nist information technology laboratory itl the cyber
play

NIST Information Technology Laboratory (ITL) The Cyber Maryland - PowerPoint PPT Presentation

NIST Information Technology Laboratory (ITL) The Cyber Maryland Showcase Security Automation Guidance Tower of Babel Documents Too much Alerts & Web Sites proprietary, Advisories incompatible information Costly


  1. NIST Information Technology Laboratory (ITL) The Cyber Maryland Showcase

  2. Security Automation Guidance • “Tower of Babel” Documents – Too much Alerts & Web Sites proprietary, Advisories incompatible information – Costly – Error prone – Difficult to scale • Inefficient – Resources spent on Assessment “security hygiene” Reporting Tools Tools • Vulnerability management • Configuration Management management Tools • Patch management 2

  3. Security Automation •Automation: Guidance Documents – Compliance Alerts & Management (PCI, Web Sites Advisories HIPAA, etc…) – Efficiency – Accuracy – Resources re-tasked to harder problems: • Incident response • Infrastructure enhancement Assessment Reporting Tools • Standardization: Tools – Same Object, Same Management Name Tools – Reporting 3

  4. National Vulnerability Database • NVD is the U.S. government repository of public vulnerability management information. • Provides standardized reference for software vulnerabilities. • Used by government, industry and academia • Spanish and Japanese language translations

  5. National Checklist Program U.S. Government repository of publicly available security checklists � Eases compliance management � Checklists cover 178 products � Checklist contributors include � Government organizations � Vendors � Non-profit organizations

  6. Partners • US Government – National Security Agency (NSA) – Department of Homeland Security (DHS) – Defense Information Systems Agency (DISA) • Foreign Government – Japan - JVN/IPA - Japan Vulnerability Notes / Information Technology Promotion Agency – Spain – INTECO - Instituto Nacional de Tecnologías de la Comunicación • Private Sector – Apple, Microsoft, Red Hat, Sun Microsystems – Security product vendors

  7. Product Validation Program http://nvd.nist.gov/scapproducts.cfm

  8. John Banghart Computer Security Division Information Technology Laboratory john.banghart@nist.gov 301-975-8514

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend