Sunteți pe pagina 1din 8

Part 3

Custom
Customsupplement
supplement
to to
Federal
Federal
Computer
Computer
Week
Week

GOVERNMENT
INFRASTRUCTURE
SECURITY M ANAGEMENT

Security Starts With You, page s2 • Endpoint Security Management Software, page s5
8 Keys to Securing Your Mobile Workforce, page s6 • The Security Roadmap, page s8
Custom supplement to Federal Computer Week

Security Starts With You


Security is one of the only endeavors where success is measured by nothing happening.
And that nothing starts with you.

For those professionals in charge of government security mean finding 10 attributes that can be shared across the
management, being proactive is a way of life. community and they become the universal core of focus.

As managers, they lead their organization’s efforts on a You might get advice to not focus on the ID
variety of fronts. It starts with authenticating staff and management piece, but focus on the business of
contractor identities so they can access agency sites, establishing identity and then working the standards
systems and networks. which in turn causes your agency to deal with the ID
management piece.
At the same time, these managers must make sure data
is secure both in motion and at rest; so there is a need The key to making that work is to separate the idea of
for more physical and cyber authentication, encryption identity and personas. Use the attributes to establish a
standards and procedures. This translates into security universal core and then make rules about how to
policies and governance procedures that must work with handle attributes.
an increasingly mobile workforce.
There is evolution happening moving
Further, in this world where information sharing is
becoming the norm rather than the exception in from protecting networks first to
government, the need for authentication and security
between machine-to-machine communications is protecting the data first.
paramount.
At conference after conference, government security
And, of course, these security managers must protect leaders have talked about how our governance model
your network. creates tension between access and security. And that
we do not have tools and technologies where security
The Goal Is Better IT Security is seamless.
Now, as the transition to new leadership grows closer,
there is more and more focus on who now is going to That is where identity management has to be the
provide the strong executive leadership and vision that foundation. You need to know who is on your network
supports CIOs and CSOs on IT security issues. with strong authentication processes. If you have that,
then you can get into network access by attribute and
The government is finally responding to the cyber threat other network access control activities. The CAC card is
with a major infusion in funding for cyber security efforts. progress; it is a foundational element but governance and
Cyber security is now a major initiative in intelligence ID management are the keys.
with DHS taking the lead.
TIC and CAC
And if you were able to talk with security pros off-the- You would certainly hear talk of the TIC (Trusted
record during a “Networking Reception”, here is a sample Internet Connection) implementation: OMB has mandated
of what you might hear them talking about. the need to quickly reduce the amount of agency internet
connections. Plans for reduction are in progress.
You might hear them talking about needing a better
understanding of what Identity Management really means. You would hear about the need for stronger governance
After all, sound security starts with sound identity when it comes to security issues. You can have all the
management practices. HSPDs and NIST standards you want, but it still comes
down to implementation.
You might hear an idea such as that ID management could continued on page s4

s2
Custom supplement to Federal Computer Week

Security Starts with You, continued from page s2

They would also talk about training and the need for
more and better education on how to use the CAC cards Manage the risk
and finding ways to make security seamless across all
agencies. They would talk about having a better Security risk is the likelihood that something bad will happen that
infrastructure that builds in a more secure physical and
causes harm to an informational asset (or the loss of the asset).
logical access solution.
A manager’s role in managing risk depends on his or her
They would be talking about recent OMB FISMA
guidelines and NIST C&A guidance and talk about how organizational responsibility. IT infrastructure managers have a
government is doing a better job on C&A and identifying different role than finance managers. But, both need to engage in
risks, while FISMA scores are also better in some cases. some level of organizational risk management assessment of one
You might also hear them say industry is doing a better or more of the following:
job of taking government requirements in house and
“working the issues”. • Security policy
• Organization of information security
Protect The Data First
But you would also hear them talk about barriers that • Asset management, human resources security
still exist because some in senior management do not view • Physical and environmental security
cyber security as a national security threat, despite the • Communications and operations management
hacking and the increased investment in cyber security. • Access control
• Information systems acquisition
You would hear them talk about the need for even
• Development and maintenance
better encryption for laptops. Theft of laptops and
unauthorized remote access are two mobile workforce • Information security incident management
issues that must be dealt with. Encryption is a big issue • Business continuity management
especially with telework. Privacy is also big along with • Regulatory compliance
web application security.
Managers should identify the value of the IT and information
There also might be talk of how effective HSPD-12 assets that might be impacted. Then a threat and vulnerability
really is. And what they are really supposed to do? Is there
analysis should be conducted to identify the potential effect of
a plan? Many look to GSA. It could be years before using
an occurrence and the probability of that occurrence. This type
the card for physical and logical access control and to
leverage the benefits of using the card. of analysis should rely on both quantitative and qualitative
measures. Finally, risk mitigation controls should be identified
Finally, you might hear them talk about the ever present and implemented in proportion to the cost and potential severity
need for more funding for specific security issues and needs. of the risk.

