Infrastructure Security Research Agenda 2011āPart 2: Posturing and Reacting Faster/Better
The first of my Infrastructure Security Research Agenda 2011 posts, introducing the concept of positivity, generated a lot of discussion. Not only attached to the blog post (though the comments there were quite good), but in daily discussions with members of our extended network. Which is what a research agenda is really for. Itās a way to throw some crap against the wall and see what sticks. Posturing So letās move on to the next aspect of my Ingress research ideas for the next year. Itās really not novel, but considering how awful most organizations are about fairly straightforward blocking and tackling, it makes sense to keep digging into this area and continue publishing actionable research to help practitioners become a bit less awful. Iām calling this topic area Posturing because itās really about closing the doors, battening down the windows, and making sure you are ready for the oncoming storm. And yes, itās storming out there. We did talk about this a bit in the Endpoint Security Fundamentals series under Patching and Secure Configurations. There are three aspects of Posturing: Vulnerability Management: Amazingly enough, we havenāt yet written much on how to do vulnerability management. So weāll likely focus on a short fundamentals series, and follow up with a series on Vulnerability Management Evolution, because with the advent of integrated application and database scanning ā combined with the move towards managed services for vulnerability management ā there are plenty of things to talk about. Patching: No itās not novel, but itās still a critical part of the security/ops guyās tool box. As the tools continue to commoditize, weāll look at whatās important and how patching can & should be used as a stepping stone to more sophisticated configuration management. The process (laid bare in Patch Management Quant) hasnāt changed, but weāll have some thoughts on tool evolution for 2011. Configuration Policy Compliance: Pretty much all the vulnerability management players are looking at auditing device configurations and comparing reality to policy as a logical extension of the scans they already do. And they are right, to a point. In 2011 weāll look at this capability as leverage on other security operational functions. Weāll also document the key capabilities required for security and an efficiency ā beyond managing configuration changes for policy compliance. To be honest Iām not crazy about the term Posturing, but I couldnāt think of anything I liked better. This concept really plays into two aspects of our security philosophy: Reduce attack surface: A configuration policy with solid vulnerability/configuration/patching operations help close the holes used by less sophisticated attackers. Positivity falls into this bucket as well, by restricting the types of traffic and executables allowed in our environments. React faster: By watching for configuration changes, which can indicate unauthorized activity on key devices (generally not good), you put yourself in position to see attacks sooner, and thus to respond faster. Yes, we are doing a lot of research into what āresponseā means here, but Posturing can certainly be key to making sure nothing gets missed. React Faster and Better We beat this topic to death in 2010, so Iām not going to reiterate a lot of that research beyond pointing to the stuff weāve already done: Understanding and Selecting SIEM/Log Management Monitoring up the Stack Incident Response Fundamentals Weāre also working on the successor to Incident Response Fundamentals in our React Faster and Better series. That should be done in early January, and then weāll focus our research in this area on implementation and success, which means a few Quick Wins series. These will probably include: Quick Wins with Network Monitoring: You know how I love monitoring, and clearly understanding and factoring network traffic into security analysis can yield huge dividends. But how? And how much? Quick Wins with Security Monitoring: Deploying SIEM and Log Management can be a bear, so weāll focus on making sure you can get quick value from any investment in this area, as well as ensuring you are setting yourself up for a sustainable implementation. We have learned many tricks over the past few years (particularly from folks who have screwed this up), so itās time to share. Once much of this research is published, weāll have a pretty deep treatment of our React Faster and Better concept. Share:
