Agencies see better ways to manage IT
Connecting state and local government leaders
The greatest security challenges facing IT administrators today are not intercepting viruses or blocking attacks but rather controlling the security infrastructure and managing processes.
Scott Hill oversees the Treasury Department's effort to manage information from a vast network of security systems.
Olivier Douliery
City of Fresno, Calif., on third-party developed solution
Challenge:
Solution:
Defense, Defense Intelligence Agency on third-party developed solution
Challenge:
Solution:
Challenge:
Homeland security accomplished through strong internal security management
Challenge:
Solution:
Homeland security on third-party developed solution
Challenge:
Solution:
Information technology agency, Pentagon emphasizes certifcation and accreditation of systems
Challenge:
Solution:
Information technology agency, Pentagon on third-party developed solution
Challenge:
Solution:
Interior, Bureau of Land Management on third-party developed solution
Challenge:
Solution:
Internal Revenue Service emphasizes certifcation and accreditation of systems
Challenge:Solution: An IRS team developed a new C and A process with help from other agencies and commercial consultants.
The process identifies, categorizes and defines the boundaries of IT systems and does a risk management assessment of each. This creates a consistent and repeatable C and A process, and the results can be used to identify systemic risks.
Labor accomplished through strong internal security management
The IRS has accredited 13 of 30 general support systems and expects finish by June.
Challenge: How do you move from an F on the annual cybersecurity report card?
Solution: A collaborative computer security program supported by senior management in all DOL agencies.
Agency officials, the inspector general and CIO have established a departmentwide security subcommittee and created a set of common goals. A security manager was hired in 2001 to manage the program.
The program has resulted in consistent FISMA reporting and a B- on the 2004 cybersecurity report card.
State on third-party developed solution
Challenge: How do you monitor a worldwide network supporting 40,000 users to ensure compliance with enterprise security configuration standards?
Solution: Security Baseline Toolkit from ManTech Security Technologies Corp. of Fairfax, Va.
State Department posts use the Baseline Toolkit for scanning all elements of classified and unclassified networks. Mandatory quarterly scans were implemented in October 2004, and scans can be conducted remotely from Washington if necessary.
The toolkit has reduced the time needed to inspect a typical network from more than 600 man-hours to one or two hours, requiring no more than 15 minutes of an IT employee's time. It has eliminated the need for traveling teams of IT experts and provides a central repository of data for reporting and analysis.
Treasury accomplished through strong internal security management
Challenge: How do you manage security data generated for the government's largest secure private civilian network?
Solution: Develop a security information management tool to process alert data from devices deployed throughout the WAN.
The Treasury Communications System has more than 5,700 circuits connected to 1,200 routers at 1,700 sites and supports more than 150,000 employees. The SIM tool correlates real-time alerts from intrusion detection systems and firewalls with vulnerability scan data, according to Scott Hill, the TCS information system security manager.
Active alerts can be correlated with historical data to eliminate false positives.
USAID on third-party developed solution
Challenge: How do you scan your network for vulnerabilities and get actionable results?
Solution: Develop a grading system based on results from the nCircle IP360 Vulnerability Management System.
Before 2004, USAID conducted network vulnerability assessments once a month. Each assessment produced a deluge of results that were outdated before they reached administrators and included a plague of false positives. As a result, IT staff lost confidence in the program.
The agency wanted to implement a security program that graded each vulnerability. USAID selected the nCircle IP360 Vulnerability Management System from nCircle Network Security Inc. of San Francisco.
The nCircle hardware appliances continually scan the USAID network for vulnerabilities. Between the first and twenty-first of every month, scanning picks up even more as the system develops security grades for the agency's assessment. Rather than using words like high, medium and low to evaluate security risks, the nCircle system assigns integer scores based on a variety of variables, including how long the vulnerability has been exposed and how easy it is to exploit.
USAID staffers now have a better picture of the agency's network security. With more than 15,000 hosts worldwide, the average nCircle-derived security score has dropped from 185 to 102, which USAID calls a high B.
USPS on third-party developed solution
Challenge: How do you provide end-point protection on the world's largest intranet?
Solution: The Postal Service chose personal firewalls and intrusion prevention systems.
The personal firewalls and IPSes on 180,000 desktops and servers monitor inbound and outbound traffic, blocking more than 200 million external threats a month at the network perimeter and blocking virus and spyware traffic trying to leave the network.
Security updates are sent in a matter of hours rather than days. Software patches can be applied on a regular schedule.
NEXT STORY: DHS secure network was rushed, IG says