Muutke küpsiste eelistusi

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP [Pehme köide]

  • Formaat: Paperback / softback, 288 pages, kõrgus x laius x paksus: 231x188x15 mm, kaal: 501 g, 75 Illustrations
  • Ilmumisaeg: 16-Sep-2012
  • Kirjastus: Osborne/McGraw-Hill
  • ISBN-10: 0071772510
  • ISBN-13: 9780071772518
Teised raamatud teemal:
  • Formaat: Paperback / softback, 288 pages, kõrgus x laius x paksus: 231x188x15 mm, kaal: 501 g, 75 Illustrations
  • Ilmumisaeg: 16-Sep-2012
  • Kirjastus: Osborne/McGraw-Hill
  • ISBN-10: 0071772510
  • ISBN-13: 9780071772518
Teised raamatud teemal:
Presents technical, administrative, and operational strategies for network security, covering such topics as patches and updates, customized auditing content, and evaluating compliance.

The definitive guide to information security automation technologies

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP provides IT security managers in both government agencies and private organizations with full details on the capabilities of SCAP (Security Content Automation Protocol) technologies. SCAP reduces dozens of individual security-related tasks (checking that patches are up to date) to simple, streamlined, and automated tasks that produce standardized results. It aids in the integration and ease of use of multiple, non-interoperable products and platforms.

This book is written by a team of subject matter experts from G2, a leading computer security company working closely with the SCAP standards agency (NIST), government clients, including the Department of Defense, NSA, Drug Enforcement Administration, and FDA, and private clients such as American Express, Monster.com, and Black & Decker. The book delivers a complete and accessible overview of SCAP, including enumerations of common platforms, vulnerabilities, and configurations. SCAP's open-standard, SML-based language is discussed, along with the Open Vulnerability and Assessment Language (OVAL), and how it communicates.

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP

  • Features thorough, accessible explanations for security professionals of all levels about what SCAP is and what it can do to automate and streamline network security practices
  • Helps you immediately take advantage of SCAP support in existing products, and includes tips for purchasing new security products and services that can interoperate with existing enterprise systems
  • Includes case studies of SCAP streamlining in practice
  • Supplemented by an author website with up-to-date resources and announcements on the latest developments in the field
  • Provides a solid foundation for studying particular SCAP components in more detail and customizing/programming SCAP content and tools

Coverage includes:
What Is SCAP; SCAP Languages; SCAP Enumerations; SCAP Vulnerability Measurement; Putting the Pieces Together; Using SCAP In Your Enterprise; Emerging SCAP Technologies

