IS Inspection Trends - jsac

advertisement
Information Systems (IS)
Inspection Trends
April 17 – 18, 2013
Stan Sterns, CISSP
Lockheed Martin Aeronautics
1
Agenda
•
•
•
•
Cognizant Security Agency
Common Security Plans Deficiencies
Common System Validation Vulnerabilities
DSS Inspection Overview
– General Comments
– Interview Questions
– Recommendations
– Observations
– Vulnerabilities
– Enhancements
• Partnership/Sharing and Collaboration
• Closing
2
Cognizant Security Agency (CSA)
• Defense Security Service (DSS) is the primary government entity
responsible for approving cleared contractor information systems
to process classified data.
• Works with industry partners to ensure information system
security controls are in place to limit the risk of compromising
national security information.
• Ensures adherence to national industrial security standards.
–
–
–
–
–
National Industrial Security Program Operating Manual (NISPOM), Feb 2006)
Industrial Security Field Operations (ISFO) Process Manual, Jun 2011
Standardization of Baseline Technical Security Configurations, Mar 2009
Industrial Security Letters (ISLs)
Others, as applicable
3
Top 10 Deficiencies – Security Plans
• SSP Incomplete or missing attachments
• Inaccurate or incomplete configuration diagram or system
description
• SSP not tailored to the system
• Sections in general procedures contradict protection profile
• Missing certifications from the ISSM
• Missing variance, waiver, risk acknowledgement letter
• Incorrect or missing ODAA UID in plan submission
• Integrity & Availability not addressed completely
• Inadequate anti-virus procedures
• Inadequate trusted download procedures
(Riley, 2013)
4
Security Plan Deficiencies
Missing certifications from the
ISSM, 6%
Integrity & Availability not
addressed completely, 5%
Incorrect or missing ODAA UID
in plan/plan submission
Missing variance waiver risk
6%
acknowledgement letter 6%
Inadequate anti-virus
procedures 4%
SSP Not Tailored to the
System, 14%
Inadequate trusted download
procedures, 2%
Inaccurate or Incomplete
Configuration diagram/system
description, 15%
SSP Is incomplete or missing
attachments, 27%
Sections in General
Procedures contradict
Protection Profile, 12%
# Deficiencies
# Plans w/ Deficiencies
# Plans Reviewed
Avg Deficiency per Plan
Denials
Rejections
Feb-12 Mar-12 Apr-12 May-12 Jun-12
247
196
196
192
175
114
100
102
96
83
435
425
442
300
360
0.57
0.46
0.44
0.64
0.49
37
26
47
34
24
22
8
7
11
5
Jul-12 Aug-12 Sep-12 Oct-12 Nov-12 Dec-12 Jan-13
194
162
224
172
147
88
163
102
79
104
82
82
52
94
339
330
365
315
277
262
330
0.57
0.49
0.61
0.55
0.53
0.34
0.49
25
25
34
19
9
15
28
9
6
8
5
15
5
18
5
Top 10 Vulnerabilities – System Validations
• Security relevant objects (SROs) not protected
• Inadequate auditing controls
• Improper session controls: Failure to have proper user
activity/inactivity, logon, system attempts enabled.
• SSP does not reflect how the system is configured
• BIOS not protected
• Topology not correctly reflected in (M)SSP
• Identification & Authentication controls
• Integrity & Availability not addressed completely
• Physical security controls
• Inadequate anti-virus procedures
(Riley, 2013)
6
On-site Validation Vulnerabilities
I & A: Identification &
Authentication, 4%
SSP Does Not Reflect How
System is Configured, 10%
Topology not Correctly Reflected
in (M)SSP 6%
Bios not Protected 6%
Physical Controls 4%
Inadequate Anti-virus
Procedures 3%
Configuration Management:
Improper protection
implemented and maintained,
6%
Session Controls: Failed to have
proper user activity/inactivity,
10%
Security Relevant Objects not
Protected, 22%
Auditing, 19%
# Vulnerabilities
# Onsites w/ vulnerabilities
# Onsites
Avg Vulnerability per Onsite
Feb-12
163
78
427
0.38
Mar-12
166
67
372
0.45
Apr-12
119
71
315
0.38
May-12 Jun-12
94
124
62
73
278
284
0.34
0.44
Jul-12 Aug-12 Sep-12 Oct-12 Nov-12 Dec-12
94
96
95
104
67
92
68
51
63
62
45
59
305
256
286
285
219
207
0.31
0.38
0.33
0.36
0.31
0.44
Jan-13
128
78
247
0.52
7
General Comments (DSS Inspection)
• Rack mounted systems (all components must be marked)
• Interview ISSOs (education, certifications, system
knowledge)
• Removed CPU casing to view serial numbers on hard drive
• Wanted to see a year’s worth of audit logs (Sys, Sec, App)
• Power Users
• Access permissions on Security Relevant Objects (SROs)
• Anti-virus folder
• Regedit
• Windows/repair .dll files
• Audit log folder
8
General Comments (DSS Inspection)
•
•
•
•
•
•
•
•
•
•
•
•
Reviewed DD 147, Closed Area approval documentation
ISSO created a test account
Deploying tools to aid in management of system
General user demo/explained Trusted Download procedure
Self-Inspections
Weekly Audit Analysis
Protected Distribution Systems (NSTI 7003)
Simplified Network Security Plan (NSP)
Group Accounts
ISSO duties and responsibilities
End-of-day Out-brief
After Hours Check
9
Interview Questions (ISSO/User)
• What is your clearance level?
