際際滷

際際滷Share a Scribd company logo
Symantec Security Services Lifecycle Deployment
Methodology for Host-Based Intrusion Detection
For <Company Name>
April 10, 2001
A Deployment Methodology With Product
Lifecycle Considerations Will Enable Success
While Enhancing an Organizations Security
Architecture!
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Phase 9
Define
Install
Level I Configure
Monitor
Level II Configure
Monitor
Level III Configure
Monitor
Maintain
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1 Define
 Phase One - Project Definition
 Define a mutually acceptable Mission Statement outlining
Clients project goals
 Acquire an operational understanding of the Clients environment
and security needs:
 Review Clients documentation
 Review Environment characteristics
 Fill out applicable worksheets
 Conduct personnel interviews
 Identify Clients personnel roles and responsibilities
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase One - Project Definition (Cont.)
 Develop a comprehensive plan for integrating the product within the
Clients environment:
 Develop a Project Work Plan to detail required resources
 Develop an Acceptance Test Plan
 Address Intruder Alert (IA) product scalability requirements
 Work with Client to design a deployment strategy that is
scalable, which meets existing and future business
requirements
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase One - Project Definition (Cont.)
 Develop a comprehensive plan for integrating the product within the
Clients environment:
 Provide specifics on hardware recommendations consistent
with product architecture and design issues relevant to the
Clients environment
 Perform detailed analysis of Clients recommended IA policy
for pertinent Operating Systems and segment into three
security levels to construct Level I, II and III Baseline
configurations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase One - Project Definition (Cont.)
 Develop a comprehensive plan for integrating the products within
the Clients environment:
 Identify the scope of the IA Implementation:
 Determine Number of Managers to be installed/patched
 Determine Number of Consoles to be installed/patched
 Determine Number of Agents to be installed/patched
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase One - Project Definition (Cont.)
 Deliverables:
 Mission Statement  Clearly defined and mutually acceptable
goals for Project scope
 Project Plan - Illustrates schedule of events, resources
required and major milestones
 Acceptance Test Plan - Offers a mutually agreed upon test to
prove soundness and reliability of the deployed technology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase One - Project Definition (Cont.)
 Deliverables:
 Server Inventory - Documented List of servers to be
installed
with predetermined IA components
 Documented Level I, II and III Baseline policies 
Evaluate
Clients recommended IA policy and segment into Level
I,
II and III Baseline policy
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Define
Install
 Phase Two - Installation
 Deploy IA components identified in Server Inventory and
implement based upon Project Work Plan:
 Number of Managers to be installed/patched
 Number of Consoles to be installed/patched
 Number of Agents to be installed/patched
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Two - Installation (Cont.)
 Deliverables:
 Updated Project Plan (if applicable) - Updates sections of
this
document to show current state of the Project
 Fully-functional IA deployment  Demonstrates, through
use of the Acceptance Test Plan, that all software
components
are functioning properly
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Define
Install
Level I Configure
 Phase Three - Level I Baseline Configuration
 Import recommended Level I Baseline policy for IA focusing
on
High-Level Event Criteria
 Create an agreed upon domain architecture for managing the
products
 Work with Client to provide Separation of Duties
considerations
to determine access levels for approved personnel
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Three - Level I Baseline Configuration (Cont.)
 Add notification features for Level I Baseline policy
 Configure reporting to highlight event data and fulfill Client
expectations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Three - Level I Baseline Configuration (Cont.)
 Deliverables:
 IA Level I Baseline Configuration Guide  Describes
Clients IA security architecture, system configurations
and implemented policy through Level I Baseline
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Define
Install
Level I Configure
Monitor
 Phase Four - Data Analysis / Monitoring
 Utilize Level I Baseline policy activated on the IA Agents to
gather
data against the target environment
 Analyze the data collected by the Agents
 Address False Positives and False Negatives and document
any deviations or exceptions
 Offer guidance in the correction of discovered vulnerabilities
in order to verify the validity of the deployed Level I
Baseline policy (Client is responsible for fixing discovered
vulnerabilities)
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Four - Data Analysis / Monitoring (Cont.)
