



Mission Critical Security Planner 45
Mission Critical Security Planner | |
author | Eric Greenberg |
pages | 416 |
publisher | Wiley |
rating | 9.5 |
reviewer | Kerberos99 |
ISBN | 0471211656 |
summary | Provides an innovative approach to create a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while reducing time and cost. |
Greenberg delights in skewering bureaucracies that believe planning and methodology is an end in itself, yet recognizes key business realities facing security advocates and suggests practical approaches to "selling security" within an organization -- an important topic given tight or shrinking budgets.
Greenberg is clearly a security guy and writes with experience and authority -- at times the style is conversational and humorous and at others professorial -- it is a good read for a security-focused text. While providing a strong overview of sound security planning and risk management concepts, MCSP also digs down and provides details where it counts regarding filters, proxies, IDS/VA, configuration management, content management (ActiveX, etc), and so forth yet consistently presents this low-level detail within the framework of an actionable security planning methodology that will be relevant five or even ten years from now. MCSP is anything but a security cookbook of technology discussions gleaned from public sources, although many basic concepts and topics are explained in the book's comprehensive glossary. Instead, the book presents the strengths and weaknesses of various technologies and approaches as they relate to the security improvement process.
MCSP utilizes a sequence of sophisticated worksheets to guide the reader through the security planning process and create a dynamic, actionable security plan -- not a plan that lives on the shelf. Using Greenberg's approach there are three components to the Security Plan: Security Stack (physical, network, application, OS), Life-Cycle Stack (technology selection, implementation, operations, incident response), and Business (information, infrastructure, people). Interestingly, you may have noticed that the Security Stack is similar to the OSI model -- this is typical of the rational and logical approach throughout the book. Using the worksheet approach as a guide, the Security Plan is mapped to 28 pre-defined security elements addressing the core security planning challenges of a distributed computing environment. Based on the worksheets, the impact analysis method approach provides a readily understandable plan that reflects the specific business, technical, and lifecycle tradeoffs in your organization.
Greenberg keeps it interesting with many anecdotes illustrating key points and thought-provoking arguments. For example, he advocates an approach that will hold vendors accountable for poor security by providing a quantifiable method for business software users to track security. The final chapter covers strategic security planning with PKI and provides a roadmap for selling an organization on the benefits of PKI when appropriate.
MCSP is an innovative and useful security book. The book provides security staffers and planners with the logical framework and tools they need to create a comprehensive, living, and actionable security plan enabling the organization to shift from a reactive security posture to a more pro-active approach. Highly recommended.
Online reader resources are available and chapter one maybe downloaded from http://www.criticalsecurity.com.
Table of Contents
- Chapter 1: Setting the Stage For Successful Security Planning.
- Chapter 2: A Security Plan That Works
- Chapter 3: Using the Security Plan Worksheets: The Fundamentals
- Chapter 4: Using the Security Plan Worksheets: The Remaining Core and Wrap-Up Elements
- Chapter 5: Strategic Security Planning with PKI
- Chapter 6: Ahead of the Hacker: Best Practices and a View of the Future
You can purchase Mission Critical Security Planner from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Re:security (Score:1)
firewalls =/= security.
Re:security (Score:2, Informative)
Consumer routers that do NAT are being marketted, for some reason, as firewalls.
Re:security (Score:2)
I haven't really seen NAT being marketed as a major security feature to date, though I wouldn't doubt it. That sort of marketing does suck, but it doesn't harm the fact that a NAT really does provide some security benefits.
./ing (Score:3, Funny)
Webmasters sure need a "actionable, meaningful security approach" for this
Re:./ing (Score:3, Funny)
Re:./ing (Score:3, Funny)
What is this guy thinking? (Score:4, Funny)
Doesn't this guy know that security is all complicated and stuff and that people need to hire VERY expensive security consultants like me?
It is certainly different (which is a good thing) (Score:5, Insightful)
Re:It is certainly different (which is a good thin (Score:1)
I suppose it should surprise me why so many idiots got into computer security, but since it is so complex and easy to bullshit, and only a qualified person can tell that they dont know what they are talking about, that it actually ISNT a surprise. And if they make sure nobody around them is competant, then nobody will even know they have been hacked.
Amazon (Score:5, Informative)
Jeff Bezos Is My Cousin (Score:1, Redundant)
Re:Amazon (Score:3, Informative)
Re:abbreviated version (Score:4, Funny)
2. There is no step 2
Yes, there are other steps:
2. If you believe any Micro$haft product is secure, even with the latest rounds of Security Patches, make your way to an emergency room ASAP to get Bill G.'s hand extruded from your ass, because you're apparently just a puppet with Daddy Bill mouthing the words.
