SlideShare a Scribd company logo
1 of 38
Download to read offline
Integrating Controls and Process
                                        Improvement




                                                                                              d.
                                                                                            ve
                                                                                         er
                                                                                       es
                                                                               sR
                                                                           ht
                                                                           Kevin Behr



                                                                        ig
                                                                         CTO IP Services
                                                                   ll R
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 1A
© SANS Institute 2003                   No copying, electronic forwarding or posting               All Rights Reserved
Agenda

                               The Problem :        Are we smoking more and enjoying it less?




                                                                                                       d.
                               What we did about it.         Control is possible!




                                                                                                     ve
                               How we did it.




                                                                                                  er
                                                    Blood, Sweat and VisibleOps




                                                                                                es
                               Measuring the results.        The IMCA and other useful metrics




                                                                                      sR
                               What we have built




                                                                                ht
                                                                            ig
                                                                      ll R     © 2003 Tripwire, Inc.    2
                                                                 ,A
                        We invest in redundancy and have smart engineers. Why is our
                                                            03


                        infrastructure so unreliable?
                                                        20




               Key fingerprintthere are best 2F94 998Dfor security and audit butA169 4E46
                      I know = AF19 FA27 practices FDB5 DE3D F8B5 06E4 what about
                      the ops guys?
                                                    te
                                                  itu




                        These best practice volumes read like the tax code. How do I go
                                            st




                        about implementing substantive change when all I have to go by
                                         In




                        is a picture of utopia?
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                           3- 2A
© SANS Institute 2003                    No copying, electronic forwarding or posting                       All Rights Reserved
The Problem




                                                                                              d.
                                                                                            ve
                                                                                         er
                                                                                       es
                                                                               sR
                                                                           ht
                                                                        ig
                                                                   ll R
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 3A
© SANS Institute 2003                   No copying, electronic forwarding or posting               All Rights Reserved
The Problem

                              IDC, Meta etc say that security incidents cause less
                              than 3 percent of down time.




                                                                                                   d.
                              IDC Meta etc say that Hardware and environmental




                                                                                                 ve
                              issues cause less than 6% of down time.




                                                                                              er
                              Why aren’t our production systems more reliable?




                                                                                            es
                              Why are our Ops people so busy and why are




                                                                                  sR
                              service levels getting worse? Our Data Center is
                              always on fire!




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    4
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 4A
© SANS Institute 2003                   No copying, electronic forwarding or posting                    All Rights Reserved
The Problem - Humans

                              Changes that authorized, tasked and directed IT
                              people make cause 78%of all system outages!




                                                                                                  d.
                              Our current way of working does nothing to address




                                                                                                ve
                              this.




                                                                                             er
                              Many companies spend millions on change




                                                                                           es
                              management systems – only to have them




                                                                                 sR
                              circumvented and never know it.




                                                                           ht
                                                                       ig
                                                                  ll R    © 2003 Tripwire, Inc.    5
                                                              ,A
                        IDC reports that authorized change by humans represents almost 80
                                                          03


                        percent of all IT outages.
                                                      20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                  te
                                              itu
                                          st
                                       In
                                 NS
                               SA
                            ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3- 5A
© SANS Institute 2003                  No copying, electronic forwarding or posting                    All Rights Reserved
The Problem - Humans

                              Many companies have developers maintaining
                              production servers because of downsizing.




                                                                                                   d.
                              In many companies Security and Operations have




                                                                                                 ve
                              an adversarial relationship. Ops undoes what




                                                                                              er
                              security puts in place. Security breaks what Ops




                                                                                            es
                              provisions trying to minimize risk.




                                                                                  sR
                              Much of the critical knowledge on how things
                              “Really work” lives in a few very busy minds.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    6
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 6A
© SANS Institute 2003                   No copying, electronic forwarding or posting                    All Rights Reserved
The Problem- The way we work it

                              Studies show that up to 80% of problem resolution
                              time is spent determining the nature of the problem.




                                                                                                   d.
                              The balance is spent actually correcting or




                                                                                                 ve
                              bypassing the problem.




                                                                                              er
                              Ops is so consumed with fighting fires that there is
                              little or no accurate documentation of existing




                                                                                            es
                              systems.




                                                                                  sR
                              There are no accurate golden builds – New servers
                              are like snowflakes – No two are exactly the same.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    7
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 7A
© SANS Institute 2003                   No copying, electronic forwarding or posting                    All Rights Reserved
The Problem – Integrity Drift

                              The purpose of deployed infrastructure “drifts” or
                              changes over time. Suddenly a mail server is now




                                                                                                   d.
                              also a DNS server, a DHCP server .




                                                                                                 ve
                              Security is reduced to using detective controls to




                                                                                              er
                              figure out what ops is deploying after the fact.




                                                                                            es
                              New services deployed instantly become mission




                                                                                  sR
                              critical but there is no way to re-create the server
                              that has evolved over time..




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    8
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 8A
© SANS Institute 2003                   No copying, electronic forwarding or posting                    All Rights Reserved
What we did about it




                                                                                              d.
                                                                                            ve
                                                                                         er
                                                                                       es
                                                                               sR
                                                                           ht
                                                                        ig
                                                                   ll R
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3- 9A
© SANS Institute 2003                   No copying, electronic forwarding or posting               All Rights Reserved
What we did about it

                              Used a twelve step program to determine that we
                              were powerless over our propensity to “light and




                                                                                                   d.
                              fight” ops fires.




                                                                                                 ve
                              We came to the conclusion that we needed a higher




                                                                                              er
                              power (ITIL) and that if we worked the program we
                              could find our way to Serenity and many nines of up




                                                                                            es
                              time.




                                                                                  sR
                              We vowed to share our experience with others
                              along the way.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    10
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 10 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
What we did – The Higher Power

                              We needed a framework to put all of our activity
                              into. So we could understand what it was we were




                                                                                                   d.
                              supposed to be doing.




