Proving Control of the Infrastructure
|
|
|
- Violet Lynch
- 10 years ago
- Views:
Transcription
1 WHITE paper The need for independent detective controls within Change/Configuration Management page 2 page 3 page 4 page 6 page 7 Getting Control The Control Triad: Preventive, Detective and Corrective Defining Automated Configuration Audit and Control An Automated Configuration Audit and Control Solution Proof Positive Gene Kim, CTO, Tripwire, Inc. and Rob Warmack, Senior Director of Product Strategy, Tripwire, Inc Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved.
2 In virtually every industry, the success of an organization is inextricably linked to the reliability, availability and security of its Information Technology (IT). Consequently, IT management must identify and analyze the relevant risks facing its production environment and then put controls in place to prevent, detect, and correct for them. Not only are these controls required for effective management, they are also good for business and fundamental to meeting regulatory compliance requirements. Unauthorized access due to security breaches is a high-profile risk. Hackers from outside the network, or more likely, employees or contractors with means, motive and opportunity, manage to bypass or defeat security defenses and make malicious changes to software files and system configurations. These unauthorized changes can have dire consequences, such as financial loss, disruptions to IT operations, and negative public perception. Although security often gets the spotlight, the much greater risks to the organization are system reliability and availability issues. Gartner asserts that 80 percent of unplanned downtime is caused by people and process issues, including poor change management practices, while the remainder is caused by technology failures and disasters. 1 IDC cites similar findings that indicate that operator error is the single largest source of outages causing nearly 60 percent of overall infrastructure downtime. 2 Many IT organizations, in the spirit of being nimble and responsive to their customers, are actually putting themselves at risk in the everyday process of making changes to their own systems. If industry analysts are correct, and practical experience certainly indicates that they are, the greatest point of leverage for increasing the overall reliability, availability and security of information systems, and addressing related compliance requirements, is controlling change across the IT infrastructure. Getting Control IT management has tried many things to control change. They have invested in a variety of change and configuration management (C/CM) products or developed their own sets of tools to manage infrastructure changes. They have improved the efficiency and speed of the C/CM process, such as automating the change approval process workflow, automating the deployment of software and configuration changes, as well as automating the discovery of information assets and mapping these assets to the services they provide. Despite all this technology and automation, reliability, availability and security issues still exist and proving compliance remains difficult. Consider the case of patch management technologies that inadvertently result in servers that will never boot again, all deployed at speeds never possible without automation. The mistaken assumption is that by automating and systemizing the way change is authorized and implemented, human error is also reduced. All too often, these tools don t actually improve service quality and can even exacerbate the situation by enabling more undesired changes to be made more frequently. Why is it essential that changes to IT infrastructure be controlled? First, IT risks create real business risks because the most critical business processes are often run entirely on IT. Second, effective management of IT hinges on the effective management of IT infrastructure you cannot manage the IT service or IT value without first effectively managing the IT infrastructure. IT infrastructure spans all the servers, network devices, and databases that IT application services are built upon, as well as the controls that protect them, such as firewalls and intrusion detections systems. 1 Donna Scott, VP and Research Director, Best Practices for Operational Change Management, Gartner, Inc Stephen Elliot, IDC, Senior Analyst Network and Service Management, 2004 Page 2
3 Integrity of the IT infrastructure is foundational. Like a building built on unstable ground, when the integrity of the IT infrastructure lacks stability, reliability or security, the integrity of the entire system dependent upon that infrastructure, and perhaps even the entire organization, is not stable, reliable or secure. But why has change management failed for some organizations and flourished in others? Two industry organizations, the Software Engineering Institute and the IT Process Institute, have been studying IT organizations that have demonstrated superior levels of availability with the greatest efficiencies, the lowest amount of unplanned work, and the best security process integration. Their change volumes are among the highest and yet, they enjoy the highest change success rates. What makes these high performing IT organizations successful is that they have a culture of change management with effective controls in place that enforce the change management process. They also have a culture of causality that ensures that change is ruled out first in the repair cycle. 3 Like any operation striving for high quality, high-performers detect production variances early, before they cause downtime or a security event, and evaluate their performance based on defined metrics. They, too, have made varying degrees of investment in automated C/CM tools, but the difference is that the high performers have also implemented effective processes and controls that continually assess the effectiveness and efficiency of their change management processes. Without such controls, IT organizations lack an effective, proactive way to quickly discover when the wrong change was made, or when the right change was made but at the wrong time. The Control Triad: Preventive, Detective and Corrective Driven by Sarbanes-Oxley legislation and a growing list of other regulations, IT management is quickly coming to appreciate both the importance of internal process control to the organization at the highest levels, as well as the significant effort required to continually prove that internal process controls are both in place and effective. Likewise, the audit industry is working to provide IT management open control frameworks, such as Control Objectives for Information and related Technology (COBIT) and ISO17799, to help identify, document, and evaluate IT controls. In the language of audit, high performing IT organizations must have internal process controls to mitigate the inherent risks of change. Internal process controls are policies, procedures, and practices put in place to ensure that business objectives are achieved and risk mitigation strategies are carried out. 4 According to the Institute of Internal Auditors, there are three categories of internal process controls, all of which are relevant to change management: Preventive Controls Controls that define the roles and responsibilities, processes, and policies intended to manage change management risks; Detective Controls Controls that automatically track and reconcile production changes, and detect when preventive controls fail, and; Corrective Controls Controls that provide recovery mechanisms to mitigate the impact of failed changes. 3 Best in Class Security and Operations Round Table Report, Software Engineering Institute/Carnegie Mellon University, IT Control Objectives for Sarbanes-Oxley, IT Governance Institute, 2004 Page 3
