Management (CSM) Capability
|
|
|
- Lenard Jordan
- 10 years ago
- Views:
Transcription
1 CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security
2 Table of Contents 1 PURPOSE AND SCOPE THREAT / ATTACKS QUESTION: WHAT TYPES OF ATTACKS ARE WE TRYING TO ADDRESS WITH CSM? QUESTION: HOW ARE THESE ATTACKS DIFFERENT FROM EXPLOITING VULNERABILITIES IN SOFTWARE? QUESTION: HOW DOES CSM ADDRESS ATTACKS ON POORLY CONFIGURED SYSTEMS? INTEGRATION QUESTION: WHAT CAPABILITIES SUPPORT CONFIGURATION SETTINGS MANAGEMENT? QUESTION: WHAT CAPABILITIES DOES CSM SUPPORT? QUESTION: WHAT OTHER CAPABILITIES PROVIDE COMPENSATING CONTROLS TO CSM? DESIRED STATE QUESTION: WHAT IS CONSIDERED A CONFIGURATION SETTING? QUESTION: WHAT ARE TYPES OF COMMON CONFIGURATION WEAKNESSES? QUESTION: WHAT IS THE CSM DESIRED STATE? QUESTION: WHAT IS THE DESIRED STATE SPECIFICATION FOR CSM? QUESTION: WHAT DATA SHOULD BE RECORDED IN DESIRED STATE? QUESTION: HOW DOES MY D/A DETERMINE ITS CSM DESIRED STATE? QUESTION: IS CONFIGURING ONLY FEDERALLY SPECIFIC SETTINGS ENOUGH? QUESTION: IS RELYING ON BEST PRACTICE CHECKLISTS ACCEPTABLE FOR CSM? ACTUAL STATE QUESTION: WHAT IS ACTUAL STATE? QUESTION: WHAT MAKES UP MY D/A S ACTUAL STATE INVENTORY? QUESTION: WHAT DATA SHOULD BE RECORDED IN ACTUAL STATE? QUESTION: HOW DOES MY D/A DETERMINE ITS ACTUAL STATE? FINDING DEFECTS QUESTION: HOW DOES A D/A FIND THE DIFFERENCE BETWEEN DESIRED STATE AND ACTUAL STATE IN CSM? QUESTION: HOW DOES A D/A MANAGE POOR CONFIGURATIONS? FIXING DEFECTS QUESTION: WHAT OPTIONS ARE AVAILABLE FOR ADDRESSING THE DIFFERENCE BETWEEN ACTUAL AND DESIRED STATE? QUESTION: WHY IS THE GAP BETWEEN DESIRED STATE AND ACTUAL STATE IMPORTANT TO THE D/A? QUESTION: HOW CAN MY D/A MINIMIZE EXPOSURE TO POOR CONFIGURATIONS? Configuration Settings Management Continuous Diagnostics and Mitigation 1
3 1 Purpose and Scope This toolkit outlines and documents issues of relevance to implementing the Configuration Settings Management (CSM) Capability as part of Continuous Diagnostics and Mitigation (CDM). This toolkit provides general information on CSM and implications thereof. Further, this toolkit highlights potential considerations that technical implementers as well as managers may have when understanding how their organization can effectively implement CSM to better manage cybersecurity risk. Additional considerations, inquiries, and suggestions for revision or addition can be submitted to: This toolkit will be updated as required. Configuration Settings Management Continuous Diagnostics and Mitigation 2
4 2 THREAT / ATTACKS 1. QUESTION: WHAT TYPES OF ATTACKS ARE WE TRYING TO ADDRESS WITH CSM? Answer: CSM mitigates attacks that require successful exploitation of default or poor configuration settings to compromise a device or a system. Attack Description: Attackers attempt to exploit software or hardware with weak or insecure configurations. Once a configuration setting is compromised, it may be used to compromise confidentiality, integrity, and availability of resources or data residing on systems and networks. Attack Types: For CSM, our interests include but are not limited to the following: Exploitation of default accounts and passwords (e.g., initial router password) Exploitation of out-of-the-box configurations (e.g., TFTP is enabled) Exploitation of inadequate software or hardware configuration settings (e.g., user can modify setting) Exploitation of configurations designed for usability and not security (e.g., AutoRun is enabled) Exploitation of misconfigured privilege settings or permissions on software and hardware (e.g., configuration file is set to world-writable) Impact: By reducing the number of weak or incorrect settings, we can reduce the attack surface, making it harder for attackers to succeed. Configurations can exist for software, hardware, or firmware. Configurations on endpoints can include ports, protocols, or available services. Related Resources NIST Guidance: NIST Guide for Security-Focused Configuration Management of Information Systems: NIST SP National Checklist Program for IT Products--Guidelines for Checklist Users and Developers: rev2/sp rev2.pdf Configuration Settings Management Continuous Diagnostics and Mitigation 3
5 2. QUESTION: HOW ARE THESE ATTACKS DIFFERENT FROM EXPLOITING VULNERABILITIES IN SOFTWARE? Answer: Attacks against configuration settings exploit functionality in software or hardware, rather than flaws in the software or hardware. While attacks that exploit vulnerabilities in software (managed by Vulnerability Management) deal with bugs in software s source code and method of operation, attacks against configuration settings exploit default or out-of-the-box settings, or misconfigurations caused by administrators who incorrectly configure permissions to a resource. Differentiation: CSM addresses the need to track and manage configuration settings of assets within an organization. While the Manage Software Inventory capability addresses changes that affect specific versions of patches, updates, plug-ins, and new releases, CSM addresses modifications to the software parameters. Vulnerability Management also ties in closely with this capability unmanaged or unmodified default configurations on hardware and software assets can lead to exploitable vulnerabilities. Attackers can easily take advantage of these targets of opportunity, also known as low-hanging fruit in hacker circles. Not all vulnerable configuration settings are due to out-of-the-box settings. During troubleshooting efforts, administrators sometimes change permissions on files or services to ensure the security settings are not interfering with the execution of a program or service. When inadvertently left in place, these configuration changes can leave the modified application open to attack and exploitation. 