OVAL Developer Days. July 11-12, 2006
|
|
|
- Grant Austin
- 9 years ago
- Views:
Transcription
1 OVAL Developer Days July 11-12, 2006
2 Introduction Attendee List Day One Session OVAL Tutorial Session External Repositories Inventory Definitions Content Writing Definition Bundles Schematron Validation Discussion Session OVAL Supporter OVAL Certification Primary Source Vendors Day Two Session Automated Security Measurement Session OVAL Extensions - <remedy> and <solution> Session XCCDF-P - Three Part URN Conclusion
3 Introduction OVAL Developer Days was held on July 11-12, 2006 at The MITRE Corporation in Bedford, MA. The purpose of this event was to focus on the recently released version 5 of the OVAL Language and to educate attendees about the new features that have been added. In addition, other areas of concern (repository, compatibility) were discussed in an attempt to improve the associated procedures and requirements. By bringing together the lead proponents within the OVAL Community, the goal was to derive solutions that would benefit all parties, and continue the development of the language. What follows is a detailed summary of the discussions from this event. Please refer to the presentations that were given for additional information. They are available on the OVAL Web site
4 Attendee List Assuria - Chris Wood BigFix - Anna Min CA - Mark Gergely - John Devereux Center for Internet Security - Dave Waltermire Citadel Security Software, Inc. - Kent Landfield Configuresoft, Inc. - Dennis Moreau - Greg Frascadore Department of Defense - Melissa McAvoy Mindjet - Nils Puhlmann MITRE - Margie Zuk - Dr. Todd Wittbold - David Mann - Charles Schmidt ncircle - Michael Murray - Jay Graver - Mike Luu NIST - Steve Quinn (telecon) - Peter Mell (telecon) - Richard Ayers PatchLink Corporation - Tom Klemzak - Ken Lassesen Secure Elements - Scott Carpenter - Andrew Bove - Dave Neimoller ThreatGuard - Rob Hollis - Randy Taylor University of Nebraska at Omaha - Matt Payne OVAL Team - Steve Boczenowski - Matt Wojcik - Jon Baker - Andrew Buttner - Dr. Harvey Rubinovitz - Bob Martin - 4 -
5 Day One Session 1 OVAL Tutorial OVAL Developer Days opened with a tutorial on version 5.0 of the OVAL Language which was released on July 16 th, Topics included the breakout of <objects> and <states>, the use of variables within OVAL, complex objects involving <sets> and <filters>, and definition extension. A simple 'Hello World' example was stepped through to help demonstrate writing content in the new format. Overall the session was about educating the attendees, so discussion was limited to questions about some of the material. One of the nicest comments at the end of the session was about how all the topics discussed at last year's OVAL Developer Days seem to have been addressed in the new version. The entire presentation is available on the OVAL Web site. Session 2 The second session focused on the OVAL Repository. Some background information was presented about the goals of the OVAL Repository, followed by an outline of its history. The details of this talk can be found in the presentation available on the OVAL Web site. Discussion at the end of the briefing was focused on the future direction of the OVAL Repository. External Repositories There was some discussion on how external repositories fit into the OVAL Community. Currently, Red Hat hosts an external repository containing patch definitions for their security advisories. Our hope is that additional OS vendors will stand up external repositories to cover their operating system. If this becomes reality, how should the OVAL Repository relate to these external repositories? Should the content held in an external repository be copied into the OVAL Repository? Or should the OVAL Repository link to the individual definitions held in the external repository? Both of those suggestions involve incorporating the external content in the OVAL Repository and hence subjecting them to the community review process. It was then mentioned that when dealing with patch content, OS vendors are the definitive source and they should not be subject to the community review process. In addition, pulling in content from external repositories opens up the challenge of keeping both repositories in sync and up to date. Another suggestion is to simply provide links to the external repositories as a whole. In essence notifying users about them and providing a source for the OVAL Community to find the different external repositories that are out there. It was also pointed out that the type of content being produced factors into the decision. Patch content is more likely to be taken directly from the OS vendor, while vulnerability or configuration content might be better served by the community and the review process. A feature to the language that could help with the relationship between external repositories was discussed. Currently in version 5.0, any OVAL Definition linked to by an <extended_definition> tag must reside in the definition document. The proposal is to have an <external_definition> that is just a reference to a definition located in some external repository. The id and location of this definition would be provided so tools can fetch the definition during evaluation. This allows extension of other's content without forcing the definition writer to pull in - 5 -