                                                                                                 ve
                              The framework we chose was the Information




                                                                                              er
                              Technology Infrastructure Library or ITIL (eye-til)




                                                                                            es
                              Pros – Very Large and comprehensive




                                                                                  sR
                              Cons- Very Large and very descriptive (what it looks
                              like) – we needed Prescriptive (what to do)




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    11
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 11 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
What we did about it - What is ITIL?
                              British Office of the Crown Government authors many well-
                              known documents, including ISO17799 (BS7799) Created
                              They realized Ops best practices have never been




                                                                                                    d.
                              documented, and created ITIL (IT Infrastructure Library) and




                                                                                                  ve
                              BS15000 to describe how world-class Ops processes
                              Extremely widely used in Europe, but gaining acceptance in




                                                                                               er
                              the U.S.




                                                                                             es
                               HP OpenView, CA UniCenter, and IBM Tivoli are all basing their EMS
                                 products on ITIL terminology




                                                                                   sR
                               ComputerWorld 10/7/2002: Proctor & Gamble reports saving $125
                                 million per year on IT cost savings (10-15% of their annual IT




                                                                             ht
                                 budget)




                                                                          ig
                                                                    ll R    © 2003 Tripwire, Inc.    12
                                                                ,A
                      IT Infrastructure Library (ITIL) is the only consistent and
                                                            03


                      comprehensive documentation of best practice for IT Service
                      Management. Used by many hundreds of organizations around the
                                                        20



                      world, a whole ITIL philosophy has grown up around the guidance
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                      contained within the ITIL books.
                                                    te




                        ITIL consists of a series of books giving guidance on the provision of
                                                itu




                        quality IT services, and on the accommodation and environmental
                        facilities needed to support IT. ITIL has been developed in
                                             st




                        recognition of organizations' growing dependency on IT and
                                          In




                        embodies best practices for IT Service Management.
                        The ITIL Online : http://www.ogc.gov.uk/itil/
                                  NS




                        The Office of Government and Commerce (owners of ITIL)
                                SA




                        http://www.ccta.gov.uk/
                             ©




                        BS15000 / BS 15000 is the world's first standard for IT service
                        management. The standard specifies a set of inter-related
                        management processes, and is based heavily upon the ITIL (IT
                        Infrastructure Library) framework. The BS15000 Site
                        http://www.bs15000.org.uk/




                             Kevin Behr - Integrating Controls and Process Improvement
                                                          3 - 12 A
© SANS Institute 2003                    No copying, electronic forwarding or posting                     All Rights Reserved
What Is “Visible Ops?”
                              A closed-loop process methodology, aimed at increasing
                              Operational efficiencies and increasing service levels
                              Based on studying “best in class” enterprise operations




                                                                                                    d.
                              Visible Ops goals




                                                                                                  ve
                               A small subset of ITIL and BS15000 frameworks, for terminology,




                                                                                               er
                                  processes, and future improvements




                                                                                             es
                               Intended to 80% of the benefits at 20% of ITIL effort
                               A “step by step” approach to three fundamental service management




                                                                                   sR
                                  disciplines
                              Methodology authors:




                                                                             ht
                               Gene Kim, CTO, Tripwire, Inc.




                                                                         ig
                               Kevin Behr, CTO, IP Services, Inc.

                                                                     ll R   © 2003 Tripwire, Inc.    13
                                                                    ,A
                        This space left intentionally blank
                                                             03
                                                         20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                     te
                                                itu
                                             st
                                          In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                           3 - 13 A
© SANS Institute 2003                    No copying, electronic forwarding or posting                     All Rights Reserved
What we did about it – VisibleOps

                              Gene Kim and I studied many enterprise operations
                              (A major trading company, The largest wireless




                                                                                                   d.
                              carrier, a major stock exchange) and we began to




                                                                                                 ve
                              note that these organizations had successfully




                                                                                              er
                              implemented and benefited from preventive and




                                                                                            es
                              detective control combinations.




                                                                                  sR
                              These controls were used to create audit points that
                              made it easy to understand known good states.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    14
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 14 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
What we did about it

                              We also began to see that if the infrastructure state
                              was understood early on in the problem




                                                                                                   d.
                              management cycle the time it took to accurately




                                                                                                 ve
                              determine the nature of the problem could




                                                                                              er
                              drastically be reduced.




                                                                                            es
                              We would be able to stop many inappropriate and




                                                                                  sR
                              costly over-escalations if we could rule out change
                              as early as possible.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    15
                                                               ,A
                        When examining Problem resolution reports it was noticed that if
                                                           03


                        change could be ruled out early the time it took to close the ticket
                        was reduced.
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                      Most every organization has a star quarterback in operations, and
                                                   te




                      security. Many groups thought that everything wound up escalating
                                               itu




                      to this person because the overall environment had grown so
                      complex that only a few people could solve what used to be simple
                                            st




                      problems. This often results in a serious moral problem for the
                                         In




                      brightest staff. We needed to put them in to an advisory role where
                      they coach and consult instead of fighting fire full time on the front
                                  NS




                      lines. The ultimate goal is to free up enough their time to turn them
                      loose on creating additional operational efficiencies and process
                                SA




                      improvement.
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 15 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
What we did about it

                              Best in class operations had bounded remediation
                              times for critical infrastructure.




                                                                                                  d.
                              In order to have valid golden builds to accomplish




                                                                                                ve
                              this the change management process must have




                                                                                             er
                              more teeth than just the “honor system”.




                                                                                           es
                              These organizations also displayed the earliest




                                                                                 sR
                              integration of security in to the Ops lifecycle




                                                                           ht
                                                                       ig
                                                                  ll R    © 2003 Tripwire, Inc.    16
                                                              ,A
                      We spoke to many large IT groups and heard them complain about
                                                          03


                      the ineffective nature of their change management systems. One
                      CTO even complained that his engineers were often so busy and
                                                      20



                      backlogged in firefighting that they didn’t feel like they had enough
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                      time to even work through the Change Management processes.
                                                  te




                      This meant that changes made during firefighting were never even
                                              itu




                      documented!
                                          st




                        Security would be completely on their own to detect and respond to
                                        In




                        these ad-hoc changes. They would certainly never know who made
                        the changes let alone if they were made by friend or foe (although
                                 NS




                        the odds are with “friend”)!
                               SA
                            ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                        3 - 16 A
© SANS Institute 2003                  No copying, electronic forwarding or posting                     All Rights Reserved
Best In Class Ops and Security
                                                                                   Best in class Ops and
                                                                                   Security organizations
                                                                                   have:
                                                                                   •Highest