 Deliverables:
 IA Level I Vulnerability Report - Illustrates discovered
vulnerabilities from Agent data collection utilizing Level I
Baseline policy recommendations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Define
Install
Level I Configure
Monitor
Level II Configure
 Phase Five - Level II Baseline Configuration
 Import recommended Level II Baseline policy for IA focusing
on
Medium-Level Event Criteria
 Add notification features for Level II Baseline policy
 Configure reporting to highlight event data and fulfill Client
expectations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Five - Level II Baseline Configuration (Cont.)
 Deliverables:
 IA Level II Baseline Configuration Guide  Describes
Clients IA security architecture, system configurations
and implemented policy through Level II Baseline
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Define
Install
Level I Configure
Monitor
Level II Configure
Monitor
 Phase Six - Data Analysis / Monitoring
 Utilize Level II Baseline policy activated on the IA Agents to
gather
data against the target environment
 Analyze the data collected by the Agents
 Address False Positives and False Negatives and document
any deviations or exceptions
 Offer guidance in the correction of discovered vulnerabilities
in order to verify the validity of the deployed Level II
Baseline policy (Client is responsible for fixing discovered
vulnerabilities)
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Six - Data Analysis / Monitoring (Cont.)
 Deliverables:
 IA Level II Vulnerability Report - Illustrates discovered
vulnerabilities from Agent data collection utilizing Level
II
Baseline policy recommendations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Define
Install
Level I Configure
Monitor
Level II Configure
Monitor
Level III Configure
 Phase Seven - Level III Baseline Configuration
 Import recommended Level III Baseline policy for IA focusing
on
Low-Level Event Criteria
 Add notification features for Level III Baseline policy
 Configure reporting to highlight event data and fulfill Client
expectations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Seven - Level III Baseline Configuration (Cont.)
 Deliverables:
 IA Level III Baseline Configuration Guide  Describes
Clients IA security architecture, system configurations
and implemented policy through Level III Baseline
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Define
Install
Level I Configure
Monitor
Level II Configure
Monitor
Level III Configure
Monitor
 Phase Eight - Data Analysis / Monitoring
 Utilize Level III Baseline policy activated on the IA Agents to
gather data against the target environment
 Analyze the data collected by the Agents
 Address False Positives and False Negatives and document
any deviations or exceptions
 Offer guidance in the correction of discovered vulnerabilities
in order to verify the validity of the deployed Level III
Baseline policy (Client is responsible for fixing discovered
vulnerabilities)
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Eight - Data Analysis / Monitoring (Cont.)
 Deliverables:
 IA Level III Vulnerability Report - Illustrates discovered
vulnerabilities from Agent data collection utilizing Level
III
Baseline policy recommendations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Phase 9
Define
Install
Level I Configure
Monitor
Level II Configure
Monitor
Level III Configure
Monitor
Maintain
 Phase Nine - Maintain
 Enable the Client to maintain IA by implementing daily
operations
and procedures for keeping the technology functional and up-
to-
date
 Document the entire Lifecycle Deployment Methodology for
future Client reference
 Instruct Client on the value of reevaluation and the benefit of
revisiting the aforementioned phases as product updates are
released and/or the Clients architecture changes
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Nine - Maintain (Cont.)
 Provide extensive product knowledge transfer, for designated
Client personnel, on the day-to-day operations relative to the
deployed technology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Nine - Maintain (Cont.)
 Deliverables:
 Product Update Procedures Guide for IA  Offers
recommendations and knowledge specific to product
updates and upgrades
 Change Control Guide for IA - Offers recommendations
and knowledge specific to implementing a successful
Change Control Program
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
 Phase Nine - Maintain (Cont.)
 Deliverables:
 Daily Operations Guide for IA - Offers recommendations
and knowledge specific to daily product maintenance
and
management issues
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Phase 9
Define
Install
Level I Configure
Monitor
Level II Configure
Monitor
Level III Configure
Monitor
Maintain
 Questions ???