4 These three controls are independent of one another and must provide verifiable evidence proving not only that each control exists, but that the controls are effective against identified risks. 5 Though IT organizations vary in sophistication, most are likely to have some preventive controls in place to define change management and security policies. For instance, they may have policies that require changes to be formally requested, approved and tested before deployment. From a security perspective, effective perimeter defenses and identity management tools and technologies are expected to be in place to maintain a defensible barrier around the network. However, merely having preventive controls is not enough: Organizations with just preventive controls still have unscheduled and protracted downtime, low change success rates and high levels of unplanned work. This shows that preventive controls alone are not adequate for reducing change and security-related business risks. Without the balance and enforcement of a detective control, preventive processes are easily circumvented or simply ignored. Unintended and unauthorized changes made to production infrastructure go unchecked and often result in unplanned downtime. Likewise, it is possible for malicious changes to either penetrate the security perimeter or originate from within the organization unnoticed to only be discovered after IT service is impacted. And if a failure in a preventive control goes undetected, corrective actions aren t likely to be triggered until the failure becomes visible throughout the organization. A detective control serves as a tripwire that discovers the failure or circumvention of preventive controls and alerts IT or triggers associated processes to take corrective action. To be effective against the increasing volume of changes, a detective control must cover the breadth of the infrastructure and independently discover change made by any source. By reconciling desired changes and exposing those that are undesired, an effective detective control automatically (audits change and provides IT managers and auditors comprehensive, meaningful reports of change activity). Defining Automated Configuration Audit and Control Configuration audit and control isn t a new concept. Manual inspections and custom scripts are commonly used to verify that changes are made correctly. However, several trends create very real challenges for IT: the growing volume of changes driven by the business, the increased rate of change driven by automated change deployment technologies (e.g., patch management and software distribution), and the inability to manually reconcile these changes to authorized work orders. Consequently, the majority of changes and the integrity of the change management process is simply assumed to be properly managed. To auditors and a growing number of IT executives, management by good intentions is unacceptable. On-the-fly modifications, work-arounds, and untested quick fixes eventually take their toll as system configurations drift slowly away from a known and trusted state and processes break down from a lack of enforcement. The price is paid later when unexplained outages result after patches fail or servers can t be quickly rebuilt, and unplanned work is required to resolve the issues. More and more time is spent on rework and unplanned work, detracting from completion of planned work. 5 Change and Patch Management: Critical for Organizational Success, Institute of Internal Auditors, 2005 Page 4
5 The solution is automated configuration audit and control to simultaneously address reliability, availability, and security, which has three critical functions within the C/CM process: independent detection of change regardless of source or intent reconciliation of detected change with intended and authorized change independent reporting of all change activity across production systems Independent change detection: The fundamental role of configuration audit and control is to serve as an independent detective control with the ability to automatically detect system changes across an entire infrastructure comprised of a disparate, far-flung mix of servers, routers, firewalls, databases, etc. As an independent detective control properly segregated from the persons or technologies making the changes, the configuration audit and control system detects changes regardless of who made the change or why the change was made. This means capturing automated and manual changes, authorized and intended changes, as well as the occasional unauthorized, unintended, or potentially malicious change, in sufficient detail to determine the date, time, implementer, system, and the details of the change made. 6 Detecting change at this level requires first maintaining a baseline for each system to define a known and trusted state of software files and configurations, and then continually checking all systems to discover when deviations from baselines occur. By logging and accepting only those changes that are authorized and intended, IT management has continual proof that the integrity of the infrastructure is intact. Change reconciliation: The majority of infrastructure changes are authorized and intended and must be independently validated to prove that desired changes occur as planned. But more importantly, desired changes must be resolved and filtered out to uncover any undesired changes. If a change can t be correlated back to change approval or release management processes, preventive controls have been compromised and corrective controls must be triggered. Integration with other C/CM tools enables the configuration audit and control system to automatically correlate detected changes with approved intentions and trigger recovery whenever necessary. Change ticketing systems define which changes are approved, may describe the intended changes, as well as indicate when the changes should be made and by whom. Within release management, software distribution or configuration management tools can also define what changes were expected to be deployed. When undesired change is detected, the configuration audit and control system must alert appropriate systems and network monitoring tools, plus open incident tickets within the service desk so the undesired change can be further explored. For practicality and usability within an enterprise, it is essential that the system be highly scalable, centralized and offers sufficient interfaces to facilitate these various integrations. Independent reporting: A configuration audit and control solution provides IT management and auditors proof of systems and process integrity by generating an independent accounting of actual changes across the breadth of the infrastructure, reconciled with authorized and intended changes. These reports offer ongoing proof that effective change controls are in place, as well as provide decision support tools for problem management. 6 Change and Patch Management: Critical for Organizational Success, Institute of Internal Auditors, Page 5