The fact is: there is an evolution happening from Managers can accept, mitigate, transfer, or, some cases, deny
protecting networks first to protecting the data first. The
the risk. These decisions should be made in concert with a multi-
new administration needs to focus all the security on the
data. People need to get serious; and make sure data is not disciplinary team that includes finance, IT and security specialists.
compromised if a machine disappears.
Security risk management is not a one-time process. On-going
Some would say that we need to radically adjust our review of identified risks and periodic assessment of potential new
thinking because within the next 5 years data will become risks are essential for continued security risk management.
the center of gravity for operations and networks won’t
be that important. The new concept could be the data
center is not a data warehouse, but the center of
computing. It is in the data center that the transactions And proactively securing that data will be the security
of government will be taking place. manager’s Number One priority then as it is now. ❑

s4
Custom supplement to Federal Computer Week

What Your Endpoint Security


Management Software Should Do
There is a strong case for investing in as much automation as possible to manage and
perform everything related to endpoint data protection.

There are lots of security related tasks. There are not a


lot of people to do those tasks. Security managers are taking a proactive
That’s a strong case for investing in as much automation
approach and developing a clear,
as possible to manage and perform everything related to in-depth policy regarding the use of
endpoint data protection.
devices within the enterprise.
Many of these security requirements can be met using
COTS solutions designed to mitigate evolving threats and laptops, servers and portable mass media endpoints.
enable compliance. COTS solutions also are available for
mandated encryption of sensitive and classified data. So, They are shifting their enterprise endpoint security
what are some other areas you should look for automated efforts to address today’s realities by taking a proactive
help in addition to securing your endpoints? Look no approach and developing a clear, in-depth policy regarding
farther than: the use of devices within the enterprise.

• Secure Digital Communication – protecting mission- And they are deploying proactive software solutions to
critical data sent over high-speed WANs as well as support these policies and help gain a decisive advantage by
remote access VPNs. taking an offensive approach to protecting their enterprise
• Secure Login & Authentication - providing authorized endpoints, no matter how frequently they evolve.
users with secure access to sensitive information, appli-
cations and facilities while keeping the bad guys out. Blacklist or Whitelist?
• Application Security Solutions – providing the security Take all the known threats and create your blacklist.
foundation for mission-critical applications. This That’s what firewall, anti-virus software and intrusion
includes using PDF software that allows for electronic detection systems do. And they require constant updating.
delivery options that include certified documents, You can do the same with device use. But every day a new
multistep digital signatures and rights management. device comes on the market. Keeping an up-to-date
blacklist is tough. Some might say impossible.
The Evolving Endpoint
Defending the network perimeter – the endpoint – has You could do the opposite. Create a whitelist.
always been at the core of an organization’s security
strategy. Today the endpoint is no longer the desktop or Your whitelist is a pre-defined list of devices or
even the laptop. For today’s mobile workforce, portable applications that are allowed to run on enterprise hardware
mass media (e.g. flash drives, cell phones, Blackberrys, while blocking everything else by default. This concept
memory sticks and PDAs) represents the next generation shelters administrators from the laborious task of
of endpoints; and new opportunities for data loss, maintaining blacklists of all known devices.
introduction of malware and data theft.
According to security provider Lumension, “while
So, while fortifying the outer barriers of the network blacklisting only accounts for devices that a company
remains a vital component to overall enterprise security knows it wants to deny, the whitelist approach prevents
efforts, it is no longer an effective last line of defense. even unknown devices from harming the network. With
Security managers are equipping themselves with a blacklist-based solution, any device that is not
solutions designed to protect against attacks on PCs, continued on page s7

s5
Custom supplement to Federal Computer Week

8 Keys To Securing Your


Mobile Workforce
You’ve got a mobile workforce and they are going to carry data with them. Here are 8
things you can do to get them to them work securely.

