Security Content Automation Protocol for Governance, Risk, Compliance, and Audit



Similar documents
Automating Compliance with Security Content Automation Protocol

Federal Desktop Core Configuration (FDCC)

BMC Client Management - SCAP Implementation Statement. Version 12.0

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Continuous Monitoring

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

How To Monitor Your Entire It Environment

Security compliance automation with Red Hat Satellite

STIGs,, SCAP and Data Metrics

How To Get The Nist Report And Other Products For Free

Qualys PC/SCAP Auditor

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

An Enterprise Continuous Monitoring Technical Reference Architecture

Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation

DoD Secure Configuration Management (SCM) Operational Use Cases

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

Making Vulnerability Management Operational

Security Controls Assessment for Federal Information Systems

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Secunia Vulnerability Intelligence Manager (VIM) 4.0

CONTINUOUS MONITORING

VRDA Vulnerability Response Decision Assistance

CDM Vulnerability Management (VUL) Capability

Manage Vulnerabilities (VULN) Capability Data Sheet

How To Improve Nasa'S Security

Healthcare Information Security Governance and Public Safety II

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

NetIQ FISMA Compliance & Risk Management Solutions

Security Control Standard

AHS Flaw Remediation Standard

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

White Paper. Understanding NIST FISMA Requirements

Report Book: Retina Network Security Scanner Unlimited

Looking at the SANS 20 Critical Security Controls

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

Patch and Vulnerability Management Program

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Towards security management in the cloud utilizing SECaaS

PII Compliance Guidelines

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

FREQUENTLY ASKED QUESTIONS

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

Analytics and Continuous monitoring Engine (ACE) for Enterprise Risk and Compliance Management

Improving Security Vulnerability and Configuration Management through a Service Oriented Architecture Approach

Guide to Enterprise Patch Management Technologies

Requirements For Computer Security


Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

FY15 Quarter 1 Chief Information Officer Federal Information Security Management Act Reporting Metrics V1.0

FISMA: Securing National Infrastructure

The Fundamental Difference Between SIEM & Log Management Solutions: State vs. Event Data

NOTICE: This publication is available at:

Total Protection for Compliance: Unified IT Policy Auditing

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Security Coordination with IF-MAP

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

COORDINATION DRAFT. FISCAM to NIST Special Publication Revision 4. Title / Description (Critical Element)

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

Mark S. Orndorff Director, Mission Assurance and NetOps

NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner

FISMA Implementation Project

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Secunia Vulnerability Intelligence Manager

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

EAC Decision on Request for Interpretation (Operating System Configuration)

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

6. Exercise: Writing Security Advisories

Checklist to Assess Security in IT Contracts

Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

D. Best Practices D.2. Administration The 6 th A

Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009

Security Orchestration with IF-MAP

Transcription:

UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED

Agenda NIST s IT Security Automation Agenda Definitions of Security Content Automation Protocol (SCAP) How SCAP Works SCAP for Compliance Use Cases Emerging Use Cases SCAP Validation Program Relevant NIST Publications Recommendations

Enterprise Information Security Reporting Flow Diagram Software Flaw Alerts Software Flaw Assessment Security Content Automation Protocol Security Configuration Assessment Asset Inventory Vulnerability Remediation System Approval Configuration Standards Configuration Inventory 3

Definitions of SCAP -A technology to bring interoperability to vulnerability management products of differing manufacture -A standard input and output format for vulnerability management products -Standardized and transparent expression of security configurations and software flaws - A suite of vulnerability management specifications that together enable standardization and automation of vulnerability management, measurement, and technical policy compliance checking -A vehicle for network hygiene -The plumbing for delivering information security to the enterprise

What is SCAP? How Standardizing the format by which we communicate Protocol What Standardizing the information we communicate Content CVE CVSS OVAL http://nvd.nist.gov XCCDF CCE http://checklists.nist.gov 70 million hits per year 20 new vulnerabilities per day, over 6,000 per year Mis-configuration cross references Reconciles software flaws from US CERT and MITRE repositories Spanish translation Produces XML feed for NVD content

Security Content Automation Protocol (SCAP) Standardizing How We Communicate CVE Common Vulnerability Enumeration Standard nomenclature and dictionary of security related software flaws CCE Common Configuration Enumeration Standard nomenclature and dictionary of software misconfigurations Common Platform Enumeration Standard nomenclature and dictionary for product naming XCCDF extensible Checklist Configuration Description Format Standard XML for specifying checklists and for reporting results of checklist evaluation OVAL Open Vulnerability and Assessment Language Standard XML for test procedures Cisco, Qualys, Symantec, Carnegie Mellon University CVSS Common Vulnerability Scoring System Standard for measuring the impact of vulnerabilities

