Title: Nick Connor,
1Security Innovation Technology Consortium
(SITC) Governance, Risk Compliance Special
Interest Group (GRC SIG) GRC Interoperability
Standard Thursday, 22nd January 2009 CPNI,
London
- Nick Connor,
- Assuria Limited
Stephen Hall Infogov
Mike Popham Infogov
2Agenda
1230 Arrival, Registration, Lunch 1300
Welcome and Introduction (Paul Osborne, SITC)
1310 Government perspective on GRC (Phil H,
CPNI) 1320 Industry perspective on GRC (Martin
Jordan, KPMG) 1330 GRC Presentation - Stephen
Hall 1400 GRC Interoperability Architecture -
Nick Connor and Mike Popham 1420 GRC
Interoperability Demonstration - Nick Connor and
Stephen Hall 1450 GRC Essential Features
Demonstration - Nick Connor and Stephen Hall
1515 QA
3Stephen
GRC Presentation - Stephen Hall
Governance - setting business strategy
objectives, determining risk appetite,
establishing culture values, developing
internal policies and monitoring
performance. Risk Management - identifying and
assessing risk that may affect the ability to
achieve objectives, applying risk management to
gain competitive advantage and determine risk
response strategies and control
activities. Compliance - operating in accordance
with objectives and ensuring adherence with laws
and regulations, internal policies procedures,
and stakeholder commitments.
4Stephen
GRC Framework for Corporate Objectives
GRC provides a framework and a methodology to
enable those people responsible for managing the
business to give confidence to those people who
are accountable to shareholders and to regulators
that corporate objectives are being met.
5Business drivers for an integrated approach to
GRC
Stephen
Increased complexity due to globalisation
Increased competitive pressures
Increasing regulations
Governance Risk and Compliance
Ethical and financial scandals
New technologies
Integrity-driven performance expectations
Transparency and accountability demands
Increased demands from stakeholders
6GRC Challenges PwC/META Group Research
Stephen
Strategic View Operational
Issues Future Trends
- Significant improvements are expected in the
areas of data accuracy, quality of decision
making, task redundancies, etc. - Technology will be a critical GRC enabler
- Effective GRC can realise value in the areas of
reputation and brand, employee retention and
revenue
- See GRC as a value driver
- The need for connection among GRC is understood
and valued although operational issues exist - Exposure to substantial risk through
insufficient commitment to risk management
- Manual processes are instrumental to meet GRC
requirements - Most do not have real-time GRC capability 1/3
of regulated organisations are not even close - Growing investment area, but light on cost and
value measurement - Investment shifting towards technology
7Stephen
GRC What are the objectives?
Governance Ultimately, Governance determines what
the Board is responsible for and to what degree
it entrusts day-to-day administration to the CEO,
the management team and perhaps below. Knowledge
Management In creating a shared governance, risk
and compliance environment, software supports
performance objectives by regulation, standards
and policy to whatever degree the Board wants.
Process Crucially, software enables linkage of
roles, processes and assets. Plan, Do, Check.
Act (PDCA) processes should be effectively
managed in a single framework so the organization
as a whole is better governed Technology Convergen
ce of data, status, actions and incidents must be
easily monitored, providing visibility and
control to the business.
