Information Security News mailing list archives
Re: Group crafts rating system for server security
From: Chris Brenton <cbrenton () SOVER NET>
Date: Wed, 27 Dec 2000 07:52:16 -0500
Dan Tobin wrote:
While I certainly do see the need for a system like this, I have no faith that it can happen, especially by folks with so many vested interests in the economics of it.
Hummm. I work for Dartmouth college's security institute and we are also involved with the CIS project. We actually stand the chance of losing some funding if CIS is successful. We're involved because it's a great idea that's badly needed.
For this to happen in the time frame allocated, a gargantuan effort would need to be launched,
I agree completely however I've also been amazed at the amount of resources that have signed up to help out with this project. It really has turned into a gargantuan effort.
and then validated with series of controlled experiments.
Yup, it's called "peer review". Hand it out for free and let people beat on it and tweak as required. Same principal as open source.
However, as Weld alluded, there is no way to control enough variables to make this statistically valid.
Depends on the level of granularity you are looking for. Can you rate one system a "7" and another an "8", I think so. Can you rate one system a "8.12" and another "8.13", I think the whole field is far too fluid for that level of detail. This also somewhat misses the point of what CIS is all about (disclaimer: I don't speak for CIS, this is just my read on the whole thing). CIS appears to be looking at the Internet as one big network and attempting to perform a risk assessment. IMHO this is no different than what all of us do with our own little piece of the pie. The idea is to try and identify the weak points and pull them up to standard with everything else. For example, anyone who spends any time in this field quickly identifies that there are certain types of networks/domains that a lot of attacks originate from. This tends to be because systems within these realms are easy pickings for the attacker community. The idea is to baseline the level of security put into play by organizations that _are not_ being used as bounce sites and attempt to do what ever is possible to try and bring the minimal sites up to spec. This may take the form of free tools, procedures, support, etc. I personally don't have all the answers but I'm glad to be helping out an organization that is taking a stab at making a difference for all of us.
Further, how long is the "single number" going to be valid for? The security posture of a "system", however you want to define it, changes daily.
Again, I agree completely. As with any risk assessment any checks need to be dated, revision controlled, etc. *sigh* Back when I was consulting, the above attitude was always the biggest problem I had getting security managers to perform regular risk assessments. They don't want to hear its an on going process. The attitude was "why bother if I can't just check it once and be done with it". BTW, when I need to do risk assessment predictions I look at the organization's _process_ for remaining secure. If they are diligent at receiving alert notifications, installing patches, reviewing logs, etc. you can make a pretty accurate guess that they will remain secure. If a consultant walked in and set everything up and the systems are now running on auto-pilot, you can make a pretty accurate guess that at some point they'll get whacked.
Put me into that famous category of peoiple actually wanting to add "science" back into "Computer Science".
Don't take it personally, but I *really* hate this attitude. Throw some stones and then try and close with some cute snippet instead of a solution. If you have a better idea, please sing out. I'm more than happy to volunteer my time to support any good project that works towards making us all more secure. That's why I'm working with CIS. It may or may not be perfect, but its an effort to do the work rather than throw stones.
Wow... if it were this easy, I would have finished my PhD long ago probably...
<GRIN>...no comments here. Chris -- ************************************** cbrenton () sover net * Mastering Cisco Routers http://www.amazon.com/exec/obidos/ASIN/078212643X/ * Mastering Network Security http://www.amazon.com/exec/obidos/ASIN/0782123430/ ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Group crafts rating system for server security InfoSec News (Dec 22)
- <Possible follow-ups>
- Re: Group crafts rating system for server security InfoSec News (Dec 27)
- Re: Group crafts rating system for server security Chris Brenton (Dec 28)
