Summer 200811 IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Assignment 4 Instructor: Dr E. Crowley Student: Victor Wong Date: 23 September, 2004.
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Software Quality Assurance Plan
Control and Accounting Information Systems
DoD Information Assurance Certification and Accreditation Process (DIACAP) August 2011.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
MSIA Introduction to Information Systems Security Training and Policy Week 1 Live Session Presentation.
Security Controls – What Works
Information Security Policies and Standards
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Laboratory Personnel Dr/Ehsan Moahmen Rizk.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Information Systems Security Officer
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Network security policy: best practices
1 Susan Weigert, Project Officer GSEGs Overview of GSEG Management.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Unit Introduction and Overview
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
LANDWARNET 2011AMERICA’S ARMY: THE STRENGTH OF THE NATION UNCLASSIFIED.
Information Systems Security Computer System Life Cycle Security.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Incident Management PCCYFS June 27, 2007 Incident Management for the Office of Children, Youth and Families.
© Mahindra Satyam 2009 Configuration Management QMS Training.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
September Interface Kickoff Sunflower Project Statewide Management and Reporting Tool Update September 02, 2009.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Indian Health Service Grants Management Grants 101- Fundamentals.
State of Georgia Release Management Training
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Responsibilities of Test Facility Management, Study Director, Principal Investigator and Study Personnel G. Jacobs Belgian GLP Monitorate Zagreb, 17 December.
1 Auditing Your Fusion Center Privacy Policy. 22 Recommendations to the program resulting in improvements Updates to privacy documentation Informal discussions.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Software Configuration Management
IT Development Initiative: Status and Next Steps
County HIPAA Review All Rights Reserved 2002.
PLANNING A SECURE BASELINE INSTALLATION
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Performance based planning and programming
Presentation transcript:

Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum standards for administrators of national security systems

Summer IAVA2 Committee on National Security Systems IA functions of an SA are: 1.work closely with the ISSO to ensure IS or network is used securely 2.participate in the IS Security incident reporting program 3.assist the ISSO in maintaining configuration control of systems and applications software 4.advise the ISSO of security anomalies or integrity loopholes 5.administer user identification or authentication mechanism of the IS or network.

Summer IAVA3 Differences at Three Levels of SA SA responsibility ENTRY LEVEL: describe and apply the appropriate actions to manage and administer an IS in a secure manner. INTERMEDIATE LEVEL: explain and implement the appropriate actions to manage and administer an IS. ADVANCED LEVEL: verify that the appropriate actions are implemented to manage and administer an IS In accordance with applicable IA regulations, policies, and guidelines.

Spring 2008Set 7 IAVA4 The Role of DISA in the IAVA PROCESS Version June 2002 Information Assurance Vulnerability Alert

Summer IAVA5 1. Introduction and Purpose The DOD is concerned with threats that must be protected through risk management. The ASD/C3I tasked: 1.Establish control of the Department's vulnerability alert system. 2.Provide CINCs, Services, and Agencies (C/S/A) access to vulnerability notifications that require action. 3.Require acknowledgement of action messages. 4.Require compliance and report status to DISA. 5.Track compliance and report to OSD. 6.Conduct random compliance checks.

Summer IAVA6 DISA and IAVA Process Handbook Two distinct responsibilities: 1.Act as agent managing vulnerability notices 2.Produce vulnerability notices and report statistics on the IAVA Web site Works for the National Communications System as part of DISA’s vulnerability management and is incorporated into configuration management. Intended to control down to the system asset level: the numbers of systems on which a vulnerability exists, when compliance has been achieved, when an extension has been requested, and when an extension has been granted.

Summer IAVA7 Purpose Two tools: 1.IAVA system, a database tracking compliance statistics, and 2.Vulnerability Compliance Tracking System database system to track the status of vulnerabilities at the asset level. [Its statistics are rolled up to the IAVA system for a compliance view within the agency.]