8Stephen
What Do GRC Technologies Achieve
Online audit of external suppliers, saves time
money
Online audit any part of your organisation
against any standard Create an Information
Security focused asset register Define generic
work roles Do business impact analysis simply
easily Identify the key services, assets data
which need Business Continuity or DR Perform Risk
Assessments, simply easily Incident reporting
with a difference Build a central policy
register Helps you plan your security
investment Provides you with a real time
RiskView Allows you to report on anything
Links assets to legislation/controls
Roles linked to controls/policy/procedures
Quick win, keeps risk business focused
Reduce exposure
Reduces risks with countermeasures
Understand the financial operational impact
Supports the audit process
Spend effectively wisely
Manage more effectively
Reduces reliance on third partys
9Stephen
Enterprise Scope of GRC Technologies
A dashboard bridges the gap between the
complexity of the subject and senior management
Flexible reporting to enable the audit committee
to quickly evaluate the companys risk
Gather information from subject matter
experts and add value through integration of data
Compliance (Gap Analysis) for any Standard,
Regulation, or Legislation
10Mike
Requirement to Interoperate
Operational Requirement Throughout supply
chain, dynamically sense, analyse and manage -
Risks - operational, financial and IT -
Compliance with regulations, standards, policies
and objectives Need therefore for multiplicity
of sensors to interface with GRC technology so
that the management and reporting utility exists
for these operational requirements to be met and
actions taken
Sensors Heat, Light, Sound Locks, Alarms,
CCTV, Illumination, Physical, Wireless,
Information, Technologies such as for Identity
Management
11Mike
Interoperability Architecture
Sense Host Enterprise
Upload current risk register (inherits current
values)
Link assets to process to roles carried out by
people
Adopt controls from internal or external standards
Effect Host Enterprise
Author own controls using Proteus self authoring
tool
Auto generation of Questionnaires, emailed,
delegated and responded to yes, no, partial with
evidence and action plans etc
Creates shared GRC environment with instant
reporting via www
Template Library Summary ISO 27000 series, BS
25999, Physical Risk Audit, Gambling Commission,
CobiT 4.1, Data Protection Act, EU Data Privacy,
Civil Contingencies Act, Freedom of Information
Act, SOX, SAS70, PCI DSS, PAS8000, ISF
12GRC SensorsInteroperability architecture
- Nick Connor, MBCS, CITP, MMIS
- Managing Director and Co-founder
- Assuria Limited
13Sensors
- Introduction
- Sensor relation to GRC
- Sensor capabilities
- Sensors and GRC
- Required GRC Standard
- Summary
14Sensors
- What do we mean by sensors?
- Tools (typically software) that monitor the
status (state) of a process or asset. - Our focus is anything that may impact the
Confidentiality, Integrity or Availability of
assets. - Broadly
- IT assets and controls
- Physical assets and controls
- External / Environmental
15Typical sensor
Management Console
Management Console
Summarise and report
Summarise and report
Summarise and report
Database
Summarise and report
Summarise and report
Aggregate / evaluate
Aggregate / evaluate
Aggregate / evaluate
Aggregate / evaluate
Aggregate / evaluate
Reports
Monitor, detect and report events and conditions
Agents Probes Detectors
Monitor, detect and report events and conditions
Monitor, detect and report events and conditions
16Example IT sensors
- System monitors
- Vulnerability assessment, configuration and
policy compliance t - Network traffic monitors
- Intrusion detection, Intrusion prevention,
Firewall/Router logs, - Access and identity monitors
- Failed logins, privilege escalation, Bio-metric
identities - Web site monitors
- Vulnerabilities, Pages visited, referred from,
- End point monitoring
- Permitted user activity, Data leakage monitoring
- Anti-virus, anti-phishing, Malware detection
- Others
- Event and Audit log collection Operating
System, Infrastructure, applications
17GRC and Sensors
Governance, Risk and Compliance
Controls ISO 27001, ISO 13335, NIST 800-53, CIS
SENSORS
Software sensorsFor example Configuration
assurance, Vulnerability assessment, Policy
compliance, Change detection, Audit log management
Source Gartner (January 2006)
18Sensors can .
- provide automated input from low level data to
- Identify changes in the risk posture of assets
- confirm compliance to legislation and regulation
- (or non-compliance)
- verify and confirm working controls (and not
working controls) - correlate / aggregate many events into state
change - highlight new risks / threats
- identify incidents
- identify possible data leakage
- identify potential reputation damage
- many more
19To enable sensorsto provide data toGRC we need
aninterface.
