02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

promote “higher education in information assurance” and produce “a growing number <strong>of</strong> pr<strong>of</strong>essionals<br />

with IA expertise in various disciplines.” 80<br />

A relatively new development in incident handling training is <strong>the</strong> certification <strong>of</strong> CSIRT incident<br />

handling staff or teams. In 2000, <strong>the</strong> SANS Institute 81 began <strong>of</strong>fering individual certifications<br />

for Global Information Assurance Certification (GIAC) 82 Certified <strong>Incident</strong> Handler<br />

(GCIH). 83 And in 2003, <strong>the</strong> CERT Coordination Center began <strong>of</strong>fering <strong>the</strong> CERT-Certified<br />

<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> Handler certification. 84<br />

The U.S. Department <strong>of</strong> Defense has mandated that all <strong>Computer</strong> Network Defense Service<br />

Providers (CNDSP) be certified and accredited in order to continue providing security services<br />

to <strong>the</strong>ir subscribers. The CNDSP certification and accreditation process is means by<br />

which providers can become certified according to <strong>the</strong> guidelines identified in DoD Directive<br />

8530.1 “<strong>Computer</strong> Network Defense” and DoD Instruction 8530.2 “Support to <strong>Computer</strong><br />

Network Defense.” 85 The Certification and Accreditation process is an evaluation <strong>of</strong> <strong>the</strong> protect,<br />

detect, respond, and sustain capabilities <strong>of</strong> <strong>the</strong> CND service provider, as well as an<br />

evaluation <strong>of</strong> <strong>the</strong> ability <strong>of</strong> <strong>the</strong> provider to deliver <strong>the</strong>se services to its subscribers.<br />

Previous to <strong>the</strong>se more specialized incident handling certifications, more generalized certifications<br />

in <strong>the</strong> field <strong>of</strong> information security have been available to individuals. The most recognized<br />

is <strong>the</strong> Certified Information Systems <strong>Security</strong> Pr<strong>of</strong>essional (CISSP), 86 <strong>of</strong>fered<br />

through “(ISC) 2 ” <strong>the</strong> International Information Systems <strong>Security</strong> Certifications Consortium,<br />

Inc. 87 The CISSP Certification examination covers a working knowledge <strong>of</strong> ten domains <strong>of</strong><br />

information security that comprise <strong>the</strong> Common Body <strong>of</strong> Knowledge (CMK). 88 Some <strong>of</strong> <strong>the</strong><br />

o<strong>the</strong>r types <strong>of</strong> information security certifications that are recognized are listed in Appendix C.<br />

In reviewing <strong>the</strong> results <strong>of</strong> <strong>the</strong> CSIRT Organizational Survey, <strong>the</strong>re was no standard type <strong>of</strong><br />

certification or degree required for incident handling staff by <strong>the</strong> teams participating in <strong>the</strong><br />

80<br />

81<br />

82<br />

83<br />

84<br />

85<br />

86<br />

87<br />

88<br />

<br />

<br />

<br />

<br />

<br />

Policy documents are available to .mil sites via links on or<br />

; access requires a DoD PKI Certificate.<br />

<br />

<br />

. The ten domains <strong>of</strong> <strong>the</strong> CBK are <strong>Security</strong><br />

Management <strong>Practice</strong>s; <strong>Security</strong> Architecture and Models; Access Control Systems & Methodology;<br />

Application Development <strong>Security</strong>; Operations <strong>Security</strong>; Physical <strong>Security</strong>; Cryptography;<br />

Telecommunications, Network, & Internet <strong>Security</strong>; Business Continuity Planning; and Law, Investigations,<br />

& Ethics.<br />

80 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!