Commercial Practices in IA Testing Panel



Similar documents
Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Firewall Environments. Name

Client Security Risk Assessment Questionnaire

8. Firewall Design & Implementation

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Information Security Policy

The Protection Mission a constant endeavor

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Goals. Understanding security testing

How To Manage Security On A Networked Computer System

Chapter 9 Firewalls and Intrusion Prevention Systems

Critical Controls for Cyber Security.

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

McAfee Security Architectures for the Public Sector

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Defending Against Data Beaches: Internal Controls for Cybersecurity

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

defense through discovery

Global ediscovery Client Data Security. Managed technology for the global legal profession

IBM QRadar Security Intelligence April 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Introduction to Cyber Security / Information Security

SANS Top 20 Critical Controls for Effective Cyber Defense

Critical Security Controls

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

INCIDENT RESPONSE CHECKLIST

ICANWK406A Install, configure and test network security

Meeting the Challenges of Virtualization Security

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Exam 1 - CSIS 3755 Information Assurance

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

How To Buy Nitro Security

ABB s approach concerning IS Security for Automation Systems

Cisco Advanced Services for Network Security

Cyber Situational Awareness for Enterprise Security

Security Services. 30 years of experience in IT business

NETWORK PENETRATION TESTING

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

QRadar SIEM 6.3 Datasheet

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

HEC Security & Compliance

Strategic Information Security. Attacking and Defending Web Services

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Segmentation

Cisco Security Optimization Service

How To Protect A Network From Attack From A Hacker (Hbss)

The Information Assurance Process: Charting a Path Towards Compliance

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Best Practices For Department Server and Enterprise System Checklist

MANAGED SECURITY SERVICES

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Strengthen security with intelligent identity and access management

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

How To Achieve Pca Compliance With Redhat Enterprise Linux

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Applying the DOD Information Assurance C&A Process (DIACAP) Overview

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Guideline on Auditing and Log Management

Secure networks are crucial for IT systems and their

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Managing IT Security with Penetration Testing

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

THE OPEN UNIVERSITY OF TANZANIA

Understanding SCADA System Security Vulnerabilities

Network and Host-based Vulnerability Assessment

University System of Maryland University of Maryland, College Park Division of Information Technology

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

HP Security Assessment Services

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

What is Security Intelligence?

UNDERSTANDING PCI 3.0 AND HOW TO REDUCE YOUR SCOPE

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

All Information is derived from Mandiant consulting in a non-classified environment.

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Information Security Network Connectivity Process

Industrial Security for Process Automation

Top 20 critical security controls

Looking at the SANS 20 Critical Security Controls

Transcription:

Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation

Panel Members! Dr. Myron L. Cramer» Executive Director, Information Assurance Division, Windermere! Lori Ericson» interamerica Analytics! Matthew Devost» Director of Operations, Security Design International (SDI)! Samuel Nitzberg» Senior Scientist, New Jersey Operations, Windermere

Objectives! To share commercial practices in the area of IA Testing, emphasizing topics with high relevance to DoD! The speakers will each share their perspectives and will participate in Group Wrap-up

Discussion Topics Presentations will address he following topics as they relate to IA testing.! Test Objectives» What things are commercial testers trying to accomplish?» How are these objectives incorporated into test planning?! Threats» How does the commercial world characterize its threats?» What are threat motives, capabilities?» What kind of intelligence gathering is done on the threat?» To what extent does the threat drive a system design?» How is this incorporated in testing? continued

Discussion Topics (cont)! Metrics» What is the current commercial thinking on test metrics?» How do they measure success?! Test Methods» What are the roles for vulnerability scanning, penetration testing, blind testing, insider testing?! Reports» What kind of documentation is produced?» How does it get used?» Who uses test reports?

