SlideShare a Scribd company logo
1 of 31
May/Madrid 2007
Con la colaboración de

y el patrocinio de




       CERT Certification

                              Vicente Aceituno
 As Louis Pasteur put it in a lecture in the
  University of Lille: “In the fields of
  observation chance favors only the prepared
  mind”.
What?


 CERT or CERT/CC (Computer Emergency
  Response Team / Coordination Center)
 CSIRT (Computer Security Incident Response
  Team)
 IRT (Incident Response Team)
 CIRT (Computer Incident Response Team)
 SERT (Security Emergency Response Team)
CERT


 A Computer Security Incident Response Team (CSIRT)
  is a service organization that is responsible for receiving,
  reviewing, and responding to computer security incident
  reports and activity.
 Their services are usually performed for a defined
  constituency that could be a parent entity such as a
  corporation, governmental, or educational organization;
  a region or country; a research network; or a paid client.
  (CERT/CC)
CERT - Benefits


 Centralized coordination for IT security issues within
  the organization.
 Specialized handling of and response to IT incidents.
 Dealing with legal issues and preserving evidence in
  the event of a lawsuit.
 Keeping track of developments in the security field.
 Stimulating cooperation within the constituency on IT
  security (awareness building).
CERT - Types

 Academic Sector CSIRT
 Commercial CSIRT
 Governmental Sector CSIRT
 Internal CSIRT
 Military Sector CSIRT
 National CSIRT
 Small & Medium Enterprises (SME) Sector
  CSIRT
 Vendor CSIRT
CERT - Services


 Reactive Services
     Alerts and Warnings
     Incident Handling
     Vulnerability Handling
     Artifact Handling
CERT - Services


 Proactive Services
   Technology Watch
   Announcements
   Security Audit or Assessments
   Configuration and Maintenance of Security
    Tools, Applications and Infrastructures
   Development of Security Tools
   Intrusion Detection Services
   Security-Related Information Dissemination
CERT - Services


 Security Quality Management Services
     Risk Analysis
     Business Continuity & Disaster Recovery Planning
     Security Consulting
     Awareness Building
     Education / Training
     Product Evaluation or Certification
CERTs in Europe
Trust Building


   Team – Team
   Association
   Inter - Association
   Personal relationships.
   Certification - Trusted Introducer.
   Agreements:
     Code of Conduct.
     Memoranda of Understanding.
     SLAs.
 Adherence to standards.
Association - FIRST
 Mission:
    FIRST is an international confederation of trusted computer incident
     response teams who cooperatively handle computer security
     incidents and promote incident prevention programs.
    FIRST members develop and share technical information, tools,
     methodologies, processes and best practices
    FIRST encourages and promotes the development of quality
     security products, policies & services
    FIRST develops and promulgates best computer security practices
    FIRST promotes the creation and expansion of Incident Response
     teams and membership from organizations from around the world
    FIRST members use their combined knowledge, skills and
     experience to promote a safer and more secure global electronic
     environment.
Certification - Trust

 A way to evidence the organization's stance on security;
 A part of a contract to ensure commitment by one of the
  parties to security management;
 A mechanism to ensure mutual understanding of the
  services obtained from a provider.
 Trust relationships with Third Parties, like Partners,
  Customers and Suppliers.
CERT Certification

 What is certification good for?
   It is a driver for implementation of better IS
    practices.
Certification - Trust

 What is certification good for?
    Establishing trust relationships.
Certification - Challenges


 Challenges
    Certification doesn’t guarantee performance.
     Performance depends on the budget, the capability
     and the commitment of those involved in running it.
    Certification only guarantees that the cause of faults
     is not poor process design.
    Poor performers and bogus certifications lower the
     reputation of the certification and damage the
     reputation of all certificate holders.
Certification - Challenges

                             Specification
Certification - Challenges

                             Different
                             Implementations
Certification - Challenges

If you get the
same certificate
Certification - Challenges

For different
implementations
Certification - Challenges

The market
reputation you
will get is that of
the worst
implementation
Certification - Challenges