3. QUESTION: HOW DOES CSM ADDRESS ATTACKS ON POORLY CONFIGURED SYSTEMS? Answer: Because poorly configured systems provide attackers with easy targets of opportunity due to quick access to elevated privileges or known default settings, a rigorous configuration settings management process and policies can help identify poor and unsecure configuration settings. After quickly identifying poorly configured systems, the organization has a few options for managing this risk: Primary Methods Quickly configure the system to the correct setting. Quickly determine the root cause of the misconfiguration. Preventative Methods Develop processes to perform quality assurance checks of configuration settings of new devices added to your inventory. Develop processes to prevent unauthorized individuals from making configuration settings changes. Develop processes and policies for configuration settings management and control. Configuration Settings Management Continuous Diagnostics and Mitigation 4
6 3 INTEGRATION Attackers first seek out assets with default configurations, such as the default admin password on a service, for easy access into other systems. It is the easiest way for an attacker to exploit a network. 4. QUESTION: WHAT CAPABILITIES SUPPORT CONFIGURATION SETTINGS MANAGEMENT? Answer: Hardware Asset Management (HWAM) and Software Asset Management (SWAM) support CSM by providing a reliable inventory of hardware and software assets to check for known issues. 5. QUESTION: WHAT CAPABILITIES DOES CSM SUPPORT? Answer: CSM can aid in proper execution of Vulnerability Management. For example, sometimes enabling or disabling configuration settings in file sharing and in services can help mitigate certain vulnerabilities. More supported capabilities will be added as more phases of CDM are rolled out. 6. QUESTION: WHAT OTHER CAPABILITIES PROVIDE COMPENSATING CONTROLS TO CSM? Answer: SWAM can provide compensating controls to CSM. By preventing vulnerabilities using patching, certain configuration settings can be protected from exploitation. Another way SWAM can provide compensating controls to CSM is through whitelisting or blacklisting. By allowing or disallowing certain software to be installed, whitelists and blacklists reduce the risk that a piece of software could be exploited due to poor or incorrect configurations. 4 DESIRED STATE 7. QUESTION: WHAT IS CONSIDERED A CONFIGURATION SETTING? Answer: A configuration setting is a piece of metadata about software or hardware that determines how it functions. The value can be changed by an administrator (with proper permissions). A configuration setting can take the form of a default password in a SAM file (in the case of the Windows Operating System), a registry key, or a line in a configuration file that is used by a program when executed. A configuration setting can also take the form of privileges (such as file/folder permissions) that must be set by an administrator. Configuration Settings Management Continuous Diagnostics and Mitigation 5
7 8. QUESTION: WHAT ARE TYPES OF COMMON CONFIGURATION WEAKNESSES? Answer: The most common types of configuration weaknesses are associated with default settings. Examples include the following: Default accounts and passwords (e.g., initial router password) Out-of-the-box configurations (e.g., TFTP is enabled) Inadequate software or hardware configuration settings (e.g., user can modify setting) Configurations designed for usability and not security (e.g., AutoRun is enabled) Misconfigured privilege settings or permissions on software and hardware (e.g., configuration file is set to world-writable) Security weaknesses can occur when users and administrators make an unauthorized software or hardware change for testing or to make a task easier. CSM helps quickly identify and remediate these changes and thus limit an adversary s exposed attack surface. 9. QUESTION: WHAT IS THE CSM DESIRED STATE? Answer: The desired state for CSM is for every authorized device to be configured with the authorized configuration settings as required for the role the device has been assigned. (See SWAM for Roles and Profiles.) Background: The CSM desired state is an enterprise that comprises hardware and software assets with strong and secure configurations. Desired configuration settings are defined and maintained (e.g., ownership is assigned, settings are authorized, frequent maintenance is performed) in checklists and standard configuration operating system images. This desired state includes establishing and maintaining a secure system software image to build and deploy new systems from within the organization. This image should be based on government and industry best practice checklists and security guides, and it should be backed with an established approval process for any deviations from the baseline. Approved organizational system configuration checklists should be established, maintained, and routinely reviewed. Software checklists should be maintained in a machine-readable format to streamline scanning and testing. Hardware checklists should include diagrams to ensure that the configuration process is repeatable and to reduce mistakes. Quality controls should be designed throughout both the software and hardware configuration process to identify any missed or overlooked steps in the checklists. 