SlideShare a Scribd company logo
SYSTEM SECURITY & MANAGEMENT
SHAWN WELLS
DIRECTOR, INNOVATION PROGRAMS
unclass: shawn@redhat.com
(+1) 443-534-0130
1UNCLASSIFIED
60 MINUTES, 3 GOALS
1.  Review compliance tech + initiatives
spanning I4, TS13, DISA, NIST, and Red Hat
•  SCAP Security Guide
•  Security Baselines (CS2, STIG, etc)
•  Emerging Tech
2. 
3. 
60 MINUTES, 3 GOALS
1.  Review compliance tech + initiatives
spanning I4, TS13, DISA, NIST, and Red Hat
•  SCAP Security Guide
•  Security Baselines (CS2, STIG, etc)
•  Emerging Tech
2.  T3 ATO’d System Management Framework
•  System Provisioning, Patch Management, Monitoring, Conf Mgmt
•  Sponsored by T3 (“go redhat-support”)
3. 
60 MINUTES, 3 GOALS
1.  Review compliance tech + initiatives
spanning I4, TS13, DISA, NIST, and Red Hat
•  SCAP Security Guide
•  Security Baselines (CS2, STIG, etc)
•  Emerging Tech
2.  T3 ATO’d System Management Framework
•  System Provisioning, Patch Management, Monitoring, Conf Mgmt
•  Sponsored by T3 (“go redhat-support”)
3.  Demonstrate current capabilities
NSA C63 (aka NIAP) & Red Hat:
where we’ve been… and next stop
SCAP
Security Guide
FSO I43, I411,
TS13,
T3
NVD U.S. Federal
AUS Federal
AppSec Engineering
RHEL5 STIG Delay:
1,988 days
RHEL6 STIG Delay:
932 days
STIG Version 1, Release 2, Section 1.1:
“The consensus content was developed using an
open source project called SCAP Security
Guide. The project’s website is https://
fedorahosted.org/scap-security-guide/. Except
for differences in formatting to accommodate
the DISA STIG publising process, the content of
the RHEL6 STIG should mirror the SCAP
Security Guide content with only minor
divergences as updates from multiple sources
work through the consensus process”
SCAP Security Guide
•  Guidance broken into profiles:
•  RHEL6 STIG
•  CS2
•  NIST NVD (JBoss only)
•  FISMA Moderate (in progress)
<fix system="urn:xccdf:fix:script:sh">
yum -y install aide
</fix>
SYSTEMS MANAGEMENT
18
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 SYSTEM MANAGEMENT CAPABILITIES
T3 RHN Satellite v6: Launching in 2014
•  An entirely new Satellite system
•  Puppet for Configuration
•  Foreman for Provisioning
•  Katello for Content Management
•  Pulp for Repo Management
•  Candlepin for Subscription Management
T3 RHN Satellite v6: Workflow
T3 RHN Satellite v6: Workflow
T3 RHN Satellite v6: Workflow
THANK YOU!
45

More Related Content

What's hot

OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony GoddardOSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
NETWAYS
 
Extending GitHub to Meet your Open Source Policy
Extending GitHub to Meet your Open Source PolicyExtending GitHub to Meet your Open Source Policy
Extending GitHub to Meet your Open Source Policy
FINOS
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Lucy Huh Kerner
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Michael Boelen
 
Présentation kaspersky threat intelligence services
Présentation kaspersky threat intelligence servicesPrésentation kaspersky threat intelligence services
Présentation kaspersky threat intelligence services
ANSItunCERT
 
Analysis of TLS in SMTP World
Analysis of TLS in SMTP WorldAnalysis of TLS in SMTP World
Analysis of TLS in SMTP World
Binu Ramakrishnan
 
[201702]Qubit Security Pitch deck
[201702]Qubit Security Pitch deck[201702]Qubit Security Pitch deck
[201702]Qubit Security Pitch deck
Seungmin Shin
 
Web Application firewall-Mod security
Web Application firewall-Mod securityWeb Application firewall-Mod security
Web Application firewall-Mod security
Romansh Yadav
 
AISA 2018 Perth Conference: State Of Web Wecurity In 2018
AISA 2018 Perth Conference: State Of Web Wecurity In 2018AISA 2018 Perth Conference: State Of Web Wecurity In 2018
AISA 2018 Perth Conference: State Of Web Wecurity In 2018
James Bromberger
 
