Seven Practical Steps for Federal Cyber Security and FISMA Compliance

Size: px
Start display at page:

Download "Seven Practical Steps for Federal Cyber Security and FISMA Compliance"

Transcription

1 Gene Kim CTO, Tripwire, Inc. Seven Practical Steps for Federal Cyber Security and FISMA Compliance white paper Configuration Control for Virtual and Physical Infrastructures

2 Introduction The number of security breaches of federal information systems and cases of improper access to these systems continues to grow at an alarming rate. In fact, federal civilian agencies reported three times more cyber security incidents in 2008 than in 2006, according to the Department of Homeland Security (DHS). And that s just the number of reported incidents; an official at the DHS believes the number may be higher. 1 A quick Internet search reveals the continued pervasiveness of security breaches of federal information systems. The following represents a fraction of the security incidents that have been reported already this year: Three State Department contractors, out of idle curiosity, viewed passport files of over 150 high-profile individuals, including actors and politicians from 2002 to Access to these files is only permissible when necessary to perform official government duties. In mid-march of this year, a Romanian hacker was arrested by Romanian police and potentially faces up to 12 years in jail. The hacker, who called himself Wolfenstein, broke into the U.S. Department of Defense in 2006 and compromised servers and attempted to cover his tracks by deleting access logs. 3 On February 11, 2009, unauthorized access to a computer in the Federal Aviation Administration s (FAA s) network may have exposed the personal information of over 45,000 employees and retirees of the FAA. 4 The FAA claims the server was not connected to the operation of air traffic control. Sometime before February 11, 2009, Govtrip.com, the webbased service that handles reservations for a dozen or more U.S. federal agencies, was hacked and changed so that government employees visiting the site were redirected to a site that installed malicious software on employees computers. A spokesperson from the General Services Administration believes that no user information was compromised. 5 In response to this tremendous increase in detected and reported incidents, the Obama administration has intensified its focus on cyber security across all federal agencies. Evidence of this heightened focus is President Obama s mandate on February 9, 2009, for an immediate 60-day review of the plan, programs, and activities underway throughout the government dedicated to cyber security. This brings up an enormous challenge and highlights an uncomfortable truth: cyber security breaches and failures continue to occur, despite federal organizations putting tremendous time and money into cyber security. And compliance activities often focus more on generating paperwork to prove compliance than creating controls that prevent security breaches and enable their quick detection and recovery, further complicating the issue. Clearly, there is concern about and a desire to improve the security of federal information systems. So where and how do we as information security professionals begin to address the challenge faced not only by those responsible for ensuring the security of federal information systems? In this paper, we turn to Gene Kim, Tripwire CTO and founder, and co-author of Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps, to answer that question and provide seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. Before launching into the seven practical steps, we ll take a look at recent activities the U.S. Government has undertaken to provide cyber security for its information systems. The Federal Information Security Management Act The Federal Information Security Management Act of 2002, (FISMA) is a prime example of a cyber security effort by the United States Government that shows improved security on paper, but has been found difficult to apply. When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government. FISMA not only applies to federal agencies, but also to any contractors or organizations responsible for these information systems. 6 FISMA outlines controls that are valuable and necessary for protecting information systems. Grades for FISMA Compliance Rise, but So Do Security Breaches Unfortunately, many see FISMA compliance as a bureaucratic paperwork drill capable of generating a room full of documents to provide evidence for an audit. Each year, the U.S. Office of Management and Budget (OMB) produces a report card for the FISMA compliance level of each federal agency subject to 2 WHITE PAPER Seven Practical Steps for Federal Cyber Security and FISMA Compliance

