<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Characterisation and Application Whitelisting in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14781#M462</link>
    <description>&lt;P&gt;&amp;gt; Caute_cautim (Contributor III) posted a new topic in Tech Talk on 09-19-2018&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; One of the techniques to counter the advancement of malware within&lt;BR /&gt;&amp;gt; servers, network devices etc is to use "Characterisation"&lt;BR /&gt;&amp;gt; â€œcharacterisationâ€&amp;#157; is a synonym for â€œunique identifierâ€&amp;#157;.&lt;BR /&gt;&lt;BR /&gt;Another name for it is signature, and it is used in a wide variety of applications in security.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; This is&lt;BR /&gt;&amp;gt; typically applied to an operating system,&amp;nbsp; programme, library or other&lt;BR /&gt;&amp;gt; programmatic element in the form of a checksum which can be calculated from a&lt;BR /&gt;&amp;gt; â€œknown goodâ€&amp;#157; component and stored for comparison should there be any concern&lt;BR /&gt;&amp;gt; that components have been damaged or compromised.&lt;BR /&gt;&lt;BR /&gt;Checksum, CRC, parity bit, hash, signed hash, or even just "existence at a known good state."&amp;nbsp; Change detection was one of the original three antiviral technologies Fred Cohen identified in his original work back in 1983.&amp;nbsp; As well as change detection, it was often known as integrity checking, although I always felt that name promised more than it actually delivered.&amp;nbsp; (See "Authenticode.")&lt;BR /&gt;&lt;BR /&gt;Despite the name, I always felt Integrity Master was a very effective change detection program for applications.&amp;nbsp; My favourite, though, was DiskSecure, which checked the operating system and initial load, was extremely simple, and worked to secure the platform in a wide variety of dangerous situations.&amp;nbsp; (It once saved my bacon when I was reviewing a not very good antivirus and security program.)&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; Application Whitelisting is defined as: An approach in which&lt;BR /&gt;&amp;gt; all executables and applications are prevented from executing by default, unless&lt;BR /&gt;&amp;gt; explicitly permitted. &amp;nbsp; So okay, I can apply Characterisation to authorised&lt;BR /&gt;&amp;gt; download sites from vendors and check them with MD5 or SHA512 hashes and I can&lt;BR /&gt;&amp;gt; create baselines for authorised Operating Systems, and other applications etc.&lt;BR /&gt;&amp;gt; &amp;nbsp; Servers - I can use both Open Source, and Vendors solutions from CFEngine,&lt;BR /&gt;&amp;gt; Carbon Black, Trip Wire for various operating systems - Microsoft Windows uses&lt;BR /&gt;&amp;gt; Applocker etc. &amp;nbsp; But how does one do the same with Network Devices:&lt;BR /&gt;&lt;BR /&gt;Basically, on every device you have to start with a trusted platform (a realistically trusted platform, not just something with "TP" in the name), and do the initial check, and subsequent checks, locally.&amp;nbsp; This can be backed up across the net for reporting and comparison for additional security, but you do have to engage additional safeguards to secure the communications.&lt;BR /&gt;&lt;BR /&gt;Microsoft once tried to do it the quick and cheap way with Authenticode.&amp;nbsp; Authenticode used digital signing (by the author) of code, but a) didn't actually guarantee that the code was &lt;A href="https://books.google.ca/books?id=KzabAgAAQBAJ&amp;amp;pg=PT343&amp;amp;lpg=PT343&amp;amp;dq=internet+exploder+authenticode&amp;amp;source=bl&amp;amp;ots=XHWVUIl8Bu&amp;amp;sig=XcRV7WLEAlHgUtgN8lIZpCo8ppQ&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=2ahUKEwjVx6rMq8jdAhVKzlQKHfEJAVcQ6AEwA3oECAcQAQ#v=onepage&amp;amp;q=internet%20exploder%20authenticode&amp;amp;f=false" target="_blank"&gt;safe&lt;/A&gt; (see "&lt;A href="https://www.safaribooksonline.com/library/view/web-security-and/1565922697/ch04s05.html" target="_blank"&gt;Internet Exploder&lt;/A&gt;"), and b) didn't make any provision for certificate revocation.&amp;nbsp; By the time Microsoft lost two keys signing key certificates Authenticode was already seen as weak, and thereafter lost all credibility.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; Types&lt;BR /&gt;&amp;gt; traditional network devices - firewall, routers, switches etc &amp;nbsp; Then how about&lt;BR /&gt;&amp;gt; Virtual network devices, and then think about - how do you apply it to Network&lt;BR /&gt;&amp;gt; Functional Virtualisation? &amp;nbsp; I am looking for practical suggestions, as a&lt;BR /&gt;&amp;gt; practical framework to manage these. &amp;nbsp; I have looked at the NIST guidance, and&lt;BR /&gt;&amp;gt; Australian Security Directorate approaches as well. &amp;nbsp; Suggestions please?&lt;BR /&gt;&lt;BR /&gt;Well, note as above.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Sep 2018 00:40:40 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2018-09-20T00:40:40Z</dc:date>
    <item>
      <title>Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14773#M461</link>