6 all the content they are extending. Note that XML Includes could be used with the current schema to accomplish something similar. Inventory Definitions With version 5.0, definition extension allows content writers to make better use of inventory definitions. Discussion ensued about how inventory definitions should be supported in the OVAL Repository. Correct use of inventory definitions should reduce the amount of maintenance as changes will only need to be made in one place. Of course a collection of inventory definitions needs to be developed in order for them to be used. This is an area of work for the community over the next couple of months. Content Writing Support for content writers needs to be improved. Suggestions included adding functionality to the OVAL Web site to allow searching for all the definitions that include a specific OVAL Test. This feature will help provide an understanding of where a certain test is used if a modification needs to be made. Another feature that would be of great help would be the ability to determine if a specific <object> (or <test> or <state>) already exists so that it can be reused. Another area to help with content submission is a tool to detect when duplicate tests/objects/states are being submitted. Basically it would flag something as already in the repository and give the id so the content writer can make the modification. It was also mentioned that a schema for validating the metadata required by the OVAL Repository (as opposed to the metadata required by the OVAL Language) should be available to assist content writers. Definition Documents It was requested that the OVAL Community have more flexibility in creating the definition documents (for example, a definition document containing all the Windows XP definitions) that can be downloaded from the web site. In an ideal world, the user could enter a set of criteria (similar to the search criteria) and a definition document based on this would be created and available for download. Schematron Validation One way to help validate the content that is being submitted is to utilize the Schematron statements that have been bundled into version 5.0 of the OVAL Language. This should become a requirement for submission as it will help catch a number of small errors that commonly occur. Discussion In between sessions, a discussion was held regarding the breakup of OVAL Definitions pertaining to the issue they are defining. For each issue (a vulnerability, or a patch, etc.), should only one OVAL definition be written? Or should multiple smaller definitions be written, each defining a specific platform? The discussion led to the idea of having a number of individual definitions focused on specific platforms all wrapped up by a single definition that extends the individual definitions to define the issue in its entirety. This approach would have the problem of having two OVAL ids associated with each issue. Does writing only one OVAL definition per issue imply completeness? A definition writer might not have the knowledge to write the definition for every system, either not knowing how to, or not having the schema for additional platforms. When evaluated, the answer that is given is assumed correct and a user will think they are not vulnerable when in fact they very well could be. This problem could be solved by the correct use of the - 6 -
7 <unknown_test>. If a definition writer knows that a certain platform is affected, but is unable to write the OVAL piece for it, an <unknown_test> can be written to say this. That way, evaluation of the OVAL Definition will result in "unknown". Another issue with breaking up a definition is that the breakup becomes inconsistent across different definition writers. Some writers choose to break up the OVAL definitions one way, while others choose to break things up a different way. It is hard to enforce this even with a documented style guide. It is much easier to get the community following a consistent format with one definition per issue. Overall, the room was split on this topic and further discussion should be had. Session 3 Automated Security Measurement Steve Quinn and Peter Mell of NIST presented on their work involving FISMA Technical Control Automation. They are working with OVAL and other standards including XCCDF, CVE, and CVSS in an effort to express security guidance in a machine readable automated way. Please look at the presentation available on the OVAL Web site for more information. Day Two Session 4 The forth session was focused on OVAL Compatibility. After a quick introduction to the compatibility program, a number of edge use cases were presented. For each one, we discussed whether the organization/individual should be part of the compatibility program. These use case discussions themselves were meant to start conversations regarding the direction of OVAL Compatibility and led to a number of additional topics. OVAL Supporter There are a number of use cases that don't fit exactly into the defined OVAL Compatibility program. These capabilities should still be recognized and this can be accomplished through the OVAL Supporter section. An OVAL Supporter is a capability that incorporates OVAL in some way, but yet does not fit the model of OVAL Compatibility. OVAL Compatibility should be limited to those tools that exchange information in the OVAL format. OVAL Certification In addition to having the compatibility program for capabilities (tools and services), the idea of an OVAL Certification process for individuals was discussed. In order to be a certified OVAL contributor, an individual would need to pass a test. Creating such a test would be a difficult task and administrating it would be an even tougher task. Even with these challenges, this would provide a foundation to build upon. By certifying individuals, it gives organizations a way of verifying who has at least been exposed to OVAL. OVAL Certified individuals would not be required for a capability to achieve OVAL Compatibility (or vise versa) OVAL Certification would just be a way to distinguish who an organization has on their team and represent some level of expertise in the OVAL arena