3 the act and provides an overall grade for federal information systems. These grades have trended slightly upward in recent years, with the grades for 2005 through 2007 being D+, C- and C, respectively, and a recent OMB report for fiscal year 2008 indicates that cyber security continues to improve. 7 Yet with costs for FISMA projected to balloon from $5.5 billion in fiscal year 2006 to a total of $27.9 billion between 2008 and 2012, 8 an uncomfortable question must be raised: Why has the effectiveness of cyber security programs not increased given that FISMA scores and the cost for FISMA compliance have? New Approaches to Cyber Security and FISMA As the frustration of understaffed agencies trying to meet and prove compliance to FISMA continues to grow, a new initiative has gained support. This initiative, the Consensus Auditing Guidelines (CAG), identifies the high priority security holes to protect from attacks. Rather than competing with FISMA, CAG specifically addresses one of the calls to action of the in-progress update to FISMA 2008 to establish a prioritized baseline of information security measures and controls that can be continuously monitored through automated mechanisms. On top of the CAG initiative, FISMA has recently begun to emphasize measuring security performance. This shift in focus will require effective controls, especially around the correctness of configurations and the enforcement of change control processes. John Gilligan, former Air Force CIO, and the individual driving CAG, reiterated the relevance of correct configurations to cyber security and FISMA, citing that during the NSA vulnerability scanning of the Department of Energy, over 80 percent of successful breaches took advantage of misconfigurations in software. 9 In a radio interview, Mr. Gilligan stated that this source of security risk was a significant driver of some of his other initiatives and activities, which include development of the Federal Desktop Security Standard and his efforts to reform FISMA. The seven practical steps described in this paper reaffirm Mr. Gilligan s view of misconfigurations, emphasizing the need to gain situational awareness and control over access, configurations and change. Characteristics of Highperforming IT Organizations The recommendations in the Visible Ops Security Handbook are based upon the results of an almost 10-year study of IT operations and information security organizations. The study identified the characteristics of high-performing IT organizations those organizations that consistently had the best security, the best compliance posture and the highest ability to maintain predictable and reliable IT operations. These topperformers had figured out how to build sustainable security controls that integrated into daily IT operational processes and delivered value to other organization stakeholders. Studying these high performing IT organizations revealed how to simultaneously maintain an effective security posture, while complying with regulatory requirements. These highperforming IT organizations were: Organizationally aligned High performing information security teams understand how security advances and protects organization goals. Low performing teams focus on things the organization doesn t care about, like the improbable or irrelevant and other technological minutia. Often other groups in the organization consider these low performing teams hysterical. Plugged in High performing information security teams integrate into the right functional groups even though they don t have direct operational responsibility. Low performers aren t present where the work is done and often expend effort helping the wrong people, reinforcing the perception that information security is irrelevant. Adding value High performing information security teams provide value to organization and IT process owners, and they know what they need from these process owners in return. Low performers don t help advance the operational objectives of their colleagues, nor do they clearly articulate what they want people to do differently to meet information security requirements. Consequently, these low performers are often viewed as incompetent. For these organizations, information security simultaneously enabled the organization to respond more quickly to urgent organization needs and helped provide stable, secure and predictable IT services. The Seven Practical Steps In the seven steps discussed in the remainder of this paper, we ll learn how to gain control over production and application/service development processes at the relevant parts of the lifecycle and we ll start generating value for the relevant parties. By doing this, we replicate the observed high-performing 3 WHITE PAPER Seven Practical Steps for Federal Cyber Security and FISMA Compliance

