I've been following this discussion with interest.  This is due that
I am going through this process.  So these are my thoughts;

        1. IDS tools are important.  What is actually needed is a judgement
Vs cost call.  I view them as my eyes of what is occurring on the network
and a way to ensure that the security policy is adhered to.  An interesting
book I am half way through at the moment is Network Intrusion Detection, an
Analyst's Handbook by Stephen Northcutt (I purchased this over the web at
fatbrain.com).  I have dealt with Stephen before via another mail list and I
feel he has no particular barrow to push.

        2. With using the external people like KPMG, Ernst&Young etc I see
as a way of providing an external, independent view of where the security is
at. ie review of policy, vulnerabilities etc.

        Both areas you can do yourself.  The  external monitoring  services
is the installation of IDS software and all they do is let you know when an
alert is activated.
        To me that is IDS.  You don't really need that external party to let
you know.  You can hire a security administrator for that.  Most IDS
software can be set to send an e-mail or ring you - that is the service that
the external monitoring companies are offering.


        John Taylor



        From:   Frank Knobbe <[EMAIL PROTECTED]> on 24/08/2000 11:12
        To:     [EMAIL PROTECTED]@SMTP@Aus Exchange, Frank Knobbe
<[EMAIL PROTECTED]>@SMTP@Aus Exchange, [EMAIL PROTECTED]@SMTP@Aus
Exchange
        cc:      

        Subject:        RE: Online Security Services and Continous Risk
Management

        -----BEGIN PGP SIGNED MESSAGE-----
        Hash: SHA1

        > -----Original Message-----
        > From: [EMAIL PROTECTED]
        > [mailto:[EMAIL PROTECTED]] Sent: Wednesday, August 23,
        > 2000 7:38 PM To: Frank Knobbe; [EMAIL PROTECTED] Subject:
        > RE: Online Security Services and Continous Risk Management  
        > 
        > OK, let's then put into your thinking then.  Manufacturers: 
        > vendors who 
        > make firewalls, IDS, virus protection, etc
        > Installers - high end to low end consulting services that install
        > and  configure them (rack and stack ) Consulting - verify that
        > everything looks and smells ok, the  alarm trips  when the door is
        > locked type of thing. (Don't really do to much). Monitoring
        > companies - 24 x7 if the alarm trip they call or page you.  
        > 
        > OK, so where does online security services come in, mind you 
        > the category I 
        > am talking about is very ill-defined, especially when they 
        > advertise they 
        > are a one-stop security solution but they are just going 
        > after replacing 
        > the Consulting piece stated above.

        I would say they fit the Monitoring companies. Back to your
question,
        though: Are they worth it.

        I think that can be answered by comparing them to traditional
        security monitoring companies (A*T etc). Are they worth it?
Shouldn't
        alarm bells and whistles be enough? Hardly, because by the time you
        return from vacation your stuff is gone. Does a monitoring company
        help? My personal opinion is no because when they show up, my stuff
        is gone already. 

        Now reflect that to IT security monitoring. If they monitor and send
        me an email saying that around 2am on Sunday something strange
        happened what appears to be a break-in, then they're worthless
        because I'll find that out on Monday when I review my logs (or check
        my email etc).
        If they show up Monday, it's too late.

        If a security monitoring company could be on site immediately to
        catch the intruder and prevent damage, start forensics and have a)
my
        data saved from the evil hackers, and b) evidence or at least a
        report for me on Monday, then I think they would be worth an
        appropriate amount of money. 

        Are they worth it? Only if they can prevent damage or minimize it. I
        don't think they are worth it if they just let me know I have been
        hacked.

        So the question becomes: What service can they offer that really
help
        my company and its data? Just being a watchdog and bark is not
        enough. They oughta be able to bite the intruder.

        If they are so cheap that I don't need a network admin capable of
        reading log files, than this might be another reason to contract
them
        (Saves me from setting up/getting a log analyzer/IDS system). Money
        is the deciding factor in that case and I doubt that the security
        consulting companies are as cheap as A*T.

        Another question is: Does my company want to take the risk and
        responsibility of trusting such a contractor? How do I explain my
        shareholders that my alarm system failed because the contractor
        failed.

        > >The problem I see is that pretty much everyone wants to do it
all,
        > >trying to present themselves as a one-stop security shop.
        > 
        > The one stop solution model stopped working a while back, it 
        > is more of a 
        > partnering type of ASP, MSP type architecture these days.  
        > Not one company 
        > can do it all,and what end it ends up doing is confusing 
        > CIOs, CEOs on who 
        > to go with.  The biggest result for each security dollar spent.

        Yet we still find companies that acquire instead of
        partnering/outsourcing. I know of a press announcement due next week
        that fits this shoe perfectly. And I think everyone has seen
        company's A stock dip when they acquired company B to add to their
        portfolio of services offerings because the market does not believe
        that company B's line of business fits in company A real of
        expertise.

        Sorry for drifting off topic there for a minute...

        Regards,
        Frank


        -----BEGIN PGP SIGNATURE-----
        Version: PGP Personal Privacy 6.5.1
        Comment: PGP or S/MIME (X.509) encrypted email preferred.

        iQA/AwUBOaR2e0RKym0LjhFcEQIjcwCg/g/eH1ieb5ooJE4p9XcS8FksHcIAnRfB
        oJHuK1E6cAdyqRP91DwfBD3a
        =1/On
        -----END PGP SIGNATURE-----
        -
        [To unsubscribe, send mail to [EMAIL PROTECTED] with
        "unsubscribe firewalls" in the body of the message.]



-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to