Wednesday, May 27, 2009

Security Metrics

http://www.securitymetrics.org

"Security Metrics - Replacing Fear, Uncertainty, and Doubt" by Andrew Jaquith - Addison-Wesley.

http://www.youtube.com/watch?v=dFsbqGJ3qEY - Security Metrics: A Beginner's Guide 

Wednesday, May 6, 2009

Vulnerability Scanners

Nessus
GFI LanGuard
Qualys
Rapid 7 NeXpose
Catbird (service)
Acunetix Web Vulnerability Scanner (detects SQL Injection, XSS, etc.)
Secunia CSI (Corporate Software Inspector - informs about missing patches for thousands of third party programs on Windows platform)
Retina
Microsoft Baseline Security Analyzer
CoreImpact
ISS Internet Scanner
Saint
McAfee - Foundstone
nCircle - IP360
Saint Corp – Saint
Critical Watch - Fusion VM
NeXpose
System Scanner-Assuria

http://www.netiq.com/products/vsm/default.asp
http://www.scmagazineus.com/Best-policy-management-solution/article/130876/
http://www.outpost24.com

Tuesday, April 28, 2009

Governance Risk and Compliance Tools

http://www.moduloriskmanager.com/home.jsp
http://www.ca.com/au/products/subcategory.aspx?id=8019
http://www.sai-global.com/compliance/default.htm
http://www.brighttalk.com/channels/1044/view - Global Compliance Channel

Wednesday, March 18, 2009

Wednesday, March 4, 2009

Key Management

This is a thread from a LinkedIn discussion (Information Security Community)

What are the important aspects of an encryption key management policy?

Please feel free to post any thoughts on what you believe should be included in an encryption key management policy. Thanks in advance.

- What are the elements of a good backup policy? Is keeping keys in escrow enough? Or is a more immediately available backup needed as well?

- What kind of physical and logical access controls (or other measures) should be implemented around the keys to prevent unauthorized access, modification, duplication, or destruction of the keys?

- What are the elements of a good process for destroying keys that are old or may have been compromised? Should keys be periodically updated and replaced to further mitigate the threat of unauthorized duplicates?

- What are the best software solutions in the marketplace for managing encryption keys? What aspects of a software solution are most important?

- Who should be the ultimate approver for access to the keys? Particularly if the software owner and database owner are not the same person/group; which group should own the keys, related processes, and approval role?

The Responses:


You should definitely check out NIST Key Management Guideline:
http://www.linkedin.com/redirect?url=http%3A%2F%2Fcsrc%2Enist%2Egov%2Fgroups%2FST%2Ftoolkit%2Fkey_management%2Ehtml&urlhash=J9SW&_t=tracking_disc

Especially SP 800-57 Part 2, Recommendation for Key Management - Part 2: Best Practices for Key Management Organizations:
http://www.linkedin.com/redirect?url=http%3A%2F%2Fcsrc%2Enist%2Egov%2Fgroups%2FST%2Ftoolkit%2Fdocuments%2FSP800-57Part2April2005%2Epdf&urlhash=7bVc&_t=tracking_disc

And SP 800-57, Part 3 DRAFT Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance:
http://www.linkedin.com/redirect?url=http%3A%2F%2Fcsrc%2Enist%2Egov%2Fpublications%2Fdrafts%2F800-57-part3%2FDraft_SP800-57-Part3_Recommendationforkeymanagement%2Epdf&urlhash=vRs3&_t=tracking_disc

With regards to your questions: Detailed specification of controls really depend on the risk posture. I.e. it's very different for personal finance data and for nuclear arms control. Besides it's unrealistic to expect same techniques to work universally in different applications/platforms.

As for the user interface aspect of key management PGP is the gold standard:
http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Epgp%2Ecom%2Fproducts&urlhash=dceX&_t=tracking_disc

Tuesday, March 3, 2009

Business Continuity

  • http://training.fema.gov/emiweb/IS/is139lst.asp
  • http://www.cpaccarolinas.org/Symposium07/07Presentations/PresentationWS2-Zino_ExerciseBrief.pdf
  • http://www.bcphelp.com/docs/Courses.doc
  • http://www.ccep.ca/index.shtml
  • Exercise Evaluation and Improvement Planning - https://hseep.dhs.gov/support/VolumeIII.pdf
  • Exercise Design (Independent Study Guide) - www.ncsu.edu/ehs/BCP/planning_templates/design_evaluation.php
  • FEMA Exercise Evaluation Course - http://training.fema.gov/EMIWeb/STCourses/