8 Primary Source Vendors An idea for promoting creation of content and for rewarding those vendors who produce OVAL Definitions is to establish the notion of Primary Source Vendor and to call them out with a special award / distinction. This might help provide incentive for those vendors that are not currently participating. This title would be a special tag given in addition to OVAL Definition Producer. These different labels within compatibility allow customers to more effectively search for the specific product they are looking for. We could take this a step further and also have an Authoritative Source classification. The big challenge here would be determining who the authoritative voice is. Session 5 OVAL Extensions - <remedy> and <solution> Ken Lassesen from PatchLink gave a presentation about the need for remedy and solution information within OVAL. He had submitted a proposal to the OVAL Community before OVAL Developer Days regarding a technical implementation of <remedy> and <solution> tags. The presentation was geared at getting the ball rolling in that direction. Please look at the presentation available on the OVAL Web site for more information. It was noted that there might be some overlap with features already in existence with XCCDF. XCCDF can be used to define policy level decisions. An example would be trying to determine which alternative to choose. Going forward we need to investigate how XCCDF might help provide some of the needed functionality. Session 6 The final session of the day was a talk regarding XCCDF-P. This is an NSA led effort that has been in the works for about a year. Its main goal is to define a data model and XML representation for expressing qualifications and hierarchies of facts about platforms. This effort is related to OVAL in that OVAL definitions have a need to express which platforms they are intended for, currently accomplished through the <affected> element. In addition, OVAL inventory definitions can be written for each defined XCCDF-P identifier. XCCDF-P - Three Part URN The latest proposal for XCCDF-P is to break the URN identifier into three distinct parts: a hardware part, an OS part, and an application part, with each part being optional. The goal would be for the identifier to represent a class of machines that match the characteristics held within the id, thus allowing policy to be associated with those machines. The URN is not meant to be a complete description of the system but rather a way to identify a class of systems. The format of the URN would in essence be three small hierarchies, one for each part. The hierarchy structure allows higher level classifications to be assumed. The original XCCDF-P format was based on a similar hierarchy and there were questions about how effective a hierarchy can be at covering the vast array of platforms in existence. Breaking the single hierarchy into three smaller hierarchies has not solved the problem completely, but has enabled it to more easily identify a wider range of complex platforms
9 Conclusion Thank you to all that attended and made OVAL Developer Days 2006 a great success. The OVAL team is looking forward to working with everyone to expand on the topic discussed and come to a conclusion on many of the issues presented. See everyone next July!! - 9 -
Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)
NIST Interagency Report 7669(Draft) Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT) John Banghart Stephen Quinn David Waltermire NIST Interagency Report
An Enterprise Continuous Monitoring Technical Reference Architecture
An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell
Federal Desktop Core Configuration (FDCC)
Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007 FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to
FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs
FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
Making Vulnerability Management Operational
QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. Making Vulnerability Management Operational Track 1 11:45am-12:30pm/Ballroom A Robert A. Martin The MITRE Corporation Preview
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
Automating Compliance with Security Content Automation Protocol
Automating Compliance with Security Content Automation Protocol presented by: National Institute of Standards and Technology Agenda Information Security Current State Security Content Automation Protocol
Common Platform Enumeration (CPE) Technical Use Case Analysis
Common Platform Enumeration (CPE) Technical Use Case Analysis The MITRE Corporation November, 2008 Executive Summary A common theme taken from discussions at the Common Platform Enumeration (CPE) Developer
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference
SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security
Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation
Transformational Vulnerability Management Through Standards Robert A. Martin MITRE Corporation The Department of Defense s new enterprise licenses for vulnerability assessment and remediation tools [1,2]
Customer Support Policy
Customer Support Policy This Customer Support Policy ( Policy ) describes the Support that Invenias provides to Customers that have paid all applicable fees and that are using Licensed Software in a Supported
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
Status Update. Jon Baker September 28, 2010
