<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integrity checks in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7591#M148</link>
    <description>&lt;P&gt;So there are a few Host Intrusion Prevention/Detection Sys HIPS/HIDS out there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Three examples that would probably work:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tripwire is the original take a hash of all the files on the system and then compare for modification, Symantec has the Control Compliance Suite and Data Center Security that do similar things, and McAfee has a Host Intrusion Prevention product for Desktops and Servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to check data integrity files just have something encrypt and sign it with x.509 or OpenPGP(look after your keys).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the one that's interesting to me verification of Firmware, quite difficult to achieve and while I know of many possible attacks I guess the approach I would have is to have one system watch the other, but how would you tell if both systems graphics cards were lying to you?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These guys look to be top dog &lt;A href="http://trapezoid.com" target="_blank"&gt;http://trapezoid.com&lt;/A&gt; at the moment - &amp;nbsp;but if I remember the approach&amp;nbsp;you might take with vehicles is to&amp;nbsp;monitor communications between components over CAN bus or&amp;nbsp;AFDX. not being able to install much on to components. Not sure how this maps to PCs/Servers/VMs/Container but it looks fun:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html" target="_self"&gt;https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Feb 2018 11:20:27 GMT</pubDate>
    <dc:creator>Early_Adopter</dc:creator>
    <dc:date>2018-02-21T11:20:27Z</dc:date>
    <item>
      <title>Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7590#M147</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please give me your opinion about this security control called integrity checks. I am specifically interested in the context of NIST 800 53 controls catalog:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;SI-7(1) Software, Firmware, And Information Integrity | Integrity Checks &lt;/STRONG&gt;&lt;/EM&gt;that lists requirement that the information system should "performs an integrity check of software/firmware/information] at startup or regularly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am really puzzled are we talking about a standalone separate tool that does integrity checks or ... for example the WIndows chkdisk or the built in features in most OS count for this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess my question is - can you give me an example of such integrity checking tool that would make me compliant with this control (built in or 3rd party), also - if you have any opinions about this I would appreciate.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 11:01:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7590#M147</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-21T11:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7591#M148</link>
      <description>&lt;P&gt;So there are a few Host Intrusion Prevention/Detection Sys HIPS/HIDS out there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Three examples that would probably work:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tripwire is the original take a hash of all the files on the system and then compare for modification, Symantec has the Control Compliance Suite and Data Center Security that do similar things, and McAfee has a Host Intrusion Prevention product for Desktops and Servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to check data integrity files just have something encrypt and sign it with x.509 or OpenPGP(look after your keys).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the one that's interesting to me verification of Firmware, quite difficult to achieve and while I know of many possible attacks I guess the approach I would have is to have one system watch the other, but how would you tell if both systems graphics cards were lying to you?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These guys look to be top dog &lt;A href="http://trapezoid.com" target="_blank"&gt;http://trapezoid.com&lt;/A&gt; at the moment - &amp;nbsp;but if I remember the approach&amp;nbsp;you might take with vehicles is to&amp;nbsp;monitor communications between components over CAN bus or&amp;nbsp;AFDX. not being able to install much on to components. Not sure how this maps to PCs/Servers/VMs/Container but it looks fun:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html" target="_self"&gt;https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 11:20:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7591#M148</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-02-21T11:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7592#M149</link>
      <description>&lt;P&gt;Thanks for your input Adopter.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 11:37:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7592#M149</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-21T11:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7593#M150</link>
      <description>&lt;P&gt;Early_Adopter makes some good points about what we as administrators can do.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I would also say it includes selecting systems that use "&lt;A href="https://en.wikipedia.org/wiki/Trusted_Computing" target="_self"&gt;Trusted Computing Platform&lt;/A&gt;", which validates a digital signature on the boot loader before the firmware will transfer control to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would also include things&amp;nbsp;that manufacturers are doing for us behind the scenes, such as &lt;A href="https://en.wikipedia.org/wiki/Code_signing" target="_self"&gt;installer signing&lt;/A&gt;, which causes both Windows and RedHat to refuse to install software that does not have a valid digital signature (E.g. signed by a CA in your certificate store).&amp;nbsp; &amp;nbsp;Java is now doing the same thing at run-time for applets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 14:53:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7593#M150</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2018-02-21T14:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7595#M151</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/102722613"&gt;@Deyan&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please give me your opinion about this security control called integrity checks. I am specifically interested in the context of NIST 800 53 controls catalog:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;SI-7(1) Software, Firmware, And Information Integrity | Integrity Checks &lt;/STRONG&gt;&lt;/EM&gt;that lists requirement that the information system should "performs an integrity check of software/firmware/information] at startup or regularly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am really puzzled are we talking about a standalone separate tool that does integrity checks or ... for example the WIndows chkdisk or the built in features in most OS count for this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess my question is - can you give me an example of such integrity checking tool that would make me compliant with this control (built in or 3rd party), also - if you have any opinions about this I would appreciate.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Also don't forget to look at the corresponding entry in 800-53A, the manual used for testing compliance with the control in 800-53. Here is what it says:&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="7"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT size="1"&gt;POTENTIAL ASSESSMENT METHODS AND OBJECTS&lt;/FONT&gt;&lt;FONT size="2"&gt;: &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Examine&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records generated/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes; information system audit records; other relevant documents or records]. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Interview&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators]. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Test&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;Software, firmware, and information integrity verification tools]. &lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;So you can use any of the above methods to check/meet compliance. It may not be a software method, it may be a person manually checking firmware dates manually and documenting that they haven't changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A good way to prove compliance is to&amp;nbsp; look at the manual your auditor is going to use to verify compliance, which is 800-53A.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 17:42:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7595#M151</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-02-21T17:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7637#M152</link>
      <description>&lt;P&gt;Thanks CISO Scott&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 06:25:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7637#M152</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-22T06:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7824#M153</link>
      <description>&lt;P&gt;Looking at what an auditor will check for is an excellent way to approach this.&amp;nbsp; Having said that, sometimes&amp;nbsp;an experienced auditor will approach this with an open mind for any kind of 'health-check', technical or organizational measure (aka TOM) that an organization uses to verify the configuration/patch-level/settings/etc. for systems.&amp;nbsp; I recommend doing a quarterly walk-through of each system (if possible) looking&amp;nbsp;at&amp;nbsp;user IDs, access policies, software (including firmware and OS) versions and patches, application settings, network configuration and anything else that might be pertinent in your environment.&amp;nbsp; Not a 'fun' task, but essential for the basic hygiene of systems.&amp;nbsp; Good luck!&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 16:11:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7824#M153</guid>
      <dc:creator>Edd</dc:creator>
      <dc:date>2018-02-26T16:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Integrity checks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7848#M154</link>
      <description>&lt;P&gt;Thanks Edd and everyone.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 19:50:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Integrity-checks/m-p/7848#M154</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-26T19:50:21Z</dc:date>
    </item>
  </channel>
</rss>