GRC systems
- Common Language
- Connection technology
- Protocol
Management Console
Management Console
Summarise and report
Database
Summarise and report
Summarise and report
Summarise and report
Summarise and report
Aggregate / evaluate
Aggregate / evaluate
Aggregate / evaluate
Aggregate / evaluate
Aggregate / evaluate
Reports
Monitor, detect and report events and conditions
Agents Probes Detectors
Monitor, detect and report events and conditions
Monitor, detect and report events and conditions
20GRC systems
GRC Interface mustsupport multiple sensors
- Common Language
- Connection technology
- Protocol
Different sensors
Summarise and report
Database
Summarise and report
Database
Aggregate / evaluate
Reports
Reports
Monitor, detect and report events and conditions
Monitor, detect and report events and conditions
Monitor, detect and report events and conditions
Aggregate / evaluate Monitor, detect and report
events and conditions
21GRC and Sensors
Governance, Risk and Compliance
Controls ISO 27001, ISO 13335, NIST 800-53, CIS
GRC Interface for Information exchange
Software sensorsFor example Configuration
assurance, Vulnerability assessment, Policy
compliance, Change detection, Audit log management
Source Gartner (January 2006)
22GRC Information Standard
- To facilitate the exchange of data between
various sensors and GRC products. - To include
- Common definition of terms, a GRC language
- Common connection technology how do the
products talk to each other - Common interchange protocol how do products
interchange information
23Proposed GRC standard proposed characteristics
- Open standard community developed. MITRE model
is suggested - Should be XML based
- Open ended and extensible allow for ISO 27001,
ITIL, CVE, CVSS, XCCDF, OVAL.
24Need for common language
- Common language computer and human readable
- Sensors and GRC often from different backgrounds
and have own terminology for their information. - What is a vulnerability?
- What is the impact of a vulnerability
- What is risk?
- What is a threat, how is it evaluated?
25Standards and emerging standards.
- In IT Security the best established relevant
standards are probably CVE and CVSS - Common Vulnerabilities and Exposures, or CVE, is
a dictionary of publicly-known information
security vulnerabilities and exposures. - Common Vulnerability Scoring System (CVSS) is an
industry standard for assessing the severity of
computer system security vulnerabilities.
26Must be extensible..
Governance, Risk and Compliance
Controls ISO 27001, ISO 13335, NIST 800-53, CIS
Information exchange gap
Software sensorsFor example Configuration
assurance, Vulnerability assessment, Policy
compliance, Change detection, Audit log management
Source Gartner (January 2006)
27XCCDF An exampleof an XML based standard
28(No Transcript)
29XCCDF - The Extensible Configuration Checklist
Description Format
- XCCDF is a specification language for writing
security checklists, benchmarks, and related
kinds of documents. An XCCDF document represents
a structured collection of security configuration
rules for some set of target systems. - The specification is designed to support
information interchange, document generation,
organizational and situational tailoring,
automated compliance testing, and compliance
scoring. The specification also defines a data
model and format for storing results of benchmark
compliance testing. - The intent of XCCDF is to provide a uniform
foundation for expression of security checklists,
benchmarks, and other configuration guidance, and
thereby foster more widespread application of
good security practices. - XCCDF documents are expressed in XML, and may be
validated with an XML Schema-validating parser. - XCCDF was designed to support integration with
multiple underlying configuration checking
'engines'. The expected or default checking
technology is MITRE's OVAL(tm). - Source NIST XCCDF web site - http//nvd.nist.gov
/xccdf.cfm
30Human readable
Automated testing
31Community developed
Example OVAL email discussion list
32Other Information Security Data Standards (US
centric)
- Enumerations
- (CVE) Common Vulnerabilities and Exposures -
http//cve.mitre.org - (CCE) Common Configuration Enumeration -
http//cce.mitre.org - (CPE) Common Platform Enumeration -
http//cpe.mitre.org - (CWE) Common Weakness Enumeration -
http//cwe.mitre.org - (CAPEC) Common Attack Pattern Enumeration and
Classification - (CVSS) Common Vulnerability Scoring System
http//www.first.org/cvss/cvss-guide.html - Languages
- (OVAL) Open Vulnerability and Assessment
Language - http//oval.mitre.org - (CRF) Common Result Format - http//crf.mitre.org
- (CEE) Common Event Expression -
http//cee.mitre.org - Repositories
- OVAL Repository
- (NVD) National Vulnerability Database
- (SCAP) NIST Security Content Automation Protocol
