CASE STUDY CSC leverages Lumeta and Tripwire for CDM / CMaaS Enables Federal and other government entities to strengthen the security posture of their cyber networks Computer Sciences Corporation (CSC) is a global leader of next-generation information technology (IT) services and solutions. Their mission is to enable superior returns on clients’ technology investments through best-in-class industry solutions, domain expertise and global scale. Josh Canary, CISSP, PMP, BPA Program Manager at CSC spoke on a joint webinar with Lumeta and Tripwire to discuss the benefits and integration synergy between the two companies in addressing the cybersecurity requirements for the Continuous Diagnostics and Mitigation (CDM) program released by the U.S. Department of Homeland Security (DHS). The following includes edited excerpts from his presentation: “ What we liked about the two products put together was that it allowed us to first ‘turn on the lights’ [Lumeta], and then the categorization of risks [Tripwire] allowed us to not be blinded by what we saw. – Josh Canary, CISSP, PMP, BPA Program Manager at CSC ” Challenge Continuous Diagnostics and Mitigation (CDM)1 Cyber attacks on Federal government networks are growing more sophisticated, frequent, and dynamic. It is paramount that the government protects networks, systems, and information from unauthorized access or disruption while continually providing essential services to the public. The Continuous Diagnostics and Mitigation (CDM) program is a dynamic approach to fortifying the cybersecurity of government networks and systems. CDM provides federal departments and agencies with capabilities and tools that identify cybersecurity risks on an ongoing basis, prioritize these risks based upon potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first. Federal governments (as well as state, local, and regional governments, in addition to defense organizations) can benefit from a blanket purchase agreement (BPA) called Continuous Monitoring as a Service (CMaaS) to strengthen their information technology networks. The goal of the CMaaS BPA and CDM Program is to provide a consistent, government-wide set of continuous diagnostic solutions to enhance defenders’ abilities to identify and mitigate emerging cyber threats through risk-based decision making. The program consists of three phases. The first phase of CDM focuses on endpoint integrity: management of hardware and software assets, configuration management, and vulnerability management, which are foundational capabilities to protect systems and data. Phases 2 and 3 are being further defined to include Least Privilege and Infrastructure Integrity, and Boundary Protection and Event Management, respectively. 1 www.dhs.gov/cdm and www.us-cert.gov/cdm CSC2 CSC supports federal agencies’ missions to respond to these ever-changing cyber threats and has collected, vetted and selected the industry’s best cybersecurity tools and services for its Continuous Diagnostics and Mitigation (CDM) Tools, and Continuous Monitoring as a Service (CMaaS) Blanket Purchase Agreement (BPA). CSC’s CMaaS solutions strengthen the cybersecurity of government networks. CSC understands that an agency can’t protect its assets without knowing the composition of its network. Solution “We’re currently in Phase 1 of the CDM Program. CSC, as an integrator, looked at hundreds of different products, but what we really found to be amazing is that just by using these two products [Lumeta and Tripwire] we were able to meet all four of the critical guidelines in Phase 1 of CDM. CDM Phase 1: Endpoint integrity a Hardware Asset Management (HWAM) a Software Asset Management (SWAM) a Configuration Settings Management (CSM) a Vulnerability Management (VUL) We found that when we combine the two products together, that 20% gap [in enterprise network visibility is closed]. Many products we found that do vulnerability management and hardware asset management allow you to put in an IP address range. ‘I’ll tell you where my network is, now you go out and find all those devices that are on my network.’ What we found interesting and unique about Lumeta is the ability to find rogue devices and leaks. Being able to ‘turn on the lights’ of your network and define what’s out there is definitely the first step in terms of being able to protect [the network]. If you don’t know what’s there, any number of patching, any number of system changes, any number of firewalls or other devices you might buy is not going to protect what you don’t know you have. You have to be able to identify the risks and do the analysis to find out what’s actually going to hurt you. Just by identifying the devices in your network and not actually doing the categorization (when you actually find out where the risks are), you still don’t know what’s on your network. For example, most Windows Servers have a BIND service installed by default … now it’s almost never turned on. We found a number of tools that would determine that there was in fact a BIND service and raise a red flag. But it’s not a problem if it’s disabled. What we liked about the two products put together was that it allowed us to first ‘turn on the lights’ [Lumeta], and then the categorization of risks [Tripwire] allowed us to not be blinded by what we saw. As more and more BYOD systems are coming on line ... while the perimeter, which used to be the bastion of protection, is now getting more and more muddy … I can’t just put up four corners around my building and decide it’s clean. I need to be a lot more engaged with devices that are walking around outside of my control.” Continuous Monitoring “When observing, orienting, deciding and taking action, you’re finding out what’s on your network, finding out what the risks are, finding out what the possible exploits are, deciding on a level of security control, you’re deploying the security controls, and even more important you’re monitoring them. It’s a constant process. The faster you’re able to bring your controls to bear and make changes and fix things that are broken, then you’re able to get ahead of your adversary. He’s attempting to bring malware to bear, exploits to bear, exfiltrate your information, try to take advantage of non-existent patches, or even patches that maybe the industry hasn’t determined there’s a weakness yet. So the faster you’re able to turn a vulnerability into a non-vulnerability, the better off you’re going to be in the long term.” 2 http://www.csc.com/public_sector/ds/11237/107249-cdm_cmaas?ref=ls Lumeta Corporation | 300 Atrium Drive, Suite 302 | Somerset, NJ 08873 USA | +1.732.357.3500 | www.lumeta.com © 2015 Lumeta Corporation. All rights reserved. Lumeta, the Lumeta logo and IPsonar are registered trademarks of Lumeta Corporation in the United States and other countries. All other trademarks or service marks are the property of their respective owners.