Integrating IT and IT Security Through SCAP Vulnerability Management CVE CVSS Misconfiguration OVAL Asset Management XCCDF CCE Compliance Management Configuration Management CVE CCE XCCDF OVAL CVSS Common Vulnerability Enumeration Common Platform Enumeration Common Configuration Enumeration extensible Checklist Configuration Description Format Open Vulnerability and Assessment Language Common Vulnerability Scoring System

Understanding Software Flaw Exposure Vulnerability Management Asset Inventory CVE CVSS Software Flaw Alert OVAL Asset Management XCCDF CCE Configuration Management Compliance Management

Existing Federal Content Standardizing What We Communicate In response to NIST being named in the Cyber Security R&D Act of 2002 Encourages vendor development and maintenance of security guidance Currently hosts 135 separate guidance documents for over 165 IT products Translating this backlog of checklists into the Security Content Automating Protocol (SCAP) Participating organizations: DISA, NSA, NIST, Hewlett-Packard, CIS, ITAA, Oracle, Sun, Apple, Microsoft, Citadel, LJK, Secure Elements, ThreatGuard, MITRE Corporation, G2, Verisign, Verizon Federal, Kyocera, Hewlett-Packard, ConfigureSoft, McAfee, etc. Over 4 million hits per month About 20 new vulnerabilities per day Mis-configuration cross references to: NIST SP 800-53 Security Controls (All 17 Families and 163 controls) DoD IA Controls DISA VMS Vulnerability IDs Gold Disk VIDs DISA VMS PDI IDs NSA References DCID ISO 17799 Reconciles software flaws from: US CERT Technical Alerts US CERT Vulnerability Alerts (CERTCC) MITRE OVAL Software Flaw Checks MITRE CVE Dictionary Produces XML feed for NVD content

National Checklist Program Hosted at National Vulnerability Database Website

How SCAP Works Report Checklist XCCDF Platform Misconfiguration General Impact Software Flaw General Impact XCCDF CCE coming soon* CVE CVSS Commercial Government Tools Specific Impact Results Specific Impact Results coming soon* CVSS Test Procedures OVAL Patches OVAL * NIST IR-7502: DRAFT The Common Configuration Scoring System (CCSS) http://csrc.nist.gov/publications/pubsdrafts.html

Linking Configuration to Compliance REFERENCES IA-5 - Authenticator Management NIST 800-26: 15.1.6, 15.1.7, 15.1.9, 15.1.10, 15.1.11, 15.1.12, 15.1.13, 16.1.3, 16.2.3 GAO FISCAM: AC-3.2 DOD 8500.2: IAKM-1, IATS-1 DCID 6/3: 4.B.2.a(7), 4.B.3.a(11) CobIT DS5 ISO/IEC 17799: 11.5.2, 11.5.3 HIPAA SR 164.312(a)(1) Access Control PCI Data Security Standard v1.1 8.5.10 800-68 Section 6.1 - Table A-1.4 DISA STIG Section 5.4.1.3 DISA Gold Disk ID 7082 PDI IAIA-12B NSA Chapter 4 - Table 1 Row 4 CCE-100 - minimum-password-length RULE CCE-100 - minimum-password-length test procedures Operational Efficiency Map it up-front Map it only once Map it with expertise - let technologists be technologists Support standardized builds Communicate clearly and definitively Communicate broadly Slogans A Scan Once, Report Many technology Make compliance a by-product of security

800-53 Controls with Automated Checking Control Control Control Tool Set Automation Count Percent Example Framework Tools Full Automation - - - Partial Automation 49 30% PL-2 System Security Plan Security Content Automation Protocol Future Automation Techniques or No Automation Full Automation 31 19% AC-11 Session Lock Partial Automation 39 24% AC-8 System Use Notification 44 27% AC-1 Access Control Policy and Procedures Total Controls 163 100%

