Organizations use both emerging and existing technologies to ensure compliance. One particular challenge is how to update and track regulatory changes and new rules, including how to use them to coordinate policy management and compliance training.
This section presents some of the notable technologies. They are:
The COSO Internal Control—Integrated Framework was developed by the Committee of Sponsoring Organizations of the Treadway Commission. That led to the term COSO. The organization was formed in 1992 with the main idea of creating a framework of controls to ensure a company’s financial reports were accurate and free from fraud. The COSO framework has evolved over the years with the latest version published in May 2013. Since 1992, both technology in general and the Internet in particular have evolved. Not surprisingly, technology and information security have become major parts of the COSO controls framework.
In fact, COSO, like Control Objectives for Information and related Technology (COBIT), is often used by auditors, compliance professionals, and risk professionals. COSO is widely used and recognized as a major U.S. standard that has been adopted worldwide. Because COSO controls apply both to business functions (such as financial accounting) and to technology (such as information security), they make a powerful framework. The framework can describe how controls should be built, in both business and technology terms. This has enormous benefits for the security team. The security team can build controls in a way that the business side is more likely to understand. That makes it a little easier to talk the language of the business side. That, in turn, leads to greater business support for adopting the security controls.
The COSO control framework works well with other frameworks, such as COBIT. In fact, COBIT 5 leverages both COSO and International Organization of Standardization (ISO) principles and extends the work into many information security areas not handled by COSO. So rather than competing, these frameworks actually complement each other.
COSO outlines how controls should be built and managed in order to ensure compliance with many major regulations today. For example, the governance body for the Sarbanes-Oxley (SOX) Act of 2002 recommends the COSO internal framework as a means of compliance with SOX. In other words, if you implement the COSO control framework, you will be compliant with SOX regulations.
The MITRE Corporation is a private company that performs a lot of work for U.S. government agencies. For example, MITRE maintains the Common Vulnerabilities and Exposures (CVE) for the National Cyber Security Division of the U.S. Department of Homeland Security. Many of the original employees came from the Massachusetts Institute of Technology (MIT), and they work on research and engineering (RE). However, MITRE is not an acronym. Additionally, MITRE is not part of MIT.
Consequently, COSO is a powerful framework to ensure that risks are well managed and the right controls are built to keep systems compliant with many laws and regulations.
More information on the COSO internal controls framework can be found at www.coso.org.
The Security Content Automation Protocol (SCAP), pronounced “S-cap,” is a technology used to measure systems and networks. It’s actually a suite of six specifications. Together these specifications standardize how security software products identify and report security issues. SCAP is a trademark of NIST.
NIST created SCAP as part of its responsibilities under the Federal Information Security Management ACT (FISMA). The goal is to establish standards, guidelines, and minimum requirements for tools used to scan systems. Although SCAP is designed for the creation of tools to be used by the U.S. government, private entities can use the same tools.
The six specifications are:
SCAP isn’t a tool itself. Instead, it’s the protocol used to build the tools. Compare this to Hypertext Transfer Protocol (HTTP), the protocol that transmits traffic over the Internet so that applications can display data in user applications. Web browsers can display pages written in Hypertext Markup Language (HTML) and Extensible Markup Language (XML). However, HTTP can’t display the traffic itself. Instead, web browsers such as Edge, Firefox, or Chrome are the tools that use HTTP to transmit and receive HTTP traffic and display the HTML-formatted pages. Similarly, SCAP-compliant tools use the underlying specifications of SCAP to scan systems and report the results. There are a wide variety of tool purposes. These include the ability to audit and assess systems for compliance with specific requirements. They can scan systems for vulnerabilities. They also can detect systems that don’t have proper patches or are misconfigured.
Some of the tools currently available are:
If you want to read more about SCAP, read NIST SP 800-126. This is the technical specification for SCAP version 1.3. At this writing, NIST SP 800-126 rev 3 is in draft. It is the technical specification for SCAP version 1.1. You can access NIST SP 800-126 and other NIST 800-series special publications at http://csrc.nist.gov/publications/PubsSPs.html.
NIST has established a formal validation program for NIST products. You can view a full list of SCAP validated products at http://nvd.nist.gov/scapproducts.cfm.
The Simple Network Management Protocol (SNMP) is used to manage and query network devices. SNMP commonly manages routers, switches, and other intelligent devices on the network with IP addresses. SNMP is a part of the TCP/IP suite of protocols, so it’s a bit of a stretch to call it an emerging technology. However, SNMP has improved over the years. The first version of SNMP was SNMP v1. It had a significant vulnerability: Devices used community strings for authentication. The default community string was “Public,” and SNMP sent it over the network in clear text. Attackers using a sniffer such as Wireshark could capture the community string even if it was changed from the default. They could then use it to reconfigure devices.
SNMP was improved with versions 2 and 3. Version 3 provides three primary improvements:
Web-Based Enterprise Management (WBEM) is a set of management and Internet standard technologies. It standardizes the language used to exchange data among different platforms for management of systems and applications. Just as SCAP provides the standards used to create tools, WBEM also provides standards used in different management tools. The tools can be graphical user interface (GUI)–based tools; some tools are command line tools that don’t use a GUI.
WBEM is based on different standards from the Internet and from the Distributed Management Task Force (DMTF), Inc. DMTF is a not-for-profit association. Members promote enterprise and systems management and interoperability. These standards include:
WBEM uses HTTP, which is commonly used on the Internet. However, WBEM also can operate on internal networks using HTTP.
A digital signature is a value that identifies a file’s origin. Usually the data in the file is first hashed using a cryptographic hash, then signed (i.e., encrypted with the sender’s private key). Digital signing technologies provide added security for files. A file signed with a digital signature provides authentication and integrity assurances. It also provides nonrepudiation; in other words, it provides assurances that a specific sender sent the file. It also provides assurances that the file has not been modified.
A public key infrastructure (PKI) is needed to support digital signatures. A PKI includes certificate authorities (CAs) that issue certificates. The certificate includes a public key matched to a private key. Anything encrypted with the private key can be decrypted with the public key. Additionally, anything encrypted with the public key can be decrypted with the private key.
Digital signatures provide added security for many different types of policy compliance files. For example, consider patches and other update files. You would download these files and use them to patch vulnerabilities. If an attacker somehow modified the patch, instead of plugging a vulnerability, you would be installing malware. Similarly, many definition updates for security tools are digitally signed.
If a file is digitally signed, you know it has not been modified. The following steps show one way that a digital signature is used for a company named Acme Security. The company first obtains a certificate from a CA with the following steps:
No matter how many times you calculate a hash, it will always be the same as long as the source is the same. This is similar to counting the number of apples in a bowl. As long as the number of apples stays the same, you’ll always come up with the same number. If someone takes an apple away or adds an apple, the resulting number will change.
Digital signatures aren’t a new technology; however, their use with security tools and downloads has significantly increased over the years. A digital signature provides you with an additional tool to verify authentication and integrity for downloaded files. It is likely that drivers you use for devices like printers are digitally signed.