Security Standards Compliance CSE ITSG Trend Micro Products. - Version 2.0

Size: px
Start display at page:

Download "Security Standards Compliance CSE ITSG Trend Micro Products. - Version 2.0"

Transcription

1 Security Standards Compliance CS ITSG Trend Micro roducts (Deep Discovery Inspector, Deep Security and SecureCloud) - Version 2.0 Document TMIC-004-CS Version 2.0, February

2 Guide to Managing Security Risks from Using Information Systems, Security Control Catalogue, ITSG-33 Annex 3 Security Standards Compliance -- Trend Micro roducts (Deep Discovery Inspector, Deep Security and SecureCloud) Reference: A CS Guide to Managing Security Risks from Using Information Systems, Security Control Catalogue, ITSG-33 Annex 3, final draft, 31 Mar 11 B CS Guide to Managing Security Risks from Using Information Systems, rotected B / Medium Integrity / Medium Availability, ITSG-33, Annex 4, 1, final draft, 31 Mar 2011 C CS Guide to Managing Security Risks from Using Information Systems, rotected A / Low Integrity / Low Availability, ITSG-33, Annex 4, 2, final draft, 31 Mar 2011 D CS Guide to Managing Security Risks from Using Information Systems, Secret / Medium Integrity / Medium Availability, ITSG-33, Annex 4, 3, final draft, 31 Mar 2011 Recommended Security Controls for Federal Information Systems and Organizations, NIST Special ublication , Revision 3, Aug F Security and rivacy Controls for Federal Information Systems and Organizations, NIST Special ublication , Revision 4, 15 Jan 2014 G Security Standards Compliance S Revision 4 - (Deep Discovery Inspector and SecureCloud), Trend Micro whitepaper, repared by BD ro, version 2, Feb 2015 H Government nterprise, Large Scale Virtual Server nvironment, Risk Assessment, Trend Micro whitepaper, repared by BD ro, version 1, 11 Feb 2011 I Securing Large Scale Virtual Server nvironments in US Government nterprises, Trend Micro whitepaper, repared by BD ro, version 1, 29 Nov 2011 The Communications Security stablishment (CS) ITSG-33 series of guidelines provides definitions of security controls that security practitioners can use as a foundation for selecting security controls for the protection of Government of Canada information systems. The key guidance documents are the Annex 3 Security Controls Catalogue and 3 companion Annex 4 security control profiles documents: 1: {rotected B / Medium Integrity / Low Availability}; 2: {rotected A / Low Integrity / Low Availability}; and 3: {Secret / Medium Integrity / Medium Availability}. The ITSG-33 Security Controls Catalogue is based on NIST S Revision 3 (Aug 2009). This document is an update to the 2011 whitepaper and includes Deep Discovery Inspector in the compliance analysis. Virtualized servers and cloud computing environments, are being implemented throughout government enterprises and their cloud service providers. They face many of the same security challenges as their physical counterparts and additionally have to contend with a number of security concerns specific to the virtual environment such as: inter VM traffic, resource contention, blurring of system and network security boundaries, mixed trust levels, security zoning, and separation of duties. In particular, organizations need to specifically protect their sensitive information assets in the virtualized multi-tenant cloud environment where the physical storage locations are unknown to them and distributed across the cloud. The ITSG-33 guidance documents provide a foundation of security controls for incorporating into an organization s overall security requirements baseline for mitigating risk and improving systems and application security in their physical and virtualized environments. Many of these organizations using the security requirements also have obligations to be able to demonstrate compliance with the security requirements. From a security product vendor s viewpoint, there is a need to clearly demonstrate to users of their products, how their products will, satisfy, support (i.e. product self-protection), or partially meet the ITSG-33 security requirements. In this document we have indicated how ITSG-33 compliance is addressed by the Trend Micro Deep Discovery Inspector, Deep Security and SecureCloud solutions. The Trend Micro products Deep Discovery Inspector v3.7, Deep Security v9.5 and SecureCloud v3.7 help satisfy the requirements of ITSG-33, at both the application/system enterprise level and as security features specific to the products, such as product access controls, audit capability, etc. The appropriate context of each compliancy statement is indicated: - how the Trend Micro products help satisfy the nterprise level security requirements; and - how the Trend Micro products satisfy the roduct level security requirements. These product-specific compliancy details are needed by managers, security systems engineers and risk analysts in order that they may select and architect costeffective secure solutions that will protect their nterprise systems and sensitive information assets from the modern hostile threat environment. The context compliancy statements include those related to the SFRs and SARs 1 used in most recent Common Criteria evaluations: Deep Discovery Inspector v3.1 AL2 2 ; and Deep Security v AL2 evaluation in progress 3. The Common Criteria certification ensures that these products have been methodically designed, tested and reviewed by fully qualified US and Canadian government certified testing laboratories. The ITSG-33 compliancy analysis also recognized that SecureCloud cryptographic capabilities were developed using FIS evaluated libraries 4. One of the major challenges is for government enterprises and their service providers to remain compliant with the ITSG-33 requirements in the constantly changing threat environment. One objective of this Trend Micro document is to provide focused guidance on how the Trend Micro Deep Discovery Inspector, Deep Security and SecureCloud solutions can effectively help deal with these ongoing challenges. The ITSG-33 security control profiles and priorities are leveraged to provide such focus in this guidance. This rioritized Approach identifies the applicable ITSG-33 implementation priorities (1,, or 3) and the security controls profile (1, 2 or 3). These details will help enterprises and their service provider partners implement a continuous improvement process to protect critical assets data against the highest risk factors and modern escalating threats. The above referenced Trend Micro whitepapers also provide additional guidance related to virtualization implementations. 1 The CC evaluation Security Targets also included Trend Micro product specific Security Functional Requirements (SFRs) and Security Assurance Requirements (SARs) related to Intrusion Detection and Anti-Malware. 2 Deep Discovery Inspector v 3.1 CC Certification Report CR, CS, dated 21 Jan The current Common Criteria evaluation of Deep Security v9.5 is an update to the earlier evaluations to AL4+ for Deep Security v7.5 S (Certification Report # ) and for Deep Security v8.0 S1 (Maintenance Report # MR). 4 SecureCloud utilizes FIS Level 2 Certified, Validation Number 1123:Cryptographic Libraries Document TMIC-004-CS Version 2.0, February