• How often do you access classified information?
• What is your background in regards to information systems
security?
• What would you do if a stranger asked you about your job?
• What would you do if you received an unusual email?
• What is the definition of adverse information?
• What are the three levels of classified information?
• Have you had any foreign travel?
10
Interview Questions (ISSO)
•
•
•
•
•
•
•
•
How are new systems certified?
How are the weekly user audits performed?
When is the last time service patches were installed?
What is the process for issuing a temporary password?
What is the process for issuing a new hard drive?
Does the ISSM recertify each new hard drive?
Do you use a Seal Log?
Do you courier classified material off the facility?
11
Recommendations
•
•
•
•
•
•
•
•
•
Two-person integrity for all Trusted Downloads
“Deny” access group for expired user accounts
Sysadmin account disabled when not needed
Identify each room/closed area on hardware baseline
Should be keeping originally signed user briefing forms
LED monitors vs CRT monitors
Request audit variance for hard drives with limited use
Separate maintenance log for security relevant actions
Recording password changes in maintenance log (NR)
12
Observations
•
•
•
•
•
•
•
•
•
ATO/Self-Cert letters must reflect caveats
Must have justification for “power users”
Non-SCI should reflect NOFORN
Systems with configuration variations should be “SSP”
ISSOs/AISSOs cannot verify their own clearances
Single system with WAN connection (MUSA or P2P?)
Privileged accounts should not be obvious
BIOS resets to default when removed from system
If users must be “administrators” – identify limitations
13
Observations
• Restricted area processing – mark current level
• Security seals over screws
• Mark unclassified equipment with a 5-foot radius
Possible Enhancements/Best Practices:
• Automated user briefing statements
• Formal system shutdown procedures
• Trusted download warning banner pops up whenever a
user logs in
• Background banners – must be accurate to include caveats
14
Common Vulnerabilities
• Security relevant software not on software baseline
• Privilege account box not checked on briefing statement
• Incorrect audit settings on SROs
• McAfee, ORACLE Desktop Client
• SRO not secured from unauthorized access
• Users had “read” permissions to “SecEvent”
• Configuration management
• Incorrect serial numbers on hardware baseline
• (ex: 56719B1 and should be 5671981)
• Patch management – systems not patched to SP3
15
Common Vulnerabilities
•
•
•
•
Local accounts on client/server configuration
Restricted area procedures not being followed
Built-in administrator password set to never expire
DoD banner not displayed when connecting to remote
system
• Certification Process- HDDs incorrectly marked while the
external chassis was marked correctly
• Test account still active
16
Enhancements (2013)
•
•
•
•
•
•
•
•
•
•
•
Category 1 Company Sponsored Events
Category 2 Internal Education Brochures and Products
Category 3 Security Staff Professionalism
Category 4 Information Product Sharing within the Community
Category 5 Active Membership in the Security Community
Category 6 Contractor Self Review
Category 7 Counterintelligence Integration
Category 8 Cyber Security
Category 9 FOCI/International
Category 10 Classified Material Controls/Physical Security
Category 11 Information Systems
17
Sharing and Collaboration
• Partnership
• Information Security Working Groups
– National Classification Management Society
– Information Systems Special Interest Group
• Sharing of tools, resources, and general information
– Joint Security Awareness Council
• Luncheons
– Enhancement Ideas
– Best Practice Considerations
– System Configurations
18
Closing
•
•
•
•
Cognizant Security Agency
Security Plan Deficiencies
System Validation Vulnerabilities
DSS Inspection Overview
–
–
–
–
–
–
General Comments
Interview Questions
Recommendations
Observations
Vulnerabilities
2013 Enhancements
• Partnership/Sharing and Collaboration
19
Any Questions
References:
Riley, R. (2013, February). NISPPAC C&A Working Group Update for the Committee.
Defense Security Service, Office of Designated Approval Authority
Download