SlideShare una empresa de Scribd logo
1 de 15
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Enterprise Security Management
Protection Profiles:
An Implementation Plan
September 2009
Eric Winterton, Booz | Allen| Hamilton
Joshua Brickman, CA Inc.
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
2
Agenda
- Review
- Enterprise Security Management—what are
these products?
-Categories
-Methodology
- Schedule
- Communication Plan
- Risks/Beta/Roll-out
- How can you get involved (Participants)
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
3
How did we got here?
-2008 Proposal (Winterton/Brickman)
-Approach
-Consensus
-All Participating Countries
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Enterprise Security Management
4
Standardized
logging
Compliance
&
configuration
Identity
Management
Monitoring
&
response
Policy/Access
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
What Products Make Up ESM?
CA Identity
Manager
CA GRC Manager CA Siteminder CA Auditor for z/OS CA Enterprise Log
Manager
SC Operations
Manager, SC
Configuration
Manager & SC VMM
SC Operations
Manager, SC
Configuration
Manager, SC
Essentials
SC Operations
Manager &
SC Essentials
SC Operations
Manager*
Symantec Alteris Symantec CCS/FTK Symantec Alteris Symantec SSIM Symantec Alteris
EMC RSA Access
Manager
EMC RSA Envision EMC RSA Envision
Oracle Identity
Manager
Oracle Enterprise
Manager
Oracle Access
Manager
Oracle Audit Vault Oracle Audit Vault
IBM Tivoli Identity
Manager
IBM Tivoli
Compliance Insight
Manager (TCIM) ,
Security
Information Event
Manager (TSIEM)
IBM Tivoli Unified
Single Sign-On ,
Tivoli Security
Policy Manager
IBM Common Audit
and Reporting
(CARS) & TCIM
5
Identity
Management Compliance
and
configuration
Policy/Access
Monitoring
and
response
Standardized
logging
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
6
Approach
ID CC
Gaps for
ESM
Start
Establish
Industry
Team and
Select Lab
Created
ESM Product
Categories
Collected
Products
and Data
Define next
level of Use
Cases
Develop
Global
Threat
Analysis
Select
Protection
Profile
Establish
High-level
Spec for PP
Develop PP
Verify (QA)
on PP
Publish PP
Draft for
Public
Comment
Declare PP
Status
(Global
Conference)
Publish PP
PPs
Complete?
Stop
No
Yes
Publish PP
Draft for
Public
Comment
Completed as of Sept 09
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
7
Cause and Effect/Fishbone
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
8
Timeline so far
- Sept 2008 Proposal
- Received well at 9th ICCC--interest by multiple
vendors, NIAP, consultants and other schemes
- May 2009: NIAP pledges support for creation of
the ESM PP’s.
- May-Aug 2009: Concurrence of ESM product
categories among Microsoft, IBM, EMC, Oracle
Symantec, Ricoh, and CA Inc solidified
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Implementation Plan
9
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Communication Plan
- Comment Periods
-Posted on official sites
-Allow for anyone to provide feedback
- CCVF
- ICCC and RSA
10
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Participation to Date
- You can be a part of this team
- The more participants the better the quality
11
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Joshua Brickman, PMP
CA, Inc.
Program Manager, Federal Certifications
(508) 628-8917
Joshua.Brickman@ca.com
Q & A
12
Eric Winterton, CISSP
Booz | Allen | Hamilton
CCTL Director
(410) 684-6691
winterton_eric@bah.com
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
13
Backup Slides
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
Impact to Effort Matrix
14
Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services
marks and logos referenced herein belong to their respective companies.
All Products in ESM
15

Más contenido relacionado

Último

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Último (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Destacado

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Destacado (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Enterprise security management protection profiles an implementatiion plan final

  • 1. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Enterprise Security Management Protection Profiles: An Implementation Plan September 2009 Eric Winterton, Booz | Allen| Hamilton Joshua Brickman, CA Inc.
  • 2. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 2 Agenda - Review - Enterprise Security Management—what are these products? -Categories -Methodology - Schedule - Communication Plan - Risks/Beta/Roll-out - How can you get involved (Participants)
  • 3. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 3 How did we got here? -2008 Proposal (Winterton/Brickman) -Approach -Consensus -All Participating Countries
  • 4. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Enterprise Security Management 4 Standardized logging Compliance & configuration Identity Management Monitoring & response Policy/Access
  • 5. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. What Products Make Up ESM? CA Identity Manager CA GRC Manager CA Siteminder CA Auditor for z/OS CA Enterprise Log Manager SC Operations Manager, SC Configuration Manager & SC VMM SC Operations Manager, SC Configuration Manager, SC Essentials SC Operations Manager & SC Essentials SC Operations Manager* Symantec Alteris Symantec CCS/FTK Symantec Alteris Symantec SSIM Symantec Alteris EMC RSA Access Manager EMC RSA Envision EMC RSA Envision Oracle Identity Manager Oracle Enterprise Manager Oracle Access Manager Oracle Audit Vault Oracle Audit Vault IBM Tivoli Identity Manager IBM Tivoli Compliance Insight Manager (TCIM) , Security Information Event Manager (TSIEM) IBM Tivoli Unified Single Sign-On , Tivoli Security Policy Manager IBM Common Audit and Reporting (CARS) & TCIM 5 Identity Management Compliance and configuration Policy/Access Monitoring and response Standardized logging
  • 6. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 6 Approach ID CC Gaps for ESM Start Establish Industry Team and Select Lab Created ESM Product Categories Collected Products and Data Define next level of Use Cases Develop Global Threat Analysis Select Protection Profile Establish High-level Spec for PP Develop PP Verify (QA) on PP Publish PP Draft for Public Comment Declare PP Status (Global Conference) Publish PP PPs Complete? Stop No Yes Publish PP Draft for Public Comment Completed as of Sept 09
  • 7. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 7 Cause and Effect/Fishbone
  • 8. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 8 Timeline so far - Sept 2008 Proposal - Received well at 9th ICCC--interest by multiple vendors, NIAP, consultants and other schemes - May 2009: NIAP pledges support for creation of the ESM PP’s. - May-Aug 2009: Concurrence of ESM product categories among Microsoft, IBM, EMC, Oracle Symantec, Ricoh, and CA Inc solidified
  • 9. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Implementation Plan 9
  • 10. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Communication Plan - Comment Periods -Posted on official sites -Allow for anyone to provide feedback - CCVF - ICCC and RSA 10
  • 11. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Participation to Date - You can be a part of this team - The more participants the better the quality 11
  • 12. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Joshua Brickman, PMP CA, Inc. Program Manager, Federal Certifications (508) 628-8917 Joshua.Brickman@ca.com Q & A 12 Eric Winterton, CISSP Booz | Allen | Hamilton CCTL Director (410) 684-6691 winterton_eric@bah.com
  • 13. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 13 Backup Slides
  • 14. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Impact to Effort Matrix 14
  • 15. Copyright ©2009 CA & Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. All Products in ESM 15