Getting proactive about security

Information security is a reactive world. The next intrusion, vulnerability or worm is always right around the corner. With critical issues arising everywhere, the typical IT staff or security organization spends most of its time reacting to outside forces and not nearly enough time getting ahead of the curve. One way out of this downward spiral is to get proactive with a system security policy and a method of ensuring compliance. This can change the environment from scrambling to planning, and increase the value and reduce the cost of security.

But how can this be accomplished without time, resources and a radical change in the environment?

System security policy management tools are growing in popularity. These tools automate the process of viewing and setting the configurations of a large number of systems, and reporting on their configurations against a security policy to give measurable results. Improperly configured systems, including items such as permissions, user rights and operating system security parameters, cause most common security problems. Keeping critical systems updated with current patches is also a part of this process. Properly configured and patched systems are less vulnerable, leading to fewer security incidents.

The basic process of using these tools is to continuously audit, assess and comply. That is, audit your systems against the security policy, assess the results of the audit, and comply with your policy by applying settings or patches on systems that are out of compliance.

Implementing a system security policy

The process of using these applications to implement a system security policy works as follows:

Phase 1: Choose or set up a policy. Some products come pre-configured with industry-standard, best practices templates to start from. Industry best practices security templates are available as documents from the operating system vendors (such as Microsoft Corp., Sun Microsystems Inc., IBM Corp., Hewlett-Packard Co.) on how to set up their systems securely. Similar documents are available from third-party and government organizations, such as SANS, CIS or the NSA. These documents can list hundreds of permissions and configuration parameters that should be set properly to ensure a secure system. A good tool will have these policies as templates in the application that can be customized to the particular needs of the enterprise. These documents, and the software’s implementation of them, should be thoroughly reviewed and understood. The implementation should also be tested in the lab to assess the effect on corporate applications of locking down the systems.

Phase 2: Identify the systems to be secured. Some of these applications will auto-discover the systems available and will allow the user to choose from a list. Others require that a list of machines be provided. System security policies should be applied to the most critical servers first, and then rolled out in a phased approach that makes sense for the enterprise.

Phase 3: Schedule or activate an audit. This is the data-collection process that will gather data from each machine over the network. Some of the applications do this without additional software, and some require a specialized agent installed on the target system.

Phase 4: Run a report and assess the results. A good selection of reports to use out of the box or for customization is critical. Reports should be detailed, with item-by-item and machine-by-machine listings, roll-up reports with machine summaries for finding problem areas, executive summaries with overall status reporting and high-level charts, and trend reports that can be used to graph progress over time.

Phase 5: Comply with your policy. Apply the needed changes or patches to systems that are out of compliance, and then begin again at Phase 3. A flexible product will allow the administrator to select which changes to be applied, or automatically apply all changes. Of course, any changes or patches should be tested first before being applied to production systems.

The return on investment of this approach is significant:

– Properly configured systems are less vulnerable to attacks, reducing incident response costs.

– Patched systems are less vulnerable to attacks, reducing incident response costs.

– Automated tools reduce the cost and resources required to get and stay in compliance.

Choosing an enterprise system security product

Of course, there are key considerations when looking at enterprise system security policy management products:

Agentless vs. Agent-Based Architecture. If there are only a few systems and the administrators are willing, then agents can be installed on audited systems. For large numbers of systems, both desktops and servers, an agentless approach is desirable. It reduces the cost and time to deploy the application, and eliminates the need and cost to manage and upgrade the agents.

Policy Flexibility. The audit must measure against the specific policy of an organization. The policy customization function must be able to cover the items being audited and be intelligent enough to account for different circumstances. Items such as the missions of the audited systems (e.g., database, Web, file server) and the platforms of the systems (e.g., UNIX or Windows 2000) will require different data to be collected and measured.

Central Database. The information gathered from an audit of a large number of machines is substantial. A tool that stores this data in a database via a standard interface will make this information more manageable. A central database also provides for easier custom reporting.

Reporting Flexibility. The data produced must meet the needs of the organization. The ability to do custom reports is often required to meet these needs if the “canned” reports provided by the tool do not suffice.

With the appropriate enterprise system-security policy management tool, system security can be accurate, efficient and complete, providing a stronger level of security to the enterprise while reducing the cost of maintaining this security.

Fred Pinkett and is vice president of product management at Pedestal Software, a Newton, Mass.-based provider of vulnerability management software for auditing, deploying and enforcing system security policies on desktops/workstations and servers. Mr. Pinkett has more than 16 years of experience in security, networking and other technologies.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now