- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
The long view of security strategies for your network.
In this column, I review three important aspects of early warnings in CIRT management: notification of vulnerabilities, notification of threats and notification of incidents.
A computer incident response team (CIRT) relies on operations managers to maintain adequate defenses by maintaining up-to-date system and application software. The subject of patch management is complex and will be discussed in another series, but I can remind readers that there are many resources on which to draw for notification of newfound vulnerabilities. Each network-equipment and system-software vendor generally provides a notification service; many organizations have one of their employees subscribe to these to keep up with the news.
A better approach, less susceptible to interruption, is to set up a special e-mail address for all the subscriptions and to assign one or more people to read that mail every day. If one of the team members is away on assignment or on vacation, be sure that a replacement person takes over the task of scanning the notices to spot anything that is relevant to your network configuration. Instead of forwarding the messages to an individual’s mailbox, all of them can be kept in a separate mailbox accessible to everyone on the team.
There are also many newsletters that summarize vulnerabilities; I particularly like “@RISK: The Consensus Security Alert” from the SANS Institute; you can subscribe at no cost using:
Finally, regular readers will recall that the Common Vulnerabilities and Exposures (CVE) dictionary ( http://cve.mitre.org/ ) is a superb compendium of standardized names for vulnerabilities and exposures. MITRE writes, “CVE aspires to describe
and name all publicly known facts about computer systems that could allow somebody to violate a reasonable security policy
for that system.”
MITRE also uses the term “exposure” and defines it as “security-related facts that may not be considered to be vulnerabilities by everyone.” You can download the CVE in various formats or you can use the ICAT Metabase ( http://icat.nist.gov/icat.cfm ) to search the CVE for various subsets of vulnerabilities (e.g., by product, version, type, and so on). At the time of this writing (late June) there were 6,663 vulnerabilities in the CVE. As a side note, of these, 1,383 involved buffer overflows (about one-fifth).
There’s a wide range of resources keeping track of security threats. By staying up to date about new threats, you can improve your defenses before you are attacked; e.g., if particular attacks are growing in frequency and there are configuration changes or other measures you can take to stave them off, early warning is a real help. Some of the more popular alert letters - and where you can subscribe - include:
* Computerworld Security Update
* DHS/IAIP Daily Open Source Report
* Information Security This Week
* SANS NewsBites
* SC Infosecurity Opinionwire
Editor’s Note: Let us not forget Network World’s own twice-weekly Virus and Bug Patch Alert for threats and vulnerabilities.
If you’re not already a subscriber you can sign up at:
Finally, it’s important to know when there’s an incident happening in your own system. Intrusion detection systems should be configured to alert CIRT or network management personnel at once when there are successful intrusions, disturbances of network performance, equipment malfunctions and other incidents. There are systems available to coordinate output from network and security systems for rapid notification; for example, the GFI LANguard Security Event Log Monitor (S.E.L.M.) is described as follows:
“GFI LANguard Security Event Log Monitor (S.E.L.M.) performs event log based intrusion detection and network-wide event log management. GFI LANguard S.E.L.M. archives and analyzes the event logs of all network machines and alerts administrators in real time to security issues, attacks and other critical events. GFI LANguard S.E.L.M.'s intelligent analysis means network administrators need not be 'event gurus' to be able to:
* Monitor for critical security events network-wide, and detect attacks and malicious network users.
* Receive alerts about critical events on Exchange, ISA, SQL and IIS Servers.
* Back up and clear event logs network-wide, and archive them to a central database.”
Note: I have no financial interest whatsoever in the resources listed in this article. Mention of specific products should not be interpreted as endorsement.
Read more about security in Network World's Security section.
M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services and teaching. He is Chief Technical Officer of Adaptive Cyber Security Instruments, Inc. and Associate Professor of Information Assurance in the School of Business and Management at Norwich University. Visit his Web site for white papers and course materials.