3 Deep Discovery Inspector with combined functionality of Virtual Analysis (sandbox threat behavior simulation), Advanced Threat Scans, and AT Detection, has been certified to the ISO Common Criteria AL2 level. The primary Deep Discovery Inspector modules include: Management Console, provides a built-in online management console through which users can view system status, configure threat detection, configure and view logs, run reports, administer Deep Discovery Inspector, and obtain help. Virtual Analyzer, provides a virtualized environment where untrusted files can be safely inspected. Network Content Correlation ngine is a module that implements rules or policies defined by Trend Micro. Trend Micro regularly updates these rules after analyzing the patterns and trends that new and modified viruses exhibit. Advance Threat Scan ngine is a file-based detection-scanning engine that has true file type, multi-packed files, and IntelliTrap detection. The scan engine performs the actual scanning across the network and uses a virus pattern file to analyze the files passing through the network. The virus pattern file contains binary patterns of known viruses. Trend Micro regularly releases new virus pattern files when new threats are detected. Network Virus Scan uses a combination of patterns and heuristics to proactively detect network viruses. It monitors network packets and triggers events that can indicate an attack against a network. It can also scan traffic in specific network segments. Network Content Inspection ngine is a module used to scan the content passing through the network layer. The Deep Security product provides, in both virtualized and physical environments, the combined functionality of a Common Criteria AL2 validated Firewall, Anti-Virus, Deep acket Inspection, Integrity Monitoring, Log Inspection, Role Based Access Control (RBAC) and support for multi-tenant virtual environments. The primary Deep Security modules include: Deep Security Manager is a centralized Web-based management console which administrators use to configure security policy and deploy protection to the enforcement components: the Deep Security Virtual Appliance and the Deep Security Agent. Firewall Module centralizes management of server firewall policy using a bidirectional stateful firewall. Supports virtual machine zoning and prevents denial of service attacks. rovides broad coverage for all I-based protocols and frame types as well as fine-grained filtering for ports and I and MAC addresses. Anti-malware Module provides both real-time and on-demand protection against file-based threats, including threats commonly referred to as malware, viruses, Trojans, and spyware. To identify threats, Anti-Malware checks files against a comprehensive threat database, portions of which are hosted on servers or kept locally as updatable patterns. Anti-Malware also checks files for certain characteristics, such as compression and known exploit code. To address threats, Anti-Malware selectively performs actions that contain and remove the threats while minimizing system impact. Anti-Malware can clean, delete, or quarantine malicious files. It can also terminate processes and delete other system objects that are associated with identified threats. Recommendation Scans identifies known vulnerabilities. The operation scans the operating system and also installed applications. Recommendation Scans automate scanning of systems and patch levels against the latest Critical Vulnerability and xposure (CV) database, to automatically apply Deep Security signatures, engines, patterns, and rules/filters to detect/prevent exploitation of these vulnerabilities and to produce audit logs and reports which can be used to support a continuous monitoring program or audits. Integrity Monitoring Module detects and reports malicious and unexpected changes to files and systems registry in real time, and is available in agentless form factor. rovides administrators with the ability to track both authorized and unauthorized changes made to the instance. The ability to detect unauthorized changes is a critical component in a cloud security strategy as it provides the visibility into changes that could indicate the compromise of an instance. Log Inspection Module provides visibility into important security events buried in log files. Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at OSSC. Intrusion revention Module protects computers from being exploited by attacks against known and zero-day vulnerability attacks as well as against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed. It identifies malicious software accessing the network and increases visibility into, or control over, applications accessing the network. Intrusion revention prevents attacks by detecting malicious instructions in network traffic and dropping relevant packets. Web Reputation Module protects against web threats by blocking access to malicious URLs. Deep Security uses Trend Micro's Web security databases from Smart rotection Network sources to check the reputation of Web sites that users are attempting to access. The Web site's reputation is correlated with the specific Web reputation policy enforced on the computer. Depending on the Web Reputation Security Level being enforced, Deep Security will either block or allow access to the URL. SecureCloud is based on a Common Criteria AL 4 certified product and provides FIS full disk encryption either in the virtualized or physical environments, and has been specifically designed to assist in a multi tenancy Cloud environment to ensure that each tenant s data is isolated, using cryptography and cryptographic keys unique to each tenant. Document TMIC-004-CS Version 2.0, February

4 These three products and other Trend Micro services can be integrated into various enterprise architectures required to effectively minimize the organization s cyber security risks. Such Trend Micro services include:. Control Manager provides a centralized management function for Deep Discovery Inspector (and other Trend Micro products). Smart rotection Network provides a URL and file reputation rating service. TrendLabs is a global network of research, development, and action centers committed to 24x7 threat surveillance, attack prevention, and timely and seamless solutions delivery. Serving as the backbone of the Trend Micro service infrastructure, TrendLabs is staffed by a team of several hundred engineers and certified support personnel that provide a wide range of product and technical support services. Threat Management Services provides organizations with an effective way to discover, mitigate, and manage stealthy and zero-day internal threats. Threat Management Services brings together security experts and a host of solutions to provide ongoing security services. These services ensure timely and efficient responses to threats, identify security gaps that leave the network vulnerable to threats, help minimize data loss, significantly reduce damage containment costs, and simplify the maintenance of network security. Threat Management Service ortal is an on premise or hosted service which receives logs and data from registered products (DDI) and creates reports to enable product users to respond to threats in a timely manner and receive up-to-date information about the latest and emerging threats. Threat Connect correlates suspicious objects detected in the organizations environment and threat data from the Trend Micro Smart rotection Network. By providing ondemand access to Trend Micro intelligence databases, Threat Connect enables an organization to identify and investigate potential threats to their environment. Mobile App Reputation Services (MARS) collects data about detected threats in mobile devices. Mobile App Reputation Service is an advanced sandbox environment that analyzes mobile app runtime behavior to detect privacy leaks, repacked mobile apps, third-party advertisement SDKs, vulnerabilities, and app categories. Threat Mitigator receives mitigation requests from Deep Discovery Inspector after a threat is detected. Threat Mitigator then notifies the Threat Management Agent installed on a host to run a mitigation task. Mitigation (Module) Devices performs threat cleanup activities on network endpoints. Document TMIC-004-CS Version 2.0, February