                                                                                                   d.
                                                                                   Server/sysadmin ratios




                                                                                                 ve
                                                                                   •Lowest Mean Time To
                                                                                   Repair (MTTR)




                                                                                              er
                                                                                   -Highest Mean Time




                                                                                            es
                                                                                   Between Failures
                                                                                   (MTBF)




                                                                                  sR
                                                                                   •Earliest integration of
                                                                                   Security into Ops
                                                                                   lifecycle




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.              17
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 17 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                               All Rights Reserved
How we did it




                                                                                              d.
                                                                                            ve
                                                                                         er
                                                                                       es
                                                                               sR
                                                                           ht
                                                                        ig
                                                                   ll R
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 18 A
© SANS Institute 2003                   No copying, electronic forwarding or posting               All Rights Reserved
Where Is The Leverage?
                                                                                          Ensure that I can control
                         Ensure that I have predictability                               changes in my world in the
                        around what goes into production                                  production environment




                                                                                                                  d.
                                                                                                                ve
                                                                                                             er
                                                                                                           es
                                                                                                 sR
                                                                                           ht
                                                                                       ig
                                    Help me learn to do this in an
                                         automated fashion.                                        Equip me to deal with problems



                                                                                  ll R
                                                                                                    efficiently and feed the results
                                                                                                      back into my environment


                                                                                          © 2003 Tripwire, Inc.                        19
                                                                                ,A
                        Shift resources from fire fighting to implementing release
                                                                            03


                        management, controls and resolution processes.
                                                                           20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                                      te
                                                                     itu
                                                              st
                                                         In
                                          NS
                                        SA
                                  ©




                                   Kevin Behr - Integrating Controls and Process Improvement
                                                                           3 - 19 A
© SANS Institute 2003                                  No copying, electronic forwarding or posting                                         All Rights Reserved
Process Area Objectives
                              Release Management
                               Ensure that provisioned systems match the “known, good build”
                               Promote repeatable builds for all configurations




                                                                                                       d.
                              Control Processes




                                                                                                     ve
                               Ensure that changes can be traced to a valid business reason




                                                                                                  er
                               Create a control point, where Ops, Dev, or Security can so stop a
                                 change from occurring




                                                                                                es
                               Control configuration drift and uncontrolled changes




                                                                                      sR
                              Incident Management / Resolution
                               Decrease MTTR (mean time to resolve) outages




                                                                                ht
                               Increase “culture of causality,” allowing better diagnosis and problem




                                                                             ig
                                  management practices


                                                                       ll R    © 2003 Tripwire, Inc.    20
                                                                  ,A
                        This space left intentionally blank
                                                              03
                                                          20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                      te
                                                 itu
                                              st
                                          In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                            3 - 20 A
© SANS Institute 2003                    No copying, electronic forwarding or posting                        All Rights Reserved
How we did it – Stabilize the patient

                               Attack the 80%. Stop the bleeding caused by:
                               change drive-bys ,integrity drift and changes made




                                                                                                     d.
                               during firefighting.




                                                                                                   ve
                               We used the combination of a preventive control




                                                                                                er
                               (don’t touch that fence it’s electric!) and a detective




                                                                                              es
                               control (why did you touch the fence at 2:11 am on




                                                                                    sR
                               March 3rd?) to get a handle on the state of every
                               piece of critical infrastructure.




                                                                              ht
                                                                          ig
                                                                     ll R    © 2003 Tripwire, Inc.    21
                                                                  ,A
                        Audit change and configuration controls
                                                             03


                                Tools: Tripwire, Tivoli auditing components, reports from
                                change management tools
                                                          20




               Key fingerprint = AF19 FA27 2F94footprints to DE3D F8B5 06E4 A169 4E46
                             Audit configuration 998D FDB5 ensure compliance
                                                      te




                                Map all changes to authorized work order
                                                 itu




                                End-of-shift audit requires Ops managers to handover data
                                center in the same state as they received it
                                              st
                                           In
                                   NS
                                 SA
                             ©




                              Kevin Behr - Integrating Controls and Process Improvement
                                                            3 - 21 A
© SANS Institute 2003                     No copying, electronic forwarding or posting                     All Rights Reserved
How we did it – Catch and Release

                              We caught and foot-print audited all critical
                              infrastructure configurations in the wild.




                                                                                                  d.
                              We created golden builds for these devices.




                                                                                                ve
                              We tested and set bounded remediation times for




                                                                                             er
                              all critical infrastructure.




                                                                                           es
                              We determined audit frequency and methods




                                                                                 sR
                              necessary to support these times .




                                                                           ht
                                                                       ig
                                                                  ll R    © 2003 Tripwire, Inc.    22
                                                              ,A
                        Create repeatable builds
                                                          03


                             Tools: Tivoli Configuration Manager, Tivoli Remote Control
                             and others (Norton Ghost, InstallShield AdminStudio, Linux
                                                      20



                             QuickStart, Sun Jumpstart)
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                             Automated provisioning of OS, configuration files,
                                                   te




                             applications, and business rules
                                              itu
                                          st




                        Create acceptance process
                                        In




                              Tools: Tripwire
                                 NS




                              Ensure that provisioned servers matches “known, good build”
                               SA
                            ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                        3 - 22 A
© SANS Institute 2003                  No copying, electronic forwarding or posting                     All Rights Reserved
How we did it – Manage the Change

                               Instituted a Change Advisory Board- Stake holders
                               include: Security Lead ,Ops Systems Engineering




                                                                                                     d.
                               Lead, VP of Operations , Service Desk Manager,




                                                                                                   ve
                               Director of Network Operations, and Internal Audit.




                                                                                                er
                               Made weekly change management meetings




                                                                                              es
                               mandatory for all CAB members.