1. Embrace The Technologies, They Are Here To Stay 3. Encrypt, Encrypt, Encrypt
There are the smart phones, the PDAs and the If information must be encrypted at all times in a
Blackberry and iPhone. They have become steady state, this can be done with nearly all forms of
indispensable. At the same time, removable storage removable media. Some encryption mechanisms can tie
media is at the center of a variety of new ways we can individual users directly to the data and/or to the media
share and use information from the small cards used in itself, preventing anyone else from using it. When this
PDAs and cameras to the thumb drives used to move type of device management is paired with application
files between PCs and personal entertainment devices, control, you’re not only securing the device itself, but
such as iPods, which may have as much as 160 Gigabytes you’re also preventing those devices from launching
of storage capacity. And most personal media devices dangerous executables, which may endanger your data.
can be connected to a PC via USB connections. They are
going to be used to access agency resources. New devices Encryption can be used in conjunction with enforement.
will be continually introduced. So who is going to have If you can track who had confidential data, how they
access? Are you going to blacklist or whitelist devices? used it, and were assured that they could not share it
outside of the enterprise, then that fulfills the need for a
2. Establish Realistic, Workable Governance Policies comprehensive audit trail that may be required.
Make a case for case for workable device and
application control polices which establish what 4. Employ Two Factor Authentication
devices and applications can be used, by whom, when, Usually, two-factor authentication involves “something
and how. Flexibility is needed to embrace personal you have,” such as a CAC, and “something you
devices that have become the way a user personalizes know,” such as a PIN or password. Most two-factor
the way they work and share data. authentication authenti-cates users of remote access
solutions such as VPNs, Citrix applications, Webmail,
Management buy-in is essential to succeed. Communicate Outlook Web Access and other Web applications, plus
with stakeholders. Windows and Unix log-ins, for compre-hensive identity
and access management.
At the same time, establish a new security policy, or
modify an existing one, to encompass any new 5. Educate Staff
authentication system. It should include policies related Educate staff on the new security technologies and
to remote access by all parties: employees, contractors, processes. Keep in mind that remote users are likely
business partners, and customers. It should also cover to need more extensive training than employees who
user privileges; encryp-tion; password and privacy work in your office facility. Make sure everyone
guidelines; and e-mail and instant messaging practices. understands that remote workers face greater risks from
security threats.
There is far more likelihood for minimal impact on end
users and infrastructure alike. Once policies are developed, 6. Maintain Your Identity and Access Management
tuned and communicated, they must be enforceable. (IAM) System
Keep track of vulnerability assessments, backup
If you don’t already have an enforcement plan for your requirements, and comprehensive incident response,
security policy, develop one. Enforcement practices should disaster recovery and COOP plans.
detail what happens when individuals fail to comply with
company policies.

s6
Custom supplement to Federal Computer Week

7. Choose A Good Authentication Solution 8. Taking it a step further with digital signatures
Things to look for are: ease of installation and use; low Digital signatures are much more difficult to imitate or
TCO; scalability; web-based self-enrollment capability; forge because the technology authenticates the identity of
the ability to manage user information with existing the sender or signer of an electronic document. Digital
Microsoft tools; no additional software needed on the signatures also add assurances that the content of an elec-
client’s workstation; minimal impact on end users; and the tronically delivered message or document hasn’t been
system should not require altering user behavior in order altered since its creation. ❑
to achieve a successful log-on.
Sources: Lumension, Adobe, Ziff-Davis

Management Software Should Do, continued from page s5


specifically listed as a threat will be able to connect to systems management, while providing necessary
the network, allowing users to pilfer data or inject flexibility to the organization.
malware into the systems.”

What the whitelist approach does is place control of As a result the software prevents data leakage via
policy squarely in the hands of the IT administration removable media, malware or spyware; protects against
staff. Only devices that are authorized as having a viable malware, viruses and spyware; safeguards against zero-day
business use will work on endpoints. threats; controls proliferation of unwanted applications
and devices; assures and proves compliance with regula-
Software Solution tions governing privacy and accountability; and maxi-
Two things your software should do are: mizes benefits of new technologies and minimizes risk.

1. Provide policy-based application and device control The software should also be used to encrypt removable
that proactively secures your organization from data media so that it can be safely used and transported without
threats, including data leakage, malware and spyware. the fear of exposing your confidential data to unautho-
2. Enable only authorized applications to run and only rized users. ❑
authorized devices (portable mass media) to connect Sources: Lumension, Adobe
to a network, laptop or PC – facilitating security and

s7
Custom supplement to Federal Computer Week

The Security Roadmap


Should you get a certification? An advanced degree? What about specific training?
There are a wide range of options for security professionals.

