FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs



Similar documents
BMC Client Management - SCAP Implementation Statement. Version 12.0

Federal Desktop Core Configuration (FDCC)

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Automating Compliance with Security Content Automation Protocol

Continuous Monitoring

Qualys PC/SCAP Auditor

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

STIGs,, SCAP and Data Metrics

How To Monitor Your Entire It Environment

Tested configuration for Major versions of Primavera:-

CA IT Client Manager. Release Notes and Known Issues. r12 SP1

DoD Secure Configuration Management (SCM) Operational Use Cases

Towards security management in the cloud utilizing SECaaS

McAfee Policy Auditor software

Secstate: Flexible Lockdown, Auditing, and Remediation

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

Security compliance automation with Red Hat Satellite

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6

Status Update. Jon Baker September 28, 2010

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

Guide to Enterprise Patch Management Technologies

AppSentry Application and Database Security Auditing

OVAL Developer Days. July 11-12, 2006

An Enterprise Continuous Monitoring Technical Reference Architecture

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Making Vulnerability Management Operational

Auditing Data Access Without Bringing Your Database To Its Knees

Healthcare Information Security Governance and Public Safety II

Dynamic Data Center Compliance with Tripwire and Microsoft

Web Conferencing Comparison Guide

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Contents. BMC Atrium Core Compatibility Matrix

SecureVue Product Brochure

IBM Tivoli Endpoint Manager for Security and Compliance

Downloading and Mass Deploying Applications

IBM InfoSphere Guardium

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Secunia Vulnerability Intelligence Manager

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

IBM Tivoli Monitoring for Databases

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

CA Client Automation

SCAP Compliance Checker Version 3.1 for Windows February 12, 2012

Real-Time Database Protection and. Overview IBM Corporation

IBM Tivoli Monitoring for Applications

CA Service Desk Manager Release 12.5 Certification Matrix

Common Platform Enumeration (CPE) Technical Use Case Analysis

SAP BusinessObjects Document Version: 4.1 Support Package Dashboards and Presentation Design Installation Guide

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

HP Service Manager Compatibility Matrix

Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective:

System Security Requirements

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

Total Protection for Compliance: Unified IT Policy Auditing

Globalization Status of Citrix Products

Configuration Audit & Control

BMC BladeLogic Client Automation Installation Guide

Schema and Release Support. Job Spooler / Job Server Compatibility. PTC Creo Elements/Direct Model Manager

Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

DraftSight Frequently Asked Questions

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY


Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

Crystal Reports XI Release 2 for Windows Service Pack 3

An Introduction to the Common Configuration Enumeration

Pulse Secure Client. Customization Developer Guide. Product Release 5.1. Document Revision 1.0. Published:

Report Book: Retina Network Security Scanner Unlimited

Oracle Database Security Myths

Delivering Security & Compliance On Demand

Infor M3 Report Manager. Solution Consultant

Manage Vulnerabilities (VULN) Capability Data Sheet

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

IBM Tivoli Remote Control

rating of 5 out 5 stars

NetIQ FISMA Compliance & Risk Management Solutions

Cloud Attached Storage 3.1 EA

IBM Tivoli Endpoint Manager for Security and Compliance

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

QRadar SIEM 6.3 Datasheet

Transcription:

FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day 2 nd Security Automation Conference and Working Group meetings Nearly 200 attendees Just hoping we were not wasting our time 3 rd Security Automation Conference 800+ attendees OMB made SCAP mainstream A product demo for the first SCAP tools was given 4 th Security Automation Conference A real maturing effort Multiple products from multiple vendors demonstrating SCAP 5 th Security Automation Conference Today, a movement in the industry Talk of integrating SCAP into Cloud Computing, VOIP, Event and Log Monitoring What a difference a couple years makes! 2 2009 SCAP Conference October 28, 2009

What is Security Automation? From this: to this

Security Content Automation Protocol (SCAP) Defined by the NIST SP 800-126: The Technical Specification for SCAP XCCDF OVAL OCIL* CCE CPE CVE CVSS extensible Configuration Checklist Description Format Open Vulnerability and Assessment Language Open Checklist Interactive Language Common Configuration Enumeration Common Platform Enumeration Common Vulnerabilities and Exposures Common Vulnerability Scoring System XML for specifying checklists and for reporting results of checklist evaluation Standard XML for representing system configuration information, assessing machine state, and reporting assessment results Standard for expressing and evaluating non-automated (i.e., manual) security checks Standard identifiers and dictionary for system configuration issues related to security Standard identifiers and dictionary for platform/product naming Standard identifiers and dictionary for security vulnerabilities related to software flaws Standard for measuring and conveying the relative severity of software flaw vulnerabilities * Due for release with SCAP version 1.1

Why Should I Care? The power shift created by structured content in other industries ISBN, UPC/Barcodes, etc. Interoperability versus lock-in Interoperability good Lock-in bad Reduce the cost of managing your networked environments

How SCAP Can Change Auditing In a future not so far away IT / Operations / Security will not have to stop what they are doing to prepare for an external audit Auditors will not need to bring in their own tools to audit the network assets directly Signed Benchmarks approved by the Auditor are running on the network IT staff hands the auditor the signed benchmark, the signed tailoring settings file and access to the signed results files. The auditor can the review the benchmark and the results, verify the signatures and determine if there are areas that the site should be validating / auditing that they currently are not and makes benchmark improvements. Their improvements are then put in place and now additional items are validated. Operations and management now have a continuous view of the status of there network

