audit. evaluate. comply. - nist · 2020-03-03 · audit. evaluate. comply. “it really is that...

60
secure elements confidential Audit. Evaluate. Comply. “It really is that simple” R 2 nd Annual Security Automation Conference and Workshop Andrew Bove Andrew Bove CTO, Secure Elements, Inc. CTO, Secure Elements, Inc. Above@Secure Above@Secure - - Elements.com Elements.com

Upload: others

Post on 09-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

secure elements confidential

Audit. Evaluate. Comply.“It really is that simple”

R

2nd Annual Security Automation Conference and Workshop

Andrew BoveAndrew BoveCTO, Secure Elements, Inc.CTO, Secure Elements, Inc.

Above@[email protected]

Page 2: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Agenda

1. Background2. Our Context -- “Codification”3. Deriving, Composing and Refining

xContent– Auditing– Vulnerability Scanning

4. Application5. Results

Page 3: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Secure Elements at a glance …

Venture Capital FundedCarlyle Venture PartnersDCM - Doll Capital Management

Founded 2003

Headquarters in Herndon, VirginiaRegional US sales officesStrong industry & channel partners

Secure Elements is dedicated to developing innovative products to evolve the way organizations achieve IT security and compliance

We enable organizations to audit, evaluate, and comply with internal, industry, and regulatory policies

C5 Security SolutionsC5 Enterprise Vulnerability Management SuiteC5 Alert ServiceC5 Enterprise Security Portal

Markets ServedGovernmentFinance, Healthcare, EnergyCritical Infrastructure Providers

Industry Alliances:

Secure Elements Company Overview

Page 4: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Product Overview

Asset inventory on-demand

Security vulnerabilities & exposures

Compliance score by asset

Evaluate

Enterprise security status

Compliance score by department

Asset criticality vs. risk exposure

Comply

Corporate policies

Regulated & industry specific

Standards & best practices

C5 Enterprise Vulnerability Management - Features

Audit

Page 5: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Appreciation

““The hardest part of building a The hardest part of building a software system is deciding what software system is deciding what to build.to build.”” –– Fred BrooksFred Brooks

Page 6: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Context: Codification

• Many Sources of Knowledge– Microsoft Windows Security Resource Kit– http://www.securityfocus.com/– http://sans.org (SANS Top 20)– FISMA– SOX– CIS– HIPPA

• Very Little is Action-able at an Enterprise level

Page 7: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Codification - Checks by Platform

Local Security Policy Settings WinXP Standalone

WinXP Domain

Win2003 Standalone

Win2003 Domain

WinSrv2000 Standalone

WinSrv2000 Domain

WinPro2000 Standalone

WinPro2000 Domain

Account PoliciesPassword PolicyEnforce password history Yes Yes Yes Yes Yes Yes Yes YesMaximum password age Yes Yes Yes Yes Yes Yes Yes YesMinimum password age Yes Yes Yes Yes Yes Yes Yes YesMinimum password length Yes Yes Yes Yes Yes Yes Yes YesPassword must meet complexity requirements Yes Yes Yes Yes Yes Yes Yes YesStore passwords using reversible encryption Yes Yes Yes Yes Yes Yes Yes Yes

Account Lockout PolicyAccount lockout duration Yes Yes Yes Yes Yes Yes Yes YesAccount lockout threshold Yes Yes Yes Yes Yes Yes Yes YesReset account lockout counter after Yes Yes Yes Yes Yes Yes Yes Yes

Local PoliciesAudit PolicyAudit account logon events Yes Yes Yes Yes Yes Yes Yes YesAudit account management Yes Yes Yes Yes Yes Yes Yes YesAudit directory service access Yes Yes Yes Yes Yes Yes Yes YesAudit logon events Yes Yes Yes Yes Yes Yes Yes YesAudit object access Yes Yes Yes Yes Yes Yes Yes YesAudit policy change Yes Yes Yes Yes Yes Yes Yes YesAudit privilege use Yes Yes Yes Yes Yes Yes Yes YesAudit process tracking Yes Yes Yes Yes Yes Yes Yes YesAudit system events Yes Yes Yes Yes Yes Yes Yes Yes