4 characteristics. We ll also be able to simultaneously achieve cyber security objectives while simultaneously achieving and maintaining FISMA compliance objectives. Step 1: Gain Situational Awareness To determine the magnitude of the organizational and technology risks so that we can better prioritize our efforts, we must first identify what technologies are being used, what they are being used for and who is responsible for their management. We can do that by answering the following questions: What IT services are being provided to the organization related to cyber security or FISMA compliance (e.g., externally facing Internet systems, systems that have personally identifiable information (PII), etc.)? What are the organizational and IT units, and how are they managed (e.g., the centralized IT services group, an IT outsourcer, etc.)? What are the other relevant regulatory and contractual requirements for the organization process (e.g., HIPAA, NERC, interagency agreements, contractual service level agreements, the Freedom of Information Act (FOIA), etc.)? What technologies and IT processes are being used for an in-scope asset (e.g., Microsoft Windows Server, Sun Solaris, Oracle, Microsoft SQL Server, etc.)? Are there any high-level risk indicators from the past to be aware of (e.g., repeat audit findings, frequent outages, etc.)? Step 2: Reduce and Monitor Privileged Access Excessive access and privileges to all levels of the IT environment application, database, operating systems, network and firewall can allow individuals to modify or disable security configuration settings, shutdown or disable critical services or alter critical application functionality. Such uncontrolled change may disrupt service and create unnecessary security vulnerabilities. In this step, we take the following measures to ensure users have appropriate access and privileges to critical systems: Document all administrators with privileged access and ensure we can reconcile them with authorized staff. Disable or delete any ghost accounts that cannot be reconciled to authorized staff. Work with system managers to reduce the number of administrators to the practical minimum needed. Ensure that access is appropriately revoked or assigned in response to personnel turnover or transfers. To ensure the measures listed above reduce privileged access, we must: Monitor privileged user account adds, removes and changes wherever they are stored, including service accounts that do system maintenance and tasks such as backing up accounts and managing the enterprise batch scheduler. Reconcile each privileged user account add, remove and change with an authorized change order from the relevant manager. This reconciliation process may be manual (a signed paper form) or automated (with a change ticket from a change management system). Reconcile each privileged account with an authorized user. For example, reconcile the account with an HR record. Alternatively, reconcile each account with an authorized service such as a backup program. Routinely re-accredit accounts quarterly or yearly, depending on turnover to ensure that management can reconcile privileged accounts to reports from HR and payroll. Step 3: Define and Enforce Configuration Standards All layers of the IT infrastructure have configuration and logical security settings designed to limit the risk of human error, fraud and security incidents by ensuring that the technology only performs as expected. Examples of these settings include proper password settings, network configuration settings and logical security settings for the database. Risk can be introduced if these settings are improperly configured. In this step, we use guidance from respected third parties and vendors like the Center for Internet Security, the SANS Institute and the National Institute of Science and Technology (NIST) to ensure our configuration and logical security settings are properly defined, implemented and verified. To ensure adherence to configuration standards, we must: Work with IT management and relevant managers on a policy that defines which security standard or standards should be used. Mandate that all production technologies that pose a risk to cyber security or FISMA related objectives use these secure configuration settings, and create a plan for deploying technologies with these settings. 4 WHITE PAPER Seven Practical Steps for Federal Cyber Security and FISMA Compliance

5 Define a time limit for initial implementation, and set expectations for how quickly corrective measures must be taken on non-compliant configurations. To ensure the above configuration controls are implemented correctly, we must: Assess and continuously monitor configuration settings. For example, we may need to assess and monitor settings stored in Unix or Windows files or Windows registry settings. Test configuration settings against internal security policies, external compliance requirements and industry best practices. Report on any variances. Verify that corrective actions to non-compliant configurations are properly implemented in the required time frame. Step 4: Integrate and Help Enforce Change Management Processes Once IT systems are in a known and trusted state, all changes made to those systems should be authorized, scheduled and substantiated by change management. To do this, we will need to: Help assess the potential impact of changes on information security and operations. Improve procedures for change authorization, scheduling, implementation and substantiation. Ensure that change requests comply with information security requirements, corporate policy and industry standards. To accomplish these objectives, we ll need to do the following: Get invited to Change Advisory Board (CAB) meetings. CAB meetings are used to assess risks of proposed changes, approve or deny change requests, review the status of planned changes, agree on implementation schedules and review the success of implemented changes. By attending, we have a say in the review and approval of those changes subject to the change approval process. Build and electrify the fence. Implement a control that assesses configuration settings against internal and external standards, gives visibility to changes made to systems, helps determine whether the change was authorized and compliant, and in the advent of a security breach, provides forensics data to support an investigation. Ensure tone from the top and help define the consequences. Words and actions from agency management on down set the tone for the behavior of everyone in the organization. We must convince top management to set the tone regarding information security as: The only acceptable number of unauthorized changes is zero. Our CIO, for example, may be able to accomplish this by simply sending an to all organizational units expressing this policy, explaining the potential damage unauthorized change can cause, and specifying consequences for those who intentionally circumvent policy. Substantiate that the electric fence is working. To prove compliance with change management processes, we must prepare for audits in advance. We ll need the following evidence: change requests and their approvals, changes detected on all relevant IT systems, reconciliations of detected changes to approved changed requests and corrective actions taken for unauthorized changes. By taking these actions, we will have integrated information security into the necessary preventive change management processes. We also will have created detective controls to ensure that those preventive controls are working. Finally, we will have created evidence to prove to auditors that effective change controls exist. Step 5: Create a Library of Trusted server builds When information security is not integrated into release management processes, IT systems may be deployed without adequate controls, resulting in negative outcomes like security breaches and compliance and audit findings. In this step, we create a library of known, trusted, and approved server builds that can be used to quickly and easily deploy an authorized, secure configuration. These secure builds combine mandatory and recommended configurations to reduce the likelihood of operational and information security failures that create vulnerabilities an intruder can exploit. To create this library, we must document the standards we will use, which requires us to: Develop standards that specify how to secure and harden the builds we release into production or check into the definitive software library (DSL). For guidance, we turn to configuration standards for information security developed by trusted external organizations such as CIS, the SANS Institute, and IT system vendors. As these external standards evolve, we ll need to update our documentation. Work with the server provisioning and release management teams to integrate independent configuration standards and 5 WHITE PAPER Seven Practical Steps for Federal Cyber Security and FISMA Compliance