 Challenges:
    Some threats fall out of the scope of information
     security:
      – Human error;
      – Incompetence;
      – Fraud;
      – Corruption.
Certification - Challenges
Certification - Summary




           Certification doesn’t guarantee
            performance.
           Bad performers damage the
            reputation of all certificate holders.
Accreditation



     Accreditation Entity    Accreditation Entity




      Certification Entity




          Final User
Trusted Introducer (TERENA)

 The Trusted Introducer (TI) is a trust broker for
  European CERTs with three levels:
    Listed – any team identified within the scope of
     TI
    Accreditation Candidate – a team which received
     and accepted invitation for Accreditation process
    Accredited – a team which successfully
     completed accreditation / verification process
Certification – Challenges

 Certification is not enough!
 Accreditation is necessary:
   Verification of personnel's competence.
   Verification of team's procedures and policies
   Verification of financial stability and
    sustainability.
   Verification of basic operational factors, such
    as reachability or response times.
Sources
   CMU/SEI Handbook for Computer Security Incident Response Teams (CSIRTs)
   ENISA’s CERT in Europe v1.4
   ENISA’s CERT cooperation and its further facilitation by relevant stakeholders.
   ENISA’s Information Security Certification Schemes Workshop 2006 Minutes, materials
    and Report.
   ENISA’s Inventory of CERT activities in Europe.
   ENISA www.enisa.europa.eu/cert%5Finventory/index_inventory.htm
   EA 7/03 Guidelines for the Accreditation of Bodies Operating Certification/Registration of
    Information Security Management Systems.
   FIRST - www.first.com
   ISM3 v2.00
   ISO/IEC 27001:2005 Information technology — Security techniques — Information
    security management systems — Requirements
   Information Security Management Maturity Model v2.00
   ISO/IEC 19011:2002 Guidelines for quality and/or environmental management systems
    auditing
   Terena’s Trusted Introducer Service (TI)
   Terena’s TF-CSIRT.
   Terena’s A Trusted CSIRT Introducer in Europe.
May/Madrid 2007
Con la colaboración de

y el patrocinio de




 THANKS
Creative Commons Attribution-NoDerivs 2.0

You are free:
•to copy, distribute, display, and perform this work
•to make commercial use of this work
Under the following conditions:

                                 Attribution. You must give the original author credit.



                               No Derivative Works. You may not alter, transform, or build upon this
                               work.

For any reuse or distribution, you must make clear to others the license terms of this work.

Any of these conditions can be waived if you get permission from the author.

Your fair use and other rights are in no way affected by the above.

This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy
of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative
Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
Trusted Introducer (TERENA)
   An invitation to start the accreditation process can be sent to a "Listed" team
    upon its request or e.g. by recommendation of an already "Accredited" CERT.
    The process of accreditation requires the team to declare its support for a
    number of criteria and provide a standardized set of information about itself.
    This data is then kept and maintained by the TI to ensure it is correct and up to
    date. Gaining the "Accredited" level results in access to numerous services,
    e.g. a database of in-depth operational contacts of all accredited teams, the TI
    mailing lists open to accredited CERTs only, PGP key signing, etc. The
    services of the TI are provided by an independent contractor appointed by
    TERENA and supervised by TI Review Board consisting of 5 members: a
    TERENA representative, three members elected by accredited teams and the
    chair of TERENA TF-CSIRT ex officio.