5 CS ITSG-33 Control AC-2 Technical / Access Control / Account Management AC-2 Technical / Access Control / Account Management (A) The organization manages information system accounts, including identifying account types (i.e., individual, group, system, application, guest/anonymous, and temporary). (B) The organization manages information system accounts, including establishing conditions for group membership. (C) The organization manages information system accounts, including identifying authorized users of the information system and specifying access privileges. (D) The organization manages information system accounts, including requiring appropriate approvals for requests to establish accounts. () The organization manages information system accounts, including establishing, activating, modifying, disabling, and removing accounts. (F) The organization manages information system accounts, including specifically authorizing and monitoring the use of guest/anonymous and temporary accounts. (G) The organization manages information system accounts, including notifying account managers when temporary accounts are no longer required and when information system users are terminated, transferred, or information system usage or need-to-know/need-to-share changes. (H) The organization manages information system accounts, including deactivating: (i) temporary accounts that are no longer required; and (ii) accounts of terminated or transferred users. (I) The organization manages information system accounts, including granting access to the system based on: (i) a valid access authorization; (ii) intended system usage; and (iii) other attributes as required by the organization or associated missions/business functions. (J) The organization manages information system accounts, including reviewing accounts [Assignment: organization-defined frequency]. Supplemental Guidance: The identification of authorized users of the information system and the specification of access privileges is consistent with the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by organizational officials responsible for approving such accounts and privileged access. Related controls: AC-3, AC-4, AC-5, AC-6, AC-10, AC- 17, AC-19, AC-20, AU-9, IA-4, IA-5, GC.ITSG33.11.CM-5, GC.ITSG33.11.CM- 6, MA-3, MA-4, MA-5, SA-7, SC-13, SI-9 1 Deep Discovery Inspector v3.1 has been AL2 certified by the Common Criteria valuation and Certification Scheme; Deep Security v9.5 is currently being evaluated to AL2 and provides the Identification and Authentication, Security Management functions to address this requirement as self-protection of the products. Deep Discovery Inspector solution assists in meeting this requirement through the use of Role Based Access Controls, for Administrator and Viewers. Deep Security solution assists in meeting this requirement through the use of Role Based Access Controls. The role-based access allows multiple administrators (Users), each with different sets of access and editing rights, to edit and monitor different aspects of the system and receive information appropriate to them. The SecureCloud solution assists in meeting this requirement by using Role Based Access Controls for Group Accounts, and Administration to manage System Administrators and by integration with an organizations Active Directory to provide the access control and account management AC-2 (4) Technical / Access Control / Account Management / Automated Audit Actions The information system automatically audits account creation, modification, disabling, and termination actions and notifies, as required, appropriate individuals. Deep Discovery Inspector solution satisfies this requirement through the use of Role Based Access Controls, which are audited in terms of the defined auditable events as documented in the Deep Discovery Inspector, Common Criteria, Security Target. Deep Security solution satisfies this requirement through the use of Role Based Access Controls, which are audited in terms of the defined auditable events. The user and group account management data that is automatically audited as auditable events are documented in the Deep Security, Common Criteria, Security Target. The SecureCloud solution satisfies this requirement by using Role Based Access Controls and integration with Active Directory to provide the access control and account management data, which is automatically captured in the SecureCloud audit logs. Document TMIC-004-CS Version 2.0, February

6 CS ITSG-33 Control AC-2 (7) Technical / Access Control / Account Management The organization: (a) stablishes and administers privileged user accounts in accordance with a role-based access scheme that organizes information system and network privileges into roles; and (b) Tracks and monitors privileged role assignments. Supplemental Guidance: rivileged roles include, for example, key management, network and system administration, database administration, web administration Tailoring and Implementation Guidance: This security control/enhancement can be met using readily available Commercial-Off-The- Shelf (COTS) components, and is considered to be best practice. Consequently, inclusion of this security control/enhancement is strongly encouraged in most cases. The minimization of administrative privileges is an account management best-practice. The Common Criteria AL-2 Certification Report for Deep Discovery Inspector v3.1 includes compliance to Security Roles, through Role Based Access Controls. Deep Security v9.5 which is currently being evaluated to the Common Criteria AL2 level includes compliance to Security Roles through Role Based Access Controls. The SecureCloud solution satisfies this requirement by using Role Based Access Controls and integration with Active Directory AC-3 Technical / Access Control / Access nforcement AC-3 Technical / Access Control / Access nforcement (A) The information system enforces approved authorizations for logical access to the system in accordance with applicable policy. Supplemental Guidance: Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the information system. In addition to enforcing authorized access at the information system level, access enforcement mechanisms are employed at the application level, when necessary, to provide increased information security for the organization. Consideration is given to the implementation of an audited, explicit override of automated mechanisms in the event of emergencies or other serious events. If encryption of stored information is employed as an access enforcement mechanism, the cryptography used must be compliant with the requirements of control SC-13. For classified information, the cryptography used is largely dependent on the classification level of the information and the clearances of the individuals having access to the information. Mechanisms implemented by AC-3 1 Deep Discovery Inspector enforces access to authorized product administrators using rolebased access control. All product administrators are assigned roles at creation. Authorized product administrators can only access the product through the administrative interface. They have full access to the functions permitted by their roles. Deep Security access enforcement includes Role-based access which allows multiple administrators, each with different sets of access and editing rights, to edit and monitor different aspects of the system and receive information appropriate to them. In addition, digital signatures are used to authenticate system components and verify the integrity of rules. SecureCloud provides an access enforcement mechanism to organizational data through the controlled release of cryptological keys to encrypt or decrypt the organizations data. The cryptological keys are only released when configured criteria (policy and integrity check) is met, this includes the location of the application, host name, the latest operating system patch, and/or the latest Trend Micro engine and pattern file. NOT: AC-3 security controls have been added to the 2012 NIST S Revision 4 security controls catalogue. They are not included in ITSG-33 which is based on the earlier 2009 Revision 3. Deep Discovery Inspector, Deep Security and SecureCloud Compliancy guidance for these new controls are provided in the referenced compliance report for S Revision 4, which is available from Trend Micro: AC-3 (7) Access nforcement / Role-Based Access Control AC-4 Technical / Access Control / Information Flow nforcement AC-4 (4) Technical / Access Control / Information Flow nforcement / Content Check ncrypted Data The information system prevents encrypted data from bypassing contentchecking mechanisms. 1 3 The Deep acket Inspection capability of Deep Security satisfies this requirement by being able to examine SSL encrypted tcp packets. Document TMIC-004-CS Version 2.0, February

