xiiContents
Shared Accounts ....................................................................................................181
Comprehensive Accountability Audit Objectives............................................................182
Current State .........................................................................................................182
Audit Requirements for Accountability..................................................................183
Domain and Local Audit Management ........................................................183
Complete ......................................................................................................184
Tempora l ......................................................................................................185
Consistent .....................................................................................................185
Relevant ........................................................................................................185
Understandable.............................................................................................186
Simple...........................................................................................................186
Sequential .....................................................................................................186
Correl ated .....................................................................................................187
Tamper proof .................................................................................................187
Traceable.......................................................................................................187
Re t ai ned .......................................................................................................188
Conclusion ......................................................................................................................188
11 SDL and Incident Response ......................................................................................189
Introduction....................................................................................................................189
Terms Used in  is Chapter ..................................................................................190
Security Development Lifecycle (SDL) Overvie w ...................................................19 0
Security Incident Response Overview ....................................................................191
Tactical Objectives .................................................................................................193
Elements of Application Development and Response .............................................195
Application .....................................................................................................................195
Phase 1—Requirements .........................................................................................196
Phase 2—Design ...................................................................................................197
reat Modeling ...........................................................................................197
Phase 3Development .........................................................................................197
Phase 4—Veri cation ............................................................................................197
Phase 5Release ...................................................................................................198
Phase 6Support/Service .....................................................................................198
(SDL)
2
Software as a Service Extensions (SaaS) ............................................................198
Security Development Lifecycle Drivers and Benefi ts ............................................199
Security Development Lifecycle Challenges .......................................................... 200
SDL Success Factors and Lessons Learned ............................................................ 202
Application Control Objec t ive s ............................................................................. 2 03
Obser vation/R ecogn ition ............................................................................. 203
Passive Detection Control Objectives ........................................................... 204
Active Detection Control Objectives ............................................................ 204
Transition Objectives ..................................................................................................... 209
Common Collection and Dispatch ....................................................................... 209
Transition Drivers and Benefi ts .............................................................................210
Transition Challenges ............................................................................................211
Transition Success Factors and Lessons Learned ....................................................212
TAF-K11348-10-0301-C000toc.indd xiiTAF-K11348-10-0301-C000toc.indd xii 8/18/10 3:20:00 PM8/18/10 3:20:00 PM
Contentsxiii
Lessons Learned............................................................................................212
Transition Control Objec tive s ................................................................................212
Rapid Response...............................................................................................................214
Incident Response Procedures ................................................................................215
Automated Respons e s ............................................................................................217
Nonincident-Related Response Procedures (Reporting) .........................................218
Reporting as a Response .........................................................................................218
Rapid Response Drivers and Benefi ts .....................................................................219
Response Challenges ..............................................................................................221
Response Success Factors and Lessons Learned ......................................................221
Response Control Objectives ................................................................................ 223
Conclusion .....................................................................................................................223
12 Keep Your Enemies Closer........................................................................................225
Introduction................................................................................................................... 225
Hire a Hacker Objectives ............................................................................................... 227
Off ensive Objectives ............................................................................................. 227
How to Use  is Tactic for Off ense ...................................................................... 228
Defensive Objectives ............................................................................................. 229
How to Use  is Tactic for Defense ...................................................................... 230
Summary ...............................................................................................................231
e Hire a Hacker Controversy ......................................................................................231
Success Factors and Lessons Learned ..............................................................................233
Control Objectives ..........................................................................................................233
Countering Insider  reats (Malicious Insider)..................................................... 234
Competent Supervision .........................................................................................235
Supervisor Attributes ................................................................................... 236
Supervisory Attributes ................................................................................. 238
Employee Screening ......................................................................................241
Target Retaliation ..................................................................................................245
Target Deception ...................................................................................................247
Malicious Code Implantation ...................................................................... 248
Conclusion ......................................................................................................................251
13 Hire a Hessian (Outsourcing)...................................................................................253
Introduction....................................................................................................................253
Security in the Outsourcing of IT Services ..................................................................... 254
Outsourcing Pros—Benefi ts ...................................................................................255
Outsource Cons—Challenges................................................................................255
Success Factors and Lessons Learned......................................................................256
Outsourcing Control Objectives ............................................................................257
Security in the Outsourcing of Security Services .............................................................261
Commonly Outsourced Services ............................................................................261
Security Auditing..........................................................................................261
Penetration Testing, Vulnerability Assessment ............................................. 262
Systems Monitoring ..................................................................................... 262
Incident Support .......................................................................................... 263
TAF-K11348-10-0301-C000toc.indd xiiiTAF-K11348-10-0301-C000toc.indd xiii 8/18/10 3:20:00 PM8/18/10 3:20:00 PM
xivContents
System Management/Administration ........................................................... 263
Security Offi cer Services .............................................................................. 263
Outsourcing of Security Services Objectives ......................................................... 264
Challenges to Outsourcing Security Services .........................................................265
Success Factors and Lessons Learned .................................................................... 266
Outsourcing Security Services Control Objectives .................................................267
Maintain the Confi dentiality of Results ........................................................267
Prevent the Disclosure of Events.................................................................. 268
Preserving Evidence ..................................................................................... 269
Avoiding Retention/Discovery Liabilities ..................................................... 269
Elevated Privilege and Intellectual Property Loss ..........................................270
Conclusion .....................................................................................................................272
14 Security Awareness Training ....................................................................................275
Introduction....................................................................................................................275
Sta Development Training ........................................................................................... 277
General Staff Security Training ............................................................................. 277
Security Staff Training .......................................................................................... 278
Security Staff Training Requirements ................................................................... 279
Security Awareness Training .......................................................................................... 280
Awareness Training Objectives ............................................................................. 280
Awareness Training Elements................................................................................ 282
Awareness Training Drivers and Benefi ts ....................................................................... 283
Industry Training Trends and Best-Practices Examples.................................................. 284
Training Resources ......................................................................................................... 286
Awareness Training Challenges ...................................................................................... 289
Success Factors and Lessons Learned ...............................................................................291
How Do You Know if Your Training Is Successful? ....................................................... 292
Conclusion ......................................................................................................................293
References..........................................................................................................................295
Append ix ...........................................................................................................................303
Physical Security Checklists ........................................................................................... 303
Index..................................................................................................................................313
TAF-K11348-10-0301-C000toc.indd xivTAF-K11348-10-0301-C000toc.indd xiv 8/18/10 3:20:01 PM8/18/10 3:20:01 PM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset