Cargando…

Security automation essentials : streamlined enterprise security management & monitoring with SCAP /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Witte, Greg
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill, [2012]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • Security Automation Essentials
  • About the Authors
  • About the Technical Editor
  • Contents at a Glance
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Why This Book?
  • Who Should Read This Book
  • What This Book Covers
  • How to Use This Book
  • How Is This Book Organized?
  • Part I: Security Automation Essentials
  • Chapter 1: The Security Management Problem
  • Security Management Challenges
  • The Number and Variety of Systems and Software to Secure
  • The Need for Continuous Security Management
  • The Need for a Comprehensive Picture of Enterprise Security
  • The Need for Standardization in Security
  • Security Requirements from Regulations and Other Sources
  • The Security Automation Solution
  • Security Automation Basics
  • Knowledge About Individual Security Elements
  • Using Checklists to Achieve Compliance
  • The Evolution of Security Automation Technologies and Standards
  • Enumeration Standards
  • Language Standards
  • Risk Measurement Standards
  • Chapter 2: What Is SCAP?
  • The History of SCAP
  • The Parts of SCAP
  • Component Specifications
  • How the SCAP Component Specifications Fit Together
  • The SCAP Protocol
  • SCAP Content
  • The Value of SCAP
  • Inventorying Installed Software
  • Identifying Security Issues
  • Monitoring the Security State
  • Security Measures and Metrics
  • Quantifying Risk
  • Fostering Common Terminology
  • Part II: Using SCAP
  • Chapter 3: SCAP Checklist and Check Languages
  • Extensible Checklist Configuration Description Format
  • Data Model and Syntax
  • Benchmark
  • Items
  • Profile
  • TestResult
  • Open Vulnerability and Assessment Language
  • Data Model
  • Generator
  • Definition
  • Test
  • Object
  • State
  • Variables
  • OVAL Results
  • Open Checklist Interactive Language
  • OCIL Data Model
  • Questions
  • Question_Test_Action Elements
  • Questionnaires.
  • Putting It All Together
  • Chapter 4: Asset Management
  • Asset Identification
  • Literal and Synthetic Identifiers
  • Correlation
  • AI Elements
  • Helper Elements
  • Asset Reporting Format
  • Relationship Terms
  • ARF Example
  • Assessment Summary Results
  • System-Ident Model
  • Chapter 5: Enumerations
  • Automation Enumerations and Their Purposes
  • Enumerations Included in SCAP
  • Common Configuration Enumeration
  • CCE History
  • The Purpose of CCE
  • CCE Entries
  • CCE Submission Process
  • CC E and the National Vulnerability Database
  • Common Platform Enumeration
  • The New CPE 2.3 Stack
  • Common Vulnerability and Exposures
  • The Birth of CVE
  • CVE Editorial Board
  • CVE Identifiers
  • Common Vulnerability Scoring System
  • Other Related Enumerations and Expressions
  • Common Weakness Enumeration
  • Common Attack Pattern Enumeration and Classification
  • Common Malware Enumeration
  • Common Event Expression
  • Distributed Audit Service
  • Common Remediation Enumeration
  • Chapter 6: SCAP Vulnerability Measurement
  • Common Vulnerability Scoring System
  • CVSS History
  • CVSS Use Cases
  • Vulnerability Characteristics
  • CVSS Scoring
  • Base Scoring
  • Temporal Scores
  • Environmental Scores
  • Base, Temporal, Environmental Vectors
  • CVSS Equations
  • Your Mileage May Vary
  • Common Vulnerability Reporting Framework (CVRF)
  • Common Misuse Scoring System (CMSS)
  • Common Configuration Scoring System
  • Vulnerability Management in the Enterprise
  • Part III: Putting It All Together
  • Chapter 7: Building Automated Security Content
  • Working with Files
  • XML Editors
  • Content Maintenance Tools
  • Enhanced SCAP Editor (eSCAPe)
  • The eSCAPe Wizards
  • Opening and Navigating an SCAP Data Stream
  • Example: Finding Malware with SCAP
  • Example: Creating Content to Check for Malicious File
  • Using the Regex Validator Tool.
  • Using the Merge OVAL Documents Tool
  • Some Useful Tips for Creating Content
  • Explain Yourself
  • Make Sure It Works
  • Version Your Artifacts
  • Reuse of Artifacts
  • Content Correctness
  • Least Version Principle
  • Design for People
  • Follow the Rules of the Road
  • Minimize Extension Depth
  • Granularity
  • Customization
  • Performance
  • Regular Expressions
  • Chapter 8: Putting Security Automation to Work in the Enterprise
  • How Organizations Are Using Security Automation
  • Automated Hardware and Software Inventory
  • Security Configuration Management (SCM)
  • OpenSCAP Security Automation Software in Linux Distributions
  • Use of Security Automation to Track Management and Operational Security
  • Security Automation to Discover Malicious Software
  • Continuous Monitoring by Integrating Security Systems
  • Device Health Monitoring
  • Building a Healthy and Resilient Cyber Ecosystem
  • Chapter 9: Conclusion
  • The Road Ahead
  • Appendix: XCCDF, OVAL, OCIL, and Supporting Enumerations Usage
  • Index.