7 CS ITSG-33 Control AC-5 Technical / Access Control / Separation of Duties AC-5 Technical / Access Control / Separation of Duties (A) The organization separates duties of individuals as necessary, to prevent malevolent activity without collusion. (B) The organization documents separation of duties. (C) The organization implements separation of duties through assigned information system access authorizations. Supplemental Guidance: xamples of separation of duties include: (i) mission functions and distinct information system support functions are divided among different individuals/roles; (ii) different individuals perform information system support functions (e.g., system management, systems programming, configuration management, quality assurance and testing, network security); (iii) security personnel who administer access control functions do not administer audit functions; and (iv) different administrator accounts for different roles. Access authorizations defined in this control are implemented by control AC-3. Related controls: AC-3 Tailoring and Implementation Guidance: This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. 1 Deep Discovery Inspector assists separation of duties by providing specific roles and access controls. The Version 3.1 of the product is certified by the Common Criteria valuation and Certification Scheme (CCS) carried out by the Communications Security stablishment Canada which provides evidence of this capability. Deep Security assists separation of duties by providing specific roles and access controls. The Version 9.5 of the product is currently being evaluated to the AL2 level, to provide evidence of this capability. SecureCloud assists separation of duties by providing specific roles and access controls and is integrated with Active Directory. AC-6 Technical / Access Control / Least rivilege AC-6 Technical / Access Control / Least rivilege (A) The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. Supplemental Guidance: The access authorizations defined in this control are largely implemented by control AC-3. The organization employs the concept of least privilege for specific duties and information systems (including specific ports, protocols, and services) in accordance with risk assessments as necessary to adequately mitigate risk to organizational operations and assets, individuals, other organizations, and Canada. Related controls: AC-2, AC-3, GC.ITSG33.11.CM-7 Tailoring and Implementation Guidance: This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. 1 Deep Discovery Inspector addresses roles and least privilege. The Version 3.1 of the product is certified by the Common Criteria valuation and Certification Scheme (CCS) carried out by the Communications Security stablishment Canada to provide evidence of addressing roles and least privilege. Deep Security address roles and least privilege. The Version 9.5 of the product is currently being evaluated to the AL2 level which will provide evidence of this capability. SecureCloud addresses roles and least privilege through the role based access control and integration with Active Directory. AC-6 (1) Technical / Access Control / Least rivilege / Authorize Access to Security Functions The organization explicitly authorizes access to [Assignment: organizationdefined list of security functions (deployed in hardware, software, and firmware) and security-relevant information]. Supplemental Guidance: stablishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters are examples of security functions. xplicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users. Related control: AC-17. Tailoring and Implementation Guidance: This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. Deep Discovery Inspector, Deep Security and SecureCloud satisfy this requirement by explicitly authorizing access to security functions through roles with specific permissions and privileges, and defining audit events. SecureCloud explicitly restricts which users have access to the cryptographic key material. Access to product Security Functions is addressed by the Common Criteria, Management of Security Functions Behavior and Management of product security function data. Deep Discovery Inspector v 3.1 is certified the Common Criteria valuation and Certification Scheme (CCS) carried out by the Communications Security stablishment Canada to the AL2 level; and Deep Security v9.5 is currently being evaluated to the AL2 level. Document TMIC-004-CS Version 2.0, February

8 CS ITSG-33 Control AC-6 (2) Technical / Access Control / Least rivilege / Non-rivileged Access for Nonsecurity Functions The organization requires that users of information system accounts, or roles, with access to [Assignment: organization-defined list of security functions or security-relevant information], use non-privileged accounts, or roles, when accessing other system functions, and if feasible, audits any use of privileged accounts, or roles, for such functions. Supplemental Guidance: This control enhancement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of role is intended to address those situations where an access control policy such as RBAC is being implemented and where a change of role provides the same degree of assurance in the change of access authorizations for both the user and all processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account. Audit of privileged activity may require physical separation employing information systems on which the user does not have privileged access. Tailoring and Implementation Guidance: This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. Deep Discovery Inspector, Deep Security and SecureCloud support compliance with this requirement by the use of a Role Base Access Control, which provides the ability to prevent a privileged user accessing nonprivileged or non security functions with the privileged role security credentials. AC-6 (4) Technical / Access Control / Least rivilege / Separate rocessing Domains The information system provides separate processing domains to enable finer-grained allocation of user privileges. Supplemental Guidance: mploying virtualization techniques to allow greater privilege within a virtual machine while restricting privilege to the underlying actual machine is an example of providing separate processing domains for finer-grained allocation of user privileges. Tailoring and Implementation Guidance: This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all systems. Consequently, inclusion in a departmental profile is made on a case by case basis. Deep Security satisfies this requirement by providing fine grained allocation of user privileges through the implementation of firewall rules/filters on specific virtual machines or physical machines to create separate processing domains/zones. This allows additional privileges within a virtual machine while restricting privileges to other virtual machines or to the underlying actual machine. NOT: AC-6 security controls have been added to the 2014 S Revision 4 security controls catalogue. They are not included in ITSG-33 which is based on the earlier 2009 Revision 3. Deep Discovery Inspector, Deep Security and SecureCloud Compliancy guidance for these new controls are provided in the referenced compliance report for NIST S Revision 4, which is available from Trend Micro: AC-6 (10) Access Control / Least rivilege / rohibit Non-rivileged Users From xecuting rivileged Functions Document TMIC-004-CS Version 2.0, February