      <description>&lt;P&gt;All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the techniques to counter the advancement of malware within servers, network devices etc is to use "Characterisation"&amp;nbsp; “characterisation” is a synonym for “unique identifier”.&lt;/P&gt;&lt;P&gt;This is typically applied to an operating system,&amp;nbsp; programme, library or other programmatic element in the form of a checksum which can be calculated from a “known good” component and stored for comparison should there be any concern that components have been damaged or compromised.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Forensic methods may also provide characterisation indicators but are likely to require additional levels of expertise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application Whitelisting is defined as:&lt;/P&gt;&lt;P&gt;An approach in which all executables and applications are prevented from executing by default, unless explicitly permitted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So okay, I can apply Characterisation to authorised download sites from vendors and check them with MD5 or SHA512 hashes and I can create baselines for authorised Operating Systems, and other applications etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Servers - I can use both Open Source, and Vendors solutions from CFEngine, Carbon Black, Trip Wire for various operating systems - Microsoft Windows uses Applocker etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But how does one do the same with Network Devices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Types traditional network devices - firewall, routers, switches etc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then how about Virtual network devices, and then think about - how do you apply it to Network Functional Virtualisation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for practical suggestions, as a practical framework to manage these.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have looked at the NIST guidance, and Australian Security Directorate approaches as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Suggestions please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 22:35:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14773#M461</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-09-19T22:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14781#M462</link>
      <description>&lt;P&gt;&amp;gt; Caute_cautim (Contributor III) posted a new topic in Tech Talk on 09-19-2018&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; One of the techniques to counter the advancement of malware within&lt;BR /&gt;&amp;gt; servers, network devices etc is to use "Characterisation"&lt;BR /&gt;&amp;gt; â€œcharacterisationâ€&amp;#157; is a synonym for â€œunique identifierâ€&amp;#157;.&lt;BR /&gt;&lt;BR /&gt;Another name for it is signature, and it is used in a wide variety of applications in security.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; This is&lt;BR /&gt;&amp;gt; typically applied to an operating system,&amp;nbsp; programme, library or other&lt;BR /&gt;&amp;gt; programmatic element in the form of a checksum which can be calculated from a&lt;BR /&gt;&amp;gt; â€œknown goodâ€&amp;#157; component and stored for comparison should there be any concern&lt;BR /&gt;&amp;gt; that components have been damaged or compromised.&lt;BR /&gt;&lt;BR /&gt;Checksum, CRC, parity bit, hash, signed hash, or even just "existence at a known good state."&amp;nbsp; Change detection was one of the original three antiviral technologies Fred Cohen identified in his original work back in 1983.&amp;nbsp; As well as change detection, it was often known as integrity checking, although I always felt that name promised more than it actually delivered.&amp;nbsp; (See "Authenticode.")&lt;BR /&gt;&lt;BR /&gt;Despite the name, I always felt Integrity Master was a very effective change detection program for applications.&amp;nbsp; My favourite, though, was DiskSecure, which checked the operating system and initial load, was extremely simple, and worked to secure the platform in a wide variety of dangerous situations.&amp;nbsp; (It once saved my bacon when I was reviewing a not very good antivirus and security program.)&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; Application Whitelisting is defined as: An approach in which&lt;BR /&gt;&amp;gt; all executables and applications are prevented from executing by default, unless&lt;BR /&gt;&amp;gt; explicitly permitted. &amp;nbsp; So okay, I can apply Characterisation to authorised&lt;BR /&gt;&amp;gt; download sites from vendors and check them with MD5 or SHA512 hashes and I can&lt;BR /&gt;&amp;gt; create baselines for authorised Operating Systems, and other applications etc.&lt;BR /&gt;&amp;gt; &amp;nbsp; Servers - I can use both Open Source, and Vendors solutions from CFEngine,&lt;BR /&gt;&amp;gt; Carbon Black, Trip Wire for various operating systems - Microsoft Windows uses&lt;BR /&gt;&amp;gt; Applocker etc. &amp;nbsp; But how does one do the same with Network Devices:&lt;BR /&gt;&lt;BR /&gt;Basically, on every device you have to start with a trusted platform (a realistically trusted platform, not just something with "TP" in the name), and do the initial check, and subsequent checks, locally.