3. If you believe in OpenVMS, visit http://www.reversemylobotomy.com/
There has been a lawsuit filed (Score:3, Funny)
"This is nothing against Mr. Greenberg," said Bill Gates when asked to comment. "We just don't want any competi- excuse me, confusion."
More on this as details develop.
Re:There has been a lawsuit filed (Score:1)
Re:There has been a lawsuit filed (Score:1)
I thought Microsoft Certified Solitaire Player?
(I know, old joke)
Re:There has been a lawsuit filed (Score:2)
Security Basics (Score:3, Interesting)
I'm currently at the level of "if it passes [insert_attack_script] its safe" but would like to learn how to get past that. I can competently secure a given box, but I think attempting a mid to large size network would be a "learning experience" (read: disaster) for me.
Any suggestions?
yes, it covers that (Score:3, Informative)
Re:Security Basics (Score:2, Informative)
quantitative results on security measures ? (Score:3, Interesting)
Like, what percentage of attacks are actually prevented by such measures ? E.g., how many sites have been protected from the SQL Slammer worm by their firewall, and on how many sites has the firewall failed, and why ?
Despite the flood of publications entering the market, I have never seen any in-depth discussion of quantifyable merits of security software. Usually the argument for investments into security is that you will save the cost caused by incidents (so the hidden assumption seems to be that the measures taken will be 100 per cent effective ?). Does this book provide any more insight ?
It's not software/features, it's the process (Score:3, Interesting)
Re:It's not software/features, it's the process (Score:2)
The hardest part is that to solve these sort of security problems involves educating the users. This takes a lot of time, and most people outside IT just don't care.
Re:quantitative results on security measures ? (Score:4, Interesting)
For instance, a sensibly configured (deny all except what is expressly required) firewall would have stopped the SQL Slammer worm, but wouldn't necessarily work against an attack launched against port 80, for example.
Good network security, as with good physical security, requires a certain element of paranoia - simply sticking a firewall in front of a box will not guarantee security.
You ask why a firewall would fail in the case of SQL Slammer.
There are two possible scenarios - explicitly allowing port 1434 connections would be one, misconfiguration would be the other.
I don't have numbers, but would say that anyone with a firewall that got affected by SQL Slammer should seriously question their firewall policy and possibly kill the admin responsible.
Re:quantitative results on security measures ? (Score:1)
1. If a firewall was configured to allow port 1434 connections into the network, then the firewall did not fail when the SQL server got infected with slammer. The firewall did exactly as it was told.
2. It's not always the admin's fault when it comes to their machines not always having the latest patches. A lot of times patches cannot be applied to a machine because it will cause the applications on that machine not to work. A lot of the admins who might get blamed were the same ones on the phone with the developers of their applications pleading with them to get their software ms-service pack compliant (before sql slammer was even thought of).
Re:quantitative results on security measures ? (Score:2)
Re:quantitative results on security measures ? (Score:2)
Or, I've seen this as well... laptops used to dial out to AOL accounts and then when the modem connection is dropped, they're now back on your LAN.
A firewall is one form of protection, but it's not impervious.
Trust me the people with that data aren't talking (Score:3, Informative)
For instance I know a fellow at a large financial institution who put 5 people in prison in 2001. These aren't kiddies or Mitnicks, these are people who've actively targetted this business and tried to break in. Naturally the security geeks mostly lose sleep over the ones they fear they didn't catch / observe.
Kiddies, worms, and all the forms of low-level noise that are part of the modern net aren't the problem. If you're successfully hit by a worm then basically you don't care enough to bother to put defenses in place because the worms usually follow the vulnerability disclosures by months, not hours or days.
If you have assets that are worth protecting then the first step in securing is to assess the cost of being rooted, and determining a cost-effective approach to mitigating attacks.
Usually this means 'defense in depth', e.g. planning and ensuring that an attacker's reconnasance will set off the alarms allowing you to mitigate before an *effective* attack is started.
My $0.02, anyone relying on a *firewall* to protect their assets has already lost the game. A serious perimiter defense probably includes a carefully secured firewall, network IDS, and host/configuration IDS/configuration management, just for starters. As with all engineering tasks, care in design directly translates to both the effectiveness and the cost-effectiveness of the results.
This book sounds like a positive step in communicating the knowlege of how this is done.
I like his... (Score:1)
Re:I like his... (Score:2)