Federal Desktop Core Configuration (FDCC)



Similar documents
BMC Client Management - SCAP Implementation Statement. Version 12.0

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

Automating Compliance with Security Content Automation Protocol

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

STIGs,, SCAP and Data Metrics

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

How To Monitor Your Entire It Environment

Qualys PC/SCAP Auditor

Continuous Monitoring

Security compliance automation with Red Hat Satellite

An Enterprise Continuous Monitoring Technical Reference Architecture

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

A Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January government

Improving Security Vulnerability and Configuration Management through a Service Oriented Architecture Approach

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

Compliance series Guide to meeting requirements of USGCB

Making Vulnerability Management Operational

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

Symantec Control Compliance Suite Standards Manager

Secstate: Flexible Lockdown, Auditing, and Remediation

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

IBM Tivoli Endpoint Manager for Security and Compliance

DoD Secure Configuration Management (SCM) Operational Use Cases

Requirements For Computer Security

Total Protection for Compliance: Unified IT Policy Auditing

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

EAC Decision on Request for Interpretation (Operating System Configuration)

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

How To Get The Nist Report And Other Products For Free

McAfee Policy Auditor software

Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

OVAL Developer Days. July 11-12, 2006

IBM InfoSphere Guardium

White Paper. Understanding NIST FISMA Requirements

Common Platform Enumeration (CPE) Technical Use Case Analysis

VRDA Vulnerability Response Decision Assistance

Guide to Enterprise Patch Management Technologies

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6

The Operating System Lock Down Solution for Linux

Secunia Vulnerability Intelligence Manager (VIM) 4.0

How To Improve Nasa'S Security

Implications of Security and Accreditation for 4DWX (Information Assurance) By Scott Halvorson Forecasters Training 26 February 2009

AHS Flaw Remediation Standard

IBM Tivoli Endpoint Manager for Security and Compliance


Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective:

Healthcare Information Security Governance and Public Safety II

Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation

CDM Vulnerability Management (VUL) Capability

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No

Symantec Client Management Suite 7.6 powered by Altiris technology

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Manage Vulnerabilities (VULN) Capability Data Sheet

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Windows Server 2008 R2 Hyper V. Public FAQ

BMC BladeLogic Client Automation Installation Guide

Desktop Virtualization: A Buyer s Guide

How To Manage A System Vulnerability Management Program

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release July 2015

AppSentry Application and Database Security Auditing

D. Best Practices D.2. Administration The 6 th A

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

CA IT Client Manager. Release Notes and Known Issues. r12 SP1

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

Towards security management in the cloud utilizing SECaaS

Comparing Free Virtualization Products

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Testing Control Systems

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

ECS 235A Project - NVD Visualization Using TreeMaps

Citadel Security Software Inc.

Implementing a Desktop Infrastructure. Version: Demo. Page <<1/9>>

SCAP Compliance Checker Version 3.1 for Windows February 12, 2012

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Audit Tools That Won t Break the Bank

Symantec Client Management Suite 8.0

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

RED HAT ENTERPRISE VIRTUALIZATION

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

CONTINUOUS MONITORING

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Transcription:

Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007

FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to meet minimum functionality Platform Specific Based on existing guidelines OMB Mandated OMB M-07-11 - Implementation of Commonly Accepted Security Configurations for Windows Operating Systems March, 2007 OMB M-07-18 - Ensuring New Acquisitions Include Common Security Configurations June, 2007 OMB Memo to CIOs - Establishment of Windows XP and Vista Virtual Machine and Procedures for Adopting the Federal Desktop Core Configurations July, 2007 In Support of the OMB Mandate NIST Technical resources MS Windows XP SP-2 and Vista FDCC Baseline Virtual Hard Disks IE 7, Win XP Firewall and Vista Defender enabled AD Group Policy Objects

FDCC OMB Memo M-07-11 Win XP and Vista Clients when deployed need to be configured according to an approved and agreed upon common Security Configuration - Baseline Submit Draft Implementation plans by May 1, 2007. Adopt FDCC by February 1, 2008. OMB Memoranda OMB Memo for CIOs July 31 st, 2007 XP and Vista + IE 7.VHD files with pre configured FDCC Security Settings to test, evaluate and certify applications by the vendors. OMB Memo M-07-18 IT Providers shall certify their applications to be fully functional and operate correctly as intended in FDCC. The approved FDCC configuration shall not be altered. Applications designed for normal end users shall run in the standard user context. S-CAP validation tools for Agencies and Vendors to check FDCC compliance and certify applications.

FDCC Common core Microsoft Windows configuration driven by OMB. Based on the DISA, NSA, NIST, USAF, and Microsoft existing guidelines for securing Windows XP and Vista. (Check Lists) Leverage USAF standard configuration Desktop initiative. Successfully Deployed and tested across half a million Windows XP Systems. Include Security and other settings (Agencies are not required to use these settings) Internet Explorer 7. Firewall is enabled for Windows XP and Vista. Windows Vista Defender is enabled.