&amp;nbsp; This can be backed up across the net for reporting and comparison for additional security, but you do have to engage additional safeguards to secure the communications.&lt;BR /&gt;&lt;BR /&gt;Microsoft once tried to do it the quick and cheap way with Authenticode.&amp;nbsp; Authenticode used digital signing (by the author) of code, but a) didn't actually guarantee that the code was &lt;A href="https://books.google.ca/books?id=KzabAgAAQBAJ&amp;amp;pg=PT343&amp;amp;lpg=PT343&amp;amp;dq=internet+exploder+authenticode&amp;amp;source=bl&amp;amp;ots=XHWVUIl8Bu&amp;amp;sig=XcRV7WLEAlHgUtgN8lIZpCo8ppQ&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=2ahUKEwjVx6rMq8jdAhVKzlQKHfEJAVcQ6AEwA3oECAcQAQ#v=onepage&amp;amp;q=internet%20exploder%20authenticode&amp;amp;f=false" target="_blank"&gt;safe&lt;/A&gt; (see "&lt;A href="https://www.safaribooksonline.com/library/view/web-security-and/1565922697/ch04s05.html" target="_blank"&gt;Internet Exploder&lt;/A&gt;"), and b) didn't make any provision for certificate revocation.&amp;nbsp; By the time Microsoft lost two keys signing key certificates Authenticode was already seen as weak, and thereafter lost all credibility.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; Types&lt;BR /&gt;&amp;gt; traditional network devices - firewall, routers, switches etc &amp;nbsp; Then how about&lt;BR /&gt;&amp;gt; Virtual network devices, and then think about - how do you apply it to Network&lt;BR /&gt;&amp;gt; Functional Virtualisation? &amp;nbsp; I am looking for practical suggestions, as a&lt;BR /&gt;&amp;gt; practical framework to manage these. &amp;nbsp; I have looked at the NIST guidance, and&lt;BR /&gt;&amp;gt; Australian Security Directorate approaches as well. &amp;nbsp; Suggestions please?&lt;BR /&gt;&lt;BR /&gt;Well, note as above.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 00:40:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14781#M462</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-09-20T00:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14782#M463</link>
      <description>&lt;P&gt;HI &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the historical perspective, however, my research points to for example and not citing vendors in particular, but their approaches:&amp;nbsp;&amp;nbsp; I am actively researching solutions at the moment - hence the thread.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; Juniper has a command line enhancement, tied together with Skytap due to the Intel Spectre and Meltdown issues, which is quite imaginative - but checking whether this is actually sufficient for Application Whitelisting validation purposes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2)&amp;nbsp; Cisco has Meraki and Umbrella approaches, which means additional services to be applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is for starters, so looking for good practical suggestions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 00:52:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14782#M463</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-09-20T00:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14784#M464</link>
      <description>&amp;gt; Caute_cautim (Contributor III) mentioned you in a post! Join the conversation&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp;&amp;nbsp; I am actively researching solutions at the moment - hence the&lt;BR /&gt;&amp;gt; thread. &amp;nbsp; 1)&amp;nbsp; Juniper has a command line enhancement, tied together with&lt;BR /&gt;&amp;gt; Skytap due to the Intel Spectre and Meltdown issues, which is quite imaginative&lt;BR /&gt;&amp;gt; - but checking whether this is actually sufficient for Application Whitelisting&lt;BR /&gt;&amp;gt; validation purposes.&lt;BR /&gt;&lt;BR /&gt;If you are worried about Spectre and Meltdown, the trusted platform is already&lt;BR /&gt;busted. (See above.) *Nothing* is going to fix that over the net, particularly not&lt;BR /&gt;a mere "command line enhancement." If they are trying to tell you that it will,&lt;BR /&gt;they are lying to you.&lt;BR /&gt;&lt;BR /&gt;(Q - What is the difference between a computer salesman and a used car salesman?&lt;BR /&gt;A - A used car salesman knows when he is lying to you.)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;Buying the right computer and getting it to work properly is no&lt;BR /&gt;more complicated than building a nuclear reactor from wristwatch&lt;BR /&gt;parts in a darkened room using only your teeth. - Dave Barry&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://www.infosecbc.org/links" target="_blank"&gt;http://www.infosecbc.org/links&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;</description>
      <pubDate>Thu, 20 Sep 2018 01:31:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14784#M464</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-09-20T01:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14785#M465</link>