Host-Based Intrusion Detection
Lifecycle Deployment Methodology

More Related Content

Host-Based IDS LLifecycle

  • 1. Symantec Security Services Lifecycle Deployment Methodology for Host-Based Intrusion Detection For <Company Name> April 10, 2001
  • 2. A Deployment Methodology With Product Lifecycle Considerations Will Enable Success While Enhancing an Organizations Security Architecture!
  • 3. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Phase 9 Define Install Level I Configure Monitor Level II Configure Monitor Level III Configure Monitor Maintain
  • 4. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Define
  • 5. Phase One - Project Definition Define a mutually acceptable Mission Statement outlining Clients project goals Acquire an operational understanding of the Clients environment and security needs: Review Clients documentation Review Environment characteristics Fill out applicable worksheets Conduct personnel interviews Identify Clients personnel roles and responsibilities Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 6. Phase One - Project Definition (Cont.) Develop a comprehensive plan for integrating the product within the Clients environment: Develop a Project Work Plan to detail required resources Develop an Acceptance Test Plan Address Intruder Alert (IA) product scalability requirements Work with Client to design a deployment strategy that is scalable, which meets existing and future business requirements Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 7. Phase One - Project Definition (Cont.) Develop a comprehensive plan for integrating the product within the Clients environment: Provide specifics on hardware recommendations consistent with product architecture and design issues relevant to the Clients environment Perform detailed analysis of Clients recommended IA policy for pertinent Operating Systems and segment into three security levels to construct Level I, II and III Baseline configurations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 8. Phase One - Project Definition (Cont.) Develop a comprehensive plan for integrating the products within the Clients environment: Identify the scope of the IA Implementation: Determine Number of Managers to be installed/patched Determine Number of Consoles to be installed/patched Determine Number of Agents to be installed/patched Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 9. Phase One - Project Definition (Cont.) Deliverables: Mission Statement Clearly defined and mutually acceptable goals for Project scope Project Plan - Illustrates schedule of events, resources required and major milestones Acceptance Test Plan - Offers a mutually agreed upon test to prove soundness and reliability of the deployed technology Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 10. Phase One - Project Definition (Cont.) Deliverables: Server Inventory - Documented List of servers to be installed with predetermined IA components Documented Level I, II and III Baseline policies Evaluate Clients recommended IA policy and segment into Level I, II and III Baseline policy Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 11. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Define Install
  • 12. Phase Two - Installation Deploy IA components identified in Server Inventory and implement based upon Project Work Plan: Number of Managers to be installed/patched Number of Consoles to be installed/patched Number of Agents to be installed/patched Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 13. Phase Two - Installation (Cont.) Deliverables: Updated Project Plan (if applicable) - Updates sections of this document to show current state of the Project Fully-functional IA deployment Demonstrates, through use of the Acceptance Test Plan, that all software components are functioning properly Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 14. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Define Install Level I Configure
  • 15. Phase Three - Level I Baseline Configuration Import recommended Level I Baseline policy for IA focusing on High-Level Event Criteria Create an agreed upon domain architecture for managing the products Work with Client to provide Separation of Duties considerations to determine access levels for approved personnel Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 16. Phase Three - Level I Baseline Configuration (Cont.) Add notification features for Level I Baseline policy Configure reporting to highlight event data and fulfill Client expectations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 17. Phase Three - Level I Baseline Configuration (Cont.) Deliverables: IA Level I Baseline Configuration Guide Describes Clients IA security architecture, system configurations and implemented policy through Level I Baseline Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 18. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Define Install Level I Configure Monitor
  • 19. Phase Four - Data Analysis / Monitoring Utilize Level I Baseline policy activated on the IA Agents to gather data against the target environment Analyze the data collected by the Agents Address False Positives and False Negatives and document any deviations or exceptions Offer guidance in the correction of discovered vulnerabilities in order to verify the validity of the deployed Level I Baseline policy (Client is responsible for fixing discovered vulnerabilities) Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 20. Phase Four - Data Analysis / Monitoring (Cont.) Deliverables: IA Level I Vulnerability Report - Illustrates discovered vulnerabilities from Agent data collection utilizing Level I Baseline policy recommendations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 21. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Define Install Level I Configure Monitor Level II Configure
