This blog serves as a place for my information security notes.
Thursday, February 10, 2011
Finding Processes
Tuesday, March 11, 2008
Another Attempt at Defining Control
A restraining device, measure, or limit;
To verify or regulate
I like a combination of those applied to information systems, so here's my first attempt: Rules that measure, limit, or regulate activity or behavior within and information system environment.
The definition is not that important, because I can fall back on examples to help someone understand controls.
Feel free to shoot holes in my definition.
Definition of Security Control
While writing this piece, I decided to define the term security control. I'm finding it's more difficult than I thought.
I first tried to create my own definition. When I discovered that my definition stunk, I searched for others.
Here's one from 8500.2 itself -- the horse's mouth:
E2.1.26. IA Control. An objective IA condition of integrity, availability, or confidentiality achieved through the application of specific safeguards or through the regulation of specific activities that is expressed in a specified format (i.e., a control number, a control name, control text, and a control class). Specific management, personnel, operational, and technical controls are applied to each DoD information system to achieve an appropriate level of integrity, availability, and confidentiality in accordance with OMB Circular A-130 (reference (v)).
I mean no offense to the people who wrote that, but it's difficult to understand. It is a definition that's all encompassing and yet leaves me with a confused feeling and is not much help pinning down the term. I'm looking for a short, pithy definition.
I'll keep trying and post what I find.
Friday, September 14, 2007
SAMI
I just found a defintion inside the definitions section of a DoD manual:
Any classified non-SCI information that has been determined by the Data or Information Owner to need the protection afforded by DCID 6/5 and bears a SAMI marking.
Because the information my app. process is not classified, I can safely say my app. does not process SAMI data. But what does SCI information mean? I'll find that next.
SCI:
Sensitive Compartmented Information, ClassifiedOf course, I'm inserting these definitions in my list of acronyms and glossary.
information concerning or derived from intelligence
sources, methods, or analytical processes, that is required
to be handled within formal access control systems established
by the Director of Central Intelligence (DCI).
Friday, September 07, 2007
FISMA Security Controls
The only security controls I've worked with so far are DoD controls. Because we want this process to apply to non-DoD customers, I'm looking into other controls such as NIST. I just started reading publication 800-53, "Recommended Security Controls for Federal Information Systems"
I'm not sure if that's the right publication, but it will certainly lead me to the answer.
Wednesday, September 05, 2007
Definitions
These are my definitions based on other standard definitions like NIST and others. What do you think of them?
Definitions
Certification: A formal evaluation, in support of an accreditation, of a computer system's safeguards to determine whether it meets a specific set of security requirements.
Accreditation: A formal decision by an approving authority that a computer system is approved to operate at an acceptable level of risk based on a set of specific requirements.
C&A: A process that ensures a system meets a formal set of security requirements.
Friday, January 26, 2007
How to Install Anything on Ubuntu
Monday, January 15, 2007
New Things to Learn
Install Adobe Flash Player for Firefox
Find out if I can receive my email from work
Can I run Windows Office in WINE on Ubuntu?
Those are the biggest items preventing me from using my Ubuntu install as my work-at-home computer.
Now, I need coffee.
Friday, January 05, 2007
67 Updates
While installing Firestarter, I discovered I had 67 updates that were waiting. I have those going right now. I believe keeping up with updates is crucial to secure computing. I'm going to stay on top of that issue.
What's the root Password?
I looked through the Ubuntu forum, www.ubuntux.org and quickly found the following information. A new user asked the same question on the forum and of course, someone quickly pointed the guy in the right direction with a link, but they piled on the typical advice, "Too lazy to look around for yourself?" That's pretty typical with forums.
Anyway, default Ubuntu does not have a root password set.
"su" is not the command to get to root. Instead, I had to type:
sudo passwd
The system prompted me for my password, then it wanted a new password for root. I set one, a complex one and I was off to work again.
Next, I need to install a firewall. I see that Firestarter is the one to use.
First Post about Ubuntu
I didn't connect it to the internet until today. I wanted to get it secured first. My next post will describe what I did to secure my Ubuntu installation.
Monday, June 05, 2006
System Description vs. Functional Description
Thursday, May 25, 2006
A VM to Replicate our Environment
I plan to get much more familiar with it.
IATO
I think we can get the SSAA done in the next week or so. I've contacted our AF rep. and he said I should call him next week to talk in person about who will fill the roles (DAA, etc.).
Also, I need to learn more about the negotiation phase. That is, when we turn in the SSAA, should we do it in person? Should we send it as an email and then have a face to face meeting later? Should we do both in person?
I'll call next week and get answers.
Friday, May 19, 2006
IATO -- let's go!
Yesterday, we decided to go the route of seeking IATO (Interim authority to operate) instead of a full-blown DITSCAP right away. This will give us a year, assuming we get an IATO, to operate and concurrently finish our entire DITSCAP with a FATO (full authority to operate). I feel good about this decision now, because it will get us going and seems achievable in the near term. Like taking a small bite instead of a big bite that we choke on. In the past, I wondered why we want to go the IATO route? I thought we had the time to do it all. Well, we don’t. No one ever has enough time.
The Project Manager Saves the Day
Yesterday, my project manager really got involved in putting together a project plan for our DITSCAP effort. It was great. He asked me lots of questions. I answered some and couldn’t answer others. The ones that I could answer were wonderful, because in the explaining, I learned what I know and identified areas that I don’t know much about.
I Feel Ready to Dive in
IÂve read the following article at least three times. On the third reading, just today, it has made more sense than ever. Every sentence makes sense. The previous readings left me with a foggy understanding that really didnÂt lead me to concrete work or lessons.
http://iac.dtic.mil/iatac Life Cycle Security and DITSCAP, IAnewsletter, Vol. 4, No. 2, Spring 01.
New blog, first post
Leave a record of lessons learned about our DITSCAP effort to help others and help us on future projects.
Our project: To certify our system so it can run inside a military domain. I’ll leave the details kind of vague, because I don’t want to bring public attention to our project. I don’t know what the confidentiality concerns are. So instead of pushing any limits, I’ll leave names, locations, and departments out of this blog. I’ll try to provide enough concrete information to make it useful to someone not familiar with my specific project.
This is my first DITSCAP effort. We’re certifying an off-the-shelf product to operate within a collaborative domain. The product is a web application server. Later, we will also certify web services that will be installed on the app. server. We’ll also certify some other systems that will use the web services.