of Federal Information and Information Systems; 2.FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems; 3.NIST Special Publication 800-18, Revision 1, Guide for Developing Security Plans for Federal Information Systems; 4.NIST Special Publication 800-30, Revision 1, Risk Assessment Guideline (October 2008); 5.NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems; 6.NIST Special Publication 800-39, Managing Risk from Information Systems: An Organizational Perspective (DRAFT); 7.NIST Special Publication 800-53, Revision 2, Recommended Security Controls for Federal Information Systems; 8.NIST Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems; 9.NIST Special Publication 800-59, Guide for Identifying an Information System as a National Security System; 10.NIST Special Publication 800-60 Revision 1, Guide for Mapping Types of Information and
• ...... 这些工作有点复杂,因为…… • The number and variety of systems to secure. • 需要进行安全维护的系统数量巨大且各不相同 • The need to respond quickly to new threats. • 对于新的威胁需要有快速的反应 • The lack of interoperability. • 安全工具之间缺乏互操作性
Automate 自动化 • Map high-level to low-level 落地 2 major elements: • Protocol – A suite of open specifications that standardize the format and nomenclature. • 一系列对格式和命名进行标准化的规范 • Content – Software flaw and security configuration standardized reference data. • 对软件漏洞和安全配置标准化的参考数据
security related software flaws CCE Common Configuration Enumeration Standard nomenclature and dictionary of software misconfigurations CPE Common Platform Enumeration Standard nomenclature and dictionary for product naming XCCDF eXtensible Checklist Configuration Description Format Standard XML for specifying checklists and for reporting results of checklist evaluation OVAL Open Vulnerability Assessment Language Standard XML for testing procedures CVSS Common Vulnerability Scoring System Standard for measuring the impact of vulnerabilities Cisco, Qualys, Symantec, Carnegie Mellon University SCAP1.0融合了这6个标准,但没有对它们进行修改,标准彼此之间是相对独立 的
Definition to test that CTRL+ALT+DEL is Required for Logon (registry key ) • Value=0 <registry_object id="oval:com.example:obj:1"> <hive>HKEY_LOCAL_MACHINE</hive> <key>Software\Microsoft\Windows\Curren tVersion\Policies\System</key> <name>disablecad</name> </registry_object> <registry_state id="oval:com.example:ste:1"> <value datatype==int" operation="equals">0</value> </registry_state> 定义描述: 转成obj 和 state: OBJEC T STATE
Required for Logon</title> •<affectedfamily="windows"/> •<description>This definition is used to introduce the OVAL Language.</description> •</metadata> •<criteria> •<criteriontest_ref="oval:org.mitre.oval.tutorial:tst:1”comment="The registry key is set to require CTRL+ALT+DEL for Logon"/> •</criteria> •</definition> •</definitions> •<tests> •<registry_testid="oval:org.mitre.oval.tutorial:tst:1"version="1"checkall"comment="The registry key is set to require CTRL+ALT+DEL •for Logon"xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows"> •<objectobject_ref="oval:org.mitre.oval.tutorial:obj:1"/> •<statestate_ref="oval:org.mitre.oval.tutorial:ste:1"/> •</registry_test> •</tests> •<objects> •<registry_objectid="oval:org.mitre.oval.tutorial:obj:1"version="1"xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows"> •<hive>HKEY_LOCAL_MACHINE</hive> •<key>Software\Microsoft\Windows\CurrentVersion\Policies\System</key> •<name>disablecad</name> •</registry_object> •</objects> •<states> •<registry_stateid="oval:org.mitre.oval.tutorial:ste:1"version="1"xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows"> •<valuedatatypeintoperation="equals">0</value> •</registry_state> •</states> •</oval_definitions>
Policy Setting Name Account lockout duration FDCC Windows XP 15 minutes CCE Reference CCE-980 Registry Setting Description This security setting determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked. The available range is from 0 minutes through 99,999 minutes. If you set the account lockout duration to 0, the account will be locked out until an administrator explicitly unlocks it. If an account lockout threshold is defined, the account lockout duration must be greater than or equal to the reset time. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. NOTE: 15 minutes is recommended by the Vista Security Guide, due to fears of Denial of Service attacks taking down systems too easily. Vista CCE v5 Reference CCE-2363-0 XP CCE v5 Reference CCE-2928-0