9 CS ITSG-33 Control AC-17 Technical / Access Control / Remote Access AC-17 (2) Technical / Access Control / Remote Access / rotection of Confidentiality - Integrity Using ncryption The organization uses cryptography to protect the confidentiality and integrity of remote access sessions. The cryptography must be compliant with the requirements of control SC-13. Supplemental Guidance: The encryption strength of mechanism is selected based on recommendations found in CSC ITSG-32 Guide to Interconnecting Security Domains [Reference 23]. Related controls: SC-8, SC-9, SC-13. Tailoring and Implementation Guidance: This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. This security control/enhancement can be met using readily available Commercial-Off- The-Shelf (COTS) components. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. Deep Discovery Inspector, Deep Security and SecureCloud solutions support compliance with this requirement through the use of the TLS/SSL protocol for remote access. AC-18 Technical / Access Control / Wireless Access AC-18 (4) Technical / Access Control / Wireless Access The organization does not allow users to independently configure wireless networking capabilities. Deep Security can assist in meeting this requirement to control wireless configuration by the use of Deep Security Firewall rules for wireless laptops. Deep Security addresses the problem, that with many laptops now capable of connecting to both the wired and wireless networks, users need to be aware of the problems that can result from this scenario. The common problem is a "network bridge" configured between the wired and wireless network. There is a risk of forwarding the internal traffic externally and potentially expose internal hosts to external attacks. Deep Security allows administrators to configure a set of firewall rules for these types of users to prevent them from creating a network bridge. AU-2 Technical / Audit and Accountability / Audiable vents AU-2 Technical / Audit and Accountability / Auditable vents (A) The organization determines, based on a risk assessment and mission/business needs, that the information system must be capable of auditing the following events: [Assignment: organization-defined list of auditable events]. (B) The organization coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events. (C) The organization provides a rationale for why the list of auditable events is deemed to be adequate to support after-the-fact investigations of security incidents. (D) The organization determines, based on current threat information and ongoing assessment of risk, that the following events are to be audited within the information system: [Assignment: organization-defined subset of the auditable events defined in AU-2 a. to be audited along with the frequency of (or situation requiring) auditing for each identified event]. Supplemental Guidance: The purpose of this control is for the organization to identify events which need to be auditable as significant and relevant to the security of the information system; giving an overall system requirement in order to meet ongoing and specific audit needs. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are to be audited at a given point in time. For example, the organization may determine that the information system must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the extreme burden on system performance. In 1 Document TMIC-004-CS Version 2.0, February Deep Discovery Inspector supports this requirement by enabling organizations to audit and log security related events through inspection of network traffic between and within an organizations network including: communications or links to suspicious/malicious endpoints, suspicious/malicious network traffic, and infected files. Logs include, time stamps, source and destination addresses, identifiers, event descriptions, success/fail indications, rules involved. Security event information can be integrated with an organization's SIM product. Deep Security supports this requirement by enabling organizations to audit and log security related events through inspection of host-based network traffic for malicious activity, key files for changes, and system logs for indicators of suspicious activity. Logs include for example, time stamps, source and destination addresses, identifiers, event descriptions, success/fail indications, rules involved. Security event information can be integrated with an organization's SIM product if required. SecureCloud provides audit records for cryptographic key generation, key access, and key destruction and also on the success or failure of cryptographic operations carried out by the validated FIS 140-2, Level 2 cryptographic libraries. Deep Discovery Inspector and Deep Security provide, in their Security Targets, a listing of Audit vents and rationale to further assist an organization in meeting this requirement. Deep Discovery Inspector v3.1 has been AL2 certified by the Common Criteria valuation and Certification Scheme; and Deep Security v9.5 is currently being evaluated to AL2.

10 CS ITSG-33 Control addition, audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the right level of abstraction for audit record generation is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Related control: AU-3 Tailoring and Implementation Guidance: The information system audits the following privileged user/process events at a minimum: (a) Successful and unsuccessful attempts to access, modify, or delete security objects (Security objects include audit data, system configuration files and file or users' formal access permissions.) (b) Successful and unsuccessful logon attempts (c) rivileged activities or other system level access (see notes for AU-2 (4)) (d) Starting and ending time for user access to the system (e) Concurrent logons from different workstations (f) All program initiations (see notes for AU-2 (4)) In addition, the information system audits the following unprivileged user/process events at a minimum: (a) Successful and unsuccessful attempts to access, modify, or delete security objects (b) Successful and unsuccessful logon attempts (c) Starting and ending time for user access to the system (d) Concurrent logons from different workstations AU-2 (3) Technical / Audit and Accountability / Auditable vents / Reviews and Updates The organization reviews and updates the list of auditable events [Assignment: organization-defined frequency]. Supplemental Guidance: The list of auditable events is defined in AU-2. Deep Discovery Inspector, Deep Security and SecureCloud satisfy this requirement to review and update the events that are audited by permitting an organization to define and implement audit event type and frequency. In addition, Deep Security and SecureCloud security event information can be integrated with an organization's SIM product if required. All products have the ability to provide security event data to an organizations central syslog server. AU-3 Technical / Audit and Accountability / Content of Audit Records AU-3 Technical / Audit and Accountability / Content of Audit Records (A) The information system produces audit records that contain sufficient information to, at a minimum, establish what type of event occurred, when (date and time) the event occurred, where the event occurred, the source of the event, the outcome (success or failure) of the event, and the identity of any user/subject associated with the event. Supplemental Guidance: Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Related controls: AU-2, AU-8 1 Deep Discovery Inspector supports, at an enterprise level, this requirement by enabling organizations to audit and log security related events through inspection of network traffic between and within an organizations network including: communications or links to suspicious/malicious endpoints, suspicious/malicious network traffic, and infected files. Logs include, time stamps, source and destination addresses, identifiers, event descriptions, success/fail indications, rules involved. Security event information can be integrated with an organization's syslog server if required. Deep Security supports, at an enterprise level, this requirement by enabling organizations to audit and log security related events through inspection of host-based network traffic for malicious activity, key files for changes, and system logs for indicators of suspicious activity. Logs include for example, time stamps, source and destination addresses, identifiers, event descriptions, success/fail indications, rules involved. Security event information can be integrated with an organization's SIM product if required. SecureCloud supports, at an enterprise level, this requirement by generating log and audit records for cryptographic key generation, cryptographic key access, and cryptographic key destruction. In addition, the success or failure of cryptographic operations is an auditable event. Deep Discovery Inspector, Deep Security, and SecureCloud generate audit data in accordance with this requirement. As evidence Deep Discovery Inspector v3.1 has been AL2 certified by the Common Criteria valuation and Certification Scheme; and Deep Security v9.5 is currently being evaluated to AL2 for audit events and generation. Document TMIC-004-CS Version 2.0, February