                                                                                    sR
                               Implemented a Change Transaction Process to
                               make the correct path : Request For Change (RFC)




                                                                              ht
                                                                          ig
                                                                     ll R    © 2003 Tripwire, Inc.    23
                                                                 ,A
                        Create change transaction workflow
                                                              03


                               Control points to document, authorize, schedule or deny, and
                               audit change requests
                                                         20



                      Create change control meetings (include Security)
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                              Tools: Tripwire, reports from change management tools (such
                                                     te




                              as trouble ticketing system)
                                                 itu
                                             st
                                           In
                                  NS
                                SA
                             ©




                              Kevin Behr - Integrating Controls and Process Improvement
                                                             3 - 23 A
© SANS Institute 2003                     No copying, electronic forwarding or posting                     All Rights Reserved
How we did it – Managing Change

                              All RFC are categorized based on a 1-4 severity
                              system. Anything above a 2 goes to the CAB for




                                                                                                   d.
                              review and comment.




                                                                                                 ve
                              Changes can only be administered during




                                                                                              er
                              maintenance windows and must be approved and




                                                                                            es
                              scheduled by the CAB.




                                                                                  sR
                              Urgent changes trigger an emergency CAB
                              meeting.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    24
                                                               ,A
                        Simple Change Management Meeting Agenda:
                                                           03
                                                       20



                      Discussion of:
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                      Failed Changes, backed-out Changes, or Changes that may have
                                                   te




                      circumvented the CAB
                                               itu




                        RFCs to be assessed by CAB members
                        Requests For Change that have been assessed by CAB members
                                           st




                        Change reviews
                                         In




                        The Change Management process, including any amendments
                                 NS




                        made to it during the period under discussion, as well as proposed
                        Changes
                               SA




                        Change Management wins/accomplishments for the period under
                        discussion, i.e. a review of the business benefits accrued by way of
                             ©




                        the Change Management process.
                        Review of Next Action assignments based on the above discussion.
                        Dismiss.
                        Meetings should have minutes taken and distributed to the CAB
                        following the meeting.




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 24 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
How we did it - First Response

                              Modified the problem management process to
                              eliminate change as early as possible by identifying




                                                                                                  d.
                              the assets directly involved in the ticket and auditing




                                                                                                ve
                              them against their configuration baseline for the last
                              72 hours. All changes found are attached to the




                                                                                             er
                              ticket.




                                                                                           es
                              If no changes are found the circle is widened to




                                                                                 sR
                              include changes made to infrastructure supporting
                              the target systems.




                                                                           ht
                                                                       ig
                                                                  ll R    © 2003 Tripwire, Inc.    25
                                                              ,A
                        Create inventory of all relevant evidence around issue or outage
                                                          03


                             Tools: Remedy/ CA Service Desk /Tivoli Configuration
                             Manager and Tripwire; Configuration and asset management
                                                      20



                             information
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                             All relevant scheduled and authorized changes
                                                  te




                              Actual changes on target system
                                              itu
                                           st




                        Formalize post-incident assessment and reconciliation of changes
                                        In




                              Tools: Tripwire, reports from Tivoli, reports from ticketing
                                 NS




                              system
                              Ensure that changes are understood
                               SA




                              Ensure that changes are incorporated into documentation and
                              propagated to other systems, as appropriate
                            ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                        3 - 25 A
© SANS Institute 2003                  No copying, electronic forwarding or posting                     All Rights Reserved
Measuring the results




                                                                                              d.
                                                                                            ve
                                                                                         er
                                                                                       es
                                                                               sR
                                                                           ht
                                                                        ig
                                                                   ll R
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 26 A
© SANS Institute 2003                   No copying, electronic forwarding or posting               All Rights Reserved
Measuring the results - The IMCA
                              Based on IT Infrastructure Library (ITIL) / BS 15000
                              standards and the Visible Ops methodology
                              An interview-fueled process with a standardized scoring




                                                                                                   d.
                              methodology




                                                                                                 ve
                              Focuses on high leverage areas:




                                                                                              er
                               Release Processes




                                                                                            es
                               Control Processes
                               Resolution Processes




                                                                                  sR
                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    27
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                      te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 27 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
Measuring the results – IMCA Questions

                              All questions are answered with a number, “from zero to
                              four”




                                                                                                        d.
                               0: Strongly disagree




                                                                                                      ve
                               4: Strongly agree
                              Sample questions




                                                                                                   er
                               “Our IT department is understaffed to meet current workloads.”




                                                                                                 es
                               “Our Service levels are spiraling downwards.”




                                                                                       sR
                               “We can enforce a standard build across all our devices.”
                               “We have a library of automated build systems for all our critical




                                                                                 ht
                                 devices.”




                                                                              ig
                               “We have a clearly defined change control policy.”

                                                                        ll R    © 2003 Tripwire, Inc.    28
                                                                   ,A
                        This space left intentionally blank
                                                               03
                                                          20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                      te
                                                 itu
                                              st
                                           In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                             3 - 28 A
© SANS Institute 2003                     No copying, electronic forwarding or posting                        All Rights Reserved
Measuring the results- IMCA report




                                                                                                d.
                                                                                              ve
                                                                                           er
                                                                                         es
                                                                               sR
                                                                         ht
                                                                     ig
                                                                ll R    © 2003 Tripwire, Inc.    29
                                                            ,A
                      This organization has no Request for Change process. Not having a
                                                        03


                      correct path for changes to follow assures that they will go the path
                      of least resistance and least documentation. Creating more gasoline
                                                    20



                      to throw on the fire.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                te
                                            itu
                                         st
                                      In
                               NS
                             SA
                          ©




                           Kevin Behr - Integrating Controls and Process Improvement
                                                      3 - 29 A
© SANS Institute 2003                No copying, electronic forwarding or posting                     All Rights Reserved
Measuring the results- IMCA report




                                                                                                d.
                                                                                              ve
                                                                                           er
                                                                                         es
                                                                               sR
                                                                         ht
                                                                     ig
                                                                ll R    © 2003 Tripwire, Inc.    30
                                                            ,A
                      This represents a pretty tight shop with some room for improvement.
                                                        03


                      They need to build on their strengths in audit and process to shore
                      up their change transaction processes. Some detective control
                                                    20



                      would certainly help their ailing rollback capabilities.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                te
                                            itu
                                        st
                                     In
                               NS
                             SA
                          ©




                          Kevin Behr - Integrating Controls and Process Improvement
                                                      3 - 30 A
© SANS Institute 2003                No copying, electronic forwarding or posting                     All Rights Reserved
Reliability and Validity of IMCA

                              Validity measures
                               Based on IT best practices frameworks of ITIL and