6 checklists. We ll also need to take standard risk-reducing measures, such as: Turnoff unnecessary features and modules that are enabled by default Disable un-needed services (e.g., http, DNS, and SMB) Disable un-needed open network ports Delete or disable unnecessary user accounts Change default passwords Ensure that relevant passwords are changed before systems move from development to production for example, developers who know ODBC and application passwords for a new order entry system no longer need these passwords when the system enters production. Include standard configuration monitoring agents in each trusted build. Once we ve defined the policies and standards that create the library of approved builds, we need to ensure these controls are working by: Assessing production configurations against known internal and external standards to ensure they are in a known, approved and secure state. Monitoring the approved build library to ensure that all adds, removes and changes conform to internal and external standards. Reconciling all adds, removes, and changes to an authorized change order. This task may be done manually or may be automated. Step 6: Integrate Into Release Management Testing and Acceptance Procedures To protect the production environment, information security requires standardization and documentation; implementation controls like checklists; and continuous control of production variance. Release management shares many of these key objectives. And while Development tends to focus on specific components, release management focuses on collections of components and whether they work together. To be effective, release management often relies on checklists and templates. In this step, we must engage with release management to ensure that information security requirements are added to their lists. To do this, we must: Develop templates for release management and interface with this team as well as quality assurance (QA) and project management to ensure that information security and regulatory compliance requirements are methodically collected at the start of each project. Establish an agreed-upon protocol for when and how release management should engage information security. For example, an agreed-upon protocol should be established regarding releases that include code that involve authorization, encryption, financial transactions and compliance requirements. Integrate automated security testing tools into the release testing process and run them against code, builds and releases. Use vulnerability scanning and management testing tools, even if they could potentially crash applications during testing it s better to find vulnerabilities in pre-production rather than in production. Use the same tools in the preproduction and production environments to prepare IT operations for potential problems when these tools are used in the production environment. Compare releases and approved builds being deployed against known and trusted states to mitigate the risks introduced by human error, missed steps, mis-configurations and other sources. In some situations, the security testing conducted by QA is sufficient for us to approve a release. In other cases, we must conduct independent security testing. Either way, arming QA with the same tools information security uses reduces findings for security testing and typically at a lower cost, with less stress, and with higher success rates for releases because corrections are made by QA. The previous preventive controls are the release testing protocols, including checklists and test procedures. To ensure these controls are working, we must: Verify that deployed image configurations match the approved and tested builds by testing them against known internal and external standards. Detect all changes made to the test environments. Reconcile changes to an authorized change order either manually or automatically. Step 7: Ensure That All Production Activities Go Through Change Management Production actions such as activating or deactivating an IT system that supports the production environment must be defined as a change. Not defining such actions as a change could result in an unauthorized deactivation of a critical application, which 6 WHITE PAPER Seven Practical Steps for Federal Cyber Security and FISMA Compliance