National Checklist Program Website U.S. Government repository of publically available security checklists - 128 Checklists currently published on the website - 17 SCAP-expressed checklists - 26 additional SCAP-expressed checklists planned for FY2010 - Checklists cover 178 products - Checklist contributors include - Government Organizations (e.g., NIST, NSA, DISA) - Vendors (e.g., Microsoft Corporation, Red Hat) - Non-profits - Federally Funded Research and Development Centers

NIST Repository is the1st, but Will not be the only archive of available SCAP content Vendors are starting to make SCAP content available on their sites Success of the NCP efforts will foster vendors to develop checklists for their products Authoritative issue will become a problem Signing needed now Alternative repositories will start to spring up Today s model for public distribution is lacking Mixed namespace benchmarks and checks will cause an addressing / access issue impacting evaluation Different models for content distribution will emerge

FDCC Center of the SCAP Universe Not A specific use case trying to solve a very important problem for a large organization The focus of the SCAP components has been to solve real global problems, not just the Federal Govt s issues SCAP is on the verge of transforming auditing as we have come to know it Private sector needs SCAP content for more than Windows and more than just FDCC

Compliance and Configuration Management FISMA HIPAA SOX DCID COMSEC 97 DoD ISO Vendor Company SP 800-53 Title III??? DCID6/3 NSA Req DoD IA Controls 17799/ 27001 SP 800-68 Security Agency Guides NSA Guides DISA STIGS & Checklists??? Guide Guide Finite Set of Possible Known IT Risk Controls & Application Configuration Options Tailoring Mgmt, Operational, Technical Risk Controls Windows XP SP1 SP2 Enterprise Mobile Stand Alone SSLF High Moderate Low Millions of settings to manage OS or Application Version/ Role Major Patch Level Environment Impact Rating or MAC/CONF

Our SCAP Challenge Produce an entire new set of content from scratch with no development tools, no management, maintenance or publishing infrastructure, assuring each component is completely reusable and all fully tested, being distributed via multiple channels, while using multiple formats for the content whose formats are changing based on the whim of others.

Content Development At A Glance XCCDF / OVAL Content All new Policies Developed GLBA HIPAA CobiT SOX ISO27001 PCI-DSS CIS Benchmarks.. Other Content OVAL Primitives OVAL Compliance Checks Patch Definitions and Benchmarks Application Checks Supporting Six OS Families Windows Mac OS X Solaris Red Hat HP-UX AIX Supporting Five CPU Architectures X86 X64 PowerPC RISC SPARC Supporting 40+ separate OS versions

Types of Content OVAL Primitives For use in our Benchmark Editor which is a shared component for multiple products Fully schema driven OVAL Configuration Checks OVAL Patch Definitions and Patch Benchmarks Application specific OVAL Checks XCCDF Benchmarks (a.k.a. Policies) Supporting NAC, Audit and Vulnerability Management

An approach to testing content Command line testing using Vendor agent MITRE's Ovaldi Development Testing Develop Setup and Definition Test scripts Execute the Definition tests prior to sending to QA Capture System Characteristics during the run Initial QA manual testing Assure all part of the submitted testable package are available Run the tests on all applicable / affected systems Integrate the tests into the automation environment Automated Testing QA manages and monitors automated testing components Test with multiple OVAL Interpreters to assure content is portable where possible Assure both positive and negative drivers contain all Definition tests Managing patch testing via System Characteristics

Content Distribution Means to distribute content is not specified Best practices is the only guide we have NIST repository forces users to pull content Still working out the content distribution and notification processes Checksums / signing of content needed Vendors producing their own content distribute it by their own means No way to verify the content is what the guidance authority released Other Intellectual Property protection mechanisms needed

SCAP Certification Certification is about the product Can it consume a random SCAP compliant document set supplied by NIST to the evaluation lab? Can it evaluate the parameters/values listed in the set? Can it report the proper results in the proper output format? If so, you pass Content certification is not currently an active certification path This is coming But what does it mean and what are the limits on what can and should be certified? Is certification really going to address interoperability issues between products and tools? This whole effort is TBD at present but assuring real interoperability between products is critical to truly realizing the value of security automation.

Localized SCAP Content Existing McAfee developed SCAP Content Benchmarks, Primitives, Oval Checks Created locale specific OVAL compliance checks Created locale/os/version specific patches Targeted application checks for desktop security products Designed and implemented a process to provide localized content using the existing SCAP specifications Creation of content Testing of content Publication of content Language English US& International (EN) Chinese Simplified (ZH CN) Chinese Traditional (ZH TW) French (FR) German (DE) Italian (IT) Japanese (JP) Polish (PL) Spanish (ES) Dutch (NL) Swedish (SV) Portuguese Brazilian (PT BR) Korean (KO) Localized Y Y Y Y Y Y Y Y Y Pending Pending Pending Pending

Current SCAP Validated Vendors

Questions??? Kent Landfield Kent_landfield@mcafee.com Office: 972.963.7096 Mobile: 214.385.1138