Foreword xiii
Acknowledgments xv
Introduction xvii
PART I Security Automation Essentials
Chapter 1 The Security Management Problem
3(26)
Security Management Challenges
4(1)
The Number and Variety of Systems and Software to Secure
5(1)
The Need for Continuous Security Management
6(2)
The Need for a Comprehensive Picture of Enterprise Security
8(1)
The Need for Standardization in Security
9(1)
Security Requirements from Regulations and Other Sources
9(1)
The Security Automation Solution
10(4)
Security Automation Basics
14(2)
Knowledge About Individual Security Elements
16(2)
Using Checklists to Achieve Compliance
18(4)
The Evolution of Security Automation Technologies and Standards
22(1)
Enumeration Standards
23(1)
Language Standards
24(3)
Risk Measurement Standards
27(2)
Chapter 2 What Is SCAP?
29(26)
The History of SCAP
30(1)
The Parts of SCAP
31(1)
Component Specifications
32(2)
How the SCAP Component Specifications Fit Together
34(3)
The SCAP Protocol
37(3)
SCAP Content
40(2)
The Value of SCAP
42(1)
Inventorying Installed Software
43(1)
Identifying Security Issues
44(2)
Monitoring the Security State
46(1)
Security Measures and Metrics
47(1)
Quantifying Risk
48(2)
Fostering Common Terminology
50(5)
PART II Using SCAP
Chapter 3 SCAP Checklist and Check Languages
55(40)
Extensible Checklist Configuration Description Format
56(1)
Data Model and Syntax
57(1)
Benchmark
58(3)
Items
61(5)
Profile
66(1)
TestResult
67(2)
Open Vulnerability and Assessment Language
69(1)
Data Model
70(1)
Generator
71(1)
Definition
71(3)
Test
74(2)
Object
76(1)
State
77(1)
Variables
78(2)
OVAL Results
80(1)
Open Checklist Interactive Language
80(1)
OCIL Data Model
81(1)
Questions
82(5)
Question_Test_Action Elements
87(4)
Questionnaires
91(2)
Putting It All Together
93(2)
Chapter 4 Asset Management
95(20)
Asset Identification
97(1)
Literal and Synthetic Identifiers
98(1)
Correlation
98(1)
AI Elements
99(3)
Helper Elements
102(1)
Asset Reporting Format
103(3)
Relationship Terms
106(2)
ARF Example
108(3)
Assessment Summary Results
111(1)
System-Ident Model
111(4)
Chapter 5 Enumerations
115(38)
Automation Enumerations and Their Purposes
116(2)
Enumerations Included in SCAP
118(1)
Common Configuration Enumeration
119(1)
CCE History
120(1)
The Purpose of CCE
121(2)
CCE Entries
123(1)
CCE Submission Process
124(7)
CCE and the National Vulnerability Database
131(1)
Common Platform Enumeration
131(2)
The New CPE 2.3 Stack
133(6)
Common Vulnerability and Exposures
139(1)
The Birth of CVE
140(1)
CVE Editorial Board
140(1)
CVE Identifiers
141(1)
Common Vulnerability Scoring System
141(1)
Other Related Enumerations and Expressions
142(1)
Common Weakness Enumeration
142(2)
Common Attack Pattern Enumeration and Classification
144(1)
Common Malware Enumeration
145(1)
Common Event Expression
145(3)
Distributed Audit Service
148(1)
Common Remediation Enumeration
149(4)
Chapter 6 SCAP Vulnerability Measurement
153(32)
Common Vulnerability Scoring System
155(1)
CVSS History
155(2)
CVSS Use Cases
157(3)
Vulnerability Characteristics
160(1)
CVSS Scoring
160(2)
Base Scoring
162(5)
Temporal Scores
167(4)
Environmental Scores
171(3)
Base, Temporal, Environmental Vectors
174(1)
CVSS Equations
174(3)
Your Mileage May Vary
177(1)
Common Vulnerability Reporting Framework (CVRF)
178(1)
Common Misuse Scoring System (CMSS)
179(1)
Common Configuration Scoring System
180(1)
Vulnerability Management in the Enterprise
181(4)
PART III Putting It All Together
Chapter 7 Building Automated Security Content
185(28)
Working with Files
186(1)
XML Editors
186(1)
Content Maintenance Tools
187(1)
Enhanced SCAP Editor (eSCAPe)
188(6)
The eSCAPe Wizards
194(1)
Opening and Navigating an SCAP Data Stream
195(1)
Example: Creating Malware SCAP Content
195(5)
Example: Creating Content to Check for Malicious File
200(4)
Using the Regex Validator Tool
204(1)
Using the Merge OVAL Documents Tool
205(1)
Some Useful Tips for Creating Content
206(1)
Explain Yourself
206(1)
Make Sure It Works
207(1)
Version Your Artifacts
207(1)
Reuse of Artifacts
208(1)
Content Correctness
209(1)
Least Version Principle
209(1)
Design for People
209(1)
Follow the Rules of the Road
210(1)
Minimize Extension Depth
210(1)
Granularity
210(1)
Customization
211(1)
Performance
211(1)
Regular Expressions
211(2)
Chapter 8 Putting Security Automation to Work in the Enterprise
213(14)
How Organizations Are Using Security Automation
215(1)
Automated Hardware and Software Inventory
216(2)
Security Configuration Management (SCM)
218(3)
OpenSCAP Security Automation Software in Linux Distributions
221(1)
Use of Security Automation to Track Management and Operational Security
221(2)
Security Automation to Discover Malicious Software
223(1)
Continuous Monitoring by Integrating Security Systems
223(1)
Device Health Monitoring
224(1)
Building a Healthy and Resilient Cyber Ecosystem
225(2)
Chapter 9 Conclusion
227(4)
The Road Ahead
228(3)
Appendix XCCDF, OVAL, OCIL, and Supporting Enumerations Usage 231(22)
Index 253
Greg Witte leads the U.S. Federal civilian customer support team at G2, Inc., a security firm committed to solving the most complex challenges related to the ability of the U.S. to collect, utilize, and defend digital information.





Melanie Cook is an information systems engineer at G2, Inc. She previously worked at the National Security Agency and at the National Institute of Standards and Technology where she contributed to SCAP efforts.





Matt Kerr is G2s Director of Research and Development. He helped develop the DISA Gold Disk application, the primary compliance assessment utility for Department of Defense systems.





Shane Shaffer is the Technical Director of Security Automation for G2. He served as the lead architect of the Department of Defenses Vulnerability Management System and has been a key contributor to the development of SCAP.