+ All Categories
Home > Documents > Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc...

Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc...

Date post: 05-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
18
Security & Scanning An Open Source Approach
Transcript
Page 1: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Security & ScanningAn Open Source Approach

Page 2: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Explaining FISMA

Page 3: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

NIST Risk Mgt Framework Takes Months

Page 4: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

NIST 800-53 Controls Hurt Your Brain

Page 5: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Time to add compliance!

Software Supply Chain Can Aid Security

Page 6: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

$ risk -a server.agency.gov

$ make artifact=system-security-plan -f doc

FISMA for Happy Developers

Page 7: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Scanning as Part of CI

Page 8: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Developers reaction to security scansProblem

Page 9: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Tip #1: Use the Families

Page 10: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Tip #2: Give Control Families Tickets

Page 11: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Tip #3: Use SCAP

SCAP == Shared Unit Testing for Vulnerabilities

Vulnerabilities● Poor configuration● Known exploits

Page 12: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Tip #4: Use OpenSCAP + GovReady

Community created portfolioof tools and content to make

attestations about known vulnerabilities

https://github.com/OpenSCAP

Open source tool that to make OpenSCAP scanning

friendlier to developers

https://github.com/GovReady/govready

Page 13: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

OpenSCAP$ oscap xccdf eval --remediate \

--profile stig-rhel6-server-upstream \

--report /root/scan-report.html \

/usr/share/xml/scap/content.xml

GovReady$ govready scan

$ govready fix

$ govready compare

Page 14: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

Next steps

● Include more operating systems (Ubuntu, Debian)● Add more tests (bash & drush based)● Create and contribute towards an application baseline:

● Drupal● Apache/Nginx● MySQL/Mariadb

Page 15: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers
Page 16: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers
Page 17: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

HOW TO ENGAGE

OpenSCAP GitHub:https://github.com/OpenSCAP

OpenSCAP References & Docs:https://github.com/OpenSCAP/scap-security-guide/wiki/Collateral-and-References

SCAP Content Mailing List:https://fedorahosted.org/mailman/listinfo/scap-security-guide

GovReady user-friendly front-end:https://github.com/GovReady/govready

Ansible-SCAP demo. See how it all works on the “drupal” branch - painlessly:https://github.com/openprivacy/ansible-scap

NIST SCAP Website:https://scap.nist.gov

Page 18: Security & Scanning a… · $ risk -a server.agency.gov $ make artifact=system-security-plan -f doc FISMA for Happy Developers

CONTACT INFO

Greg [email protected]

917-304-3488

Fen [email protected]

412-996-4113


Recommended