On 8/15/14, 5:44 PM, Andrew Gilmore wrote: > Interesting article and discussion. > > Both that blog and www.niap-ccevs.org site seems to apply specifically to > "national security systems". I get why the procurement requirements are > more stringent in that world, but you seem to imply that these requirements > are binding on every federal IT purchase. Why? I don't want any classified > or even sensitive data on my systems, so why are the purchasing > requirements the same?
Just noticed the link in Gunnar's blog was dead. Here's the updated one: https://www.niap-ccevs.org/NIAP_Evolution/faqs/nstissp-11/ And here's the definition of "What is a National Security System?": https://www.niap-ccevs.org/NIAP_Evolution/faqs/nstissp-11/#Question_III_2 Ultimately, for both DoD/IC and civilian, boil down to the Federal Information Systems Management Act of 2002 (FISMA). This actually is a *law*, and you can get a copy here: http://www.gpo.gov/fdsys/pkg/STATUTE-116/pdf/STATUTE-116-Pg2899.pdf Skip to PDF pg58, "$11331. Responsibilities for Federal information systems standards" - 11331(a)(1) gives NIST the power to prescribe standards and guidelines pertaining to Federal information systems. This is generally referred to as FISMA compliance. - 11331(a)(2) defers to the president to figure out what to do for "national security systems." That's what Presidential Decision Directive (PDD-63) is all about, which ultimately created the NSTISSP. History @ https://www.niap-ccevs.org/NIAP_Evolution/faqs/nstissp-11/#Question_I_1 - 11331(b) make following FISMA or NSTISSP mandatory So then, on the civilian side, the Department of Commerce released Federal Information Processing Standards 200 (FIPS-200), which is the "Minimum Security Requirements for Federal Information and Information Systems." You can find a copy here: http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf An exert from Section 1: > The E-Government Act of 2002 (Public Law 107-347), passed by the one hundred > and seventh > Congress and signed into law by the President in December 2002, recognized > the importance of > information security to the economic and national security interests of the > United States. Title III of > the E-Government Act, entitled the Federal Information Security Management > Act (FISMA) of 2002, > tasked NIST with the responsibility of developing security standards and > guidelines for the federal > government including the development of: > • Standards for categorizing information and information systems collected or > maintained by > or on behalf of each federal agency based on the objectives of providing > appropriate levels of > information security according to a range of risk levels; > • Guidelines recommending the types of information and information systems to > be included in > each category; and > • Minimum information security requirements for information and information > systems in each such category. The document then spells out impact levels (Section 2), and tells you to go look at NIST 800-53 for the actual, specific controls to implement once you have an impact level decision (Section 4). So, lets hop over to NIST 800-53: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf Skip allllll the way to PDF pg 108, "Table D-2: Security Control Baselines," and you'll see the Low/Mod/High impact levels and what controls you have to meet at each one. Relating to the CentOS discussion, the IA-7 controls are interesting. They state: > The information system implements mechanisms for authentication to a > cryptographic > module that meet the requirements of applicable federal laws, Executive > Orders, directives, > policies, regulations, standards, and guidance for such authentication The "that meet requirements of applicable federal laws... policies.. standards" bit refers to FIPS 140-2 certification. Which CentOS doesn't have. Another goodie, SA-4(6), "Acquisition Process | Use of Information Assurance Products", which reads: > The organization: > (a) Employs only government off-the-shelf (GOTS) or commercial off-the-shelf > (COTS) > information assurance (IA) and IA-enabled information technology products > that compose an > NSA-approved solution to protect classified information when the networks > used to transmit > the information are at a lower classification level than the information > being transmitted; and > (b) Ensures that these products hav And then SA-4(7), "Acquisition Process | NIAP-Approved Protection Profiles," which reads: > The organization: > (a) Limits the use of commercially provided information assurance (IA) and > IA-enabled > information technology products to those products that have been successfully > evaluated > against a National Information Assurance partnership (NIAP)-approved > Protection Profile for a > specific technology type, if such a profile exists; and > (b) Requires, if no NIAP-approved Protection Profile exists for a specific > technology type but a > commercially provided information technology product relies on cryptographic > functionality > to enforce its security policy, that the cryptographic module is > FIPS-validated. But again, agencies must elect to follow these controls and standards. DAAs can certainly waiver them -- and in the case of wherever CentOS is being deployed -- they have (you're not running CentOS without the knowledge of your CISO/DAA, right?). > > I am also curious why 1/3 of the CentOS binaries are different. From "How is CentOS different from Red Hat Enterprise Linux?" http://community.redhat.com/centos-faq/#_centos > While CentOS is derived from the Red Hat Enterprise Linux codebase, CentOS > and Red Hat Enterprise Linux are distinguished by divergent build > environments, QA processes, and, in some editions, different kernels and > other open source components. For this reason, the CentOS binaries are not > the same as the Red Hat Enterprise Linux binaries. .... > Once in use, the operating systems often diverge further, as users > selectively install patches to address bugs and security vulnerabilities to > maintain their respective installs. In addition, the CentOS Project maintains > code repositories of software that are not part of the Red Hat Enterprise > Linux codebase. This includes feature changes selected by the CentOS Project. > These are available as extra/additional packages and environments for CentOS > users. CentOS is a "Community Development Platform," not a RHEL clone. Elliminate "clone" from the vocabulary when talking about CentOS. CentOS has its own build system away from RHEL, and the RHEL guys don't share the build details with CentOS teams. CentOS does not do CVE verification. They simply rebuild and publish. And they figure out how to rebuild on their own. It's the CentOS *user*, not the CentOS project, that is responsible for ensuring it doesn't break their software stack and actually fixes any vulnerabilities because the CentOS project doesn't do this testing. Once of the CentOS guys posted details to this regard: http://lists.centos.org/pipermail/centos/2014-May/143094.html > What does this mean for CentOS users ... it means that YOU are > responsible to test the there is no longer an issue in YOUR environment > after you do the install. If you want a CERTIFIED fix that has been > tested, that is what Red Hat provides in RHEL. The reason they charge a > subscription price is because the do all this testing and they provide > assurance that the issues are known, fixed, tested, and certified as > mitigated. << deep breath again >> CentOS isn't the devil, though. It provides a nice middleground between bleeding-edge Fedora and 10yr stable RHEL. When it comes to government systems though, I fail to see any place for CentOS. And for those who argue "we don't need RHEL for just development!": - Even development systems must follow Information Assurance guidelines spoken about above. And ok, fine, internal environments at System Integrators are not specifically called out for these regulations... however many contracts do require integrators to follow the same standards as government systems; - CentOS isn't RHEL. If you dev/test on CentOS, you'll need to completely retest on RHEL. Two different OS' - If you throw out the economic argument ("it's just dev! i can't double my RHEL costs for dev!"), then I'll gladly volunteer to find out who your RHT Rep is... they'd love to work the economics out with you. And besides, most RHEL subscriptions come with unlimited VMs per hypervisor these days anyway. Doesn't care if it's dev/test/prod. -- SCAP Security Guide mailing list scap-security-guide@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide https://github.com/OpenSCAP/scap-security-guide/