Title: Making Security Measurable a'k'a', Architecting for Measurable Security
1Making Security Measurable (a.k.a.,
Architecting for Measurable Security)
Robert A. Martin Presentation 2.3 ARO Workshop on
Cyber Situational Awareness 14 November 2007
22007 InformationWeek/Accenture Global Information
Security Survey
Published July 16, 2007
32007 InformationWeek/Accenture Global Information
Security Survey
- Many Types of Attacks
- known vulns in OS packaged apps misconfigured
systems unknown vulns in own apps aimed at DB,
applications, and web sites - Need to Master Many Technologies
- firewalls anti-virus anti-spyware app
firewalls IDS SIMS vulnerability scans
patching - More Vulnerable Because of
- exposed backend homegrown apps increased
sophistication volume of attacks more
malicious intent lack of senior attention
incompatible security products unable to adapt
policies/configuration rules outsourcing
Published July 16, 2007
4Today Every Organization Has a Different Way of
Doing Cyber Security
- Cyber security, tools, practices and technology
have evolved dramatically over the last 10 years - The result has been that most enterprises have
been buying each new tool training their people
on it integrating it as they realize they need
to address a new area of Cyber Security - Then they buy another tool train their people
on that one too integrate it with the other
tools - Repeat for each type of security tool/challenge
that appears - Result - each organization has a different
tapestry of tools/processes integrated together
trying to do the Cyber Security job - Assets, Configuration, Vulnerabilities, Patches,
Intrusions, Malware, Malicious Code, etc. - Instead we should be architecting our security
measurement and management method and get
tools to implement and support it.
5What Do The Building Blocks for Architecting
Security Look Like?
- Standard ways for enumerating things we care
about - Languages/Formats for encoding/carrying high
fidelity content about the things we care about - Repositories of this content for use in
communities or individual organizations - Adoption/branding and vetting programs to
encourage adoption by tools and services
6The Building Blocks Are
- Enumerations
- Catalog the fundamental entities in IA, Cyber
Security, and Software Assurance - Vulnerabilities (CVE), misconfigurations (CCE),
software packages (CPE), malware (CME), attack
patterns (CAPEC), weaknesses in
code/design/architecture (CWE) - Languages/Formats
- Support the creation of machine-readable state
assertions, assessment results, and messages - Configuration/vulnerability/patch/asset patterns
(XCCDF OVAL), results from standards-based
assessments (CRF), software security patterns
(SBVR), event patterns (CEE), malware patterns
(MAEC), risk of a vulnerability (CVSS),
information messages (CAIF DEF) - Knowledge Repositories
- Packages of assertions supporting a specific
application - Vulnerability advisories alerts, (US-CERT
Advisories/IAVAs), configuration assessment (NIST
Checklists, CIS Benchmarks, NSA Configuration
Guides, DISA STIGS), asset inventory (NIST/DHS
NVD), code assessment certification (NIST
SAMATE, DoD DIACAP eMASS) - Tools
- Interpret IA, Cyber Security, and SwA content in
context of enterprise network - Methods for assessing compliance to languages,
formats, and enumerations
7The Building Blocks Are
Benchmark
8Knowledge Repositories
Configuration Guidance
Operations Security Management Processes
Configuration Guidance Analysis
Operational Enterprise Networks
Enterprise IT Asset Management
Enterprise IT Change Management
Centralized Reporting
9Knowledge Repositories
Configuration Guidance
Benchmark
Benchmark
Operations Security Management Processes
Configuration Guidance Analysis
Benchmark
Benchmark
Benchmark
Operational Enterprise Networks
Benchmark
Benchmark
Benchmark
Benchmark
Benchmark
Benchmark
Benchmark
Benchmark Results
Benchmark Results
Benchmark
Benchmark
Benchmark Results
Enterprise IT Asset Management
Enterprise IT Change Management
Centralized Reporting
10Operations Security Management Processes
Operational Enterprise Networks
Enterprise IT Asset Management
11Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Development Sustainment Security
Management Processes
Centralized Reporting
Enterprise IT Change Management
Enterprise IT Asset Management
12Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
13Knowledge Repositories
Mitigating Risk Exposures
Responding to Security Threats
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVE/CWE/ OVAL/CVSS
CVSS/CME/ CAPEC/MAEC
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
14Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
CVE
CVE
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CVE
CVE
CVE
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
CVE
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
15Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
16Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
CRF
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CRF
CRF
CRF
CRF
CRF
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
CRF
Operations Security Management Processes
CRF
CRF
CRF
CRF
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
CRF
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
17Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
18Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
19Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
20Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
21Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
22Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
23Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
24Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
25Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
SBVR
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
26Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
27Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
28CCE/ OVAL/ CRF/ XCCDF/ CPE
29Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
30CPE/ OVAL/ CRF
31Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
32(No Transcript)
33(No Transcript)
34Knowledge Repositories
CAIF/VEDEF/SIDEF/SCDEF/SFDEF/ IDMEF/IODEF/FIDEF/CV
E/CWE/ OVAL/CPE/CME/MAEC/CE/CRFE
CPE/OVAL
XCCDF/OVAL/ CCE
CVSS/CME/ CAPEC/MAEC
CVE/CWE/ OVAL/CVSS
Asset Inventory
Configuration Guidance Analysis
Vulnerability Analysis
Threat Analysis
Intrusion Detection
Incident Management
CCE/ OVAL/ CRF/ XCCDF/ CPE
CPE/ OVAL/ CRF
CVE/CWE/ CVSS/CRF/ CCE/ OVAL/ XCCDF/ CPE
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC
CVE/CWE/ CVSS/CRF/ CCE/OVAL/ XCCDF/CPE/ CME/CAPEC/
MAEC/CEE
Operations Security Management Processes
Assessment of System Development, Integration,
Sustainment Activities and Certification
Accreditation
Operational Enterprise Networks
Centralized Reporting
Enterprise IT Change Management
Development Sustainment Security
Management Processes
Enterprise IT Asset Management
35(No Transcript)
36makingsecuritymeasurable.mitre.org
Robert A. Martin ramartin_at_mitre.org
37Difficult to Integrate Information on
Vulnerabilities and Exposures
Security Advisories
Software Vendor Patches
Priority Lists
Vulnerability Scanners
Intrusion Detection Systems
Incident Response Reporting
Research
Vulnerability Web Sites Databases
38CVE Growth
Status (as of Nov 6, 2007)
39Vulnerability Type TrendsA Look at the CVE List
(2001 - 2006)
40Removing and Preventing the Vulnerabilities
Requires More Specific DefinitionsCWEs
41(No Transcript)
42Using A Unilateral NDA with MITRE to Bring in Info
- Purpose
- Sharing the proprietary/company confidential
information contained in the underlying Knowledge
Repository of the Knowledge Owners Capability
for the sole purpose of establishing a public
Common Weakness Enumeration (CWE) dictionary that
can be used by vendors, customers, and
researchers to describe software, design, and
architecture related weaknesses that have
security ramifications. - The individual contributions from numerous
organizations, based on their proprietary/company-
confidential information, will be combined into a
consolidated collection of weakness descriptions
and definitions with the resultant collection
being shared publicly. - The consolidated collection of knowledge about
weaknesses in software, design, and architecture
will make no reference to the source of the
information used to describe, define, and explain
the individual weaknesses.
43Current Community Contributing to the Common
Weakness Enumeration
- AppSIC
- Aspect Security
- Booz Allen Hamilton Inc.
- Cenzic
- CERIAS/Purdue University
- CERT/CC
- Cigital
- CodescanLabs
- Core Security
- Coverity
- Fortify
- Gramma Tech
- IBM
- Interoperability Clearing House
- JHU/APL
- JMU
- Kestrel Technology
- KDM Analytics
- Klocwork
- NSA
- OMG
- Oracle
- Ounce Labs
- OWASP
- Palamida
- Parasoft
- PolySpace Technologies
- proServices Corporation
- SANS Institute
- SecurityInnovation
- Secure Software
- Security University
- Semantic Designs
- SofCheck
- SPI Dynamics
- SureLogic, Inc.
- Symantec
- UNISYS
To join send e-mail to cwe_at_mitre.org
44PLOVER
300 nodes
2005
45Timeline of Items Enumerated and Defined in CWE
of items
time
46- To subscribe, see
- http//cwe.mitre.org/community/registration.html
- or just send an email to listserv_at_lists.mitre.org
with the command subscribe CWE-RESEARCH-LIST
47Symbolic Link Following
(composition)
Symlink Following CWE-41
Symlink Following - CWE 61
Predictability CWE-340
Race Condition CWE-362
Path Equivalence CWE-41
Insecure directory permissions CWE-275
48Symbolic Link Following (composite)
CWE-61 Symlink Following
- Filename can be predicted
- File can be created by other party before it is
opened for writing - File created in a shared directory with writable
permissions - Equivalence a symlink can act an alternate name
for a critical file