- Red Hat Repository
- (CIS) Center for Internet Security Benchmarks
- (STIGS) DISA Security Technical Implementation
Guides
33How the MITRE standards fit together
Attack taxonomy
CAPEC
CCE
CCE CWE CVE CVSS
CPE
XCCDF
OVAL
SCAP Content
NVD
34MITRE standards and SITC GRC standard
Attack taxonomy
CAPEC
CCE
CCE CWE CVE CVSS
GRCStandard
GRC tools
Sensors
CPE
OVAL
XCCDF
SCAP Content
NVD
35XML Schema example
36Challenges for the GRC Standard
- Broad range of possible sensors, including
- configuration auditing
- identity and access management
- security information
- event information and management
- Beyond IT physical controls, environmental, and
? - Not all are obviously security related but should
be CIA (Confidentiality, Integrity, Availability)
related - Aggregation of information consolidate events
(data) into GRC usable information state
change? - Reference and use to a wide range of relevant
external standards - Liaise with authors/authorities of emerging
relevant standards - Wide UK community participation balanced by speed
of delivery - Limited only by our imagination
37Thank you
38GRC Essential Features Demonstration
Nick
Stephen
GRC Sensor Technology
GRC Management Technology
39SITC GRC Interoperability demonstration
40Demonstration scenario
Tier 1 - The Web Server front end running
products such as Microsofts Internet
Information Services (IIS) or Apache HTTP
Server (Apache) these 2 products support over
80 of the worlds web sites. In this case the
web servers are running Microsoft IIS. Tier 2 -
The application servers, these servers that host
the business logic and business processes for
the web service. Tier 3 - The database server
provides the data storage and database services
to the other servers.
41Demonstration
- Today we are looking at 2 systems.
- A Windows Server 2003 system
- A Windows VISTA system
42Demonstration
- Sensors detect and report a state change.
- Sensors feed change information to GRC
- GRC reflects the change of state in asset status
- For example. A sensor detects that a server now
has a serious vulnerability which did not
previously exist on the server. The data to GRC
is server state changed from non vulnerable to
vulnerable supplementary data is the nature of
the vulnerability and the current and previous
state. Non-vulnerable to Vulnerable.
43GRC Standard requirement
InfoGovPROTEUS
GRC world
Demonstration todayA very narrow slice of the
possible range of information
Small number of simple ISO 2700 checks
Sensor world
AssuriaSensors
Other sensors
44Example checks
- ISO-27001-A.10.4 Protection against malicious
and mobile code. Sensor can verify if the
operating system is appropriately configured to
provide protection against malicious code by
checking that an Anti-virus product is installed
and update to date. For Internet Explorer
whether safe scripting is enabled. - Demonstration See if an Anti-virus product is
active and up-to-date. - ISO-27001-A.10.10.1 Audit logs recording user
activities, exceptions and information security
events shall be produced and kept for an agreed
period to assist in future investigations and
access control monitoring. - Many aspects of a System Audit log configuration
can be checked for compliance. - Demonstration Show that if a system auditing is
not correctly configured that it can be reflected
in the GRC Console. - ISO-27001-A.11.2.2 The allocation and use of
privileges shall be restricted and controlled - Many aspects of User configuration can be
checked and verified as being consistent with
requirements. - Demonstration For the demonstration we will use
checks to show that the user Guest has
privilege that can change passwords - ISO-27001-A.11.3.1 Users shall be required to
follow good security practices in the selection
and use of passwords. - Demonstration For the demonstration we will use
the checks that show that a user has Maximum
password age set to be too high.
45Sensor / GRC information exchange
InfoGovPROTEUS
GRC world
Demonstration today
Information exchange viaan XML based interface
Sensor world
AssuriaSensors
Other sensors
46Assuria Auditor
- Detects and reports potential security
vulnerabilities and security configuration bad
practice with detailed analysis and remediation
recommendations - Reports variations to security configuration
policy - Monitors ongoing compliance to external standards
/ policies - Reports unauthorised system changes
- Allows regular scheduled scanning/monitoring as
well as auditor snapshots - Flexible Alerting
- Alert on Policies
- Alert on Event Log entries
47Example Assuria Auditor report
48Detail information in Sensor report
49Demonstration
- Run sensor scan on 2 systems
- View results and show vulnerabilities detected
- Generate XML report
- Send to GRC
50XML Output file
51Questions?