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
North Texas Chapter of the ISSA
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native era
Priyanka Aash
 
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
RootedCON
 
Introducing vsRisk 2.6
Introducing vsRisk 2.6Introducing vsRisk 2.6
Introducing vsRisk 2.6
Vigilant Software
 
Tools Of The Hardware Hacking Trade Final
Tools Of The Hardware Hacking Trade FinalTools Of The Hardware Hacking Trade Final
Tools Of The Hardware Hacking Trade Final
Priyanka Aash
 
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
Stop Translating, Start Defending: Common Language for Managing Cyber-RiskStop Translating, Start Defending: Common Language for Managing Cyber-Risk
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
Priyanka Aash
 
Handling of compromised Linux systems
Handling of compromised Linux systemsHandling of compromised Linux systems
Handling of compromised Linux systems
Michael Boelen
 
Owasp crypto tools and projects
Owasp crypto tools and projectsOwasp crypto tools and projects
Owasp crypto tools and projects
OwaspCzech
 
Summer Internship Project
Summer Internship ProjectSummer Internship Project
Summer Internship Project
Steven Borik
 
OSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave Kempe
OSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave KempeOSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave Kempe
OSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave Kempe
NETWAYS
 
Maintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMaintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRisk
Vigilant Software
 

What's hot (20)

OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony GoddardOSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
 
Extending GitHub to Meet your Open Source Policy
Extending GitHub to Meet your Open Source PolicyExtending GitHub to Meet your Open Source Policy
Extending GitHub to Meet your Open Source Policy
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
 
Présentation kaspersky threat intelligence services
Présentation kaspersky threat intelligence servicesPrésentation kaspersky threat intelligence services
Présentation kaspersky threat intelligence services
 
Analysis of TLS in SMTP World
Analysis of TLS in SMTP WorldAnalysis of TLS in SMTP World
Analysis of TLS in SMTP World
 
[201702]Qubit Security Pitch deck
[201702]Qubit Security Pitch deck[201702]Qubit Security Pitch deck
[201702]Qubit Security Pitch deck
 
Web Application firewall-Mod security
Web Application firewall-Mod securityWeb Application firewall-Mod security
Web Application firewall-Mod security
 
AISA 2018 Perth Conference: State Of Web Wecurity In 2018
AISA 2018 Perth Conference: State Of Web Wecurity In 2018AISA 2018 Perth Conference: State Of Web Wecurity In 2018
AISA 2018 Perth Conference: State Of Web Wecurity In 2018
 
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native era
 
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
 
Introducing vsRisk 2.6
Introducing vsRisk 2.6Introducing vsRisk 2.6
Introducing vsRisk 2.6
 
Tools Of The Hardware Hacking Trade Final
Tools Of The Hardware Hacking Trade FinalTools Of The Hardware Hacking Trade Final
Tools Of The Hardware Hacking Trade Final
 
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
Stop Translating, Start Defending: Common Language for Managing Cyber-RiskStop Translating, Start Defending: Common Language for Managing Cyber-Risk
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
 
Handling of compromised Linux systems
Handling of compromised Linux systemsHandling of compromised Linux systems
Handling of compromised Linux systems
 
Owasp crypto tools and projects
Owasp crypto tools and projectsOwasp crypto tools and projects
Owasp crypto tools and projects
 
Summer Internship Project
Summer Internship ProjectSummer Internship Project
Summer Internship Project
 
OSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave Kempe
OSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave KempeOSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave Kempe
OSMC 2017 | Icinga2 in a 24/7 Broadcast Environment by Dave Kempe
 
Maintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMaintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRisk
 

Similar to 2013-08-22 NSA System Security & Management

2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
Shawn Wells
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
Shawn Wells
 
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 20132013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
Shawn Wells
 
2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation
Shawn Wells
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
Shawn Wells
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook
Shawn Wells
 
SC'18 BoF Presentation
SC'18 BoF PresentationSC'18 BoF Presentation
SC'18 BoF Presentation
rcastain
 
Security for developers
Security for developersSecurity for developers
Security for developers
Abdelrhman Shawky
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
 
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
Shawn Wells
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
AlgoSec
 