10. QUESTION: WHAT IS THE DESIRED STATE SPECIFICATION FOR CSM? Answer: The desired state specification is the authorized configurations defined for authorized software and hardware products in your organization. Background: Every authorized device has a role, and each role requires a baseline configuration. Each organization should have an inventory, by device, documenting the authorized configuration and thus configuration settings for each device in your enterprise. The organization must decide what software must be protected, and which settings to include in CSM. Configuration Settings Management Continuous Diagnostics and Mitigation 6
8 Bottom Line: The desired state specification contains a complete listing, by device, of all required configuration settings that should exist on each device in the organization s HWAM inventory. 11. QUESTION: WHAT DATA SHOULD BE RECORDED IN DESIRED STATE? Answer: The minimal configuration settings management data recorded for the desired state should include the following: Data Item Applicable CPE (vendor, product, version, release level) or equivalent Approved baseline configuration version for each setting CCE configuration to be followed for each setting Local D/A settings in addition to baseline configuration settings What is to be configured for each setting (registry, password, privilege, etc.) The validation rule to check for each setting What constitutes compliance for each setting Justification For defining device types, for supply chain management, and to know what CCEs may apply to the device For tracking version of baseline configurations For identifying which CCEs to configure the device to For identifying local D/A requirements beyond baseline configuration settings For identifying what needs to be checked for compliance To identify the check to be run on the metadata of the setting To document the definition of compliance for the particular setting 12. QUESTION: HOW DOES MY ORGANIZATION DETERMINE ITS CSM DESIRED STATE? Answer: The CDM Configuration Settings Management Working Group (CSMWG), which is comprised of members from participating Departments and Agencies, will provide the critical configuration settings for software commonly found on Federal networks. These settings provide the baseline for CSM. If your organization is interested in participating in the CSMWG, please [email protected] Each organization can build on this baseline with configuration settings that are operationally relevant to a unique environment. The CSM desired state for each organization should be set through the use of baseline configuration settings for each device role. Background: Your organization s configuration settings working group (or other group at the organizational level that reviews configuration settings) should determine the desired state by performing a system requirements analysis for each device role required in the enterprise. The baseline image for each asset should be the least common denominator across your enterprise with modifications approved by your organization s change management process. These baseline settings and images, along with the approved deviations, are your organization s desired state. Configuration Settings Management Continuous Diagnostics and Mitigation 7
9 The NIST CCE database provides sample baselines for some of the Common Configurations for known hardware and software devices. Organizations should have configurations for all applications. The CSMWG provides only the most critical configurations for common applications across the government. 13. QUESTION: IS CONFIGURING SETTINGS RECOMMENDED BY THE CDM CSM WORKING GROUP SUFFICIENT? Answer: The CSMWG focuses on the core and most common application settings across the U.S. Government. In the end, only your organization can determine what is most important to you and your operations. Each organization must identify the applications that have the most impact and how to properly and securely configure them in order to protect critical information and systems. Each organization has a unique risk environment; your organization must determine which configurations apply to its risk environment, and how to implement those configurations. 14. QUESTION: IS RELYING ON BEST PRACTICE CHECKLISTS ACCEPTABLE FOR CSM? Answer: Yes, but your organization should ensure that any best practices allow for sufficient usability and security for your operational environment. Background: Federal agencies are at varying levels of maturity in managing their asset configuration settings. Many agencies use established configuration guidelines and checklists from reputable government and industry sources. Reputable best practice checklists have been developed by the National Institute of Standards and Technology, National Security Agency, Defense Information Systems Agency, and Center for Internet Security. 5 ACTUAL STATE 15. QUESTION: WHAT IS ACTUAL STATE? Answer: The actual state is the current configuration settings on all assets across your network. Depending on what tools and capabilities are available, the actual state can be collected during a periodic asset discovery or through automated polling, asset self-reporting, automation, or other means. CSM actual state should be based only on authorized assets identified for HWAM and SWAM. The D/A needs to establish a policy through CSM that Configuration Settings Management Continuous Diagnostics and Mitigation 8
