Educational CyberPlayGround ®☰ Menu

NIST - Security Configuration check list

DISASTER CHECK LIST
COMMUNICATION AND COMMAND BREAK DOWN

 

National Institute of Standards and Technology
Technology Administration
U.S. Department of Commerce

The National Institute of Standards and Technology (NIST)  is cooperating with other federal agencies, IT vendors, and with industry to advance the development and use of security configuration checklists. A security configuration checklist (sometimes called a security configuration guide, lockdown guide, hardening guide, security technical implementation guide, or benchmark) is basically a series of instructions for configuring an information technology (IT) product to an operational environment. Checklists can be useful tools for reducing vulnerabilities to systems, especially for small organizations with limited resources.  IT vendors often create checklists for their own products, but other organizations such as consortia, academic groups, and government agencies have also developed them.

Checklists can be used to counter threats to computers, such as remotely launched attacks through networks and the spread of malicious code through e-mails, malicious websites, and file downloads. Vulnerabilities in IT products are discovered almost daily. Because many IT products are designed to serve a wide variety of users, they may not provide needed restrictive security controls routinely. As a result, computers can be vulnerable to threats when the products are installed. Even experienced system administrators may find it difficult and time-consuming to identify the right set of security settings for many IT products.

The NIST checklists program, described in this ITL Bulletin, includes over fifty checklists. 
http://csrc.nist.gov/checklists/

Why Checklists Are Needed

The Cyber Security Research and Development Act of 2002 (Public Law 107-305)
designates NIST to "develop, and revise as necessary, a checklist setting forth settings and option selections that minimize the security risks associated with each computer hardware or software system that is, or is likely to become, widely used within the Federal Government."

What are Checklists

A security checklist in its simplest form can be a document that contains instructions or procedures for configuring an IT product to a baseline level of security. Checklists are also commonly referred to as lockdown guides, hardening guides, security technical
implementation guides (STIGS), or benchmarks. A checklist could contain scripts, templates, and pointers to patches, or updates or firmware upgrades that can be applied to a product. A checklist might include any of the following:

* Configuration files that automatically set various security settings (e.g., executables, security templates that modify settings, scripts);

* Documentation (e.g., text file) that guides the checklist user to configure software manually;

* Documents that explain the recommended methods for the secure installation and configuration of a device; and/or

* Policy documents that set forth guidelines for activities such as audits, authentication security (e.g., passwords), and perimeter security.

The instructions in a security configuration checklist can apply to administrative practices as well as security settings for an IT product to support improvements to the product's security. Often, successful attacks on systems are the direct result of poor administrative practices such as not changing default passwords or failure to apply new patches.

The NIST program provides a consistent process for
the development, review, and use of checklists.  Examples of IT product technology areas that are included are: operating systems, database systems, web servers, e-mail servers, firewalls, routers, intrusion detection systems, virtual private networks, biometric devices, smart cards, telecommunication switching devices, and web browsers.

The NIST Checklists Program

NIST is currently working with other checklist-producing organizations including the Defense Information Systems Agency (DISA), the National Security Agency (NSA), and the Center for Internet Security (CIS), as well as IT product vendors and vendors of configuration and management
products.

NIST checklist repository
http://csrc.nist.gov/checklists/repository/index.html

NIST welcomes comments on all aspects of the checklists program. Comments may be submitted to checklists@nist.gov.


Elizabeth B. Lennon
Writer/Editor
Information Technology Laboratory
National Institute of Standards and Technology
100 Bureau Drive, Stop 8900
Gaithersburg, MD 20899-8900
Telephone (301) 975-2832
Fax (301) 840-1357

--

Software insecurity: Plenty of blame to go around
http://www.gcn.com/online/vol1_no1/40437-1.html
04/18/06

The reason software so often is not secure is the fault either of developers or of users.
[ ... Stuart Katzke of the National Institute of Standards and Technology said that standards and guidelines developed by NIST could help provide that methodology. He said the suite of documents produced for the Federal Information Security Management Act effectively establish a level of due diligence for government IT systems. "It is likely to become due diligence for the private sector as well," 
he said. The NIST publications establish requirements for agencies to comply with FISMA. Development of the standards and supporting guidelines are the first phase of FISMA implementation, he said. "We're completing the last document now," Katzke said. That is Special Publication 800-53A, a security control assessment guide. NIST has
begun the second phase of implementation, which is an accreditation program for security assessment providers. A third phase, development of a system to validate FISMA compliance tools, is "out in he future." "The framework that we have established for federal agencies is really applicable to any environment," Katzke said. He said NIST is working with the IEEE to standardize its suite of documents that would help any organization go through the categorization, assessment and accreditation process required of government systems by FISMA.]

UCITA - BAD SOFTWARE - The Right Of Return - Warranties for "Free" Software - It does not require software publishers to reveal known defects www.affect.ucita.org

[ ... Evaluation can take months or years and can cost from
hundreds-of-thousands to millions of dollars. One person said theCommon Criteria evaluation was not worth the $150,000 "entry fee" a vendor could expect to pay unless the vendor had a government contract in hand that would justify the process.

© Educational CyberPlayGround ® All rights reserved world wide.