Microsoft Virtual PC -.VHD Files VPC and.vhd Files Virtual PC Allows users to run a virtual instance of an operating system Free Download (Virtual PC 7.0) Virtual Hard Disk Files (.VHD) Virtual instance of an Operating System Runs on the Host OS Utilize the hardware of the computer (e.g., hard drive, Ethernet card, USB ports) in the same way the non-virtual MS XP and MS Vista.VHD files are configured according to the FDCC Security Requirements

Microsoft Virtual PC -.VHD Files Benefits of using.vhd Files Test Production Applications before migrating for functionality issues. Test applications during the SDLC phases. Test Updates, Patches and their impact on the production environment before introducing them to the production environment. VHDs can be discarded and reimplemented very quickly for the purposes of ensuring a pristine testing environment or if something malfunctioned with the previous VHD. Multiple VHDs can be run over a single physical platform to achieve cost savings.

SCAP (I) SCAP Method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). A selected suite of interoperable and automatable XML based standards. Method for cataloging software flaws, security related configuration issues, and product names; measure systems to determine the presence of vulnerabilities; and provide mechanisms to rank (score) the results of these measurements. Simultaneously machine and human readable. The National Vulnerability Database provides a repository and data feeds of content that utilize the SCAP standards.

SCAP (II) Leverages six (6) open standards for creating SCAP content SCAP content consists of security checklist data represented in automated XML formats, vulnerability and product name related enumerations, and mappings between the enumerations Benchmarking of the OS using predefined SCAP content

SCAP (III) Responsibilities of NIST Defines and maintains the protocol and the data feeds of content. Defines how to use the open standards within the SCAP context and defines the mappings between the SCAP enumeration standards. Check List Program reviews and approves submitted check lists by Federal Agencies and Vendors. Does not control the underlying standards that are used within the protocol.

SCAP (IV) DISA Combining Existing Initiatives STIG & Checklist Content Gold Disk & VMS Research FIRST Common Vulnerability Scoring System (CVSS) MITRE Common Vulnerability Enumeration (CVE) SCAP Common Configuration Enumeration (CCE) Open Vulnerability & Assessment Language (OVAL) Common Platform Enumeration (CCP) NSA Extensible Configuration Checklist Description Format (XCCDF) Security Guidance & Content NIST National Vulnerability Database Checklist Program Security Content Automation Program

SCAP (V) CVE CCE CPE XCCDF OVAL CVSS Common Vulnerabilities and Exposures Common Configuration Enumeration Common Platform Enumeration extensible Configuration Checklist Description Format Open Vulnerability and Assessment Language Common Vulnerability Scoring System Standard identifiers and dictionary for security vulnerabilities related to software flaws Standard identifiers and dictionary for system configuration issues related to security Standard identifiers and dictionary for platform/product naming Standard XML for specifying checklists and for reporting results of checklist evaluation Standard XML for testing procedures for security related software flaws, configuration issues, and patches as well as for reporting the results of the tests Standard for conveying and scoring the impact Electrosoft, of 2007 vulnerabilities

Mobile User Enterprise Other SCAP (VI) Agency Baseline Configuration All of the How To and Mapping Performed Here! XCCDF SCAP XCCDF DISA Platinum Vendor Guide NIST Special Pub DISA Gold NSA Guide OVAL OVAL CVE CVE + CCE CCE Finite Set of Possible Known Security Configuration Options and Patches

Windows Vista Misconfigurations DISA/NSA/NIST, Microsoft, Air Force policies Windows XP Misconfigurations/Software flaws NIST FISMA and DISA policies (SP 800-68 / Gold Disk) Windows Server 2003 Misconfigurations/Software flaws Microsoft and NIST FISMA policies Red Hat Enterprise Linux Software flaws Many more under development!! SCAP Beta Security Automation Files Available

SCAP Tool Vendor Adoption Tool Vendor Adoption of SCAP ThreatGuard First product to perform automated compliance evaluation and remediation using SCAP Secure Elements Tenable Nessus (under development) Asserted Statements of Compliance to SCAP Symantec McAfee ASG ManTech CSC

NIST Publications NIST Checklist Publication (Revised Special Publication 800-70) NIST - Information Security Automation Program (ISAP) NIST IR 7275 XCCDF version 1.1.2 (Draft Posted)

Objectives of SCAP Enable technical control compliance automation Low level vulnerability checks to map to high level compliance requirements Enable standardized vulnerability management Empower security product vendor community to perform ondemand, Government directed security and compliance audits End user organization can specify requirements COTS tools automatically perform checks Enable efficient security measurement FISMA scorecard have a quantitative component that map to actual low level vulnerabilities

Objectives (continued) Replace Stove-pipe GOTS Approaches Establish vulnerability management standards Encourage product vendors (i.e. Microsoft, Sun, Oracle, Red Hat etc.) to provide direct support in the form of security guidance/content

Benefits of SCAP Federal Agencies OMB is mandating Federal Agencies to move towards standardized common desktop configuration. Automation of technical control compliance (FISMA). Ability of agencies to specify how systems are to be secured. Ability to measure security using standardized methods. COTS Tool Vendors Vendors compete on quality of tool, not the checking content. Provision of an enhanced IT security data repository. No cost and license free. Standards based: CVE/OVAL/XCCDF/CVSS/CCE. Cover both software flaw and configuration issues. Elimination of duplication of effort/cost reduction through standardization. Security Configuration Management made easier

Resources NIST FDCC NIST SCAP NVD CVE/CCE data feed CVE Homepage CCE Homepage CPE Homepage CVSS Homepage XCCDF Standard OVAL Homepage