Home Features Security Compliance

Security Compliance

Meet federal, state, and industry
information security regulations instantly

Since security breaches can cause serious damage, the relationship between information security and the economic growth of businesses has been subject of many research studies. [1] [2] 3 [4]

The corresponding economic model, proposed by Lawrence A. Gordon and Martin P. Loeb in 2002, implies that:

  • If data were perfectly invulnerable, then no investment in information security would be made,
  • At some sufficiently larger level of vulnerability, it would be optimal to make a positive investment in information security measures in order to reduce the probability of data loss, and therefore the expected monetary loss.

Optimal information security policy should incorporate both possible approaches:

  • A reactive one — having a well-defined vulnerability assessment strategy,
  • And a proactive one — application of currently available computer protection mechanisms, or countermeasures, in order to prevent, eliminate, or minimize the impact of security flaws.

Though security vulnerabilities are difficult or even impossible to predict, many of them require multiple conditions to be met at once in order to be successfully exploited:

  • For example, attackers tend to mask their presence on the target system while exploiting a security flaw. For this reason, they often target rarely used user accounts to perform — or attempt to perform — the attack under,
  • Brute-force password guessing attacks have higher probability of success when shorter and dictionary-based passwords are used to secure some of the user accounts on the particular system,
  • Some protocols, though reliable, have been designed to operate with information in plaintext (unencrypted) form. These typically provided sufficient security at the time they have been implemented, but are not sufficient any more.

All three of the provided conditions can be avoided using the same strategy — through application and enforcement of a security policy which fulfills the following criteria:

  • Prevent retired user accounts from being reused,
  • Define and enforce strong passwords based on multiple criteria such as length and character variety, insert a delay between unsuccessful login attempts, and track these attempts,
  • And finally, forbid the use of protocols which are no longer considered secure.

In order to minimize the threat of an attack on computer infrastructure, or even completely prevent it, many institutions from both the private and public sector have adopted the concept of enforcing a security policy or a security benchmark. These policies define security requirements which all systems used by the institution must meet. It applies not only to systems physically located within the organizations, but often to any third party environments have access to the organizations’ computer infrastructures. In some cases, these policies are defined by government regulations, but many businesses adopt their own security policies even if they are not specifically required to do so by law.

The specific requirements for security policy differ depending on the area of activity of a particular organization. For example, a solely private sector based cloud solutions provider will have different security norms, and will be required to fulfill different information security requirements by law, than a United States federal agency.

Despite the variety of the possible requirements, there are many common steps and procedures that any institution or business wishing to protect itself should perform. These include, but are not limited to:

Determine the specific security baseline which the underlying computer infrastructure needs to be compliant with

Obtain a security checklist for the requirement(s) in a format suitable for machine processing

Quickly identify the current state of the computer infrastructure against the requirement(s)

React promptly — perform corrective operations for requirements the system(s) in question did not meet the requirements at a specific point in time

Prefer an automated approach — perform compliance analysis and corrective operations (remedial actions) in a machine-controlled, unattended way on a regular basis, regardless of the infrastructure’s complexity

Utilize proper software tools to carry out these tasks with minimal effort, and at the same time attempt to reduce any required outage periods related to these tasks to a minimum.

DISA STIG
FEDRAMP
FISMA
PCI DSS
USGCB
NIAP

The term security compliance (of a computer system against a particular security baseline) is used in the field of information security to denote the fact that after performing a qualified analysis of necessary features of the system, the system in question has been recognized to be configured in a way that is in line with all of the requirements as demanded by the particular security policy.

Compliance assessment usually involves both steps — the compliance analysis of the system as well as the subsequent remedial action (performing corrective operations where the original inspection detected non-compliance).

In many countries, information security is recognized as having an important role in the effort to protect economic growth and security interests. With cyberspace being vulnerable to a wide range of attacks, many countries have adopted an approach where strengthening the security and resilience of computer infrastructure must be performed at any level, be it public or private sector. Many government agencies are mandated by law to establish and manage their computer infrastructure in a specific way to protect sensitive information and prevent attacks. In the private sector, businesses handling credit cards from major card schemes are obligated to follow the Payment Card Industry Data Security Standard (PCI DSS) in order to ensure controls around cardholder data to reduce credit card fraud via its exposure.

Depending on its area of business, there may be numerous standards a particular organization must meet simultaneously in order to be compliant with all applicable laws and contractual obligations. This makes software tools like the OpenSCAP family, which can perform compliance assessments and corrective operations in an automated and continuous fashion, the perfect candidates for any organization trying to find a way to establish a proper and sustainable security compliance management policy.

How the OpenSCAP Ecosystem Can Help

Obtain a list of security requirements in a format suitable for machine processing

In order to be able to perform security compliance analysis of a computer infrastructure in an automated way, the corresponding security benchmark (the compliance requirements) need to be expressed in a specific, unambiguous format. Many security benchmarks provided by various security compliance authorities are supplied in the form of plaintext files. While this form is universal enough to be applicable to any computer infrastructure regardless of the underlying operating system, it is not appropriate for direct application. Therefore, a substantial effort is currently being invested into conversion of these security guidance baselines and associated validation mechanisms into the form of various specifications as defined by the Security Content Automation Protocol (SCAP). The SCAP Security Guide project provides these baselines as practical security guidance, and also links them to compliance requirements in order to ease deployment activities such as certification and accreditation. This way it is possible to overcome the gap between generalized policy requirements (as produced by official compliance authorities) and specific implementation guidance (in SCAP format) applicable to a specific computer environment or software product.

Practical Examples

The examples below demonstrate how various tools from the OpenSCAP family can be used to assist you in establishing and maintaining a sustainable security compliance process. See the Tools page for a more detailed description of each tool and additional examples.

Performing security compliance analysis of a freshly installed Red Hat Enterprise Linux 6.7 system using the United States Government Configuration Baseline (USGCB) profile from the security benchmark for Red Hat Enterprise Linux 6 Server system, provided by the scap-security-guide RPM package:

rhel6_7_oscap_sec_compliance_scan

Performing both security compliance analysis and corrective operations (remedial action) against the United States Government Configuration Baseline (USGCB) profile from security benchmark for Red Hat Enterprise Linux 6 Server provided by the scap-security-guide RPM package using the oscap command line tool:

# oscap xccdf eval −−remediate −−profile usgcb-rhel6-server \
−−results /tmp/usgcb-rhel6-server-results.xml \
−−report /tmp/usgcb-rhel6-server-report.html \
/usr/share/xml/scap/ssg/content/ssg-rhel6-xccdf.xml

rhel6_7_usgcb_remediation

sitemap