The document outlines a 9-phase methodology for deploying Symantec's host-based intrusion detection system at a client. It involves defining goals, installing components, and configuring 3 levels of security policies while monitoring for vulnerabilities between each phase. The final phase is to maintain the system ongoing.
1 of 39
Download to read offline
More Related Content
Host-Based IDS LLifecycle
1. Symantec Security Services Lifecycle Deployment
Methodology for Host-Based Intrusion Detection
For <Company Name>
April 10, 2001
2. A Deployment Methodology With Product
Lifecycle Considerations Will Enable Success
While Enhancing an Organizations Security
Architecture!
5. Phase One - Project Definition
Define a mutually acceptable Mission Statement outlining
Clients project goals
Acquire an operational understanding of the Clients environment
and security needs:
Review Clients documentation
Review Environment characteristics
Fill out applicable worksheets
Conduct personnel interviews
Identify Clients personnel roles and responsibilities
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
6. Phase One - Project Definition (Cont.)
Develop a comprehensive plan for integrating the product within the
Clients environment:
Develop a Project Work Plan to detail required resources
Develop an Acceptance Test Plan
Address Intruder Alert (IA) product scalability requirements
Work with Client to design a deployment strategy that is
scalable, which meets existing and future business
requirements
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
7. Phase One - Project Definition (Cont.)
Develop a comprehensive plan for integrating the product within the
Clients environment:
Provide specifics on hardware recommendations consistent
with product architecture and design issues relevant to the
Clients environment
Perform detailed analysis of Clients recommended IA policy
for pertinent Operating Systems and segment into three
security levels to construct Level I, II and III Baseline
configurations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
8. Phase One - Project Definition (Cont.)
Develop a comprehensive plan for integrating the products within
the Clients environment:
Identify the scope of the IA Implementation:
Determine Number of Managers to be installed/patched
Determine Number of Consoles to be installed/patched
Determine Number of Agents to be installed/patched
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
9. Phase One - Project Definition (Cont.)
Deliverables:
Mission Statement Clearly defined and mutually acceptable
goals for Project scope
Project Plan - Illustrates schedule of events, resources
required and major milestones
Acceptance Test Plan - Offers a mutually agreed upon test to
prove soundness and reliability of the deployed technology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
10. Phase One - Project Definition (Cont.)
Deliverables:
Server Inventory - Documented List of servers to be
installed
with predetermined IA components
Documented Level I, II and III Baseline policies
Evaluate
Clients recommended IA policy and segment into Level
I,
II and III Baseline policy
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
12. Phase Two - Installation
Deploy IA components identified in Server Inventory and
implement based upon Project Work Plan:
Number of Managers to be installed/patched
Number of Consoles to be installed/patched
Number of Agents to be installed/patched
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
13. Phase Two - Installation (Cont.)
Deliverables:
Updated Project Plan (if applicable) - Updates sections of
this
document to show current state of the Project
Fully-functional IA deployment Demonstrates, through
use of the Acceptance Test Plan, that all software
components
are functioning properly
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
15. Phase Three - Level I Baseline Configuration
Import recommended Level I Baseline policy for IA focusing
on
High-Level Event Criteria
Create an agreed upon domain architecture for managing the
products
Work with Client to provide Separation of Duties
considerations
to determine access levels for approved personnel
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
16. Phase Three - Level I Baseline Configuration (Cont.)
Add notification features for Level I Baseline policy
Configure reporting to highlight event data and fulfill Client
expectations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
17. Phase Three - Level I Baseline Configuration (Cont.)
Deliverables:
IA Level I Baseline Configuration Guide Describes
Clients IA security architecture, system configurations
and implemented policy through Level I Baseline
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
19. Phase Four - Data Analysis / Monitoring
Utilize Level I Baseline policy activated on the IA Agents to
gather
data against the target environment
Analyze the data collected by the Agents
Address False Positives and False Negatives and document
any deviations or exceptions
Offer guidance in the correction of discovered vulnerabilities
in order to verify the validity of the deployed Level I
Baseline policy (Client is responsible for fixing discovered
vulnerabilities)
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
20. Phase Four - Data Analysis / Monitoring (Cont.)
Deliverables:
IA Level I Vulnerability Report - Illustrates discovered
vulnerabilities from Agent data collection utilizing Level I
Baseline policy recommendations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
22. Phase Five - Level II Baseline Configuration
Import recommended Level II Baseline policy for IA focusing
on
Medium-Level Event Criteria
Add notification features for Level II Baseline policy
Configure reporting to highlight event data and fulfill Client
expectations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
23. Phase Five - Level II Baseline Configuration (Cont.)
Deliverables:
IA Level II Baseline Configuration Guide Describes
Clients IA security architecture, system configurations
and implemented policy through Level II Baseline
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
25. Phase Six - Data Analysis / Monitoring
Utilize Level II Baseline policy activated on the IA Agents to
gather
data against the target environment
Analyze the data collected by the Agents
Address False Positives and False Negatives and document
any deviations or exceptions
Offer guidance in the correction of discovered vulnerabilities
in order to verify the validity of the deployed Level II
Baseline policy (Client is responsible for fixing discovered
vulnerabilities)
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
26. Phase Six - Data Analysis / Monitoring (Cont.)
Deliverables:
IA Level II Vulnerability Report - Illustrates discovered
vulnerabilities from Agent data collection utilizing Level
II
Baseline policy recommendations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
28. Phase Seven - Level III Baseline Configuration
Import recommended Level III Baseline policy for IA focusing
on
Low-Level Event Criteria
Add notification features for Level III Baseline policy
Configure reporting to highlight event data and fulfill Client
expectations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
29. Phase Seven - Level III Baseline Configuration (Cont.)
Deliverables:
IA Level III Baseline Configuration Guide Describes
Clients IA security architecture, system configurations
and implemented policy through Level III Baseline
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
31. Phase Eight - Data Analysis / Monitoring
Utilize Level III Baseline policy activated on the IA Agents to
gather data against the target environment
Analyze the data collected by the Agents
Address False Positives and False Negatives and document
any deviations or exceptions
Offer guidance in the correction of discovered vulnerabilities
in order to verify the validity of the deployed Level III
Baseline policy (Client is responsible for fixing discovered
vulnerabilities)
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
32. Phase Eight - Data Analysis / Monitoring (Cont.)
Deliverables:
IA Level III Vulnerability Report - Illustrates discovered
vulnerabilities from Agent data collection utilizing Level
III
Baseline policy recommendations
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
34. Phase Nine - Maintain
Enable the Client to maintain IA by implementing daily
operations
and procedures for keeping the technology functional and up-
to-
date
Document the entire Lifecycle Deployment Methodology for
future Client reference
Instruct Client on the value of reevaluation and the benefit of
revisiting the aforementioned phases as product updates are
released and/or the Clients architecture changes
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
35. Phase Nine - Maintain (Cont.)
Provide extensive product knowledge transfer, for designated
Client personnel, on the day-to-day operations relative to the
deployed technology
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
36. Phase Nine - Maintain (Cont.)
Deliverables:
Product Update Procedures Guide for IA Offers
recommendations and knowledge specific to product
updates and upgrades
Change Control Guide for IA - Offers recommendations
and knowledge specific to implementing a successful
Change Control Program
Host-Based Intrusion Detection
Lifecycle Deployment Methodology
37. Phase Nine - Maintain (Cont.)
Deliverables:
Daily Operations Guide for IA - Offers recommendations
and knowledge specific to daily product maintenance
and
management issues
Host-Based Intrusion Detection
Lifecycle Deployment Methodology