Where networking and knowledge intersect.
David Ramirez, CISA, CISM, BS 7799 LA, CISSP, MCSE, QSA
Maintaining an adequate security level for operating systems and databases is one of the most challenging tasks for security professionals; additionally, in-depth compliance reviews are difficult due to the manual nature and skills limitations. This article presents a simplified approach to IT security management that allows IT auditors and information security professionals to discharge their responsibilities more efficiently.
Before the appearance of current, enterprise-level information security standards and supporting documents (e.g., ISO/IEC 27001, ISO/IEC 27002, ITIL, PCI DSS), there was an absence of common models for defining security within enterprise environments. Many individuals used standards defined by the US military (Rainbow Series of books1) as a guide to help them define their internal security models. These models were not a perfect fit for civilian environments and in most cases required more resources than there were available to the normal corporation in the late 1980s and early 1990s. However, many professionals used the concepts and ethos of the Rainbow Series of books to shape their own interpretation of what a control environment should look like.
For the latter part of the 1990s and all of the most recent decade, control environments were defined based on the best practices from commercial vendors or international standards that have started to appear that are aimed at closing existing gaps in the available body of knowledge.
One of the effects of the significant increase in the use of technology to support business processes and also the availability of information security standards is that all actors involved in the process of controlling assets are overwhelmed with data and are unable to have complete visibility over the issues affecting the environment. The effect to some of the actors is presented in figure 1.
There are a number of technology solutions available; in most cases, entities have deployed individual systems and applications and are trying to consolidate the information. Recently, there has been an increase in the number of entities deploying correlation engines, vulnerability scanners and intrusion detection systems to gain some visibility over the configuration and vulnerabilities present within the system. Internal audit departments are starting to use scanning software, as well, to validate the control statements received from management—in some cases, using the same tools as the information security department.
In recent years, the US government created a second wave in terms of addressing information security, the aim being to have an end-to-end platform that will allow automatic configuration, verification and auditing of computer systems. This model is based on commercial-off-the-shelf (COTS) components, as opposed to proprietary or classified technologies.
The Information Security Automation Program (ISAP) is aimed at enabling the automation and standardization of technical security operations. ISAP integrates a number of individual projects, all designed to be compatible and to focus on individual areas required for the overall coverage. Some of the individual projects are stand-alone solutions, e.g., CVE® (Common Vulnerability and Exposures).
ISAP technical specifications are contained in the related Security Content Automation Protocol (SCAP) (see figure 2). SCAP is the model for using specific standards to enable automated vulnerability management, measurement and policy compliance evaluation.
SCAP includes the following components:
Due to the fact that SCAP is a US federal model, many vendors have developed plug-ins to their products that make them SCAP-compatible. This is the only common language in the industry, which is important if organizations are planning to purchase new testing or reporting applications.
As of August 2010, there were 39 SCAP-accredited products available.2 This shows the level of adoption that the model is having and facilitates the decision-making process as organizations may already have the tools without knowing the additional options that are available, such as:
In many organizations, security compliance is measured using a combination of manual tests and scan outputs; the scans are not always configured to reflect the security policies defined within the organization and this causes reports to be confusing and full of false-positives or significant gaps. Large organizations are also affected by the need to collate results from different tools and this increases the complexity of getting the full view of the compliance status.
Commercial tools allow organizations to translate their security policy (more specifically, the operating system configuration parameters) into XML files using XCCDF and OVAL, and then to use the tool to validate and report the level of compliance against the policy. This means that the policy can be checked using different tools and against different operating systems, and, more important, the results from different tools can be collated as they can be translated into common terms by using the CVE, CVSS and CPE.
Leaving aside the technical specifications of SCAP, information security and audit professionals can expect this technology to be a mechanism that will help them deal with the complexities and size related to technology control environments. Information can be prepared for executive management by consolidating the data extracted from SCAP components and showing heat maps that can be explored for noncompliance areas; this will simplify the message and allow for better oversight of the control environment.
IT auditors planning to undertake an infrastructure audit can see their workload reduced significantly as some test samples can be extended to 100 percent of the population and verification can be automated. The flexibility of OVAL allows for the creation of configuration checks for applications; this will likely start with common applications and can evolve into proprietary systems as well.
Similarly, information security professionals looking to prove compliance against international standards can see their work reduced significantly, as shown by implementation examples provided by NIST.3 In the particular case of ISO/IEC 27001, it is possible to see a high number of controls deployed using SCAP-compatible systems and vendor scripts (configuration scripts for operating systems). In particular, the following control objectives from annex A of ISO/IEC 27001 can be tested using SCAP:
1 Rainbow Series, US Department of Defense Computer Security Center, http://www.fas.org/irp/nsa/rainbow.htm2 National Institute of Standards and Technology, National Vulnerability Database, http://nvd.nist.gov/scapproducts.cfm3 Brown, Mason; “Automating the Most Critical Security Controls,” http://scap.nist.gov/events/2009/itsac/presentations/day2/Day2_DoD_Brown.pdf
David Ramirez, CISA, CISM, CISSP, BS 7799 LA, MCSE, QSAis an IT audit director for Barclays Internal Audit. He has more than 15 years’ experience. Ramirez has published a number of articles and white papers, and his book on IPTV security was published by Wiley in January 2008.
Enjoying this article? To read the most current ISACA® Journal articles, become a member or subscribe to the Journal.
The ISACA Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the ISACA Journal.
Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors’ content.
© 2010 ISACA. All rights reserved.
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, MA 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.