Introduction to Civil Infrastructure Platform
Introduction to Civil Infrastructure PlatformIntroduction to Civil Infrastructure Platform
Introduction to Civil Infrastructure Platform
SZ Lin
 
Cncf checkov and bridgecrew
Cncf checkov and bridgecrewCncf checkov and bridgecrew
Cncf checkov and bridgecrew
LibbySchulze
 
OpenStack-Ansible Security
OpenStack-Ansible SecurityOpenStack-Ansible Security
OpenStack-Ansible Security
Major Hayden
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld
 
KVM_security
KVM_securityKVM_security
KVM_security
Frank Caviggia
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summary
Karun Chennuri
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
Aarno Aukia
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
Bloombase
 

Similar to 2013-08-22 NSA System Security & Management (20)

2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
 
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 20132013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
 
2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook
 
SC'18 BoF Presentation
SC'18 BoF PresentationSC'18 BoF Presentation
SC'18 BoF Presentation
 
Security for developers
Security for developersSecurity for developers
Security for developers
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
Introduction to Civil Infrastructure Platform
Introduction to Civil Infrastructure PlatformIntroduction to Civil Infrastructure Platform
Introduction to Civil Infrastructure Platform
 
Cncf checkov and bridgecrew
Cncf checkov and bridgecrewCncf checkov and bridgecrew
Cncf checkov and bridgecrew
 
OpenStack-Ansible Security
OpenStack-Ansible SecurityOpenStack-Ansible Security
OpenStack-Ansible Security
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
KVM_security
KVM_securityKVM_security
KVM_security
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summary
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
 

More from Shawn Wells

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
Shawn Wells
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
Shawn Wells
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
Shawn Wells
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
Shawn Wells
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
Shawn Wells
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
Shawn Wells
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
Shawn Wells
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
Shawn Wells
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
Shawn Wells
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
Shawn Wells
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
Shawn Wells
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
Shawn Wells
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
Shawn Wells
 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex event
Shawn Wells
 
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
Shawn Wells
 
2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event
Shawn Wells
 
2013-04-03 Open Source Framework to Catch the Bad Guys
2013-04-03 Open Source Framework to Catch the Bad Guys2013-04-03 Open Source Framework to Catch the Bad Guys
2013-04-03 Open Source Framework to Catch the Bad Guys
Shawn Wells
 
2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook
Shawn Wells
 
2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day
Shawn Wells
 
2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat
Shawn Wells
 

More from Shawn Wells (20)

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex event
 
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
 
2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event2013-05-22 RedHatGov Partner Event
2013-05-22 RedHatGov Partner Event
 
2013-04-03 Open Source Framework to Catch the Bad Guys
2013-04-03 Open Source Framework to Catch the Bad Guys2013-04-03 Open Source Framework to Catch the Bad Guys
2013-04-03 Open Source Framework to Catch the Bad Guys
 
2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook2013-03-25 SCAP Workshop Workbook
2013-03-25 SCAP Workshop Workbook
 
2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day2012-08-21 NRO GED Industry Day
2012-08-21 NRO GED Industry Day
 
2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat
 

Recently uploaded

The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...
ResolutionFoundation
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
dj1cx4ex
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
JuanFelipeHerrera4
 
GUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdf
GUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdfGUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdf
GUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdf
ProexportColombia1
 
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
JSchaus & Associates
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
Aggregage
 
History Of Balochistan amazing .pptx / HOB
History Of Balochistan amazing .pptx      / HOBHistory Of Balochistan amazing .pptx      / HOB
History Of Balochistan amazing .pptx / HOB
uzma baloch
 
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
vfefek
 
Draft CP-Baggao on Landslide final copyocx
Draft CP-Baggao on Landslide final copyocxDraft CP-Baggao on Landslide final copyocx
Draft CP-Baggao on Landslide final copyocx
DivineLapada
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
ProexportColombia1
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
Congressional Budget Office
 
EI Statistical Review of World Energy 2024
EI Statistical Review of World Energy 2024EI Statistical Review of World Energy 2024
EI Statistical Review of World Energy 2024
Energy for One World
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Congressional Budget Office
 
Causes Supporting Charity for Elderly People
Causes Supporting Charity for Elderly PeopleCauses Supporting Charity for Elderly People
Causes Supporting Charity for Elderly People
SERUDS INDIA
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
taqyea
 