11 CS ITSG-33 Control AU-3 (1) Technical / Audit and Accountability / Content of Audit Records / Additional Audit Information The information system includes [Assignment: organization-defined additional, more detailed information] in the audit records for audit events identified by type, location, or subject. Supplemental Guidance: An example of detailed information that the organization may require in audit records is full-text recording of privileged commands or the individual identities of group account users. Tailoring and Implementation Guidance: Additional guidance for enhancement (1): Audit events should always be capable of being associated with an individual identity. Associating audit events with a group or role is insufficient. Deep Discovery Inspector, Detection Logs can be queried for additional information, by detection types (Threats, Disruptive Applications, Malicious URLs, Virtual Analysis, Correlated Incidents, and Custom Detections), and time range. Deep Security supports compliance with this requirement through the defined audit events and the ability to carry out specific queries against the audit records simplifying the ability to locate the information of interest. In addition, deep packet inspection permits the capture of event data, at the packet level, which can be analysed for additional audit data relating to the security event SecureCloud provides a range of predefined reports that administrators can use to monitor and analyze encryption key usage patterns, inventory changes, and SecureCloud Agent activities. Administrators can also use reports to audit user activities such as web console access, policy changes, and responses to pending encryption key requests. Deep Discovery Inspector v3.1 has been AL2 certified by the Common Criteria valuation and Certification Scheme; and Deep Security v9.5 is currently being evaluated to AL2 for audit events and generation of audit data. AU-3 (2) Technical / Audit and Accountability / Content of Audit Records / Management of lanned Audit Record Content The organization centrally manages the content of audit records generated by [Assignment: organization-defined information system components]. Tailoring and Implementation Guidance: This security control/enhancement cannot be met using readily available Commercial-Off-The-Shelf (COTS) components. Consequently, implementation of this security control/enhancement may be somewhat problematic. Deep Discovery Inspector, Deep Security, and SecureCloud when integrated with the Trend Micro Control Manager support this requirement by providing centralized management and configuration of security events, rules and policies. vent information can be integrated with an organization's SIM product. Individually the products provide their own centralized management capability: - Deep Discovery Inspector, Management Console provides a built-in online capability through which users can view system status, configure threat detection, configure and view logs, run reports, and administer Deep Discovery Inspector. - Deep Security through the centralized control of the Deep Security Manager supports the satisfying of this requirement for the audit event management and configuration. SecureCloud through the centralized Web Console and the Key Management Server Web Console support implementing this control for audit event management, policies, and Integrity Checks. AU-4 Technical / Audit and Accountability / Audit Storage Capacity AU-4 Technical / Audit and Accountability / Audit Storage Capacity (A) The organization allocates audit record storage capacity and configures auditing to reduce the likelihood of such capacity being exceeded. Supplemental Guidance: The organization considers the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Related controls: AU-2, AU-5, AU-6, AU-7, SI-4 1 Deep Discovery Inspector through the guarantee of audit data availability and the prevention of audit data loss ensures that if there is insufficient audit storage capacity the latest audit records are maintained and the organization is alerted to the issue. Deep Security satisfies this requirement by monitoring the disk space available for logs and audit records, should free disk space fall below a threshold level alerts will be issued and audit /log data collected will be stored in temporary memory at the agent until sufficient free disk space is available. SecureCloud supports compliance with this requirement by providing log-maintenance-plan functionality and allowing the appropriate account-user roles to delete system logs and manage the log maintenance. These capabilities have been assured by the Deep Discovery Inspector v3.1, which has been AL2 certified by the Common Criteria valuation and Certification Scheme; and Deep Security v9.5 is currently being evaluated to AL2. NOT: AU-4 security controls have been added to the 2014 S Revision 4 security controls catalogue. They are not included in ITSG-33 which is based on the earlier 2009 Revision 3. Deep Discovery Inspector, Deep Security and SecureCloud Compliancy guidance for these new controls are provided in the referenced compliance report for NIST S Revision 4, which is available from Trend Micro: AU-4 (1) Technical / Audit and Accountability / Audit Storage Capacity / Transfer to Alternate Storage Document TMIC-004-CS Version 2.0, February