10 any piece of software discovered through CSM is then brought into the SWAM. 16. QUESTION: WHAT MAKES UP MY D/A S ACTUAL STATE INVENTORY? Answer: The actual state inventory for CSM is a listing, by discovered device, with all collected configuration settings from each device in your D/A. 17. QUESTION: WHAT DATA SHOULD BE RECORDED IN ACTUAL STATE? Answer: The minimal CSM data recorded for the actual state should include the following: Data Item Expected CPE (vendor, product, version, release level) or equivalent for each setting Version of the configuration guideline/rule set used for each setting Date/Time of Data Collection for each setting Device settings were collected from for each setting What must be returned to show current status for each setting Justification For defining device types, for supply chain management, and to know what CCEs may apply to the device For documenting the version of the guideline/rule set all comparisons were made against For documenting point in time the checks were accomplished For identifying the device checked For identifying current status for each setting The data collected for the actual state must be machine readable to prevent subjectivity by excluding humans who can misinterpret data. 18. QUESTION: HOW DOES MY ORGANIZATION DETERMINE ITS ACTUAL STATE? Answer: The actual state for asset configuration is determined by discovering the current configuration settings of all assets on the network. The actual state can be discovered by using tools and capabilities that can interrogate an asset and record its current configuration settings or by using manual methods such as a physical review of a device s settings. The actual configurations of the device and software assets on the network are compared against the authoritative configurations to determine the gap in actual state. This gap between desired state and actual state, or delta, identifies vulnerable assets (e.g., misconfigured or improperly configured hardware or software) that require corrective action. Configuration Settings Management Continuous Diagnostics and Mitigation 9
11 6 FINDING DEFECTS 19. QUESTION: HOW DOES AN ORGANIZATION FIND THE DIFFERENCE BETWEEN DESIRED STATE AND ACTUAL STATE IN CSM? Answer: Determining the difference between desired state and actual state for CSM is provided by routine checks on end devices and the verification of configuration compliance status. CDM requires that device state information be returned for some failed checks, changing how the current tools and processes perform configuration settings management. The act of collecting the data is still the comparison of what the configuration should be against what the configuration is actually set to. Configuration checks must be written in machine-readable code to prevent subjectivity, allowing only for pass or fail decisions. Defect Type Detection Rule Unapproved setting/fail against policy (out of compliance) Nonreporting devices Setting exists in the actual state and is assigned a positive risk score in the desired state. The device is in the HWAM desired or actual state, but not in the CSM actual state with timely-enough data. Response Options Change setting or accept risk score. Restore reporting or declare the device missing/uninstalled/retired in HWAM. 20. QUESTION: HOW DOES AN ORGANIZATION MANAGE POOR CONFIGURATIONS? Answer: Response options are listed in Question 19. Ultimately, it is up to each organization to implement policies for managing poor configurations. Poor hardware and software configurations must be addressed in a timely manner to reduce extended exposure to exploitation. Risk scores can be assigned to each improper or misconfigured asset configuration setting. Assets with poor configurations can then be grouped locally for summarization and management (e.g., by department or by section). An overall risk score can be assessed against each object container. 7 FIXING DEFECTS 21. QUESTION: WHAT OPTIONS ARE AVAILABLE FOR ADDRESSING THE DIFFERENCE BETWEEN ACTUAL AND DESIRED STATE? Answer: Once the organization has identified the differences between actual and desired states, it is able to understand the differences and determine the appropriate corrective actions, such as: Develop more accurate desired state specifications: Establishing and maintaining configuration inventories Configuration Settings Management Continuous Diagnostics and Mitigation 10