Summer IAVA8 2. The IAVA Process Vulnerabilities identified by or reported to DISA. The DOD-CERT analyses the vulnerability to determine its impact, severity, and ways of correcting or mitigating risk. If there is a need for action, it will inform the C/S/A by issuing either: 1) an IAVA – requires acknowledgement and compliance, 2) an Information Assurance Vulnerability Bulletin (IAVB) – requires acknowledgment, or 3) a Technical Advisory (TA) - notification only.

Summer IAVA9 CINC/Service/Agency Action Download the alert via the NIPRNET or SIPRNET Webpage Fix or comply and send status (complied or not). If not request an extension stating –assessment of risk (e.g.; vulnerability of environment to the exploit) – How system will be monitored for exploitation (e.g.; use of mitigating controls) – A Fix Action Plan with completion date Conduct random compliance checks

Summer IAVA10 VCTS Systems One for unclassified (Sensitive) and one for classified (no higher than secret) assets. All DISA IT assets susceptible to vulnerabilities are registered in the VCTS All IT susceptible to vulnerabilities must be registered Individual workstations will not be registered  the server will be registered and the field will show the number of workstations it supports. Individual machines not managed by a server environment must be registered to ensure proper tracking of alerts.

Summer IAVA11 Assets are: Laptop computers, network printers, facsimiles, and all PEDs need not be registered in the VCTS. However, DISA activities are encouraged to register the OSs. Each activity will then monitor the assets for vulnerabilities associated with these OS. Iin four categories: organizational, program level, mainframe and laboratory.

Summer IAVA12 Mainframe Assets Mainframe systems run services such as TCP/IP and the UNIX kernel; they must be registered in VCTS. Each logical domain/image must be registered. The system ID field should be populated with an IP address. Because a mainframe system typically has a staff of systems programmers responsible for the software configuration, registration of mainframe assets will be managed by the ISSO.

Summer IAVA13 Compliance Status (1) Open: new asset impacted by an alert but, no protective actions have been put in place. Most alerts allow 30 days for compliance. If asset becomes operational and registered 30 days after the release of the alert, “open” status not allowed. Not Applicable: the SA, ISSO, ISSM or PM determined a recently released alert does not apply to a registered asset. User must justify this; may be reviewed in compliance validation. Fixed/In Compliance: SA or ISSO has determined the asset is in compliance. Extension Requested: extension submitted and being reviewed. Two types: 1.The DAA accepts the risk associated with nonstandard corrective action. 2.The extension used to request additional time for corrective action.

Summer IAVA14 Compliance Status (2) Extension Approved: request approved for a specified timeframe. Management must address the problem and ensure controls are in place. Extension Denied: the Approval Authority evaluated and denied request. SA/ISSO is responsible for immediately implementing corrective actions. Extension Expired: an approved extension has expired and corrective actions must be implemented or another extension request must be submitted.

Summer IAVA15 ISSM in the VCTS Process An ISSM must: 1.Validate user accounts and remove those not required. Contact the primary SA for removal of permissions. Request user account be inactivated 2.Validate current asset information in the databases. Determine if the asset description information accurate and current. Contact primary SA for action. SA correct asset information 3.Ensure all ISSOs familiar with the registration process. 4.Ensure each asset has at least two users with update permission. 5.Validate extension requests for assets when needed.

Summer IAVA16 XOs in the VCTS Process Executive Officers (XOs) ensure that vulnerabilities are being managed by ISSMs. Must ensure that information recorded within VCTS accurate for their organization. Generally not given authority to update systems but does have browse authority to monitor progress in complying with vulnerability notices. An XO does not have to be given “browse” authority by the SA or ISSM for an asset.

Summer IAVA17 Vulnerability Notice Compliance The Vulnerability Notice Compliance Validation Process requires a Process for each C/S/A. DISA’s IAVA CV Process under development will provide weekly notices to each organization’s ISSM and Deputy Director to review and validate all vulnerability notice entries in the VCTS. Each organization responsible to ensure that all data in VCTS is accurate and current.