Status Update Jon Baker September 28, 2010 HS SEDI is a trademark of the U.S. Department of Homeland Security (DHS). OVAL Overview An international, information security, community standard to promote
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP Vasileios A. Baousis (Ph.D) Network Applications Team Slide 1 Agenda Introduction Background - SCAP - Puppet &Mcollective
Guide to Enterprise Patch Management Technologies
NIST Special Publication 800-40 Revision 3 Guide to Enterprise Patch Management Technologies Murugiah Souppaya Karen Scarfone C O M P U T E R S E C U R I T Y NIST Special Publication 800-40 Revision 3
Oracle Hyperion Data Relationship Management Best Practices, Tips and Tricks. Whitepaper
Oracle Hyperion Data Relationship Management Best Practices, Tips and Tricks Whitepaper This document contains Confidential, Proprietary, and Trade Secret Information ( Confidential Information ) of TopDown
Secstate: Flexible Lockdown, Auditing, and Remediation
Secstate: Flexible Lockdown, Auditing, and Remediation Certifiable Linux Integration Project Tresys Technology Karl MacMillan Topics Secstate Overview Sample session illustrating
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance
An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance Presented by: John Banghart, Booz Allen Hamilton SCAP Validation Project Lead Thoughts on Current State
Security Vulnerability Management. Mark J Cox
Security Vulnerability Management Mark J Cox Responsibility & Accountability Unique challenges Many vendors all ship the same thing The vulnerabilities are there. The fact that somebody in the middle of
BarTender Version Upgrades. Best practices for updating your BarTender installation WHITE PAPER
BarTender Version Upgrades Best practices for updating your BarTender installation WHITE PAPER Contents Understanding Version Upgrades 3 Upgrading BarTender to a Newer Version 4 Planning a Version Upgrade
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Security compliance automation with Red Hat Satellite
Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin Created with http://wordle.net Compliance is a major problem About half of the
Principal MDM Components and Capabilities
Principal MDM Components and Capabilities David Loshin Knowledge Integrity, Inc. 1 Agenda Introduction to master data management The MDM Component Layer Model MDM Maturity MDM Functional Services Summary
Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)
NIST Interagency Report 7800 (Draft) Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT) David Waltermire, Adam Halbardier,
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Proactively Managing Servers with Dell KACE and Open Manage Essentials
Proactively Managing Servers with Dell KACE and Open Manage Essentials A Dell Technical White Paper Dell KACE Dell Open Manage Essentials THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN
Toward an Ontology Architecture for Cyber-Security Standards
Toward an Ontology Architecture for Cyber-Security Standards Mary C. Parmelee The MITRE Corporation 7515 Colshire Drive, McLean, VA 22102-7539, USA [email protected] Abstract. The rapid growth in magnitude
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
VRDA Vulnerability Response Decision Assistance
VRDA Vulnerability Response Decision Assistance Art Manion CERT/CC Yurie Ito JPCERT/CC EC2ND 2007 2007 Carnegie Mellon University VRDA Rationale and Design 2 Problems Duplication of effort Over 8,000 vulnerability
Release Management in Vasont
VASONT FEATURE SERIES: Release Management in Vasont This white paper focuses on the critical business issues surrounding release management and explains how the Vasont Content Management System s branch
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 8. 24 July 2015
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 8 24 July 2015 Developed by Red Hat, NSA, and for the DoD Trademark Information Names, products, and
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Red Hat ISV Program Guide
Red Hat ISV Program Guide Accelerate Your Success! APJ ISV program Guide 1 of 17 WELCOME TO THE ISV PARTNER PROGRAM RED HAT PARTNER PROGRAM ISV PARTNER TRACK Welcome to the Red Hat Partner Program ISV
Dementia. Post Diagnostic Support. HEAT Target
Q ue S T Q uality and E fficiency S upport Team Dementia Post Diagnostic Support HEAT Target Information Flow Mapping Guide February 2013 DRAFT ID: A5110749 Version: 5 Page 1 of 11 Contents 1.0 Background...
July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263
July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67
A Vulnerability Assessment Tool based on OVAL in Linux System
A Vulnerability Assessment Tool based on OVAL in Linux System Youngmi Kwon 1, Hui Jae Lee 2, Geuk Lee 3 1 Dept. of InfoCom, Chungnam National University, Daejeon, South Korea [email protected] 2 Dept. of
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
D25-2. Agile and Scrum Introduction
D25-2 Agile and Scrum Introduction How to Use this Download This download is an overview of a discussion Intertech has with clients on Agile/Scrum This download has an overview of Agile, an overview of
An Introduction to Extreme Programming
An Introduction to Extreme Programming Ken Auer [email protected] http://www.rolemodelsoft.com RoleModel Software, Inc. 5004 Rossmore Dr. Fuquay-Varina, NC 27526 919-557-6352 Page 1 The Joy of Software
TABLE OF CONTENTS PARTNER COMMUNICATION GUIDELINES
Partner Communication Guidelines Brand Voice September 2013 TABLE OF CONTENTS Trademark Usage and This Document... 3 Word Choice... 3 The Names of Products Offered by Partners or Other Third Parties...
