
An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel
ARF, ARCAT, and Summary Results Lt Col Joseph L. Wolfkiel Enterprise-Level Assessment and Reporting The Concept Assessment Results Format (ARF) Assessment Summary Results (ASR) The Assessment Results Consumer
Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation
Transformational Vulnerability Management Through Standards Robert A. Martin MITRE Corporation The Department of Defense s new enterprise licenses for vulnerability assessment and remediation tools [1,2]
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
Healthcare Information Security Governance and Public Safety II
Healthcare Information Security Governance and Public Safety II Technical Track Seminar Agenda 8/26/2009 1 Vulnerability Assessment, Vulnerability Management and Penetration Testing PART 1 9:00 10:30 Anatomy
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
SESSION 706 Wednesday, November 4, 9:00am - 10:00am Track: Framework Fusion
SESSION 706 Wednesday, November 4, 9:00am - 10:00am Track: Framework Fusion 7 Steps to Secure Configuration Management Ram Ramdattan [email protected] Session Description Cyber-security threats are growing
IBM InfoSphere Guardium
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached
NETCOM/9 TH ASC Technical Authority (TA) Implementation Memorandum
NETCOM/9 TH ASC Technical Authority (TA) Implementation Memorandum U.S. ARMY ENTERPRISE SYSTEMS TECHNOLOGY ACTIVITY Fort Huachuca, AZ 85613-7070 Implementation Memorandum Number 2003-005d [Note: This Implementation
Secure Messaging Challenge Technical Demonstration
Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Security compliance automation with Red Hat Satellite
Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin Created with http://wordle.net Compliance is a major problem About half of the
McAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security PART 1 - COMPLIANCE STANDARDS PART 2 SECURITY IMPACT THEMES BUILD A MODEL THEMES MONITOR FOR FAILURE THEMES DEMONSTRATE
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009
Automating Attack Analysis Using Audit Data Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009 2 Introduction Audit logs are cumbersome and traditionally used after the fact for forensics analysis.
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Patch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
Analytics and Continuous monitoring Engine (ACE) for Enterprise Risk and Compliance Management
WHITE PAPER Analytics and Continuous monitoring Engine (ACE) for Enterprise Risk and Compliance Management Threat of Cyber Security is 24/7. New attack vectors are being designed daily and the bad actors
U.S. Department of Energy Golden Field Office Information Technology. GOanywhere Real World Virtual Desktops in the DOE
Information Technology GOanywhere Real World Virtual Desktops in the DOE Agenda 1. Brief Intro to the 2. VDI Drivers and Architecture 3. Lessons Learned 4. Benefits of VDI 5. Follow-On Initiatives About
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
C13 - Establishing a Windows Baseline Mike Villegas
C13 - Establishing a Windows Baseline Mike Villegas Windows Security Baselines Presented by Miguel (Mike) O. Villegas, CISA, CISSP Session # C13 INTRODUCTION TO WINDOWS MICROSOFT BASELINE SECURITY ANALYZER
Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)
NIST Interagency Report 7800 (Draft) Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT) David Waltermire, Adam Halbardier,
D. Best Practices D.2. Administration The 6 th A
Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.2. Administration The 6 th A 1 of 26 The previous section described how to improve IT security through use of better development
SCAP Compliance Checker Version 3.1 for Windows February 12, 2012
SCAP Compliance Checker Version 3.1 for Windows February 12, 2012 Developed by: Space and Naval Warfare (SPAWAR) Systems Center Atlantic P.O. Box 190022 North Charleston, SC 29419-9022 [email protected]
Making Vulnerability Management Operational
QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. Making Vulnerability Management Operational Track 1 11:45am-12:30pm/Ballroom A Robert A. Martin The MITRE Corporation Preview
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
RELEVANT STATISTICS FOR THE PPP PROJECT IN SOUTH AFRICA 1. NUMBER OF ELECTRONIC MEDICAL RECORDS- EMR (ON HIS) 2. OUTPATIENTS REGISTRATION (ON HIS)
RELEVANT STATISTICS FOR THE PPP PROJECT IN SOUTH AFRICA In this section we want to highlight operation facts from our IT operation in the Inkosi Albert Luthuli hospital in Durban. We have selected several
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
NetIQ FISMA Compliance & Risk Management Solutions
N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a
Dell KACE K1000 Management Appliance. Patching and Security Guide. Release 5.3. Revision Date: May 13, 2011
Dell KACE K1000 Management Appliance Patching and Security Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and agreements,
How To Manage A System Vulnerability Management Program
System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows
VRDA Vulnerability Response Decision Assistance
VRDA Vulnerability Response Decision Assistance Art Manion CERT/CC Yurie Ito JPCERT/CC EC2ND 2007 2007 Carnegie Mellon University VRDA Rationale and Design 2 Problems Duplication of effort Over 8,000 vulnerability
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1. 14 February 2014
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1 14 February 2014 Trademark Information Names, products, and services referenced within this document may be the trade
Federal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
APPLICATION SECURITY AND DEVELOPMENT SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 3, Release 5. 26 July 2013. Developed by DISA for the DoD
APPLICATION SECURITY AND DEVELOPMENT SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 3, Release 5 26 July 2013 Developed by DISA for the DoD This page is intentionally blank. ii TABLE OF CONTENTS Page
Implications of Security and Accreditation for 4DWX (Information Assurance) By Scott Halvorson Forecasters Training 26 February 2009
Implications of Security and Accreditation for 4DWX (Information Assurance) By Scott Halvorson Forecasters Training 26 February 2009 Users If I [user] am doing my job, then they [DOIM] are not doing theirs!
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
Compliance Management for Mobile Devices
Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide
Dell KACE K1000 System Management Appliance Version 5.4 Patching and Security Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
Esri Managed Cloud Services and FedRAMP
Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP
Army Golden Master (AGM) Microsoft Products
Army Golden Master (AGM) Microsoft Products Information Exchange Forum Session: 1 Army Golden Master Program Tina Hernandez NETCOM 9 th SC (A) G5 PP&A UNCLASSIFIED Program Overview / Objectives UGM Baseline
AppSentry Application and Database Security Auditing
AppSentry Application and Database Security Auditing May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft
