<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What operational capabilities file hashes can enhance? in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47769#M497</link>
    <description>Masahiro,&lt;BR /&gt;&lt;BR /&gt;I use hashing to verify the integrity of whitelisted applications before installation. It ensures users have not downloaded any other unapproved versions of the same application or simply added additional files to the file that could be used to cause chaos later on.&lt;BR /&gt;&lt;BR /&gt;Angel Q</description>
    <pubDate>Thu, 07 Oct 2021 01:50:39 GMT</pubDate>
    <dc:creator>Pasuking</dc:creator>
    <dc:date>2021-10-07T01:50:39Z</dc:date>
    <item>
      <title>What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47711#M490</link>
      <description>&lt;P&gt;According to the question c06.062 of CCSP Official Practice Tests, file hashes can enhance both operational capabilities and configuration management efforts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think of the operational capabilities in this case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its explanatory note says the following.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;EM&gt;File hashes can serve as integrity checks for both configuration management (to determine which systems are not configured to the baseline) and audit purposes (as artifacts/common builds of systems for audit review).&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems the note says the operational capabilities equal to audit capabilities, though.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:59:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47711#M490</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2023-10-09T09:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47727#M493</link>
      <description>&lt;P&gt;Conventionally configuration management includes the practice of configuration auditing, which is probably why.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Oct 2021 07:43:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47727#M493</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2021-10-04T07:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47742#M494</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Conventionally configuration management includes the practice of configuration auditing, which is probably why.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Thank you, Steve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;File hashes reveal integrity of original files. That is one of facets of configuration management. Right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 10:51:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47742#M494</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2021-10-05T10:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47769#M497</link>
      <description>Masahiro,&lt;BR /&gt;&lt;BR /&gt;I use hashing to verify the integrity of whitelisted applications before installation. It ensures users have not downloaded any other unapproved versions of the same application or simply added additional files to the file that could be used to cause chaos later on.&lt;BR /&gt;&lt;BR /&gt;Angel Q</description>
      <pubDate>Thu, 07 Oct 2021 01:50:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47769#M497</guid>
      <dc:creator>Pasuking</dc:creator>
      <dc:date>2021-10-07T01:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47774#M499</link>
      <description>Thanks Angel!&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Oct 2021 10:51:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47774#M499</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2021-10-07T10:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47821#M506</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1459503571"&gt;@Masahiro&lt;/a&gt;If you dig into the NIST SP800-167 Application Whitelisting, it is also used to check the validity of applications permitted into the system.&amp;nbsp;&amp;nbsp; You will also find a few manufacturers such as Juniper who have actually built in both Characterisation and Application Whitelisting into the Junos, for formally checking that software updates come from the correct resource, and also that someone has not manipulated the original updates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other solutions such as VMware Carbon Black does a similar series of checks too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will find similar techniques vouched and mandated by the Australian Information Security Manual and also by the New Zealand Information Security Manual too.&amp;nbsp; Both are well worth digging through, as they are both online and available for searching purposes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 10 Oct 2021 19:50:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47821#M506</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-10-10T19:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: What operational capabilities file hashes can enhance?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47865#M507</link>
      <description>&lt;P&gt;Thank you for sharing your knowledge with me,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;Your reply made me much clearer about operational capabilities which file hashes can enhance.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 08:55:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-operational-capabilities-file-hashes-can-enhance/m-p/47865#M507</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2021-10-13T08:55:06Z</dc:date>
    </item>
  </channel>
</rss>

