HP Security Handbook
Total Page:16
File Type:pdf, Size:1020Kb
The HP Security Handbook Vice President, HP Security Office Tony Redmond HP Security Handbook Lead Jan De Clercq Layout, Illustrations, Graphics and Production Lead Killian McHugh Primary Content Editors and Strategists Governance and Compliance: Stuart Hotchkiss (Lead) Proactive Security Management: Keith Millar (Lead) Identity Management: Jan De Clercq (Lead), Mark Crosbie Trusted Infrastructure: Boris Balacheff (Lead), Iver Band, Archie Reed, Mark Schiller, Bill Wear Innovation in Security: Simon Shiu (Lead), Joe Pato Additional Content Contributors Governance and Compliance: Lois Boliek, John Carchide, Frederic Gittler, David Graves, Jim Hoover, Cheryl Jackson, Paul Jeffries, Bill Kowaleski, Tari Schreider, Saida Wulteputte, Mike Yearworth Proactive Security Management: Hayden Brown, John Carchide, Tracy DeDore, Paul Jeffries, Montserrat Mane, Jim O'Shea, Christopher Peltz, Sarah Porten, Yann Vermast, Brian Volkoff, Doug Young Identity Management: Sai Allavarpu, Jean-Michel Argenville, Carolyn Bosco, Pete Bramhall, Christian Fischer, Ronald Luman, Marco Casassa Mont, Robert Neal-Joslin, Jason Rouault, Scott Swist, Ibrahim Wael, Manny Novoa Trusted Infrastructure: Enrico Albertin, Shivaun Albright, Sunil Amanna, Mike Balma, Ron Carelli, Lynne Christofanelli, Paul Congdon, Joanne Eames, Janusz Gebusia, Gary Lefkowitz, Shab Madina, Sunil Marolia, John Rhoton, Steve Scott, Rick Supplee, Tom Welsh, Chris Whitener Innovation in Security: Adrian Baldwin, Richard Brown, Chris Dalton, Bill Horne, Ed McDonnell, David Pym, Martin Sadler, Steve Simske, Richard Smith The HP Security Handbook is available online at www.hp.com/go/security/securityhandbook. For feedback, please e-mail [email protected]. For additional printed copies, please see your HP Sales Representative. About HP HP is a technology company that operates in more than 170 countries around the world. We explore how technology and services can help people and companies address their problems and challenges, and realize their possibilities, aspirations, and dreams. We apply new thinking and ideas to create more sim- ple, valuable, and trusted experiences with technology, continuously improving the way our customers live and work. No other company offers as complete a technology product portfolio as HP. We provide infrastructure and business offerings that span from handheld devices to some of the world's most powerful supercomputer installations. We offer consumers a wide range of products and services from digital photography to digi- tal entertainment and from computing to home printing. This comprehensive portfolio helps us match the right products, services, and solutions to our customers’ specific needs. HP focuses on simplifying technology experiences for all of its customers - from individual consumers to the largest businesses. With a portfolio that spans printing, personal computing, software, services and IT infrastructure, HP is among the world's largest IT companies, with revenue totaling $104.3 billion for the four fiscal quarters ended Oct. 31, 2007. More information about HP is available at www.hp.com. Fast facts • HP was incorporated in 1939. • Corporate headquarters are in Palo Alto, California. • Mark Hurd is president and CEO. • HP is a US Fortune 14 and a Global Fortune 41 company, with revenue totaling $104.3 billion for the fiscal year ended Oct. 31, 2007. • HP has 150,000 employees doing business in more than 170 countries around the world. Technology leadership HP's three business groups drive industry leadership in core technology areas: • The Personal Systems Group: Business and consumer PCs, mobile computing devices, and workstations • The Imaging and Printing Group: Inkjet, LaserJet and commercial printing, printing supplies, digital pho- tography, and entertainment • The Technology Solutions Group: Business products including storage and servers, managed services, and software Contribution HP strives to be an economic, intellectual, and social asset to each country and community in which we do business. Key areas of contribution are electronic waste, raising standards in our global supply chain and increasing access to information technology. Growth HP is focused on three technology shifts that have the power to transform our customers' lives and busi- nesses: • Next-generation data center • Always on, always connected mobile computing • Ubiquitous printing and imaging For more information, visit www.hp.com. About HP's Security Practice HP takes a holistic approach to security that includes the people, process and technology to ensure the effectiveness of the security solution. HP Services assists in defining a security strategy specifically tailored to the customer's environment and business