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
zvpwjpty
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
teeaszt
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
Energy for One World
 
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdfLecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
tshree896
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
Scribe
 

Recently uploaded (20)

The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
 
GUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdf
GUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdfGUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdf
GUIA_LEGAL_CHAPTER_8_COLOMBIAN ENVIROMENTAL REGIME.pdf
 
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
 
History Of Balochistan amazing .pptx / HOB
History Of Balochistan amazing .pptx      / HOBHistory Of Balochistan amazing .pptx      / HOB
History Of Balochistan amazing .pptx / HOB
 
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
 
Draft CP-Baggao on Landslide final copyocx
Draft CP-Baggao on Landslide final copyocxDraft CP-Baggao on Landslide final copyocx
Draft CP-Baggao on Landslide final copyocx
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
 
EI Statistical Review of World Energy 2024
EI Statistical Review of World Energy 2024EI Statistical Review of World Energy 2024
EI Statistical Review of World Energy 2024
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
 
Causes Supporting Charity for Elderly People
Causes Supporting Charity for Elderly PeopleCauses Supporting Charity for Elderly People
Causes Supporting Charity for Elderly People
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
 
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
 
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdfLecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
 

2013-08-22 NSA System Security & Management

  • 1. SYSTEM SECURITY & MANAGEMENT SHAWN WELLS DIRECTOR, INNOVATION PROGRAMS unclass: shawn@redhat.com (+1) 443-534-0130 1UNCLASSIFIED
  • 2. 60 MINUTES, 3 GOALS 1.  Review compliance tech + initiatives spanning I4, TS13, DISA, NIST, and Red Hat •  SCAP Security Guide •  Security Baselines (CS2, STIG, etc) •  Emerging Tech 2.  3. 
  • 3. 60 MINUTES, 3 GOALS 1.  Review compliance tech + initiatives spanning I4, TS13, DISA, NIST, and Red Hat •  SCAP Security Guide •  Security Baselines (CS2, STIG, etc) •  Emerging Tech 2.  T3 ATO’d System Management Framework •  System Provisioning, Patch Management, Monitoring, Conf Mgmt •  Sponsored by T3 (“go redhat-support”) 3. 
  • 4. 60 MINUTES, 3 GOALS 1.  Review compliance tech + initiatives spanning I4, TS13, DISA, NIST, and Red Hat •  SCAP Security Guide •  Security Baselines (CS2, STIG, etc) •  Emerging Tech 2.  T3 ATO’d System Management Framework •  System Provisioning, Patch Management, Monitoring, Conf Mgmt •  Sponsored by T3 (“go redhat-support”) 3.  Demonstrate current capabilities
  • 5. NSA C63 (aka NIAP) & Red Hat: where we’ve been… and next stop
  • 6.
  • 7.
  • 8. SCAP Security Guide FSO I43, I411, TS13, T3 NVD U.S. Federal AUS Federal AppSec Engineering
  • 9. RHEL5 STIG Delay: 1,988 days RHEL6 STIG Delay: 932 days
  • 10. STIG Version 1, Release 2, Section 1.1: “The consensus content was developed using an open source project called SCAP Security Guide. The project’s website is https:// fedorahosted.org/scap-security-guide/. Except for differences in formatting to accommodate the DISA STIG publising process, the content of the RHEL6 STIG should mirror the SCAP Security Guide content with only minor divergences as updates from multiple sources work through the consensus process”
  • 11.
  • 12.
  • 13.
  • 14. SCAP Security Guide •  Guidance broken into profiles: •  RHEL6 STIG •  CS2 •  NIST NVD (JBoss only) •  FISMA Moderate (in progress)
  • 15.
  • 16.
  • 19. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 20. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 21.
  • 22.
  • 23.
  • 24. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 25. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 32. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 33. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 34. T3 SYSTEM MANAGEMENT CAPABILITIES
  • 35. T3 RHN Satellite v6: Launching in 2014 •  An entirely new Satellite system •  Puppet for Configuration •  Foreman for Provisioning •  Katello for Content Management •  Pulp for Repo Management •  Candlepin for Subscription Management
  • 36. T3 RHN Satellite v6: Workflow
  • 37. T3 RHN Satellite v6: Workflow
  • 38. T3 RHN Satellite v6: Workflow
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.