User Right AssignmentAccess this computer from Network Yes Yes Yes Yes Yes Yes Yes YesAct as a apart of the operating system Yes Yes Yes Yes Yes Yes Yes YesAdd workstations to domain Yes Yes Yes Yes Yes Yes Yes YesAdjust memory quotas for a process Yes Yes Yes Yes N/A N/A N/A N/AAllow log on locally Yes Yes Yes Yes N/A N/A N/A N/AAllow log on through Terminal Services Yes Yes Yes Yes N/A N/A N/A N/ABackup files and directories Yes Yes Yes Yes Yes Yes Yes YesBypass traverse checking Yes Yes Yes Yes Yes Yes Yes YesChange the system time Yes Yes Yes Yes Yes Yes Yes YesCreate a pagefile Yes Yes Yes Yes Yes Yes Yes YesCreate a token object Yes Yes Yes Yes Yes Yes Yes YesCreate global objects SE SE SE SE SE SE SE SECreate permanent shared objects Yes Yes Yes Yes Yes Yes Yes YesDebug programs Yes Yes Yes Yes Yes Yes Yes YesDeny access to this computer from the network Yes Yes Yes Yes Yes Yes Yes YesDeny log on as a batch job Yes Yes Yes Yes Yes Yes Yes YesDeny log on as a service Yes Yes Yes Yes Yes Yes Yes YesDeny log on locally Yes Yes Yes Yes Yes Yes Yes YesDeny log on through Terminal Services Yes Yes Yes Yes N/A N/A N/A N/A

An OVAL Check ExistsAn OVAL Check Exists

SE Produced SE Produced ~400~400

Page 8: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Evolution of a XCCDF Benchmark

ChecksBy

Platform

XCCDFBenchmarkTemplates

SESecurity

Labs+

oXygenTM

+Helium

FISMABenchmark

SOXBenchmark

SE WindowsBenchmark

SE LinuxBenchmark

GLBABenchmark

C5EVM V3

Benchmarks are derived from a master ‘universe’of possible checks

People + Process + Tools

Page 9: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

C5 Command Center

Page 10: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Deriving Benchmarks Through Adaptation

All of the content that the system knows about that Iam allowed to adapt to the enterprise

Page 11: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the NIST Benchmark

Select the applicable

profiles

Page 12: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the NIST Rules

Some rules Some rules may not be may not be applicableapplicable

Page 13: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the CIS Benchmark

Page 14: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the CIS Rules

Page 15: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the CIS Rules

Page 16: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the C5 STIGS

Page 17: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of Tolerance of Rules

The Military Measurement RuleThe Military Measurement Rule: Measure it with a : Measure it with a micrometer, mark it with a piece of chalk, and cut it micrometer, mark it with a piece of chalk, and cut it with an ax.with an ax.

Page 18: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the Secure Elements Benchmark

Page 19: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the Secure Elements Profiles

Page 20: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Adaptation of the Secure Elements Rules

Local Security Policy Settings WinXP Standalone

WinXP Domain

Win2003 Standalone

Win2003 Domain

WinSrv2000 Standalone

WinSrv2000 Domain

WinPro2000 Standalone

WinPro2000 Domain

Account PoliciesPassword PolicyEnforce password history Yes Yes Yes Yes Yes Yes Yes YesMaximum password age Yes Yes Yes Yes Yes Yes Yes YesMinimum password age Yes Yes Yes Yes Yes Yes Yes YesMinimum password length Yes Yes Yes Yes Yes Yes Yes YesPassword must meet complexity requirements Yes Yes Yes Yes Yes Yes Yes YesStore passwords using reversible encryption Yes Yes Yes Yes Yes Yes Yes Yes

Account Lockout PolicyAccount lockout duration Yes Yes Yes Yes Yes Yes Yes YesAccount lockout threshold Yes Yes Yes Yes Yes Yes Yes YesReset account lockout counter after Yes Yes Yes Yes Yes Yes Yes Yes

Local PoliciesAudit PolicyAudit account logon events Yes Yes Yes Yes Yes Yes Yes YesAudit account management Yes Yes Yes Yes Yes Yes Yes YesAudit directory service access Yes Yes Yes Yes Yes Yes Yes YesAudit logon events Yes Yes Yes Yes Yes Yes Yes YesAudit object access Yes Yes Yes Yes Yes Yes Yes YesAudit policy change Yes Yes Yes Yes Yes Yes Yes YesAudit privilege use Yes Yes Yes Yes Yes Yes Yes YesAudit process tracking Yes Yes Yes Yes Yes Yes Yes YesAudit system events Yes Yes Yes Yes Yes Yes Yes Yes

User Right AssignmentAccess this computer from Network Yes Yes Yes Yes Yes Yes Yes YesAct as a apart of the operating system Yes Yes Yes Yes Yes Yes Yes YesAdd workstations to domain Yes Yes Yes Yes Yes Yes Yes YesAdjust memory quotas for a process Yes Yes Yes Yes N/A N/A N/A N/AAllow log on locally Yes Yes Yes Yes N/A N/A N/A N/AAllow log on through Terminal Services Yes Yes Yes Yes N/A N/A N/A N/ABackup files and directories Yes Yes Yes Yes Yes Yes Yes YesBypass traverse checking Yes Yes Yes Yes Yes Yes Yes YesChange the system time Yes Yes Yes Yes Yes Yes Yes YesCreate a pagefile Yes Yes Yes Yes Yes Yes Yes YesCreate a token object Yes Yes Yes Yes Yes Yes Yes YesCreate global objects SE SE SE SE SE SE SE SECreate permanent shared objects Yes Yes Yes Yes Yes Yes Yes YesDebug programs Yes Yes Yes Yes Yes Yes Yes YesDeny access to this computer from the network Yes Yes Yes Yes Yes Yes Yes YesDeny log on as a batch job Yes Yes Yes Yes Yes Yes Yes YesDeny log on as a service Yes Yes Yes Yes Yes Yes Yes YesDeny log on locally Yes Yes Yes Yes Yes Yes Yes YesDeny log on through Terminal Services Yes Yes Yes Yes N/A N/A N/A N/A