12 Establishing and updating baseline configurations for systems Having processes in place to make changes in a controlled and approved fashion Manage deployed configurations and monitor changes: Auditing changes in place against those established in the inventory or baseline Having a controlled process for exceptions with periodic review Having automated mechanisms to centrally manage, apply, and verify configurations Establishing non-persistent settings to protect against unauthorized changes In addition, the response options listed below may help when defects are found between CSM actual and desired states: Defect Type Detection Rule Unapproved Setting exists in the actual state and is setting assigned a positive risk score in the Nonreporting devices desired state. The device is in the HWAM desired or actual state, but not in the CSM actual state with sufficiently timely data. Response Options Change setting or accept risk score OR go through change management and approve setting. Restore reporting or declare the device missing/uninstalled/retired in HWAM 22. QUESTION: WHY IS THE GAP BETWEEN DESIRED STATE AND ACTUAL STATE IMPORTANT? Answer: The gap between the desired state and actual state represents the improperly configured assets on the network that are likely to be targeted for exploitation by attackers. Attackers specifically look for and target these machines to gain unauthorized access to the network. Identifying a gap between desired state and actual state also helps the organization understand whether its policies and procedures are functioning correctly (e.g., properly configuring assets on the network or properly changing configurations of assets when standard configurations change). 23. QUESTION: HOW CAN AN ORGANIZATION MINIMIZE EXPOSURE TO POOR CONFIGURATIONS? Answer: The most effective way to minimize exposure to poor configuration settings is to establish processes and procedures to routinely check, review, and report configuration settings on all assets on the network. Effective options include: Establishing and maintaining a secure image Establishing and maintaining approved configurations checklists Determining actual configurations and comparing them with authoritative approved configurations Understanding the delta and determining appropriate corrective actions Establishing processes for quickly remediating discovered discrepancies Configuration Settings Management Continuous Diagnostics and Mitigation 11
13 Attackers often exploit and infiltrate networks through assets whose security configurations have been weakened over time (e.g., configurations in which temporary exceptions were granted for specific short-term business needs but were never removed). Configuration Settings Management Continuous Diagnostics and Mitigation 12
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
CDM Software Asset Management (SWAM) Capability
CDM Software Asset Management (SWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
Software Asset Management (SWAM) Capability Description
Software Asset Management (SWAM) Capability Description Purpose Provides an organization visibility into the software installed and operating on their network(s) so they can appropriately manage authorized
Software Asset Management (SWAM) Capability Data Sheet
Software Asset Management (SWAM) Capability Data Sheet Desired State: - Only authorized software products and executable files are installed on in scope devices - All devices are assigned or authorized
Software Asset Management (SWAM) Illustrative Process
Software Asset Management (SWAM) Illustrative Process Introduction The Software Assessment Management (SWAM) capability provides an organization visibility into the software installed and operating on
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
HWAM Capability Data Sheet
HWAM Capability Data Sheet Desired State: - Only devices in the authorized Hardware Inventory are on the network - All authorized devices are in the inventory - All authorized devices are assigned to a
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY
MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS Wolfgang Kandek, CTO Qualys Session ID: Session Classification: SPO-T07 Intermediate 2012 the Year of Data Breaches 2013 continued in a similar Way Background
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
Security Standard: Servers, Server-based Applications and Databases
Security Standard: Servers, Server-based Applications and Databases Scope This standard applies to all servers (including production, training, test, and development servers) and the operating system,
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011 Executive Summary BACKGROUND The NYS Local Government Vulnerability Scanning Project was funded by a U.S. Department of Homeland Security
AHS Flaw Remediation Standard
AGENCY OF HUMAN SERVICES AHS Flaw Remediation Standard Jack Green 10/14/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
BEST PRACTICES. Systems Management. www.kaspersky.com
BEST PRACTICES www.kaspersky.com 2 YOUR GUIDE TO SYSTEMS MANAGEMENT BEST PRACTICES. Enhance security and manage complexity using centralized IT management tools. Unpatched vulnerabilities in popular applications
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme avecto.com Contents Introduction to the scheme 2 Boundary firewalls and internet gateways 3 Secure configuration
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
How To Protect Your Network From Attack
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Reclamation Manual Directives and Standards
Vulnerability Assessment Requirements 1. Introduction. Vulnerability assessment testing is required for all access points into an electronic security perimeter (ESP), all cyber assets within the ESP, and
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Office of Inspector General Audit Report
Office of Inspector General Audit Report USMMA SECURITY CONTROLS WERE NOT SUFFICIENT TO PROTECT SENSITIVE DATA FROM UNAUTHORIZED ACCESS Maritime Administration Report Number: FI-2012-138 Date Issued: May
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Information Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
