tssci security

IAM Day 2

It's been a couple days since I attended day two of the IAM training, but I've been a little busy taking that information and preparing for our class' assessment of the school.

On day two, we went over modules 3 and 4 (available at the IATRP website, for those interested) and did an actual assessment of our example organization's security posture and delivered a final report. We addressed three areas our customer was concerned most with, Networking/Connectivity, System Assurance, and Physical Environment. We made up a couple of concerns that such an organization would have, like not having backup connectivity at remote sites or ACLs and firewalls protecting internet facing systems.

Here's a copy of the assessment plan outline (nts450_day_2.pdf) and the information we gathered throughout the IAM process.

Day 1 of NSA's IAM

The IAM training has been going pretty well, even though it was just the first day. Today, the class went over the intital contact and pre-assessment phases. We defined the mission of our example organization (our customer) and identified points of contact within the company. Impact attributes (confidentiality, integrity, availability) were defined as well as the impact ratings: high, medium and low. Using these definitions, our group classed the organizational information criticality into a matrix using the impact attributes and ratings. Following, we identified information systems and modeled them after the information criticality matrix. Finally, we described our customer's system configuration and how information flows across the organization.

Day 2 should be even better, as we cover the actual on-site assessment visit and final analysis phases.

Foxit Reader 2.0 released!

Woohoo! This free PDF reader finally reached version 2. Best thing about Foxit Reader is that it's fast, self-executable, and takes up a small memory footprint.

Grab it here, thank me later.

NSA IAM... Security Assessment Methodology

This Tuesday and Wednesday I'll be attending a training session (held at my school) on the NSA's Infosec Assessment Methodology taught by Russ Rogers and Greg Miles of Security Horizon. The IAM is a vunerability assessment of an organization's security posture, and NOT a risk/threat assessmen. The IEM (Infosec Evaluation Methodology) and Red Teaming cover the actual penetration testing... the good stuff. But we'll see how this goes. I've read a couple chapters from Greg and Russ' book and already learned a lot about the contracting and pre-assessment phases. Should be interesting, I'll keep you all posted.

Crikey!

CAIRNS, Australia - Steve Irwin, the hugely popular Australian television personality and conservationist known as the "Crocodile Hunter," was killed Monday by a stingray while filming off the Great Barrier Reef. [`news.com.au <http://www.news.com.au/story/0,23599,20349890-1702,00.html>`_ has more coverage]

So unfortunate, such a great guy with a passion for wildlife and the environment.

« Newer entries — 59 — Older entries »

blog comments powered by Disqus