  • 22. Phase Five - Level II Baseline Configuration Import recommended Level II Baseline policy for IA focusing on Medium-Level Event Criteria Add notification features for Level II Baseline policy Configure reporting to highlight event data and fulfill Client expectations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 23. Phase Five - Level II Baseline Configuration (Cont.) Deliverables: IA Level II Baseline Configuration Guide Describes Clients IA security architecture, system configurations and implemented policy through Level II Baseline Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 24. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Define Install Level I Configure Monitor Level II Configure Monitor
  • 25. Phase Six - Data Analysis / Monitoring Utilize Level II Baseline policy activated on the IA Agents to gather data against the target environment Analyze the data collected by the Agents Address False Positives and False Negatives and document any deviations or exceptions Offer guidance in the correction of discovered vulnerabilities in order to verify the validity of the deployed Level II Baseline policy (Client is responsible for fixing discovered vulnerabilities) Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 26. Phase Six - Data Analysis / Monitoring (Cont.) Deliverables: IA Level II Vulnerability Report - Illustrates discovered vulnerabilities from Agent data collection utilizing Level II Baseline policy recommendations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 27. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Define Install Level I Configure Monitor Level II Configure Monitor Level III Configure
  • 28. Phase Seven - Level III Baseline Configuration Import recommended Level III Baseline policy for IA focusing on Low-Level Event Criteria Add notification features for Level III Baseline policy Configure reporting to highlight event data and fulfill Client expectations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 29. Phase Seven - Level III Baseline Configuration (Cont.) Deliverables: IA Level III Baseline Configuration Guide Describes Clients IA security architecture, system configurations and implemented policy through Level III Baseline Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 30. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Define Install Level I Configure Monitor Level II Configure Monitor Level III Configure Monitor
  • 31. Phase Eight - Data Analysis / Monitoring Utilize Level III Baseline policy activated on the IA Agents to gather data against the target environment Analyze the data collected by the Agents Address False Positives and False Negatives and document any deviations or exceptions Offer guidance in the correction of discovered vulnerabilities in order to verify the validity of the deployed Level III Baseline policy (Client is responsible for fixing discovered vulnerabilities) Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 32. Phase Eight - Data Analysis / Monitoring (Cont.) Deliverables: IA Level III Vulnerability Report - Illustrates discovered vulnerabilities from Agent data collection utilizing Level III Baseline policy recommendations Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 33. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Phase 9 Define Install Level I Configure Monitor Level II Configure Monitor Level III Configure Monitor Maintain
  • 34. Phase Nine - Maintain Enable the Client to maintain IA by implementing daily operations and procedures for keeping the technology functional and up- to- date Document the entire Lifecycle Deployment Methodology for future Client reference Instruct Client on the value of reevaluation and the benefit of revisiting the aforementioned phases as product updates are released and/or the Clients architecture changes Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 35. Phase Nine - Maintain (Cont.) Provide extensive product knowledge transfer, for designated Client personnel, on the day-to-day operations relative to the deployed technology Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 36. Phase Nine - Maintain (Cont.) Deliverables: Product Update Procedures Guide for IA Offers recommendations and knowledge specific to product updates and upgrades Change Control Guide for IA - Offers recommendations and knowledge specific to implementing a successful Change Control Program Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 37. Phase Nine - Maintain (Cont.) Deliverables: Daily Operations Guide for IA - Offers recommendations and knowledge specific to daily product maintenance and management issues Host-Based Intrusion Detection Lifecycle Deployment Methodology
  • 38. Host-Based Intrusion Detection Lifecycle Deployment Methodology Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Phase 9 Define Install Level I Configure Monitor Level II Configure Monitor Level III Configure Monitor Maintain
  • 39. Questions ??? Host-Based Intrusion Detection Lifecycle Deployment Methodology