host-based ids llifecycle

39
Symantec Security Services’ Lifecycle Deployment Methodology for Host-Based Intrusion Detection For <Company Name> April 10, 2001

Upload: condition-zebra-conzebra

Post on 15-Apr-2017

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Host-Based IDS LLifecycle

Symantec Security Services’ Lifecycle Deployment

Methodology for Host-Based Intrusion Detection

For <Company Name>

April 10, 2001

Page 2: Host-Based IDS LLifecycle

A Deployment Methodology With Product

Lifecycle Considerations Will Enable Success

While Enhancing an Organization’s Security

Architecture!

Page 3: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Phase 6

Phase 7

Phase 8

Phase 9

Define

Install

Level I Configure

Monitor

Level II Configure

Monitor

Level III Configure

Monitor

Maintain

Page 4: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1 Define

Page 5: Host-Based IDS LLifecycle

• Phase One - Project Definition

Define a mutually acceptable “Mission Statement” outlining

Client’s project goals

Acquire an operational understanding of the Client’s environment

and security needs:

Review Client’s documentation

Review Environment characteristics

Fill out applicable worksheets

Conduct personnel interviews

Identify Client’s personnel roles and responsibilities

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 6: Host-Based IDS LLifecycle

• Phase One - Project Definition (Cont.)

Develop a comprehensive plan for integrating the product within the

Client’s environment:

Develop a Project Work Plan to detail required resources

Develop an Acceptance Test Plan

Address Intruder Alert (IA) product scalability requirements

Work with Client to design a deployment strategy that is

scalable, which meets existing and future business

requirements

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 7: Host-Based IDS LLifecycle

• Phase One - Project Definition (Cont.)

Develop a comprehensive plan for integrating the product within the

Client’s environment:

Provide specifics on hardware recommendations consistent

with product architecture and design issues relevant to the

Client’s environment

Perform detailed analysis of Client’s recommended IA policy

for pertinent Operating Systems and segment into three

security levels to construct Level I, II and III Baseline

configurations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 8: Host-Based IDS LLifecycle

• Phase One - Project Definition (Cont.)

Develop a comprehensive plan for integrating the products within

the Client’s environment:

Identify the scope of the IA Implementation:

• Determine Number of Managers to be installed/patched

• Determine Number of Consoles to be installed/patched

• Determine Number of Agents to be installed/patched

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 9: Host-Based IDS LLifecycle

• Phase One - Project Definition (Cont.)

Deliverables:

Mission Statement – Clearly defined and mutually acceptable

goals for Project scope

Project Plan - Illustrates schedule of events, resources

required and major milestones

Acceptance Test Plan - Offers a mutually agreed upon test to

prove soundness and reliability of the deployed technology

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 10: Host-Based IDS LLifecycle

• Phase One - Project Definition (Cont.)

Deliverables:

Server Inventory - Documented List of servers to be

installed

with predetermined IA components

Documented Level I, II and III Baseline policies –

Evaluate

Client’s recommended IA policy and segment into Level

I,

II and III Baseline policy

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 11: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Define

Install

Page 12: Host-Based IDS LLifecycle

• Phase Two - Installation

Deploy IA components identified in Server Inventory and

implement based upon Project Work Plan:

Number of Managers to be installed/patched

Number of Consoles to be installed/patched

Number of Agents to be installed/patched

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 13: Host-Based IDS LLifecycle

• Phase Two - Installation (Cont.)

Deliverables:

Updated Project Plan (if applicable) - Updates sections of

this

document to show current state of the Project

Fully-functional IA deployment – Demonstrates, through

use of the Acceptance Test Plan, that all software

components

are functioning properly

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 14: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Define

Install

Level I Configure

Page 15: Host-Based IDS LLifecycle

• Phase Three - Level I Baseline Configuration

Import recommended Level I Baseline policy for IA focusing

on

High-Level Event Criteria

Create an agreed upon domain architecture for managing the

products

Work with Client to provide “Separation of Duties”

considerations

to determine access levels for approved personnel

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 16: Host-Based IDS LLifecycle

• Phase Three - Level I Baseline Configuration (Cont.)

Add notification features for Level I Baseline policy

Configure reporting to highlight event data and fulfill Client

expectations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 17: Host-Based IDS LLifecycle

• Phase Three - Level I Baseline Configuration (Cont.)

Deliverables:

IA Level I Baseline Configuration Guide – Describes

Client’s IA security architecture, system configurations

and implemented policy through Level I Baseline

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 18: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Define

Install

Level I Configure

Monitor

Page 19: Host-Based IDS LLifecycle

• Phase Four - Data Analysis / Monitoring

Utilize Level I Baseline policy activated on the IA Agents to

gather

data against the target environment

Analyze the data collected by the Agents

Address False Positives and False Negatives and document

any deviations or exceptions

Offer guidance in the correction of discovered vulnerabilities

in order to verify the validity of the deployed Level I

Baseline policy (Client is responsible for fixing discovered

vulnerabilities)

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 20: Host-Based IDS LLifecycle

• Phase Four - Data Analysis / Monitoring (Cont.)

