Posted August 27th, 2008 by
rybolov
OMB sneaked this one in on me: OMB Memo 08-23 requires secure DNS (standard .pdf caveat). Agencies need to submit a plan by September 5th on how they should accomplish this. The whole switchover should occur by December 2009.
The interesting thing to me is that OMB is getting bolder in specifying technical solutions. Part of me wants to scream because public policy people have no business dictating technical solutions–that’s what we have standards boards and RFCs for.
From what I hear, some of this is because OMB is starting to be a really bad lame duck. Think about it, what are the odds that anybody at OMB is going to be around in December 2009? Completely unofficial word on the street is that OMB is pushing last-minute initiatives because of politicals–trying to accomplish things in time for the elections.
Also, I think that OMB is getting tired of NIST’s nonpspecificity in their guidance. NIST’s approach to being generic in nature is necessary because of their role as a research organization and the producers of methodologies.
The solution to all this? Well, the way it happens in the rational world is organic standards boards. Yes, they have their problems (*cough* WAFs anyone? *cough*) but overall, they fill a place. Inside Government, we don’t have much of that happening–we have the CIO council and the Enterprise Architecture folks, but nothing security-specific.
Lock Up Your Data photo by psd.
Description of the picture, it’s great and needs to be repeated:
The road passes the temptations of Flash and AIR. Those who succumb or who are unfortunate enough to be lured by Silverlight’s Siren find themselves sold down the river of Rich User Experiences and hurled towards lock-in weir. The TiddlyWiki steps may rescue some, who can then join those who stuck to the main path of Javascript and AJAX for their interactions.
The URI scheme is based on DNS, a registry which has weaknesses, meanwhile the ICANN Fracture results from their greedily adding spurious new Top Level Domains such as .mobi, .jobs, .xxx and even .tel, which whilst generating more revenue (for them) causes mass confusion and threatens to break the opacity of URIs.
Similar Posts:
Posted in Technical | 2 Comments »
Tags: 800-53 • government • infosec • management • omb • security
Posted August 26th, 2008 by
rybolov
PE-52 Self-Destructing RFID Implants
Control:
The organization equips all employees with integrated storage media with self-igniting RFID devices so that they can be tracked throughout any government facility and destroyed upon command.
Supplemental Guidance:
All CISOs know that the information inside their employees’ heads is the real culprit. When they get a new job, they take that information–all learned on the taxpayers’ dime–with them. This is a much bigger security risk than the data on a USB drive could ever be. Instead of denying the obvious truth, why don’t we implement security controls to minimize the impact of out-of-control employees? This control is brought to you by L Bob Rife.
Control Enhancements:
(1) The organization destroys the information inside an employee’s head when the employee leaves the organization, much like hard drives need to be degaussed before they are sent for maintenance.
Low: MP-52 Moderate: MP-52(1) High: MP-52(1)
Similar Posts:
Posted in IKANHAZFIZMA | 2 Comments »
Tags: 800-53 • government • lolcats • risk • security
Posted July 28th, 2008 by
rybolov
Potomac Forum is having a 2-day C&A seminar on August 6th and 7th. It will be unusually good this time because I won’t be there to drag everybody down–I’ll be on the road for some training. =) Anyway, check it out and say hi to my instructors from me.
Similar Posts:
Posted in FISMA, Speaking | 1 Comment »
Tags: 800-53 • 800-53A • C&A • catalogofcontrols • compliance • fisma • gettingtogreen • government • infosec • infosharing • management • omb • risk • scalability • security • seminar • speaking
Posted July 24th, 2008 by
rybolov
Guys, please remember that the controls from SP 800-53 and the test cases from SP 800-53A need to be tailored. Otherwise, they’re as useful as a watermelon in a lake is to a kitteh.
Similar Posts:
Posted in IKANHAZFIZMA | 1 Comment »
Tags: 800-53 • 800-53A • government • lolcats • security • tailoring
Posted July 10th, 2008 by
rybolov
With as much overengineering that people do for low-criticality systems, I’m surprised nobody’s mentioned this idea yet for high-criticality data: snipers on the roof. Now that “the cat’s out of the bag”, I figure this will be in the next 800-53 revision.
Similar Posts:
Posted in IKANHAZFIZMA | 1 Comment »
Tags: 800-53 • catalogofcontrols • fisma • government • infosec • lolcats • security
Posted July 1st, 2008 by
rybolov
The perpetual draft document, SP 800-53A, has been officially released after 3 years. Check out the announcement from NIST here.
Now the interesting thing to me is that NIST is working with some other players (DNI comes to mind) on reference implementations of 800-53A. This is big, so big that I can’t add enough hyperbole to it.
Why do they need to do reference implementations? Well, because by itself, SP 800-53A is dangerous if it’s given to people who “don’t get it”. By that what I mean is this:
- SP 800-53 needs tailoring to distill into actual requirements.
- SP 800-53A needs a huge amount of tailoring to distill into test cases/procedures that match the tailoring that you did with 800-53.
- Taken at face value, 800-53 and 800-53A become the source of “death by compliance”.
- If you think the auditors could grill you to death with 800-53, 800-53A gives them tons more material.
Now time for a war story: I worked on a project where the contractor was having a hard time building a security program, mostly because they didn’t have the right staff to get the job done. The government told the contractor to use 800-53A as a starting point, and 6 months of insanity followed with 13 “security engineers” in a conference room cranking out documentation that had no basis in reality. At the end of it all, the contractor handed the Government a bill for $1M.
Now don’t get me wrong, I like the ideas behind 800-53A, but the first thing you need to know when you start using it is when you shouldn’t use it:
- Don’t run test procedures on every computer you have, use an automated tool and do spot-checks to validate that the automated tool works.
- Use less test procedures on low-criticality systems.
- “This procedure is conducted as part of the hardening validation process.”
- Common controls are even more important because you do not want the repetition of effort.
And whatever you do, don’t let 800-53A turn your risk management into a compliance activity. It has all the potential to do that.
US Government Doc’s photo by Manchester Library.
Similar Posts:
Posted in FISMA, NIST, Risk Management, What Doesn't Work, What Works | 12 Comments »
Tags: 800-53 • 800-53A • auditor • catalogofcontrols • compliance • fisma • government • infosec • itsatrap • management • security