      <description>&lt;P&gt;You are a joy to behold:&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt; Okay I have a scenario in which to prove to an auditor the Application Whitelisting has been applied to Network Devices to satisfy a government mandated control.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No sales, just plain commonsense approach required to satisfy the auditor, against the mandated control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is a practical means to do this given my original scenario.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 01:48:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14785#M465</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-09-20T01:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Caute_cautim mentioned you in (ISC)Â² Community</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14795#M467</link>
      <description>&amp;gt; Caute_cautim (Contributor III) mentioned you in a post! Join the conversation&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I have a scenario in which to prove to an&lt;BR /&gt;&amp;gt; auditor the Application Whitelisting has been applied to Network Devices to&lt;BR /&gt;&amp;gt; satisfy a government mandated control.&amp;nbsp; &amp;nbsp; No sales, just plain commonsense&lt;BR /&gt;&amp;gt; approach required to satisfy the auditor, against the mandated control. &amp;nbsp; What&lt;BR /&gt;&amp;gt; is a practical means to do this given my original scenario.&lt;BR /&gt;&lt;BR /&gt;Oh, well, yeah. As long as it's just a government mandated control, and not a real&lt;BR /&gt;safeguard, then all you have to do is make sure you can bafflegab the auditor and&lt;BR /&gt;you're laughing ...&lt;BR /&gt;&lt;BR /&gt;(And, if serious, just follow the instructions in my first response.)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;The optimist sees the Klein bottle as half full;&lt;BR /&gt;the pessimist sees the Klein bottle as half empty;&lt;BR /&gt;the topologist wants to know why you are wasting that stuff&lt;BR /&gt;trying to put it *into* a Klein bottle. - rms&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://www.infosecbc.org/links" target="_blank"&gt;http://www.infosecbc.org/links&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;</description>
      <pubDate>Thu, 20 Sep 2018 17:22:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14795#M467</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-09-20T17:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Caute_cautim mentioned you in (ISC)Â² Community</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14799#M468</link>
      <description>&lt;P&gt;Okay I will work through this as solution design, and report back on my findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think others will have similar experiences in the future, so it could act as a good reference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 20:33:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14799#M468</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-09-20T20:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14801#M469</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;P&gt;I have a scenario in which to prove to an auditor the Application White-listing has been applied to Network Devices to satisfy a government mandated control.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Perhaps the auditor is equating "white-listing" with validating against a list of&amp;nbsp;"authorized applications/versions". Maybe you could&amp;nbsp;gather the output of "show version" from each router and demonstrate that the operating system version is within your allowed range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In other words, you would be demonstrating effectiveness of your patching program&amp;nbsp;as opposed to looking for indicators of compromise.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 21:09:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14801#M469</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2018-09-20T21:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14805#M470</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;Some good points:&amp;nbsp; This is the public linkage to the New Zealand Government policy, it is online.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nzism.gcsb.govt.nz/" target="_blank"&gt;https://www.nzism.gcsb.govt.nz/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you do a search on Application Whitelisting, up pops the required controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;14.2.4.C.01&amp;nbsp; Agencies SHOULD implement application whitelisting as part of the SOE for workstations, servers and any other network device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They relate it to the Standard Operating Environment (SOE) - glossary calls it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A standardised build of an operating system and associated software that is deployed on multiple devices. An SOE can be applied to servers, workstations, laptops and mobile devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now don't fall into the trap of thinking that SHOULD is "optional", it means recommended practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, because it is online, they tend to update on the fly from time to time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have asked the authority what is acceptable for a network device - awaiting a response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will check with the Australian equivalent to see what their interpretation is as well for cross reference purposes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a work in progress.