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
How To Write The Jab P-Ato Vulnerability Scan Requirements Guide
FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide Version 1.0 May 27, 2015 JAB P-ATO Vulnerability Scan Requirements Guide Page 1 Revision History Date Version Page(s) Description Author May 27,
Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015
Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 This document has several purposes: To explain what website maintenance is and why it's critical
Software Asset Management (SWAM) Capability Description
Software Asset Management (SWAM) Capability Description Purpose Provides an organization visibility into the software installed and operating on their network(s) so they can appropriately manage authorized
Streamlining Patch Testing and Deployment
Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep
Information Technology Services firms
CHAPTER 2 SIX SOURCES OF SOFTWARE 1. Information Technology Services Firms, 2. packaged software producers, 3. enterprise-wide solutions, 4. application and managed service providers, 5. open-source and
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
Common Result Format (CRF ) Specification Version 0.3 Jon Baker Andrew Buttner Todd Wittbold The MITRE Corporation
Common Result Format (CRF ) Specification Version 0.3 Jon Baker Andrew Buttner Todd Wittbold The MITRE Corporation Introduction...3 2 Use Cases...3 3 Related Preexisting Formats...3 3. XCCDF Results Format...3
Unifying IT How Dell Is Using BMC
Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.
CONDIS. IT Service Management and CMDB
CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...
Healthcare, transportation,
Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental
Data Sheets RMS infinity
Data Sheets RMS infinity Introduction RayManageSoft infinity provides a complete set of products for software and operating system (OS) deployment, vulnerability analysis and patch management for Microsoft
GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
Secunia Vulnerability Intelligence Manager (VIM) 4.0
Secunia Vulnerability Intelligence Manager (VIM) 4.0 In depth Real-time vulnerability intelligence brought to you on time, every time, by Secunia s renowned research team Introduction Secunia is the world-leading
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Securing Your Network Environment. Software Distribution & Patch Management
Securing Your Network Environment Software Distribution & Patch Management Ken Conrad Chief Strategist Microsoft Infrastructure Solutions Analysts International Overview Microsoft s s Patch Management
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
Agile in Financial Services A Framework in Focus
Agile in Financial Services A Framework in Focus John B. Hudson, B.Sc, PMP, CSM PMI NJ Chapter February 19, 2013 19 Feb 2013 1 Objectives 1. Agile Development an Overview 2. The Agile Enterprise Infrastructure
ETPL Extract, Transform, Predict and Load
ETPL Extract, Transform, Predict and Load An Oracle White Paper March 2006 ETPL Extract, Transform, Predict and Load. Executive summary... 2 Why Extract, transform, predict and load?... 4 Basic requirements
CMDB Federation (CMDBf) Frequently Asked Questions (FAQ) White Paper
CMDB Federation (CMDBf) Frequently Asked Questions (FAQ) White Paper Version: 1.0.0 Status: DMTF Informational Publication Date: 2010-05-10 Document Number: DSP2024 DSP2024 CMDB Federation FAQ White Paper
Patch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005
Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005 Government Investment Analysis Guidance Current Government acquisition guidelines mandate the
Automating Software License Management
Automating Software License Management Automating license management saves time, resources, and costs. It also consistently produces high quality data and a documentable method for mapping software licenses
Is Penetration Testing recommended for Industrial Control Systems?
Is Penetration Testing recommended for Industrial Control Systems? By Ngai Chee Ban, CISSP, Honeywell Process Solutions, Asia Pacific Cyber Security Assessment for Industrial Automation Conducting a cyber-security
NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner
NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Vulnerability Scanning Date Approved for Submission: 24-04-2007
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Towards security management in the cloud utilizing SECaaS
Towards security management in the cloud utilizing SECaaS JAN MÉSZÁROS University of Economics, Prague Department of Information Technologies W. Churchill Sq. 4, 130 67 Prague 3 CZECH REPUBLIC [email protected]
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
Testing Control Systems
Testing Control Systems with Microsoft s Attack Surface Analyzer { Digital Bond, Inc Michael Toecker, PE ddddddddd ICSJWG October 15 th 18 th Track III { { Michael Toecker, PE Professional Engineer 8 Years
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