As a manager, if you surveyed the trends in security It’s Academic


related academic degrees for those in government and the More and more colleges and universities are developing
private sector, you would notice three trends: curriculum so that managers can attain an academic
degree (Master’s, Ph.D.). To attain the degree involves the
1. There are a lot of focused courses specifically targeting usual minimum of 2-4 years of college courses, taken with
Information Assurance and Homeland Security topics. a wide-range of general education credits that result in:
2. Many educational institutions are offering advanced Academic Certificates 18 credit hours; 2-4 year degrees
degrees with specific concentration in these areas. with concentration in Information Assurance; and
3. Many courses are available that teach to certification Advanced Degrees (Master’s, PhD. and Doctorate).
and software requirements such as A+, Network+,
SSCP, CISSP, GSLC, CISM, Security+, GISF, GSEC,
SCNP, SSCP SCNA, CISA and GSE. Security management is focused on providing
a roadmap for professional advancement and
In government that translates into DoD mandating
vendor neutral baseline IT security certifications; the State making sure security pros have a common
Department mandating vendor neutral entry level certifica-
tions; providing incentives for, but not mandating, other
body of knowledge.
certifications; OPM surveying the federal government to
identify certifications being used; and DHS developing its These courses are gaining popularity especially those
IT Security Essential Body of Knowledge to make sure with focus on Homeland Security as candidates must
everyone in the 22 components is on the same page. demonstrate skills such as human interaction skills,
research, problem solving and critical thinking skills.
A large part of security management is providing a
roadmap for professional advancement and making sure Specific Training
security professionals have a common body of knowledge. The goal of training is to teach knowledge and skills
In today’s security landscape, education can be divided that allow a person to perform a specific function. Form is
into three areas. usually topic based or role based. Different developers use
different delivery methods and can tailor existing courses
Certifications Test Professionals to meet specific needs.
What certifications (e.g. CISSP) do is to provide
established criteria and a benchmark from which to test The advantage of targeted training is that it allows
professionals. That means having a baseline of tested agencies to keep current on new areas of needed
knowledge/skills (validated minimal level of knowledge knowledge and skills. There is more emphasis on this area
in the functions required for a specific job). than the others when updating or maintaining skills and
knowledge that are job-related. Trends in training are
These can be used to build organizational-specific being driven by the tendency to use as a metric the
training, which can be used to leverage independent 3rd number of people provided training and the cost associated
party review of processes and procedures and maintain with that training and not performance improvement.
current content.
A Symbiotic Relationship
Certifications can also establish baselines that can be Management and employees inevitably view the world
met across domains, e.g. DOD, NIST and private sector. through different lenses. Each has expectations of the
Certifications also provide a good tool for attracting and other. When it comes to security and education, these
retaining the best talent. They create a pool of knowledge differences in expectations are what make the relationship
that boosts an organizations overall security posture. work for all.

s8
For management, certification means an employee who distribute and support information security solutions;
has been “vetted” by a third party as to proof of ability, and leverage existing workforce resources and attract and
thus reducing hiring risk. An academic degree means retain supplemental workforce resources.
the employee has demonstrated an ability to learn and
persevere – a foundation for all training. They also will Recently the ISS task force made these recommendations:
probably have a good knowledge of new technologies and establish common solutions in 4 key areas; close security
have a “bigger picture” view. gaps by establishing Shared Service Center (SSC) model
to drive better performance, increase expertise through
For management, training such as the VA’s role-based specialization and reduce cost by providing common
training program is an expense/investment that has immedi- products and services.
ate payback and is tailored to the unique needs of VA.
The task force also recommended leveraging a
For the individual, certification removes an entry barrier governance structure, use a phased implementation
and provides a license to operate. This license should approach and the update of NIST SP 800-16 “Information
translate into increased pay and networking opportunities Security Training Requirements: A Role- and
with others holding similar certifications. Performance-Based Model”.

For the individual, an advanced degree is the foundation Learn more about IT certification and training at
of a career which can greatly advance their domain www.fissea.org and www.nist.gov. ❑
knowledge and job track potential. Source: Federal Information Systems Security Educator’s Association (FISSEA)

For the individual, role-based training teaches them how


to do current job and can be used as a stepping stone for
advancement.

ISS LOB
A backdrop to all of this is OMB’s Information Security
Systems LOB, which was chartered to support the
President’s Management Agenda for expanded E-Gov. Its
value proposition is to improve the level of IS Security
across government; eliminate duplication of effort;
increase aggregate expertise; and reallocate resources for
missions. It initially identified common IS Security needs
across all branches of government.

Driving the ISS LOB are closing security training gaps;


defining Federal-wide standards for ISS skills; the lack of
common ISS career path; the lack of common criterion for
credentialing ISS professionals; and the duplication of
effort as agencies individually develop and procure baseline
content and sustaining distinct infrastructure to support ISS.

What this is supposed to do is support performance of


the government’s mission through improved information
systems security; establish a mechanism to acquire,

s9

S-ar putea să vă placă și