More Related Content

What's hot (20)

Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Network security
Network securityNetwork security
Network security
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Encryption
EncryptionEncryption
Encryption
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
Spoofing
SpoofingSpoofing
Spoofing
 

Similar to CERT Certification

5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Penetration Testing.pptx
Penetration Testing.pptxPenetration Testing.pptx
Penetration Testing.pptxjoe reese
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Career Certifications In Computer Networking
Career Certifications In Computer NetworkingCareer Certifications In Computer Networking
Career Certifications In Computer Networkingswregn
 
Decypher Technologies
Decypher TechnologiesDecypher Technologies
Decypher Technologiesrajeshsapkal
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 

Similar to CERT Certification (20)

5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Penetration Testing.pptx
Penetration Testing.pptxPenetration Testing.pptx
Penetration Testing.pptx
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Career Certifications In Computer Networking
Career Certifications In Computer NetworkingCareer Certifications In Computer Networking
Career Certifications In Computer Networking
 
Decypher Technologies
Decypher TechnologiesDecypher Technologies
Decypher Technologies
 
Information Security
Information SecurityInformation Security
Information Security
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
HK IT Security Consultant Profile
HK IT Security Consultant ProfileHK IT Security Consultant Profile
HK IT Security Consultant Profile
 

More from Conferencias FIST

Seguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceSeguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceConferencias FIST
 
Las Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseLas Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseConferencias FIST
 
Evolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiEvolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiConferencias FIST
 
El Information Security Forum
El Information Security ForumEl Information Security Forum
El Information Security ForumConferencias FIST
 
Inseguridad en Redes Wireless
Inseguridad en Redes WirelessInseguridad en Redes Wireless
Inseguridad en Redes WirelessConferencias FIST
 
Mas allá de la Concienciación
Mas allá de la ConcienciaciónMas allá de la Concienciación
Mas allá de la ConcienciaciónConferencias FIST
 
Riesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloRiesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloConferencias FIST
 
Demostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseDemostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseConferencias FIST
 

More from Conferencias FIST (20)

Seguridad en Open Solaris
Seguridad en Open SolarisSeguridad en Open Solaris
Seguridad en Open Solaris
 
Seguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceSeguridad en Entornos Web Open Source
Seguridad en Entornos Web Open Source
 
Spanish Honeynet Project
Spanish Honeynet ProjectSpanish Honeynet Project
Spanish Honeynet Project
 
Seguridad en Windows Mobile
Seguridad en Windows MobileSeguridad en Windows Mobile
Seguridad en Windows Mobile
 
SAP Security
SAP SecuritySAP Security
SAP Security
 
Que es Seguridad
Que es SeguridadQue es Seguridad
Que es Seguridad
 
Network Access Protection
Network Access ProtectionNetwork Access Protection
Network Access Protection
 
Las Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseLas Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática Forense
 
Evolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiEvolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFi
 
El Information Security Forum
El Information Security ForumEl Information Security Forum
El Information Security Forum
 
Criptografia Cuántica
Criptografia CuánticaCriptografia Cuántica
Criptografia Cuántica
 
Inseguridad en Redes Wireless
Inseguridad en Redes WirelessInseguridad en Redes Wireless
Inseguridad en Redes Wireless
 
Mas allá de la Concienciación
Mas allá de la ConcienciaciónMas allá de la Concienciación
Mas allá de la Concienciación
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
Wifislax 3.1
Wifislax 3.1Wifislax 3.1
Wifislax 3.1
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Riesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloRiesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el Desarrollo
 
Demostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseDemostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis Forense
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