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 21:25:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14805#M470</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-09-20T21:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14810#M471</link>
      <description>&lt;P&gt;If your network devices are supplied by one of the "big guys" that routinely play in the enterprise market (Cisco, Juniper, Palo Alto, Checkpoint, etc), you might also consider discussing the concern with your sales rep or their sales engineer.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 01:16:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/14810#M471</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2018-09-21T01:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/15324#M506</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still working through it, - I did have a response from the policy maker themselves, although they cannot give comment on different vendors, it has caused them to go back to the working table and work through the different scenarios I painted for them.&amp;nbsp;&amp;nbsp;&amp;nbsp; In summary, traditional networks, Software Derived Networks, Network Functional Virtualisation - each and every category of device regardless of whether it is physical or virtual has to be examined and research conducted as to what individual vendor can provide to ensure that the underlying Operating System can detect changes both externally or in use i.e. by external control means or at command line level.&amp;nbsp;&amp;nbsp; So basically each case has to be worked through individually and the appropriate risks, threats identified and mitigated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will update upon further research and analysis with examples - as this is going to crop up again and again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 07 Oct 2018 20:06:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/15324#M506</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-10-07T20:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/15354#M511</link>
      <description>&lt;P&gt;Update from the Policy authorities:&amp;nbsp; They cannot comment on individual vendors and associated products, of course, but their suggestion is to categorise each and every Vendor as well as devices types regardless of whether they are physical, virtual, edge or NFVs etc.&amp;nbsp;&amp;nbsp; Then carefully work through each vendors offerings, and device types and work out whether or not they each of inherent capabilities to detect minute changes to their updates, or patches and examine their capabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some vendors with some device types do have some command line capabilities, whereas others require additional external solutions to detect unauthorised changes or attempts to modify updates or patches.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously, the source is a key area, which can be handled by judicious use of Characterisation as well as confirming the validity of the downloaded update or patch via cryptographic hashing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is turning out to be a journey on a case by case basis.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a result of my chasing the policy authorities, they are now apparently updating their policy documentation, to provide further clarity as to what is acceptable for Software Defined Network (SDN) environments network devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The fun has started.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 08 Oct 2018 20:18:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/15354#M511</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-10-08T20:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: Characterisation and Application Whitelisting</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/15650#M535</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&lt;/P&gt;&lt;P&gt;A very good idea indeed - put the problem in their lap, so to speak too.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Okay now extend this subject, what happens if you have IIoT and IoT embedded gateways as well - that creates another interesting problem too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 19:49:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Characterisation-and-Application-Whitelisting/m-p/15650#M535</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-10-18T19:49:39Z</dc:date>
    </item>
  </channel>
</rss>