12 CS ITSG-33 Control AU-5 Technical / Audit and Accountability / Response to Audit rocessing Failures AU-5 (1) Technical / Audit and Accountability / Response to Audit rocessing Failures / Audit Storage Capacity The information system provides a warning when allocated audit record storage volume reaches [Assignment: organization-defined percentage] of maximum audit record storage capacity. Deep Discovery Inspector through the guarantee of audit data availability and the prevention of audit data loss ensures that if there is insufficient audit storage capacity the latest audit records are maintained and the organization is alerted to the issue. Deep Security can satisfy this requirement by monitoring the disk space available for logs and audit records, should free disk space fall below a threshold level alerts will be issued and audit /log data collected will be stored in temporary memory at the agent until sufficient free disk space is available. SecureCloud supports compliance with this requirement by providing log-maintenance-plan functionality and allowing the appropriate account-user roles to delete system logs and manage the log maintenance. These capabilities have been assured by the Deep Discovery Inspector v3.1, which has been AL2 certified by the Common Criteria valuation and Certification Scheme; Deep Security v9.5 is currently being evaluated to AL2. AU-6 Technical / Audit and Accountability / Audit Review, Analysis and Reporting AU-6 Technical / Audit and Accountability / Audit Review, Analysis and Reporting (A) The organization reviews and analyzes information system audit records [Assignment: organization-defined frequency] for indications of inappropriate or unusual activity, and reports findings to designated organizational officials. (B) The organization adjusts the level of audit review, analysis, and reporting within the information system when there is a change in risk to organizational operations, organizational assets, individuals, other organizations, or Canada based on law enforcement information, intelligence information, or other credible sources of information. Supplemental Guidance: Related control: AU-7, AC-5 References: TBS Operational Security Standard - Management of Information Technology Security [Reference 8]. Tailoring and Implementation Guidance: In order for audit to be effective, audit logs need to be collected from the various systems, amalgamated centrally and analyzed regularly by an automated tool. This approach ensures that audit logs are scrutinized and that coordinated attacks can be identified. Although an automated capability is preferable, this security control can be met using manual processes. 1 Deep Discovery Inspector can assist in meeting this control requirement through the Retro Scan Service, which scans historical web access logs (audit) for callback attempts to Command & Control(C&C) servers and other related activities in a network. Web access logs may contain undetected and unblocked connections to C&C servers that have only recently been discovered. Deep Discovery Inspector forwards suspicious events to a centralized logging server for further correlation, reporting and archiving. The Deep Security Log Inspection capability provides visibility into important security events buried in log files, and creates audit trails of administrator activity. Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIM system or centralized logging server for correlation, reporting and archiving. Deep Security also maintains information regarding the administration and management of its security functions as part of the audit records. SecureCloud provides a range of predefined reports that administrators can use to monitor and analyze encryption key usage patterns, inventory changes, and SecureCloud Agent activities. Administrators can also use reports to audit user activities such as web console access, policy changes, and responses to pending encryption key requests. SecureCloud records system events including all communication between a SecureCloud Agent and the Key Management Server. AU-6 (1) Technical / Audit and Accountability / Audit Review, Analysis and Reporting / rocess Integration The information system integrates audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities. Deep Discovery Inspector employs continuous monitoring of threat detections, which includes information on: Malicious Content, Malicious Behavior, Suspicious Behavior, xploits, Grayware, Web Reputation, and Disruptive Applications. This threat data can be sent to a centralized logging server for correlation, reporting and archiving with audit record data to support organizational processes for investigation and response to suspicious activities. Deep Security, Recommendation Scan supports this requirement by allowing organizations to automate scanning of systems and patch levels against the latest Critical Vulnerability and xposure (CV) database, to automatically apply Deep Security rules/filters to detect/prevent exploitation of these vulnerabilities and to produce audit logs and reports which can be used to support a continuous monitoring program or audits. SecureCloud and Deep Security support this integration of audit capabilities through the audit management functionality of the Deep Security Manager and the SecureCloud Management Server. Document TMIC-004-CS Version 2.0, February

Security Standards Compliance NIST SP Release 4 Trend Micro Products (Deep Security and SecureCloud) - Version 1.1

Security Standards Compliance NIST SP Release 4 Trend Micro Products (Deep Security and SecureCloud) - Version 1.1 Security Standards Compliance NIST SP 800-53 Release 4 Trend Micro Products (Deep Security and SecureCloud) - Version 1.1 Document TMIC-003-N Version 1.1, 24 August 2012 1 Security and Privacy Controls

More information

Mapping of ITSG-33 Security Controls to SP Revision 4 Security Controls

Mapping of ITSG-33 Security Controls to SP Revision 4 Security Controls 1 April 2013 BD Pro Mapping of ITSG-33 Security Controls to SP 800-53 Revision 4 Security Controls NIST SP 800-53 Revision 4 is replacing the August 2009 Revision 3 version of the security controls catalogue.

More information

CloudCheckr NIST Audit and Accountability

CloudCheckr NIST Audit and Accountability CloudCheckr NIST 800-53 Audit and Accountability FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/protect/ndcbf_

More information

Rev.1 Solution Brief

Rev.1 Solution Brief FISMA-NIST SP 800-171 Rev.1 Solution Brief New York FISMA Cybersecurity NIST SP 800-171 EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker delivers business critical

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Host Intrusion The Host Intrusion employs a response to a perceived incident of interference on a host-based system

More information

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security

More information

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to DoD Guidance for Reviewing System Security Plans and the s Not Yet Implemented This guidance was developed to facilitate the consistent review and understanding of System Security Plans and Plans of Action,

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

MIS Week 9 Host Hardening

MIS Week 9 Host Hardening MIS 5214 Week 9 Host Hardening Agenda NIST Risk Management Framework A quick review Implementing controls Host hardening Security configuration checklist (w/disa STIG Viewer) NIST 800-53Ar4 How Controls

More information

EXABEAM HELPS PROTECT INFORMATION SYSTEMS

EXABEAM HELPS PROTECT INFORMATION SYSTEMS WHITE PAPER EXABEAM HELPS PROTECT INFORMATION SYSTEMS Meeting the Latest NIST SP 800-53 Revision 4 Guidelines SECURITY GUIDELINE COMPLIANCE There has been a rapid increase in malicious insider threats,

More information

Total Security Management PCI DSS Compliance Guide

Total Security Management PCI DSS Compliance Guide Total Security Management PCI DSS Guide The Payment Card Industry Data Security Standard (PCI DSS) is a set of regulations to help protect the security of credit card holders. These regulations apply to

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations VARONIS COMPLIANCE BRIEF NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) 800-53 FOR FEDERAL INFORMATION SYSTEMS CONTENTS OVERVIEW 3 MAPPING NIST 800-53 CONTROLS TO VARONIS SOLUTIONS 4 2 OVERVIEW

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Recommended Security Controls for Federal Information Systems and Organizations

Recommended Security Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 3 Excerpt Recommended Security Controls for Federal Information Systems and Organizations JOINT TASK FORCE TRANSFORMATION INITIATIVE HIGH-IMPACT BASELINE I N F