Leveraging Leveraging indexing allows indexing allows us to provide us to provide more structure to more structure to the contentthe content

Page 21: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Reflection

• XCCDF Allows grouping of OVAL Compliance Tests

• Why Not Group OVAL Vulnerability Tests into a Vulnerability “Job” using XCCDF?

Page 22: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Vulnerability Scanning

Page 23: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Vulnerability Scanning - Platforms

Page 24: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Vulnerability Scanning – Rule Selection

What are theseWhat are thesethings anyway?things anyway?

Page 25: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Rule Interrogation

Page 26: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Vulnerability Scanning – Rule Selection

Page 27: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Checkpoint

Adapted Compliance ContentVarious Sources

Created A Vulnerability Scan

Page 28: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

OVAL Scanning

Page 29: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Apply an OVAL Vulnerability Scan

Deep asset knowledge + metadataDeep asset knowledge + metadata

Page 30: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

OVAL Scan Asset Selection

Page 31: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Perform OVAL Scan

Page 32: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a
Page 33: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Vulnerability Detail

NVDNVD

Remediation for this VulnerabilityRemediation for this Vulnerability

Drill down on those assetsDrill down on those assetsthat have this vulnerabilitythat have this vulnerability

Page 34: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Enterprise Vulnerability View

Page 35: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Performing the Audit

Page 36: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Dynamic Derivation of Applicable Benchmarks

By leveraging indexing information and our deep asset knowledge we are able to derive those benchmarks that are relevant for the assets selected

Page 37: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Perform the Audit

Page 38: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Non-Technical Controls

Page 39: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Compliance Home

All Benchmarks that have been run, are scheduled to run, or are running now

Who applied them

What was the score for all those that have completed or what is the score now for the ones in progress

What is happening with them at this moment

Page 40: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Compliance Benchmark Summary

What happened or is happening with all profiles associated with this Benchmark.

Page 41: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Compliance Profile Summary

Percentage of rules that passed and failed

What assets are in the most trouble

Percentage of assets under evaluation

Is there a rule that is causing more failures than others?

Of those assets that are out of-compliance what is the distribution of their asset criticality

Page 42: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Compliance

This asset was evaluated against 208 rules of which 123 failed

What changed? Any Vulnerabilities discovered lately?

Any remediations applied, bypassed?

Page 43: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Compliance Report Generation

Page 44: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Active HTML View

Page 45: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Detailed Asset Compliance Report

Page 46: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Enterprise Compliance

Leveraged Many Man Years of SME from SE, CIS, DISA, NSA/NIST, etc.Enabled enterprise wide evaluation of assets on demandIdentified those assets that are out of compliance/vulnerable and whyMemorialized what has been done in the databaseReport on it at will

Page 47: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Power Law – 80/20 “Rule”

• Pareto's principle– "for many phenomena 80% of consequences

stem from 20% of the causes." • 80% Use cases can be addressed by the

abstraction• 20% Require getting out of the abstraction

Page 48: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

C5 Helium Content “Browser”

Page 49: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

C5 Helium

ItIt’’s all about schema ins all about schema ingeneral, not specific to general, not specific to OVAL or XCCDFOVAL or XCCDF

Page 50: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Schema Awareness

Page 51: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Profiles

Page 52: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Simple Editing

Page 53: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Editing

Page 54: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Inter-Source Updating

Selection reference from the profile to a rule in the same source.

A ‘check’ reference from the rule to an oval definition in another source

Page 55: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Inter-Source Updating

Make a change to an OVAL definition from a different source

Page 56: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Inter-Source Updating

Page 57: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Inter-Source Updating

Page 58: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Inter-Source Updating

Page 59: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

Inter-Source Updating

Page 60: Audit. Evaluate. Comply. - NIST · 2020-03-03 · Audit. Evaluate. Comply. “It really is that simple ... SE Linux Benchmark GLBA Benchmark C5EVM V3 Benchmarks are derived from a

secure elements confidential

Audit. Evaluate. Comply.“It really is that simple”

Questions?Questions?

R