Tool Mentor: SCM - Analyze Security Threats, Vulnerabilities and Risks
TM024 - How to Use Security Compliance Manager to Analyze Security Exposures and Risks
Tool: IBM Tivoli Security Compliance Manager
Relationships
Main Description

Context

Tool mentors explain how a tool can perform tasks, which are part of ITUP processes and activities. The tasks are listed as Related Elements in the Relationships section.

You can see the details of how processes and activities are supported by this tool mentor, by clicking the links next to the icons:

Details

IBM® Tivoli® Security Compliance Manager is designed to help organizations analyze exposures and risks in their IT environment. Through an extensible data collection mechanism, powerful policy, and client management functionality and extensive reporting capabilities, Tivoli Security Compliance Manager provides organizations with the ability to easily assess the overall compliance of IT systems in accordance with defined corporate security policies. This ability to quickly assess corporate systems provides valuable data and insight into the existing exposures and risks of these systems and provides a basis for formulating mitigation plans.

Tivoli Security Compliance Manager Policy objects provide tremendous support for identification of IT security exposures and risks. While the policy objects are a flexible mechanism of defining corporate security, compliance targets, and rules for IT assets, Tivoli Security Compliance Manager fully exploits its server-client architecture to allow rapid deployment of policy objects and security assessment of the corporate assets. The ability to quickly deploy security policies and gather assessment data allows organizations to quickly perform security exposure and risk analysis on a continual basis without a large commitment of resources. This ability subsequently allows more time for planning necessary mitigation actions and the allocation of resources on work that improves the overall security of IT assets.

Much like policies, the server-client architecture of Tivoli Security Compliance Manager also enhances its ability to quickly assess corporate systems. In particular, the ability to logically group clients makes it extremely easy to manage and maintain security policies that are applied to various groups of assets. This feature also allows users to partition corporate assets in such a way that different levels of security requirements can be applied and prioritization, ownership, or task distribution of security assessment and mitigation is possible.

As Tivoli Security Compliance Manager policies and server-client architecture provide the ability for users to quickly gather vulnerability data on corporate systems, the Tivoli Security Compliance Manager collector design is the component that provides the breadth of security vulnerability data. Tivoli Security Compliance Manager collectors are self-contained, easy-to-develop, 100% Java™ components that gather a specific set of data on a client. They are stored, maintained, and managed centrally on the Tivoli Security Compliance Manager server. These components, like Tivoli Security Compliance Manager policies, can be easily updated and deployed to Tivoli Security Compliance Manager clients. Working in conjunction with policies and compliance objects, they gather security information of interest and provide the ability to produce security assessment on a broad and extensible range of security targets.

The reporting capability of Tivoli Security Compliance Manager rounds out the vulnerability identification and mitigation function. The ability to generate snapshots of client security compliance information with respect to the applied security policies provides users with a continually updated view of current and existing vulnerabilities on corporate assets. The generation of these reports can be automated using user-defined schedules further automating and simplifying the vulnerability assessment process. With the use of Crystal Enterprise Server, additional graphical operational reports are available that provide a more visual and easily consumable view of existing security issues.

An approach to use Tivoli Security Compliance Manager for IT security exposure and risk analysis is outlined here. Aspects of this approach are most likely parts of the vulnerability identification processes of most organizations. It is provided here as an example of how Tivoli Security Compliance Manager can be used for identification of IT exposures and risks. Instructions on how to interact with and use Tivoli Security Compliance Manager objects to achieve this result can be found in the Tivoli Security Compliance Manager Administration Guide.

  • Register corporate clients and create the appropriate client groups. Some common methods for logically associating clients are by operating system, by owning department, by region, or asset classification (whether it is a critical system, whether it is a public system, and so on.)
  • Define corporate security policies with Tivoli Security Compliance Manager that provide and guarantee the required standard of security on these assets. For example, a Windows XP® policy that requires systems running Windows XP OS to have service pack 1 installed; certain OS level hotfixes installed; an antivirus application installed, running and scanning on a weekly schedule; and a running software firewall with the appropriate network rule set.
  • Add these to the appropriate Tivoli Security Compliance Manager client group where they can be set up to gather security compliance assessment on a regular basis.
  • Update and deploy Tivoli Security Compliance Manager policies, collectors, and compliance objects as new vulnerabilities and additional security checks are required on the corporate assets. IGS provides a newly announced Vulnerability Index (http://www-1.ibm.com/services/us/index.wss/so/bcrs/a1008776) where daily vulnerability updates can be added to a corporate Tivoli Security Compliance Manager security and compliance deployment.
  • Develop additional collectors and deploy them into IT environment using temporary policies and client groups to collect sample data that is not necessarily directly related to corporate security policies. For example, develop a collector to count system access attempts and deploy it for a finite amount of time on critical servers to see when they might be vulnerable to increase network load or even potentially detect irregular access patterns. If appropriate, add these collectors to corporate security policy.

For More Information

For more information about this tool, click on the link for this tool at the top of this page.