More information

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 3 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls High Baseline Includes updates through 04-22-2005 AC-1 ACCESS CONTROL

More information

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE Aeronautical Telecommunication Network Implementation Coordination Group (ATNICG) ASIA/PAC RECOMMENDED SECURITY CHECKLIST September 2009

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

MINIMUM SECURITY CONTROLS SUMMARY

MINIMUM SECURITY CONTROLS SUMMARY APPENDIX D MINIMUM SECURITY CONTROLS SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS The following table lists the minimum security controls, or security control baselines, for

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

NIST Compliance Controls

NIST Compliance Controls NIST 800-53 Compliance s The following control families represent a portion of special publication NIST 800-53 revision 4. This guide is intended to aid McAfee, its partners, and its customers, in aligning

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

NIST Special Publication

NIST Special Publication DATASHEET NIST Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations Mapping for Carbon Black BACKGROUND The National Institute of Standards and Technology

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

SAC PA Security Frameworks - FISMA and NIST

SAC PA Security Frameworks - FISMA and NIST SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

A Measurement Companion to the CIS Critical Security Controls (Version 6) October A Measurement Companion to the CIS Critical Security Controls (Version 6) October 2015 1 A Measurement Companion to the CIS Critical Security Controls (Version 6) Introduction... 3 Description... 4 CIS

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Mapping BeyondTrust Solutions to

Mapping BeyondTrust Solutions to TECH BRIEF Taking a Preventive Care Approach to Healthcare IT Security Table of Contents Table of Contents... 2 Taking a Preventive Care Approach to Healthcare IT Security... 3 Improvements to be Made

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security NIST 800-82 Revision 2: Guide to Industrial Control Systems (ICS) Security How CyberArk can help meet the unique security requirements of Industrial Control Systems Table of Contents Executive Summary

More information

Four Deadly Traps of Using Frameworks NIST Examples

Four Deadly Traps of Using Frameworks NIST Examples Four Deadly Traps of Using Frameworks NIST 800-53 Examples ISACA Feb. 2015 Meeting Doug Landoll dlandoll@lantego.com (512) 633-8405 Session Agenda Framework Definition & Uses NIST 800-53 Framework Intro

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity Kaspersky Enterprise Cybersecurity Kaspersky Endpoint Security v3.2 Mapping 3.2 regulates many technical security requirements and settings for systems operating with credit card data. Sub-points 1.4,

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

THE TRIPWIRE NERC SOLUTION SUITE

THE TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED BUSINESS INTELLIGENCE SOLUTION BRIEF THE TRIPWIRE NERC SOLUTION SUITE A TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

MEETING ISO STANDARDS

MEETING ISO STANDARDS WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced

More information

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Privileged Account Security: A Balanced Approach to Securing Unix Environments Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged

More information

The "Notes to Reviewers" in the February 2012 initial public draft of Revision 4 of SP states:

The Notes to Reviewers in the February 2012 initial public draft of Revision 4 of SP states: Major Enhancements to NIST SP 800-53 Revision 4 BD Pro The "Notes to Reviewers" in the February 2012 initial public draft of Revision 4 of SP 800-53 states: "The proposed changes included in Revision 4

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Aligning with the Critical Security Controls to Achieve Quick Security Wins Aligning with the Critical Security Controls to Achieve Quick Security Wins Background The Council on CyberSecurity s Critical Security Controls for Effective Cyber Defense provide guidance on easy wins

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Aligning Agency Cybersecurity Practices with the Cybersecurity Framework

Aligning Agency Cybersecurity Practices with the Cybersecurity Framework POINT OF VIEW Aligning Agency Cybersecurity Practices with the Cybersecurity Framework Leveraging Gigamon to Align Cybersecurity Budgets with Desired Business Outcomes 2013-2017 Gigamon. All rights reserved.

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security Sneak Peak at CIS Critical Security Controls V 7 Release Date: March 2018 2017 Presented by Kelli Tarala Principal Consultant Enclave Security 2 Standards and Frameworks 3 Information Assurance Frameworks

More information

CIP Cyber Security Systems Security Management

CIP Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security System Security Management 2. Number: CIP-007-5 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in

More information

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045 Critical Security Control Solution Brief Version 6 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable,

More information

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls Mapping of FedRAMP Tailored LI SaaS Baseline to ISO 27001 Security Controls This document provides a list of all controls that require the Cloud Service Provider, Esri, to provide detailed descriptions

More information

Meeting RMF Requirements around Compliance Monitoring

Meeting RMF Requirements around Compliance Monitoring Meeting RMF Requirements around Compliance Monitoring An EiQ Networks White Paper Meeting RMF Requirements around Compliance Monitoring Purpose The purpose of this paper is to provide some background on

More information

Certification Report

Certification Report Certification Report Symantec Security Information Manager 4.8.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

Standard: Event Monitoring

Standard: Event Monitoring October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

IT Services IT LOGGING POLICY

IT Services IT LOGGING POLICY IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

Title: Planning AWS Platform Security Assessment?

Title: Planning AWS Platform Security Assessment? Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Red Hat Enterprise Linux (RHEL) 5.3 Certified Linux Integration Platform (CLIP) Security Requirements Analysis

Red Hat Enterprise Linux (RHEL) 5.3 Certified Linux Integration Platform (CLIP) Security Requirements Analysis Red Hat Enterprise Linux (RHEL) 5.3 Certified Linux Integration Platform (CLIP) Security Requirements Analysis Prepared By: Tresys Technology, LLC March 17, 2009 Table of Contents 1 Introduction... 1 1.1.

More information

Technical Reference [Draft] DRAFT CIP Cyber Security - Supply Chain Management November 2, 2016

Technical Reference [Draft] DRAFT CIP Cyber Security - Supply Chain Management November 2, 2016 For Discussion Purposes Only Technical Reference [Draft] DRAFT CIP-013-1 Cyber Security - Supply Chain Management November 2, 2016 Background On July 21, 2016, the Federal Energy Regulatory Commission

More information