Agenda Time 8:30 9:05 9:05 9:45 9:45 10:15 10:15 11:00 11:00 11:40 11:40 12:00 Topic Commercial Testing Introduction & Overview Perspectives on the Threat Break Hacker Methods & Penetration Testing New York e-commerce Testing Activities Panel Discussions Questions & Answers Speaker Myron Cramer Lori Ericson Matthew Devost Samuel Nitzberg All

Role of Testing! Testing plays an integral part of development process even in the most streamlined processes! Information security is recognized as a standard requirement for e-commerce and part of a system s transition from development to production! Information security testing of operational systems is also regularly performed

Test Objectives! What things are commercial testers trying to accomplish?» Verify design implementation, configuration, integration, operation» Assess exposures» Satisfy audit responsibilities! How are these objectives incorporated into test planning?» Identify system security requirements» Allocate security requirements within security architecture» Develop test plan

Challenges for Enterprises! Landscape Discovery» Network topology» Role of legacy systems, services and users» Constraints of communications infrastructure! Dealing with Change» Maintaining compatibility» Data center versus distributed computing base! Controlling Access» Enabling extranet operations» Sharing information with partners and customers» Protecting intranet! Scalability» Implementing security across a large enterprise» Supporting required user services» Maintaining cost-effective operations

Landscape Discovery! Scanning and assessment» Networks, servers, protocols, protections! Interviews» Nature of the information» Sensitivity» Risks» Information organization! Picture of existing architecture» Networks, servers, applications» Users» Information, value, and data sensitivity

Network Discovery

Protocol Distribution

Types of Information MISSION PLAN PROCESS 1... PROCESS n OBJECTIVE DATA BASES STAFF

Value of Information! There are different types of organizational information! These face different threats and have different security issues

Dealing with Change! Requires new approaches and new technologies» New Computing Model» Transition from Data Center to Distributed Computing» Internet connections and services! Introduces new exposures Mainframes Data Centers Computer Past Present Future Time

Controlling Access! Supporting collaboration over multiple overlapping Communities of Interest Intranet 2 Intranet 1 Internet

Scalability! Network-based components» Leverage network to distribute services to all connected users! Host-based components» Where visibility and access is required to individual workstations» Requires administration of client configurations! Managed Services» Outsourced operational support solutions

Security Architecture & Engineering REQUIREMENTS SPECIFICATIONS MECHANISMS! Policy» Business Plan» International, Federal, State Law» Intercompany Agreements! Requirements Translation» Operational Environment» Risk Exposures» User Communities» Information Administration» Security Specifications! Design» Architectural Implementation» Product Performance Specification» Components Selection and Configurations

Security Architecture Protect Enforces separation Applies Least Privilege Enforcement Principles Measure Determines the condition of an information system Support Provides enabling and infrastructure services Anti-Virus Firewalls Proxy Server VPN Content Inspection Host access controls Application access controls Network Mapping Vulnerability Assessment Intrusion Detection Authentication Directory Incident Response Enterprise Management

Security Architecture Intruder DMZ File Server Directory Server Internet Firewall Intranet Enterprise Management Users Intrusion Detection Content Inspection Web Server Mail Server Proxy Server VPN Server Clients Intranet Server Authentication Server

Domain Model! Shares security responsibility among each component in functional regions Domain 1 Domain 2 User Workstation Workstation Network Server Boundary Boundary Server Network User

IA Context Network Mapping Network Architecture Vulnerability Analysis System Vulnerabilities Intrusion Attempts Anomalies Security Policies Boundaries Boundary Protection Security Policies Significant Events Intrusion Detection Security Policies Tasking Significant Events Network Architecture Enterprise Management Status Actions Incident Response

Vulnerability Analysis CERT Advisories Known Vulnerabilities Anomalies Susceptibility Analysis Potential System Risks Boundary Protection Intrusion Detection Network Mapping Intrusion Attempts Network Architecture Server Data Base Vulnerability Modeling Security Policies Security Policies Predicted System Vulnerabilities Vulnerability Testing Verified System Vulnerabilities Incident Response Testing Tools

Scientific Method Hypothesis Test H o H a

Architecture Testing

System Functional Testing

Host Scanning

Intrusion Detection Operations

Contact Information Dr. Myron L. Cramer 410-266-1900 mcramer@wias.net http://www.wias.net Windermere Information Technology Systems Information Assurance Division 401 Defense Highway Annapolis, Maryland 21401