Security: Beyond Technical Measures @ JDJ

779 篇文章 0 订阅
<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
<script type="text/javascript"> </script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>

  Linux folks tend to have a better eye on Security. I realize that's an overwhelmingly general and wide-sweeping statement, but that's my opinion. I've been working with Linux for a very long time, and most of the other users in the community tend to be highly Technical and thus aware of many of the Security concerns facing the networked world today. And let's be honest, there's a reason we all choose to use an open source operating system that allows direct access to the kernel source code and its modules.

  Linux allows us to build robust firewalls, intrusion detection, and file system integrity checkers. The firewall I've installed at my own company is based on a Slackware 9.1 iptables implementation. The Linux world has provided us with forensic tools, vulnerability scanners, network analyzers, and more. I can now test my network, scan for Security issues, resolve those issues, and investigate potential compromises, all from the comfort of my shell prompt.

  Not only do these tools provide the ability to secure my organization at a fraction of the cost of the more commercially based tools, but they also let me see what they're doing. They have nothing to hide. In the end, I can know everything I want to know about my own Security.

  But let's step away from the Technical aspects of Security for just a moment. The Linux community has been great at addressing our Technical problems, but it's missing another piece of the puzzle that simply cannot be addressed by software: the organization itself. Organizations need to have the underlying policies, procedures, and culture associated with Security or else it becomes a simple matter of "user = bad password" or "screen = unlocked" and all of our network Security Measures have been compromised.

  Coming from a Technical background myself, this was the hardest nut for me to crack. Dealing with policies and procedures was always something that managers were supposed to do. I don't do policies. But it occurred to me in a moment of great enlightenment (OK, I'll admit it, it was actually over a Mountain Dew and a Soft Taco Supreme) that most managers can't understand the Security side like many Technical people can. So who's going to translate reality into potential policies for the managers? In the end, it falls to those Technical individuals willing to take up the banner of information Security and endure the pains of policy and management.

  The National Security Agency (NSA) developed a system, years ago, called the INFOSEC Assessment Methodology (IAM) that can be used to conduct assessments against the organizational side of each company. The system doesn't deal directly with the Technical side of Security assessments but instead strives to answer questions about organizational policy, procedure, and culture. The IAM is based on the very same procedures that NSA uses to assess the Security of military and federal sites all around the world.

  The IAM is used to determine the actual Security posture of an organization based on how it addresses Security within its policies and procedures. What's actually covered within the organizational Security policy? What's missing? Are any of these things actually enforced? How? What Security regulation is our organization required to adhere to?

  The IAM breaks down this analysis into three phases: the Pre-Assessment phase, the On-Site phase, and the Post-Assessment phase. The Pre-Assessment phase consists of activities that try to get the customer to sit down and decide what information is critical to the organization's business. The goal is to get the customer to start thinking in terms of confidentiality, integrity, and availability. We start by getting customers to ask themselves questions like "What is the impact to my organization if I lose integrity of these customer records?"

  In most cases, these decisions have to be made by upper management?level personnel who understand the ins and outs of the business process. But what the IAM delivers at the end of this phase is an easy-to-read matrix that lists the most critical information types along with the customer ratings for the impact each one would have on the organization if it were compromised.

  One of the most useful aspects of the IAM is that it also gets the customer to sit down and list the specific systems within their own networks that contain each of these critical pieces of information. So now we know which information is critical to the organization, what impact it would have on the organization if we had a compromise, and where that information exists. This provides a great starting point for Technical assessment activities because the customer has identified the most critical servers and network components.

  The On-Site phase is used to verify policies and regulations and to determine the actual level of adherence to these things. The activities include documentation review, interviews, system demonstrations, and review of network documents. The NSA IAM has worked with the National Institute of Standards and Technology (NIST) to generate a list of areas that are covered during these activities. These areas are broken into three areas: Management, Technical, and Operational.

  Management:

  INFOSEC documentation

  INFOSEC roles and responsibilities

  Contingency planning

  Configuration management Technical:

  Identification and authentication

  Account management

  Session controls

  Auditing

  Malicious code protection

  Maintenance

  System assurance

  Networking and connectivity

  Communications Security Operational:

  Media controls

  Labeling

  Physical environment

  Personnel Security

  Education training and awareness As you can see from the list above, the IAM allows for a complete organizational assessment while still allowing for the flexibility of customization for each independent organization.

  Finally, the Post-Assessment phase is generally used for creating recommendations for areas that are not being addressed appropriately and could lead to an impact on the business. With the appropriate management buy-in at this point, the final report that is produced in the Post-Assessment phase can be used as a roadmap for the organization to an increased Security posture. The management buy-in is especially vital when we consider the significant cultural and policy change that should occur in response to an assessment process of this magnitude.

  I think we all agree that great technology is a wonderful thing, but if we stop and really analyze the entire situation, we find that we need both sides of the puzzle if we're to have the best Security possible for our organization. Using a methodology like the IAM can help your organization take the next steps toward a comprehensive information Security program and augment your Technical Measures. For more information on the NSA IAM, please visit www.iatrp.com or Securityhorizon.com/index.html" target=new />www.Securityhorizon.com.

<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
<script type="text/javascript"> </script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值