7 in turn could jeopardize power delivery and affect other critical organization objectives. To do this, we will need to work with change management and production service delivery managers to ensure all production actions are authorized, scheduled and audited by change management. Information security, change management, and relevant managers will need to answer the following questions and generally agree on the answers: Under what conditions are activations, deactivations and restarts changes that require approval? Consider, for example, whether changes require approval if the change delivers a new IT service, enables a service that has security or regulatory requirements, or introduces outage risk to a missioncritical service. Who must approve standard and emergency changes? Once we ve created policies based on the answers to these questions, we must verify that these policies are followed. We can do this by monitoring all activations and deactivations and reconciling them with an authorized and scheduled change. Such monitoring lets information security ensure that activity that could introduce information security risks is adequately reviewed and mitigated. Steps for Secure, Compliant Federal Information Systems Maintaining strong cyber security of federal information systems is more than a checklist and paperwork exercise; it requires generating value for the relevant parties in the organization. Many of the steps described in this paper require us to demonstrate that the security measures we promote align with, advance and protect the organization s goals. In addition, to further gain support for integrating security into everyday organization processes, we must ensure we integrate with the right groups even when we don t have direct operational responsibility for the work they do. Configuration control solutions like Tripwire Enterprise offer us the ability to demonstrate the value of critical security measures with configuration assessment that ensures the correctness of configurations and enhanced file integrity monitoring that helps maintain configurations in that correct state. Tripwire Enterprise also provides proof that these security measures are working even supporting INFOCON requirements. Such proof is invaluable for both audit purposes and for further achieving buy-in from other IT process owners. By taking these seven practical steps to build relationships, institute preventive controls into IT production operations, and verify the effectiveness of those preventive controls, we can simultaneously meet IT operational and security goals and achieve compliance with relevant regulations like FISMA. 1 Number of reported cyber incidents jumps. A February 17, 2009 article by Ben Bain in FederalComputer Week. 2 Former State Department worker sentenced for passport snooping. A March 23, 2009 article in Computeworld by Grant Gross. action/article.do?command=viewarticlebasic&articleid= &intsrc=hm_list 3 Romanian DoD hacker nabbed. A March 20, 2009 article by Greg Masters in SC Magazine. article/129193/ 4 FAA Computers Hacked, Employee Data at Risk. February 11, 2009 article by Thomas Claburn in InformationWeek. security/attacks/showarticle.jhtml?articleid= Hackers break into government travel site, feed users attack code. February 18, 2009 article by Gregg Keizer in Computerworld. com/action/article.do?command=viewarticlebasic&articleid= The National Institute of Science and Technology (NIST), the organization charged with ensuring compliance with FISMA, developed a set of comprehensive guidelines, the 800 series of special publications, entities subject to FISMA must follow to secure federal 7 Fiscal Year 2008 Report to Congress on Implementation of The Federal Information Security Management Act of A report from the U.S. Office of Management and Budget 8 Ibid. 9 Federal News Radio, December 12, 2008, Interview with John Gilligan. 7 WHITE PAPER Seven Practical Steps for Federal Cyber Security and FISMA Compliance

8 About Tripwire Tripwire helps over 6,500 enterprises worldwide reduce security risk, attain compliance and increase operational efficiency across virtual and physical environments. With its industry leading configuration assessment and change auditing software solutions, IT organizations achieve and maintain configuration control. Tripwire is headquartered in Portland, Oregon, with offices worldwide Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. WPFCS1

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security Configuration Assessment & & Change Auditing Solutions COMPLIANCE SECURITY CONTROL Creating Effective Security Controls: A Ten Year Study of High Performing IT Security Gene Kim, CISA CTO and Co-Founder

More information

Proving Control of the Infrastructure

Proving Control of the Infrastructure WHITE paper The need for independent detective controls within Change/Configuration Management page 2 page 3 page 4 page 6 page 7 Getting Control The Control Triad: Preventive, Detective and Corrective

More information

Enforcing IT Change Management Policy

Enforcing IT Change Management Policy WHITE paper Everything flows, nothing stands still. Heraclitus page 2 page 2 page 3 page 5 page 6 page 8 Introduction How High-performing Organizations Manage Change Maturing IT Processes Enforcing Change

More information

AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR

AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

Beyond PCI Checklists:

Beyond PCI Checklists: Beyond PCI Checklists: Securing Cardholder Data with Tripwire s enhanced File Integrity Monitoring white paper Configuration Control for Virtual and Physical Infrastructures Contents 4 The PCI DSS Configuration