CERT Certification

  • 1. May/Madrid 2007 Con la colaboración de y el patrocinio de CERT Certification Vicente Aceituno
  • 2.  As Louis Pasteur put it in a lecture in the University of Lille: “In the fields of observation chance favors only the prepared mind”.
  • 3. What?  CERT or CERT/CC (Computer Emergency Response Team / Coordination Center)  CSIRT (Computer Security Incident Response Team)  IRT (Incident Response Team)  CIRT (Computer Incident Response Team)  SERT (Security Emergency Response Team)
  • 4. CERT  A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity.  Their services are usually performed for a defined constituency that could be a parent entity such as a corporation, governmental, or educational organization; a region or country; a research network; or a paid client. (CERT/CC)
  • 5. CERT - Benefits  Centralized coordination for IT security issues within the organization.  Specialized handling of and response to IT incidents.  Dealing with legal issues and preserving evidence in the event of a lawsuit.  Keeping track of developments in the security field.  Stimulating cooperation within the constituency on IT security (awareness building).
  • 6. CERT - Types  Academic Sector CSIRT  Commercial CSIRT  Governmental Sector CSIRT  Internal CSIRT  Military Sector CSIRT  National CSIRT  Small & Medium Enterprises (SME) Sector CSIRT  Vendor CSIRT
  • 7. CERT - Services  Reactive Services  Alerts and Warnings  Incident Handling  Vulnerability Handling  Artifact Handling
  • 8. CERT - Services  Proactive Services  Technology Watch  Announcements  Security Audit or Assessments  Configuration and Maintenance of Security Tools, Applications and Infrastructures  Development of Security Tools  Intrusion Detection Services  Security-Related Information Dissemination
  • 9. CERT - Services  Security Quality Management Services  Risk Analysis  Business Continuity & Disaster Recovery Planning  Security Consulting  Awareness Building  Education / Training  Product Evaluation or Certification
  • 11. Trust Building  Team – Team  Association  Inter - Association  Personal relationships.  Certification - Trusted Introducer.  Agreements:  Code of Conduct.  Memoranda of Understanding.  SLAs.  Adherence to standards.
  • 12. Association - FIRST  Mission:  FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs.  FIRST members develop and share technical information, tools, methodologies, processes and best practices  FIRST encourages and promotes the development of quality security products, policies & services  FIRST develops and promulgates best computer security practices  FIRST promotes the creation and expansion of Incident Response teams and membership from organizations from around the world  FIRST members use their combined knowledge, skills and experience to promote a safer and more secure global electronic environment.
  • 13. Certification - Trust  A way to evidence the organization's stance on security;  A part of a contract to ensure commitment by one of the parties to security management;  A mechanism to ensure mutual understanding of the services obtained from a provider.  Trust relationships with Third Parties, like Partners, Customers and Suppliers.
  • 14. CERT Certification  What is certification good for?  It is a driver for implementation of better IS practices.
  • 15. Certification - Trust  What is certification good for?  Establishing trust relationships.
  • 16. Certification - Challenges  Challenges  Certification doesn’t guarantee performance. Performance depends on the budget, the capability and the commitment of those involved in running it.  Certification only guarantees that the cause of faults is not poor process design.  Poor performers and bogus certifications lower the reputation of the certification and damage the reputation of all certificate holders.
  • 17. Certification - Challenges Specification
  • 18. Certification - Challenges Different Implementations
  • 19. Certification - Challenges If you get the same certificate
  • 20. Certification - Challenges For different implementations
  • 21. Certification - Challenges The market reputation you will get is that of the worst implementation
  • 22. Certification - Challenges  Challenges:  Some threats fall out of the scope of information security: – Human error; – Incompetence; – Fraud; – Corruption.
  • 24. Certification - Summary  Certification doesn’t guarantee performance.  Bad performers damage the reputation of all certificate holders.
  • 25. Accreditation Accreditation Entity Accreditation Entity Certification Entity Final User
  • 26. Trusted Introducer (TERENA)  The Trusted Introducer (TI) is a trust broker for European CERTs with three levels:  Listed – any team identified within the scope of TI  Accreditation Candidate – a team which received and accepted invitation for Accreditation process  Accredited – a team which successfully completed accreditation / verification process
  • 27. Certification – Challenges  Certification is not enough!  Accreditation is necessary:  Verification of personnel's competence.  Verification of team's procedures and policies  Verification of financial stability and sustainability.  Verification of basic operational factors, such as reachability or response times.
  • 28. Sources  CMU/SEI Handbook for Computer Security Incident Response Teams (CSIRTs)  ENISA’s CERT in Europe v1.4  ENISA’s CERT cooperation and its further facilitation by relevant stakeholders.  ENISA’s Information Security Certification Schemes Workshop 2006 Minutes, materials and Report.  ENISA’s Inventory of CERT activities in Europe.  ENISA www.enisa.europa.eu/cert%5Finventory/index_inventory.htm  EA 7/03 Guidelines for the Accreditation of Bodies Operating Certification/Registration of Information Security Management Systems.  FIRST - www.first.com  ISM3 v2.00  ISO/IEC 27001:2005 Information technology — Security techniques — Information security management systems — Requirements  Information Security Management Maturity Model v2.00  ISO/IEC 19011:2002 Guidelines for quality and/or environmental management systems auditing  Terena’s Trusted Introducer Service (TI)  Terena’s TF-CSIRT.  Terena’s A Trusted CSIRT Introducer in Europe.
  • 29. May/Madrid 2007 Con la colaboración de y el patrocinio de THANKS
  • 30. Creative Commons Attribution-NoDerivs 2.0 You are free: •to copy, distribute, display, and perform this work •to make commercial use of this work Under the following conditions: Attribution. You must give the original author credit. No Derivative Works. You may not alter, transform, or build upon this work. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the author. Your fair use and other rights are in no way affected by the above. This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
  • 31. Trusted Introducer (TERENA)  An invitation to start the accreditation process can be sent to a "Listed" team upon its request or e.g. by recommendation of an already "Accredited" CERT. The process of accreditation requires the team to declare its support for a number of criteria and provide a standardized set of information about itself. This data is then kept and maintained by the TI to ensure it is correct and up to date. Gaining the "Accredited" level results in access to numerous services, e.g. a database of in-depth operational contacts of all accredited teams, the TI mailing lists open to accredited CERTs only, PGP key signing, etc. The services of the TI are provided by an independent contractor appointed by TERENA and supervised by TI Review Board consisting of 5 members: a TERENA representative, three members elected by accredited teams and the chair of TERENA TF-CSIRT ex officio.