                                                                                                   d.
                                 BS15000




                                                                                                 ve
                               Questions are scored on the integrity of three key ITIL
                                 processes




                                                                                              er
                              Reliability measures




                                                                                            es
                               All answers are subjective, and can vary from day to day




                                                                                  sR
                               All answers do not have any quantitative significance (i.e.,
                                  arithmetic operations cannot be done on the answers)




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    31
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 31 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
Measuring the results- Other Metrics

                              Number of changes made in data center
                              Number of changes that map to authorized business




                                                                                                   d.
                              reason




                                                                                                 ve
                              Number of times change management system was




                                                                                              er
                              circumvented




                                                                                            es
                              Percent of outages caused by change




                                                                                  sR
                              Number of changes that obsolete repeatable builds
                              Ops “clean shift handover” success rate




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    32
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 32 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
Measuring the results- Other Metrics

                              Time to provision known, good build
                              Number of fixes/turns to match known, good build




                                                                                                   d.
                              Percentage of deployed systems that match known,




                                                                                                 ve
                              good build




                                                                                              er
                              Percentage of deployed systems that have security




                                                                                            es
                              sign-off




                                                                                  sR
                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    33
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 33 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
Measuring the results- Other Metrics

                              Outage and issue Mean Time To Repair (MTTR)
                              Aggregate outage downtime




                                                                                                   d.
                              Number of inappropriate escalations




                                                                                                 ve
                              Increased change success rate




                                                                                              er
                                                                                            es
                              Increased systemic Mean Time Between Failure




                                                                                  sR
                              Smile to frown ration on Ops, Security and Audit
                              staff




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    34
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 34 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
What you have built




                                                                                              d.
                                                                                            ve
                                                                                         er
                                                                                       es
                                                                               sR
                                                                           ht
                                                                        ig
                                                                   ll R
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 35 A
© SANS Institute 2003                   No copying, electronic forwarding or posting               All Rights Reserved
What you have built - You Can Now:
                                Enforce change management process integrity
                                Decreased firefighting and increase proactive
                                controls




                                                                                                   d.
                                Avert revenue loss due to unplanned outages




                                                                                                 ve
                                Decrease Mean Time To Repair by efficient problem




                                                                                              er
                                management processes




                                                                                            es
                                Create hard organizational change boundaries for




                                                                                  sR
                                accountability and responsibility
                                Establish a beach head for operational best




                                                                            ht
                                practices, allowing future process improvement



                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    36
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 36 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
What you have built

                              You now can measure and articulate the business
                              benefit of process improvement efforts




                                                                                                   d.
                              You can target weak areas for quick wins




                                                                                                 ve
                              Regain the confidence of the business by showing




                                                                                              er
                              off your new and improving metrics




                                                                                            es
                              Fend off IT Budget Jenga with your CFO and CEO




                                                                                  sR
                              by showing where money needs to be invested and
                              why.




                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    37
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 37 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved
Contact Information

                              Gene Kim, CTO, Tripwire, Inc.
                               genek@tripwire.com




                                                                                                   d.
                              Kevin Behr, CTO, IP Services, Inc.




                                                                                                 ve
                               kevin.behr@tcpipservices.com




                                                                                              er
                                                                                            es
                                                                                  sR
                                                                            ht
                                                                        ig
                                                                   ll R    © 2003 Tripwire, Inc.    38
                                                               ,A
                        This space left intentionally blank
                                                           03
                                                       20




               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                                   te
                                               itu
                                            st
                                         In
                                  NS
                                SA
                             ©




                             Kevin Behr - Integrating Controls and Process Improvement
                                                         3 - 38 A
© SANS Institute 2003                   No copying, electronic forwarding or posting                     All Rights Reserved

More Related Content

Viewers also liked

Itsm governance and infrastructure as code
Itsm governance and infrastructure as codeItsm governance and infrastructure as code
Itsm governance and infrastructure as codedesktophero
 
Почему управление - «Живое»?
Почему управление - «Живое»?Почему управление - «Живое»?
Почему управление - «Живое»?КоммандКор
 
Chişinău Masterclass
Chişinău MasterclassChişinău Masterclass
Chişinău MasterclassEuclidNetwork
 
5. get the most from google analytics
5. get the most from google analytics5. get the most from google analytics
5. get the most from google analyticsMoreNiche
 
Financial regulation sept2010
Financial regulation sept2010Financial regulation sept2010
Financial regulation sept2010EuclidNetwork
 
Centius training 081410
Centius training 081410Centius training 081410
Centius training 081410mhammami00
 
тренды в интернет-маркетинге
тренды в интернет-маркетингетренды в интернет-маркетинге
тренды в интернет-маркетингеViktor Kharchevskyi
 
4. removing risk from affiliate marketing
4. removing risk from affiliate marketing4. removing risk from affiliate marketing
4. removing risk from affiliate marketingMoreNiche
 
Raa Presentation 5 24 10
Raa Presentation  5 24 10Raa Presentation  5 24 10
Raa Presentation 5 24 10MichelleLaPage
 

Viewers also liked (15)

Itsm governance and infrastructure as code
Itsm governance and infrastructure as codeItsm governance and infrastructure as code
Itsm governance and infrastructure as code
 
Почему управление - «Живое»?
Почему управление - «Живое»?Почему управление - «Живое»?
Почему управление - «Живое»?
 