Risk Management Framework ORGANIZATIONAL VIEW Architecture Description FEA Reference Models Segment and Solution Architectures Mission and Business Processes Information System Boundaries Risk Executive Function Starting Point Organizational Inputs Laws, Directives, Policy Guidance Strategic Goals and Objectives Priorities and Resource Availability Supply Chain Considerations Repeat as necessary Step 6 MONITOR Security State SP 800-37 / 800-5A Step 5 AUTHORIZE Information Systems SP 800-37 Plan of Actions & Milestones Go Live Decision System Risk Acceptance Accreditation Certification and Accreditation Similarly - SAS-70 Type II Audits Step 1 CATEGORIZE Information Systems FIPS 199 / SP 800-60 RISK MANAGEMENT FRAMEWORK Security Life Cycle Step 4 ASSESS Security Controls SP 800-53A Security Assessment Report Step 2 SELECT Security Controls FIPS 200 / SP 800-53 Security Plan Step 3 IMPLEMENT Security Controls SP 800-70

Use Case: The Office of Management and Budget Federal Desktop Core Configuration Repeatable Assessments and Uniform Reporting OMB 31 July 2007 Memo to CIOs: Establishment of Windows XP and VISTA Virtual Machine and Procedures for Adopting the Federal Desktop Core Configurations Your agency can now acquire information technology products that are self-asserted by information technology providers as compliant with the Windows XP & VISTA FDCC, and use NIST s Security Content Automation Protocol (S-CAP) to help evaluate providers selfassertions. Information technology providers must use S-CAP validated tools, as they become available, to certify their products do not alter these configurations, and agencies must use these tools when monitoring use of these configurations.

Use Case: The Office of Secretary of Defense Computer Network Defense Data Pilot CND Data Model Overview Integrated and Timely Situational Awareness IP Vuln Asset Config IDs Env Info HW SW net CCE IP MAC EIN FQDN cert owner MAC location IP location Category DHCP Event IP Vulnerability CVSS Remedy CCE CVE MAC Event NAT Event IP CVE CCE Sig Event CVE CEE Event IP/MAC CVE CCE Event IP Assessment Incident Threat IDs Technique Exploit Actor IP Actor Asset IP IP CME CVE Vuln CME Exploit Vuln CME Anomaly Evnt CEE Flow Event IP Log Event CEE

Use Case: The Payment Card Industry Technical and Operational Reqs for ASVs Standardized Software Flaw Content and Impact Scores Version 1.1 of Technical and Operational Requirements for Approved Scanning Vendors (ASVs) The detailed report must be readable and accurate, and must include the following: Detailed statement for each vulnerability found on the customer infrastructure, including: Industry reference numbers such as CVE, CAN, or Bugtraq ID Severity level - Common Vulnerability Scoring System (CVSS), http://www.first.org/cvss/, base score, as indicated in the National Vulnerability Database (NVD), http://nvd.nist.gov/cvss.cfm (where available)

International Adoption Spanish Government Italian Government European Union/EC Japanese Government

Emerging Use Cases SCAP Checklists as software flaw alert format SCAP Reports as technical appendix to system risk acceptance documents SCAP Checklists as communication from central OCIO, IG, and audit bodies on implementation expectations SCAP Reports as evidence of implementation and adjustment of technical security controls (e.g., evidence for SAS-70 Type II audit) SCAP Reports to perform comparative analysis for infrastructure connections (e.g., long-term partnerships, merger, acquisition)

SCAP Validation Program Status As of 6 January 2009, 11 months of operation 10 Accredited labs Validated Products 13 vendors 19 products 68 capabilities-based validations 13 standards-based validations All 13 vendors and 17/19 products are FDCC Scanner validated and more to come in 2009.

SCAP Documentation SP800-117: DRAFT Adopting and Using Security Content Automation Protocol COMING SOON SP800-126: Security Content Automation Protocol Specification SP800-70 Rev 1: DRAFT National Checklist Program for IT Products- -Guidelines for Checklist Users and Developers IR-7511: DRAFT Security Content Automation Protocol (SCAP) Validation Program Test Requirements IR-7435: The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems IR-7275 Rev 3: Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4 IR-7502: DRAFT The Common Configuration Scoring System (CCSS)

Recommendations Investigate use of SCAP for existing use cases talk with stakeholders and NIST Consider emerging use cases talk with NIST Determine if your current tool set has been SCAP Validated visit http://nvd.nist.gov Read relevant NIST documents Join mailing lists to monitor community dialog Attend the Fifth Annual Security Automation Conference in Fall 2009

Questions? Presenter: Tim Grance grance@nist.gov SCAP Homepage: http://scap.nist.gov SCAP Validation Tools: http://nvd.nist.gov/scapproducts.cfm SCAP Validation Homepage: http://nvd.nist.gov/validation.cfm National Checklist Program: http://checklists.nist.gov National Vulnerability Database: http://nvd.nist.gov