Security Environment Assessment

Download Report

Transcript Security Environment Assessment

Security Environment Assessment
Outline
 Overview
 Key Sources and
Participants
 General Findings
 Policy / Procedures
 Host Systems
 Network Components
 Applications
 Overall Assessment Compliance with Policy
 Next Steps
Overview
 Objective
 Broad sweep to find significant strengths / weaknesses
 Baseline - not final statement of vulnerabilities
 Approach
 Interviews
 Review of system configurations
 Automated assessment tools (GFI)
 Examined policy, procedures, host systems, network
infrastructure, and some applications
General Findings - Strengths
 Linksys Router /Firewall protects the network perimeter
 Mostly Standardized Intel Platform with an OS, of which
is XP
 Customer security requirements have positively
influenced security awareness
 Regulatory requirements dictate due diligence
General Findings - Weaknesses
 External (e.g., Internet) access is not restricted i.e.
(Filter inappropriate network traffic)
 Critical Identified internal systems are not isolated
 Production systems are not subject to configuration
management
 Security program lacking key components and scope
necessary to effectively influence all systems
 Security staff not required but security knowledge and
emphasis lacking technical expertise to perform effective
oversight of all systems
 Policies not used to guide internal activities
 Security responsibilities not well defined
 Available technical features not used to best advantage
Policy / Procedures - Weaknesses
 System specific practices not tied to top-level policy
 User account / password management practices
 Access control decisions




Workstation policy not clear; basic features not implemented
High level policies for internet usage etc… does not exist
Procedures well defined for systems not defined
Training / user awareness for system specific features not
provided
 Training / user orientation emphasizes personal responsibility
does not exist
 Incident detection and response not addressed
General Findings - Weaknesses (cont)
 System specific procedures lacking
 Security not integrated with business processes
 Security responsibility for new systems and applications
not well defined
 Staff lacks technical expertise to effectively influence
design of new systems
Policy/Procedures
 Strengths
 High level policy has good components
 Training / user orientation emphasizes personal
responsibility
 Procedures well defined for mainframe systems
 Weaknesses
 System-specific practices not tied to top-level policy
 User account/password/access practices not consistent
 No provisions for incident detection / response
Host Systems
 Strengths
 Privileged access limited
 Security enhancements being implemented on some
systems
 Weaknesses
 Available features not used to best advantage
 Technical vulnerabilities on many systems
 Unnecessary services are available
 Configuration not guided by security policy
Network Infrastructure
 Strengths
 Firewall/address translator limits external access
 Router filters limit access within the network
 Weaknesses
 Network security responsibility not well defined;
configuration not guided by a security policy
 No capability for encrypted internal communications,
remote access, or Internet links
 Dial-up access not well controlled or secured
Applications
 Strengths
 Development and production environments are segregated
 Application security features are used to restrict access
 Weaknesses
 Password management practices are inconsistent
 Personal accountability is not always maintained
Overall Assessment -- Compliance with Security Policies
 Comparison of observed practice with the published
“Information Security Policy”
 Policy does not influence security configuration /
management of non-mainframe systems
 Most policy statements have not been implemented
consistently across the enterprise
Next Steps
 Reaction to vulnerabilities/weaknesses
 Recommend, prioritize, and implement fixes
 Implementation of Internet and remote access
solution
 Validate design; implement technical fixes, policy, and
procedures
 Define network security enhancements
 Refine requirements; select and implement solution