ABA Localita Austria
ABA Localita AustriaABA Localita Austria
ABA Localita Austria
 
Antriksh forest
Antriksh forestAntriksh forest
Antriksh forest
 
Chişinău Masterclass
Chişinău MasterclassChişinău Masterclass
Chişinău Masterclass
 
5. get the most from google analytics
5. get the most from google analytics5. get the most from google analytics
5. get the most from google analytics
 
Financial regulation sept2010
Financial regulation sept2010Financial regulation sept2010
Financial regulation sept2010
 
Centius training 081410
Centius training 081410Centius training 081410
Centius training 081410
 
тренды в интернет-маркетинге
тренды в интернет-маркетингетренды в интернет-маркетинге
тренды в интернет-маркетинге
 
4. removing risk from affiliate marketing
4. removing risk from affiliate marketing4. removing risk from affiliate marketing
4. removing risk from affiliate marketing
 
Raa Presentation 5 24 10
Raa Presentation  5 24 10Raa Presentation  5 24 10
Raa Presentation 5 24 10
 
Adventure Friends
Adventure FriendsAdventure Friends
Adventure Friends
 
ABA Life Sciences
ABA Life Sciences ABA Life Sciences
ABA Life Sciences
 
Pittsburgh willy's menu
Pittsburgh willy's menuPittsburgh willy's menu
Pittsburgh willy's menu
 
ABA Business Location Austria
ABA Business Location AustriaABA Business Location Austria
ABA Business Location Austria
 

More from Gene Kim

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Gene Kim
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)Gene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was ReleasedGene Kim
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedGene Kim
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesGene Kim
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity ConferenceGene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?Gene Kim
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsGene Kim
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOGene Kim
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns DistilledGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksGene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Gene Kim
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsGene Kim
 

More from Gene Kim (20)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons Learned
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps Rocks
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 