processes. As a leader in IT management, and more specifi- cally IT service management, HP Services brings tremendous breadth and depth of management expertise to every consulting engagement. Our expert security staff includes Certified Information Systems Security Professionals (CISSPs) and certified Sysadmin, Audit, Network, Security (SANS) individuals who bring extensive experience in multi-vendor platforms including HP-UX, IBM AIX, Sun Solaris, OpenVMS, Microsoft Windows, and Linux. As a member of the Information Technology Information Sharing and Analysis Center (IT-ISAC), HP's security services team stays abreast of the latest information on cyber security issues and utilizes proven best practices and methodologies such as BS 7799/ISO 17799. Table of contents Introduction Note ........................................i Introduction.............................................ii The Security Landscape ...................................ii HP’s Security Framework .................................iii Business Context . iii Governance and Compliance. iii Proactive Security Management . iv Identity Management. iv Trusted Infrastructure . iv Security Handbook Contents . v Bringing the HP Security Strategy to Market: HP Secure Advantage. vi Chapter One: Governance and Compliance 1. Definition ...........................................1-1 2. Purpose ............................................1-2 3. Why Have Governance? ..............................1-3 4. The Importance of Information Assets ...................1-3 5. Information Security Defined ..........................1-3 5.1. Board of Directors’ Responsibilities . 1-4 5.2. IT Responsibilities. 1-4 6. Regulatory Standards ................................1-4 6.1. International Standards . 1-5 6.2. When to Use the International Standards . 1-6 6.3. Best-Practice Legislation . 1-7 6.4. Privacy Aspects and Issues . 1-7 7. The Governance and Risk Management Lifecycles . 1-8 7.1.ProcessSteps.........................................1-9 7.2. Gap Analysis . 1-9 7.3. Risk Analysis . 1-10 7.4. Security Control Architecture . 1-12 7.5. Security Implementation Architecture . 1-14 7.6. Implementation. 1-15 7.7. Support, Manage, and Operate . 1-15 7.8. Audit and Test . 1-15 7.9. Review and Update . 1-15 8. Managing Governance in Practice Information Security - Service Management (ISSM) ...........................1-16 8.1. ISSM Control Model . 1-17 9. Moving to Continuous Compliance .....................1-20 9.1. Comparison of Standard and Continuous Compliance . 1-20 9.2. Continuous Compliance Example . 1-21 9.3. The Efficiency of Continuous Compliance . 1-21 10. Using Models and Model based Technologies to Support - Security Governance .................................1-22 11. The Economics of Security An Example ................1 23 : - 12. Key Performance Indicators and Metrics ...............1-25 13. New Model based Analysis Approaches to Support Risk - Analysis Trust Economics ............................1 26 - - 14. HP Governance Services ............................1-26 15. Security and HP's Vision ............................1-27 16. Governance Summary ..............................1-28 Chapter Two: Proactive Security Management 1. Definition ...........................................2-2 1.1. Managing Protection Proactively and Reactively . 2-2 1.2. Responding to Changing Business Models . 2-2 1.3. Integrating with IT Management. 2-3 1.4. Maintaining Acceptable Security and Risk Levels . 2-3 2. Purpose ............................................2-3 2.1. Protecting Against Increasing Threats . 2-3 2.2. Enabling Changing Trust Models . 2-4 2.3. Managing Increased Process Complexity . 2-4 2.4. Complying with Changing Regulations. 2-5 2.5. Purpose of Proactive Security Management Depends on More Than Technology............................................2-5 2.6. IT Management Trends and Security Management. 2-5 3. HP Proactive Security Management Framework ..........2-6 3.1. Compliance, Security Monitoring and Reporting. 2-7 3.2. Vulnerability Management . 2-7 3.3. Content Management. 2-7 3.4. Identity Management Integration . 2-8 3.5. Host Management . 2-8 3.6. Intrusion Detection and Prevention . 2-9 3.7. Problem Management. 2-10 3.8. Investigations and IT Forensics . 2-10 3.9. Security Program Administration. 2-10 3.10. Incident Management . 2-11 3.11. Risk Management . 2-11 3.12. IT Administration Integration . 2-11 4. HP Proactive Security Management Offerings ...........2-12 4.1. HP Proactive Security Management Services. 2-12 4.2. HP Proactive Security Management Products . 2-19 5. Proactive Security Management Summary ..............2-28 Chapter Three: Identity Management 1. Definition ...........................................3-1 2. Purpose ............................................3-1