6 Complementing what a change ticketing or configuration management tool can provide, a configuration audit and control solution provides an independent, verifiable audit log of all actual change activity, not just planned changes. Performance indicators generated by the system can serve as IT operational metrics, as well as security and assurance metrics, reporting: the number of actual changes made to the IT infrastructure; the number of those changes that were authorized; the variance between planned and actual changes, and; where the most frequent changes are being made and who is making them. 7 Change activity reports are also essential as decision support tools when restoring service interruptions and outages, and resolving service incidents and problems. Configuration audit and control data can be used to determine if change was a causal factor to an incident or problem. If changes are discovered, the detailed change information can be used to establish when the system was last in a known and trusted state, then identify exactly what changed from that baseline, when it changed, and even who made the change. An Automated Configuration Audit and Control Solution Other C/CM products offer pieces of configuration audit and control, but lack the comprehensive capabilities previously described that are essential to an effective independent detective control. Change ticketing systems are aware of authorized changes, but can t automatically determine if its approved changes are ever actually made. Software distribution and patch management tools understand the intended changes they are instructed to deploy, but ignore those changes that occur outside of their defined scope of responsibility and cannot deal effectively with manual or scripted changes. Server and network configuration management tools are limited to the domains they manage (e.g., just servers or network devices) and aren t able to automatically reconcile with other C/CM systems the changes that they may detect, nor report on the effectiveness of the overall change management process for the infrastructure. Tripwire provides configuration audit and control solutions that specifically address the enterprise s need for independent detective controls. Its solutions provide a single point of control for detecting, reconciling, and reporting change activity across servers, workstations, network devices, and a growing number of other infrastructure components. Its library of graphical reports and executive dashboards document detailed change activity and provide essential change performance indicators. This information enables IT management to better manage change and the overall integrity of the infrastructure, and therefore IT as a whole. 7 Change and Patch Management: Critical for Organizational Success, Institute of Internal Auditors, Page 6
7 Proof Positive Configuration audit and control assures compliance by demonstrating that internal control structures for change management and security are in place and effective. When combined with a change approval process that allows only approved and tested changes to be implemented, it increases the availability of information systems both through enforcement of better change management processes and by offering decision support tools to quickly remediate outages and incidents when they inevitably occur. Finally, configuration audit and control enhances security and instills greater confidence in IT systems by demonstrating that only authorized and intended changes have been made to the production environment. These capabilities demonstrate that an independent solution is essential for proving control as well as systems and process integrity across the IT infrastructure. To Learn More For additional information on configuration audit and control solutions as they relate to IT auditing, regulatory compliance, the IIA and GTAG, best practices such as ITIL/Visible Ops and CobiT, the ITPI and the ITGI, please visit US TOLL FREE: TRIPWIRE MAIN: FAX: SW Broadway, 3rd Floor Portland, OR USA Page 3 Page 7 WPPDS01 WPPC6
Enforcing IT Change Management Policy
WHITE paper Everything flows, nothing stands still. Heraclitus page 2 page 2 page 3 page 5 page 6 page 8 Introduction How High-performing Organizations Manage Change Maturing IT Processes Enforcing Change
IT Service Management Metrics Metrics that Matter
Gene Kim, CTO, Tripwire, Inc. IT Service Management Metrics Metrics that Matter Four Key Benchmarks for Improving IT Performance white paper Configuration Control for Virtual and Physical Infrastructures
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Real-Time Security for Active Directory
Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The
Reining in the Effects of Uncontrolled Change
WHITE PAPER Reining in the Effects of Uncontrolled Change The value of IT service management in addressing security, compliance, and operational effectiveness In IT management, as in business as a whole,
Actionable Security Intelligence: Preparing for the Next Threat with a Proactive Strategy
www.netforensics.com NETFORENSICS WHITE PAPER Actionable Security Intelligence: Preparing for the Next Threat with a Proactive Strategy Contents Executive Summary The Information Security Landscape Security
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Configuration Audit & Control
The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration
File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions
File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Improving Network Security Change Management Using RedSeal
SOLUTION BRIEF Mapping the Impact of Change on Today s Network Security Infrastructure Improving Network Security Change Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
8 Key Requirements of an IT Governance, Risk and Compliance Solution
8 Key Requirements of an IT Governance, Risk and Compliance Solution White Paper: IT Compliance 8 Key Requirements of an IT Governance, Risk and Compliance Solution Contents Introduction............................................................................................