Kevin Behr: Integrating Controls and Process Improvement

  • 1. Integrating Controls and Process Improvement d. ve er es sR ht Kevin Behr ig CTO IP Services ll R ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 1A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 2. Agenda The Problem : Are we smoking more and enjoying it less? d. What we did about it. Control is possible! ve How we did it. er Blood, Sweat and VisibleOps es Measuring the results. The IMCA and other useful metrics sR What we have built ht ig ll R © 2003 Tripwire, Inc. 2 ,A We invest in redundancy and have smart engineers. Why is our 03 infrastructure so unreliable? 20 Key fingerprintthere are best 2F94 998Dfor security and audit butA169 4E46 I know = AF19 FA27 practices FDB5 DE3D F8B5 06E4 what about the ops guys? te itu These best practice volumes read like the tax code. How do I go st about implementing substantive change when all I have to go by In is a picture of utopia? NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 2A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 3. The Problem d. ve er es sR ht ig ll R ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 3A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 4. The Problem IDC, Meta etc say that security incidents cause less than 3 percent of down time. d. IDC Meta etc say that Hardware and environmental ve issues cause less than 6% of down time. er Why aren’t our production systems more reliable? es Why are our Ops people so busy and why are sR service levels getting worse? Our Data Center is always on fire! ht ig ll R © 2003 Tripwire, Inc. 4 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 4A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 5. The Problem - Humans Changes that authorized, tasked and directed IT people make cause 78%of all system outages! d. Our current way of working does nothing to address ve this. er Many companies spend millions on change es management systems – only to have them sR circumvented and never know it. ht ig ll R © 2003 Tripwire, Inc. 5 ,A IDC reports that authorized change by humans represents almost 80 03 percent of all IT outages. 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 5A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 6. The Problem - Humans Many companies have developers maintaining production servers because of downsizing. d. In many companies Security and Operations have ve an adversarial relationship. Ops undoes what er security puts in place. Security breaks what Ops es provisions trying to minimize risk. sR Much of the critical knowledge on how things “Really work” lives in a few very busy minds. ht ig ll R © 2003 Tripwire, Inc. 6 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 6A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 7. The Problem- The way we work it Studies show that up to 80% of problem resolution time is spent determining the nature of the problem. d. The balance is spent actually correcting or ve bypassing the problem. er Ops is so consumed with fighting fires that there is little or no accurate documentation of existing es systems. sR There are no accurate golden builds – New servers are like snowflakes – No two are exactly the same. ht ig ll R © 2003 Tripwire, Inc. 7 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 7A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 8. The Problem – Integrity Drift The purpose of deployed infrastructure “drifts” or changes over time. Suddenly a mail server is now d. also a DNS server, a DHCP server . ve Security is reduced to using detective controls to er figure out what ops is deploying after the fact. es New services deployed instantly become mission sR critical but there is no way to re-create the server that has evolved over time.. ht ig ll R © 2003 Tripwire, Inc. 8 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 8A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 9. What we did about it d. ve er es sR ht ig ll R ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3- 9A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 10. What we did about it Used a twelve step program to determine that we were powerless over our propensity to “light and d. fight” ops fires. ve We came to the conclusion that we needed a higher er power (ITIL) and that if we worked the program we could find our way to Serenity and many nines of up es time. sR We vowed to share our experience with others along the way. ht ig ll R © 2003 Tripwire, Inc. 10 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 10 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 11. What we did – The Higher Power We needed a framework to put all of our activity into. So we could understand what it was we were d. supposed to be doing. ve The framework we chose was the Information er Technology Infrastructure Library or ITIL (eye-til) es Pros – Very Large and comprehensive sR Cons- Very Large and very descriptive (what it looks like) – we needed Prescriptive (what to do) ht ig ll R © 2003 Tripwire, Inc. 11 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 11 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 12. What we did about it - What is ITIL? British Office of the Crown Government authors many well- known documents, including ISO17799 (BS7799) Created They realized Ops best practices have never been d. documented, and created ITIL (IT Infrastructure Library) and ve BS15000 to describe how world-class Ops processes Extremely widely used in Europe, but gaining acceptance in er the U.S. es HP OpenView, CA UniCenter, and IBM Tivoli are all basing their EMS products on ITIL terminology sR ComputerWorld 10/7/2002: Proctor & Gamble reports saving $125 million per year on IT cost savings (10-15% of their annual IT ht budget) ig ll R © 2003 Tripwire, Inc. 12 ,A IT Infrastructure Library (ITIL) is the only consistent and 03 comprehensive documentation of best practice for IT Service Management. Used by many hundreds of organizations around the 20 world, a whole ITIL philosophy has grown up around the guidance Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 contained within the ITIL books. te ITIL consists of a series of books giving guidance on the provision of itu quality IT services, and on the accommodation and environmental facilities needed to support IT. ITIL has been developed in st recognition of organizations' growing dependency on IT and In embodies best practices for IT Service Management. The ITIL Online : http://www.ogc.gov.uk/itil/ NS The Office of Government and Commerce (owners of ITIL) SA http://www.ccta.gov.uk/ © BS15000 / BS 15000 is the world's first standard for IT service management. The standard specifies a set of inter-related management processes, and is based heavily upon the ITIL (IT Infrastructure Library) framework. The BS15000 Site http://www.bs15000.org.uk/ Kevin Behr - Integrating Controls and Process Improvement 3 - 12 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 13. What Is “Visible Ops?” A closed-loop process methodology, aimed at increasing Operational efficiencies and increasing service levels Based on studying “best in class” enterprise operations d. Visible Ops goals ve A small subset of ITIL and BS15000 frameworks, for terminology, er processes, and future improvements es Intended to 80% of the benefits at 20% of ITIL effort A “step by step” approach to three fundamental service management sR disciplines Methodology authors: ht Gene Kim, CTO, Tripwire, Inc. ig Kevin Behr, CTO, IP Services, Inc. ll R © 2003 Tripwire, Inc. 13 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 13 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 14. What we did about it – VisibleOps Gene Kim and I studied many enterprise operations (A major trading company, The largest wireless d. carrier, a major stock exchange) and we began to ve note that these organizations had successfully er implemented and benefited from preventive and es detective control combinations. sR These controls were used to create audit points that made it easy to understand known good states. ht ig ll R © 2003 Tripwire, Inc. 14 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 14 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 15. What we did about it We also began to see that if the infrastructure state was understood early on in the problem d. management cycle the time it took to accurately ve determine the nature of the problem could er drastically be reduced. es We would be able to stop many inappropriate and sR costly over-escalations if we could rule out change as early as possible. ht ig ll R © 2003 Tripwire, Inc. 15 ,A When examining Problem resolution reports it was noticed that if 03 change could be ruled out early the time it took to close the ticket was reduced. 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Most every organization has a star quarterback in operations, and te security. Many groups thought that everything wound up escalating itu to this person because the overall environment had grown so complex that only a few people could solve what used to be simple st problems. This often results in a serious moral problem for the In brightest staff. We needed to put them in to an advisory role where they coach and consult instead of fighting fire full time on the front NS lines. The ultimate goal is to free up enough their time to turn them loose on creating additional operational efficiencies and process SA improvement. © Kevin Behr - Integrating Controls and Process Improvement 3 - 15 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 16. What we did about it Best in class operations had bounded remediation times for critical infrastructure. d. In order to have valid golden builds to accomplish ve this the change management process must have er more teeth than just the “honor system”. es These organizations also displayed the earliest sR integration of security in to the Ops lifecycle ht ig ll R © 2003 Tripwire, Inc. 16 ,A We spoke to many large IT groups and heard them complain about 03 the ineffective nature of their change management systems. One CTO even complained that his engineers were often so busy and 20 backlogged in firefighting that they didn’t feel like they had enough Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 time to even work through the Change Management processes. te This meant that changes made during firefighting were never even itu documented! st Security would be completely on their own to detect and respond to In these ad-hoc changes. They would certainly never know who made the changes let alone if they were made by friend or foe (although NS the odds are with “friend”)! SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 16 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 17. Best In Class Ops and Security Best in class Ops and Security organizations have: •Highest d. Server/sysadmin ratios ve •Lowest Mean Time To Repair (MTTR) er -Highest Mean Time es Between Failures (MTBF) sR •Earliest integration of Security into Ops lifecycle ht ig ll R © 2003 Tripwire, Inc. 17 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 17 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 18. How we did it d. ve er es sR ht ig ll R ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 18 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 19. Where Is The Leverage? Ensure that I can control Ensure that I have predictability changes in my world in the around what goes into production production environment d. ve er es sR ht ig Help me learn to do this in an automated fashion. Equip me to deal with problems ll R efficiently and feed the results back into my environment © 2003 Tripwire, Inc. 19 ,A Shift resources from fire fighting to implementing release 03 management, controls and resolution processes. 