More information

SMITHSONIAN INSTITUTION

SMITHSONIAN INSTITUTION SMITHSONIAN INSTITUTION FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 2012 INDEPENDENT EVALUATION REPORT TABLE OF CONTENTS PURPOSE 1 BACKGROUND 1 OBJECTIVES, SCOPE, AND METHODOLOGY 2 SUMMARY OF RESULTS

More information

Dynamic Data Center Compliance with Tripwire and Microsoft

Dynamic Data Center Compliance with Tripwire and Microsoft Dynamic Data Center Compliance with Tripwire and Microsoft white paper Configuration Control for Virtual and Physical Infrastructures For IT, gaining and maintaining compliance with one or more regulations

More information

Reining in the Effects of Uncontrolled Change

Reining in the Effects of Uncontrolled Change WHITE PAPER Reining in the Effects of Uncontrolled Change The value of IT service management in addressing security, compliance, and operational effectiveness In IT management, as in business as a whole,

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

Defending the Database Techniques and best practices

Defending the Database Techniques and best practices ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager mtrinidad@appsecinc.com March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Steven Snaith, Risk

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

NetIQ FISMA Compliance & Risk Management Solutions

NetIQ FISMA Compliance & Risk Management Solutions N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a

More information

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND

More information

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,

More information

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Specific observations and recommendations that were discussed with campus management are presented in detail below. CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE

More information

Making Database Security an IT Security Priority

Making Database Security an IT Security Priority Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases

More information

How To Improve Nasa'S Security

How To Improve Nasa'S Security DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL

More information

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit e-book Five Ways to Use Security Intelligence to Pass Your HIPAA Audit HIPAA audits on the way 2012 is shaping up to be a busy year for auditors. Reports indicate that the Department of Health and Human

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

What is Penetration Testing?

What is Penetration Testing? White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide

More information

Cyber Security Management

Cyber Security Management Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum sbarnum@mitre.org September 2011 Overview What is SCAP? Why SCAP?

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of

More information

Database Security & Auditing

Database Security & Auditing Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

The problem with privileged users: What you don t know can hurt you

The problem with privileged users: What you don t know can hurt you The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn 4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration

More information

Security for NG9-1-1 SYSTEMS

Security for NG9-1-1 SYSTEMS The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball

More information

BIG SHIFT TO CLOUD-BASED SECURITY

BIG SHIFT TO CLOUD-BASED SECURITY GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP

More information

Sarbanes-Oxley Control Transformation Through Automation

Sarbanes-Oxley Control Transformation Through Automation Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 info@bluelance.com

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta. Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks

More information

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

WHITE PAPER. PCI Basics: What it Takes to Be Compliant WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on

More information

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance Table of Contents 3 10 Essential Steps 3 Understand the Requirements 4 Implement IT Controls that Affect your

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

EXECUTIVE STRATEGY BRIEF. Securing the Cloud Infrastructure. Cloud. Resources

EXECUTIVE STRATEGY BRIEF. Securing the Cloud Infrastructure. Cloud. Resources EXECUTIVE STRATEGY BRIEF Securing the Cloud Infrastructure Cloud Resources 01 Securing the Cloud Infrastructure / Executive Strategy Brief Securing the Cloud Infrastructure Microsoft recognizes that trust

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES

PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES CONFIDENCE: SECURED WHITE PAPER PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE BENCHMARKS, STANDARDS, FRAMEWORKS

More information

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.

More information

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance WHITE paper Four Key Benchmarks for Improving IT Performance page 2 page 3 page 4 page 5 page 6 page 6 Mean Time to Repair First Fix Rate Change Success Rate Server to System Administration Ratio Reason

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938

More information

The True Story of Data-At-Rest Encryption & the Cloud

The True Story of Data-At-Rest Encryption & the Cloud The True Story of Data-At-Rest Encryption & the Cloud by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800 500 3167 twitter.com/firehost

More information

Office of Inspector General Audit Report

Office of Inspector General Audit Report Office of Inspector General Audit Report USMMA SECURITY CONTROLS WERE NOT SUFFICIENT TO PROTECT SENSITIVE DATA FROM UNAUTHORIZED ACCESS Maritime Administration Report Number: FI-2012-138 Date Issued: May

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Standard Database Security Configurations Are Adequate, Although Much Work Is Needed to Ensure Proper Implementation August 22, 2007 Reference Number:

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information