Deliverables:

IA Level I Vulnerability Report - Illustrates discovered

vulnerabilities from Agent data collection utilizing Level I

Baseline policy recommendations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 21: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Define

Install

Level I Configure

Monitor

Level II Configure

Page 22: Host-Based IDS LLifecycle

• Phase Five - Level II Baseline Configuration

Import recommended Level II Baseline policy for IA focusing

on

Medium-Level Event Criteria

Add notification features for Level II Baseline policy

Configure reporting to highlight event data and fulfill Client

expectations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 23: Host-Based IDS LLifecycle

• Phase Five - Level II Baseline Configuration (Cont.)

Deliverables:

IA Level II Baseline Configuration Guide – Describes

Client’s IA security architecture, system configurations

and implemented policy through Level II Baseline

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 24: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Phase 6

Define

Install

Level I Configure

Monitor

Level II Configure

Monitor

Page 25: Host-Based IDS LLifecycle

• Phase Six - Data Analysis / Monitoring

Utilize Level II Baseline policy activated on the IA Agents to

gather

data against the target environment

Analyze the data collected by the Agents

Address False Positives and False Negatives and document

any deviations or exceptions

Offer guidance in the correction of discovered vulnerabilities

in order to verify the validity of the deployed Level II

Baseline policy (Client is responsible for fixing discovered

vulnerabilities)

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 26: Host-Based IDS LLifecycle

• Phase Six - Data Analysis / Monitoring (Cont.)

Deliverables:

IA Level II Vulnerability Report - Illustrates discovered

vulnerabilities from Agent data collection utilizing Level

II

Baseline policy recommendations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 27: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Phase 6

Phase 7

Define

Install

Level I Configure

Monitor

Level II Configure

Monitor

Level III Configure

Page 28: Host-Based IDS LLifecycle

• Phase Seven - Level III Baseline Configuration

Import recommended Level III Baseline policy for IA focusing

on

Low-Level Event Criteria

Add notification features for Level III Baseline policy

Configure reporting to highlight event data and fulfill Client

expectations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 29: Host-Based IDS LLifecycle

• Phase Seven - Level III Baseline Configuration (Cont.)

Deliverables:

IA Level III Baseline Configuration Guide – Describes

Client’s IA security architecture, system configurations

and implemented policy through Level III Baseline

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 30: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Phase 6

Phase 7

Phase 8

Define

Install

Level I Configure

Monitor

Level II Configure

Monitor

Level III Configure

Monitor

Page 31: Host-Based IDS LLifecycle

• Phase Eight - Data Analysis / Monitoring

Utilize Level III Baseline policy activated on the IA Agents to

gather data against the target environment

Analyze the data collected by the Agents

Address False Positives and False Negatives and document

any deviations or exceptions

Offer guidance in the correction of discovered vulnerabilities

in order to verify the validity of the deployed Level III

Baseline policy (Client is responsible for fixing discovered

vulnerabilities)

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 32: Host-Based IDS LLifecycle

• Phase Eight - Data Analysis / Monitoring (Cont.)

Deliverables:

IA Level III Vulnerability Report - Illustrates discovered

vulnerabilities from Agent data collection utilizing Level

III

Baseline policy recommendations

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 33: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Phase 6

Phase 7

Phase 8

Phase 9

Define

Install

Level I Configure

Monitor

Level II Configure

Monitor

Level III Configure

Monitor

Maintain

Page 34: Host-Based IDS LLifecycle

• Phase Nine - Maintain

Enable the Client to maintain IA by implementing daily

operations

and procedures for keeping the technology functional and up-

to-

date

Document the entire Lifecycle Deployment Methodology for

future Client reference

Instruct Client on the value of reevaluation and the benefit of

revisiting the aforementioned phases as product updates are

released and/or the Client’s architecture changes

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 35: Host-Based IDS LLifecycle

• Phase Nine - Maintain (Cont.)

Provide extensive product knowledge transfer, for designated

Client personnel, on the day-to-day operations relative to the

deployed technology

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 36: Host-Based IDS LLifecycle

• Phase Nine - Maintain (Cont.)

Deliverables:

Product Update Procedures Guide for IA – Offers

recommendations and knowledge specific to product

updates and upgrades

Change Control Guide for IA - Offers recommendations

and knowledge specific to implementing a successful

Change Control Program

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 37: Host-Based IDS LLifecycle

• Phase Nine - Maintain (Cont.)

Deliverables:

Daily Operations Guide for IA - Offers recommendations

and knowledge specific to daily product maintenance

and

management issues

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Page 38: Host-Based IDS LLifecycle

Host-Based Intrusion Detection

Lifecycle Deployment Methodology

Phase 1

Phase 2

Phase 3

Phase 4

Phase 5

Phase 6

Phase 7

Phase 8

Phase 9

Define

Install

Level I Configure

Monitor

Level II Configure

Monitor

Level III Configure

Monitor

Maintain

Page 39: Host-Based IDS LLifecycle

• Questions ???

Host-Based Intrusion Detection

Lifecycle Deployment Methodology