Editor's Notes

  1. The first major outbreak of a worm in the global IT infrastructure occurred in the late 1980s. The worm was named Morris2 and it spread swiftly, effectively infecting a great number of IT systems around the world. This incident acted as a wake-up call: suddenly people got aware of a strong need for cooperation and coordination between system administrators and IT managers in order to deal with cases like this. Due to the fact that time was a critical factor, a more organised and structural approach on handling IT security incidents had to be established. And so a few days after the “Morris-incident” the Defence Advanced Research Projects Agency (DARPA) established the first CSIRT: the CERT Coordination Center (CERT/CC3), located at the Carnegie Mellon University in Pittsburgh (Pennsylvania). This model was soon adopted within Europe, and 1992 the Dutch Academic provider SURFnet launched the first CSIRT in Europe, named SURFnet-CERT4. Many teams followed and at present ENISAs Inventory of CERT activities in Europe5 lists more than 100 known teams located in Europe.
  2. As Louis Pasteur put it in a lecture in the University of Lille, “in the fields of observation chance favours only the prepared mind”. Likewise, governments, companies and individuals need to be prepared to observe, detect and respond to all kinds of unpredictable technical threats and incidents. This need led to the proliferation of CERTs that must share information and coordinate for reasons of efficiency, preventing duplication of efforts, and avoiding sending out incoherent or even contradictory warnings and alerts.
  3. The EuroCERT was funded by TERENA with money collected from voluntaries wishing to participate and contribute to the project. Since TERENA was established for research and academic networks, all participants came from this area. It was expected however that commercial ISPs would join by the end of the pilot. The pilot did not work as well as expected. One of the problems was that with different set of services delivered by each team, it was very hard to define the scope of work for EuroCERT that would satisfy the needs of all sponsors without overlapping with work that others are already doing for their own constituencies. Other problems were caused by the need of acceptance of submission to an external authority, e.g. giving up direct personal links. The fact that Europe if a multinational and multicultural structure and that work of a CERT team within national research network would be coordinated with international EuroCERT which was an international entity did not make things any easier. The EuroCERT services, and thus the project SIRCE itself ended in September 1999, two months before the scheduled date, due to lack of interest and funding.