TRIPWIRE REMOTE OPERATIONS: STOP OPERATING, START ANALYZING
SERVICES TRIPWIRE REMOTE OPERATIONS: STOP OPERATING, START ANALYZING WHY COUNT ON TRIPWIRE REMOTE OPERATIONS? Free up time for more strategic projects Benefit from Tripwire s in-house expertise Achieve
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
Information Technology Auditing for Non-IT Specialist
Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating
WHITE PAPER. Meeting the True Intent of File Integrity Monitoring
WHITE PAPER Meeting the True Intent of File Integrity Monitoring Introduction The term file integrity monitoring, or FIM, popped up back in 2001 when the VISA started working on a security specification
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.
Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise. Benefits of Backup Policy Management
Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise Why Policy Management Matters... 3 Data Protection Service Management: An Overview... 3 Policy Management s Role
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Published April 2010. Executive Summary
Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must
Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation
Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Version 7.0 SP1 Evaluation Guide September 2010 Version 2.4 Copyright 2010, Lumension, Inc. Table of Contents Lumension Endpoint
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Dynamic Data Center Compliance with Tripwire and Microsoft
Dynamic Data Center Compliance with Tripwire and Microsoft white paper Configuration Control for Virtual and Physical Infrastructures For IT, gaining and maintaining compliance with one or more regulations
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
WHITE PAPER. Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements
WHITE PAPER Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements TABLE OF CONTENTS Executive Summary 2 Sarbanes-Oxley Section 404 Internal Controls 3 IT Involvement
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
See all, manage all is the new mantra at the corporate workplace today.
See all, manage all is the new mantra at the corporate workplace today. 1) Do you want to schedule backups, software updates using just one consistent automation platform? 2) Do you want a product that
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
How to Secure Your SharePoint Deployment
WHITE PAPER How to Secure Your SharePoint Deployment Some of the sites in your enterprise probably contain content that should not be available to all users [some] information should be accessible only
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA
White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities
SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
Implement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE
ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Maximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
File Integrity Monitoring:
File Integrity Monitoring: Compliance and Security for Virtual and Physical Environments white paper Configuration Control for Virtual and Physical Infrastructures Contents 3 Executive Summary 3 An Increased
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
CA Configuration Management Database (CMDB)
PRODUCT BRIEF: CA CMDB CA Configuration Management Database (CMDB) CA CONFIGURATION MANAGEMENT DATABASE (CMDB) HELPS YOU IDENTIFY AND UNDERSTAND THE DEPENDENCIES AND RELATIONSHIPS AMONG AND BETWEEN YOUR
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
How to Eliminate the No: 1 Cause of Network Downtime. Learn about the challenges with configuration management, solutions, and best practices.
How to Eliminate the No: 1 Cause of Network Downtime Learn about the challenges with configuration management, solutions, and best practices Share: Through 2015, 80% of outages impacting mission-critical
Infasme Support. Incident Management Process. [Version 1.0]
Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Select the right configuration management database to establish a platform for effective service management.
Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely
Change Management. Why Change Management? CHAPTER
Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
FIREWALL CLEANUP WHITE PAPER
FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The
How To Manage Log Management
: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll
Sarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
integrating cutting-edge security technologies the case for SIEM & PAM
integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
The problem with privileged users: What you don t know can hurt you
The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so
Product Financial Control Solutions Spreadsheet Workbench
Product Financial Control Solutions Spreadsheet Workbench Supporting Financial Transformation Through Increased Efficiency, Risk Mitigation and Control Product In many respects spreadsheets represent the
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
How To Standardize Itil V3.3.5
Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations