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 19 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 20. Process Area Objectives Release Management Ensure that provisioned systems match the “known, good build” Promote repeatable builds for all configurations d. Control Processes ve Ensure that changes can be traced to a valid business reason er Create a control point, where Ops, Dev, or Security can so stop a change from occurring es Control configuration drift and uncontrolled changes sR Incident Management / Resolution Decrease MTTR (mean time to resolve) outages ht Increase “culture of causality,” allowing better diagnosis and problem ig management practices ll R © 2003 Tripwire, Inc. 20 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 20 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 21. How we did it – Stabilize the patient Attack the 80%. Stop the bleeding caused by: change drive-bys ,integrity drift and changes made d. during firefighting. ve We used the combination of a preventive control er (don’t touch that fence it’s electric!) and a detective es control (why did you touch the fence at 2:11 am on sR March 3rd?) to get a handle on the state of every piece of critical infrastructure. ht ig ll R © 2003 Tripwire, Inc. 21 ,A Audit change and configuration controls 03 Tools: Tripwire, Tivoli auditing components, reports from change management tools 20 Key fingerprint = AF19 FA27 2F94footprints to DE3D F8B5 06E4 A169 4E46 Audit configuration 998D FDB5 ensure compliance te Map all changes to authorized work order itu End-of-shift audit requires Ops managers to handover data center in the same state as they received it st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 21 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 22. How we did it – Catch and Release We caught and foot-print audited all critical infrastructure configurations in the wild. d. We created golden builds for these devices. ve We tested and set bounded remediation times for er all critical infrastructure. es We determined audit frequency and methods sR necessary to support these times . ht ig ll R © 2003 Tripwire, Inc. 22 ,A Create repeatable builds 03 Tools: Tivoli Configuration Manager, Tivoli Remote Control and others (Norton Ghost, InstallShield AdminStudio, Linux 20 QuickStart, Sun Jumpstart) Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Automated provisioning of OS, configuration files, te applications, and business rules itu st Create acceptance process In Tools: Tripwire NS Ensure that provisioned servers matches “known, good build” SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 22 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 23. How we did it – Manage the Change Instituted a Change Advisory Board- Stake holders include: Security Lead ,Ops Systems Engineering d. Lead, VP of Operations , Service Desk Manager, ve Director of Network Operations, and Internal Audit. er Made weekly change management meetings es mandatory for all CAB members. sR Implemented a Change Transaction Process to make the correct path : Request For Change (RFC) ht ig ll R © 2003 Tripwire, Inc. 23 ,A Create change transaction workflow 03 Control points to document, authorize, schedule or deny, and audit change requests 20 Create change control meetings (include Security) Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Tools: Tripwire, reports from change management tools (such te as trouble ticketing system) itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 23 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 24. How we did it – Managing Change All RFC are categorized based on a 1-4 severity system. Anything above a 2 goes to the CAB for d. review and comment. ve Changes can only be administered during er maintenance windows and must be approved and es scheduled by the CAB. sR Urgent changes trigger an emergency CAB meeting. ht ig ll R © 2003 Tripwire, Inc. 24 ,A Simple Change Management Meeting Agenda: 03 20 Discussion of: Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Failed Changes, backed-out Changes, or Changes that may have te circumvented the CAB itu RFCs to be assessed by CAB members Requests For Change that have been assessed by CAB members st Change reviews In The Change Management process, including any amendments NS made to it during the period under discussion, as well as proposed Changes SA Change Management wins/accomplishments for the period under discussion, i.e. a review of the business benefits accrued by way of © the Change Management process. Review of Next Action assignments based on the above discussion. Dismiss. Meetings should have minutes taken and distributed to the CAB following the meeting. Kevin Behr - Integrating Controls and Process Improvement 3 - 24 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 25. How we did it - First Response Modified the problem management process to eliminate change as early as possible by identifying d. the assets directly involved in the ticket and auditing ve them against their configuration baseline for the last 72 hours. All changes found are attached to the er ticket. es If no changes are found the circle is widened to sR include changes made to infrastructure supporting the target systems. ht ig ll R © 2003 Tripwire, Inc. 25 ,A Create inventory of all relevant evidence around issue or outage 03 Tools: Remedy/ CA Service Desk /Tivoli Configuration Manager and Tripwire; Configuration and asset management 20 information Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 All relevant scheduled and authorized changes te Actual changes on target system itu st Formalize post-incident assessment and reconciliation of changes In Tools: Tripwire, reports from Tivoli, reports from ticketing NS system Ensure that changes are understood SA Ensure that changes are incorporated into documentation and propagated to other systems, as appropriate © Kevin Behr - Integrating Controls and Process Improvement 3 - 25 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 26. Measuring the results d. ve er es sR ht ig ll R ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 26 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 27. Measuring the results - The IMCA Based on IT Infrastructure Library (ITIL) / BS 15000 standards and the Visible Ops methodology An interview-fueled process with a standardized scoring d. methodology ve Focuses on high leverage areas: er Release Processes es Control Processes Resolution Processes sR ht ig ll R © 2003 Tripwire, Inc. 27 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 27 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 28. Measuring the results – IMCA Questions All questions are answered with a number, “from zero to four” d. 0: Strongly disagree ve 4: Strongly agree Sample questions er “Our IT department is understaffed to meet current workloads.” es “Our Service levels are spiraling downwards.” sR “We can enforce a standard build across all our devices.” “We have a library of automated build systems for all our critical ht devices.” ig “We have a clearly defined change control policy.” ll R © 2003 Tripwire, Inc. 28 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 28 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 29. Measuring the results- IMCA report d. ve er es sR ht ig ll R © 2003 Tripwire, Inc. 29 ,A This organization has no Request for Change process. Not having a 03 correct path for changes to follow assures that they will go the path of least resistance and least documentation. Creating more gasoline 20 to throw on the fire. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 29 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 30. Measuring the results- IMCA report d. ve er es sR ht ig ll R © 2003 Tripwire, Inc. 30 ,A This represents a pretty tight shop with some room for improvement. 03 They need to build on their strengths in audit and process to shore up their change transaction processes. Some detective control 20 would certainly help their ailing rollback capabilities. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 30 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 31. Reliability and Validity of IMCA Validity measures Based on IT best practices frameworks of ITIL and d. BS15000 ve Questions are scored on the integrity of three key ITIL processes er Reliability measures es All answers are subjective, and can vary from day to day sR All answers do not have any quantitative significance (i.e., arithmetic operations cannot be done on the answers) ht ig ll R © 2003 Tripwire, Inc. 31 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 31 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 32. Measuring the results- Other Metrics Number of changes made in data center Number of changes that map to authorized business d. reason ve Number of times change management system was er circumvented es Percent of outages caused by change sR Number of changes that obsolete repeatable builds Ops “clean shift handover” success rate ht ig ll R © 2003 Tripwire, Inc. 32 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 32 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 33. Measuring the results- Other Metrics Time to provision known, good build Number of fixes/turns to match known, good build d. Percentage of deployed systems that match known, ve good build er Percentage of deployed systems that have security es sign-off sR ht ig ll R © 2003 Tripwire, Inc. 33 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 33 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 34. Measuring the results- Other Metrics Outage and issue Mean Time To Repair (MTTR) Aggregate outage downtime d. Number of inappropriate escalations ve Increased change success rate er es Increased systemic Mean Time Between Failure sR Smile to frown ration on Ops, Security and Audit staff ht ig ll R © 2003 Tripwire, Inc. 34 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 34 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 35. What you have built d. ve er es sR ht ig ll R ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 35 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 36. What you have built - You Can Now: Enforce change management process integrity Decreased firefighting and increase proactive controls d. Avert revenue loss due to unplanned outages ve Decrease Mean Time To Repair by efficient problem er management processes es Create hard organizational change boundaries for sR accountability and responsibility Establish a beach head for operational best ht practices, allowing future process improvement ig ll R © 2003 Tripwire, Inc. 36 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 36 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 37. What you have built You now can measure and articulate the business benefit of process improvement efforts d. You can target weak areas for quick wins ve Regain the confidence of the business by showing er off your new and improving metrics es Fend off IT Budget Jenga with your CFO and CEO sR by showing where money needs to be invested and why. ht ig ll R © 2003 Tripwire, Inc. 37 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 37 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved
  • 38. Contact Information Gene Kim, CTO, Tripwire, Inc. genek@tripwire.com d. Kevin Behr, CTO, IP Services, Inc. ve kevin.behr@tcpipservices.com er es sR ht ig ll R © 2003 Tripwire, Inc. 38 ,A This space left intentionally blank 03 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 te itu st In NS SA © Kevin Behr - Integrating Controls and Process Improvement 3 - 38 A © SANS Institute 2003 No copying, electronic forwarding or posting All Rights Reserved