FISMA: Difference between revisions

From 太極
Jump to navigation Jump to search
Line 24: Line 24:
= Web security =
= Web security =
* [https://www.invicti.com/ Invicti] security scan. [https://www.invicti.com/web-vulnerability-scanner/manuals/installing/installing-invicti-desktop/ Netsparker]
* [https://www.invicti.com/ Invicti] security scan. [https://www.invicti.com/web-vulnerability-scanner/manuals/installing/installing-invicti-desktop/ Netsparker]
** missing X-Frame-Options header which means that this website could be at risk of a clickjacking attack. Remedy: Sending the proper X-Frame-Options in HTTP response headers that instruct the browser to not allow framing from other domains.
** (Apache & SSH) Version Disclosure from http response. Configure your web server to prevent information leakage from the SERVER header of its HTTP response.
** Weak Ciphers Enabled. Attackers might decrypt SSL traffic between your server and your visitors. For Apache, you should modify the SSLCipherSuite directive in the httpd.conf. ''' SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4'''


= NIST-NVD =
= NIST-NVD =

Revision as of 13:13, 18 August 2022

Federal Information Security Modernization Act (FISMA)

Vocabulary

  • General Accountability Office (GAO) audit
  • Authorization to Operate (ATO)
  • Risk Management Framework (RMF)

A complete FISMA package includes at least the following artifacts:

  • FIPS-199 System Categorization
  • E-Authentication Threshold or Risk Analysis (eTA/eRA)
  • Business Impact Assessment (BIA) (may be documented in Contingency Plan)
  • System Security Plan (SSP)
  • Privacy Impact Assessment (PIA)
  • Interconnection Agreements (e.g., ISA and/or MOUs), if applicable
  • Configuration Management Plan (CMP)
  • Contingency Plan (CP)
  • Contingency Plan Exercise Report (if Moderate or High impact FIPS rated)
  • Security Assessment Plan (SAP)
  • Security Assessment Report
  • Plan of Action and Milestones (POA&M)
  • ATO Letter signed by Federal Authorizing Official (AO)
  • AC/IA (access control/identify authentication) SOP

Web security

  • Invicti security scan. Netsparker
    • missing X-Frame-Options header which means that this website could be at risk of a clickjacking attack. Remedy: Sending the proper X-Frame-Options in HTTP response headers that instruct the browser to not allow framing from other domains.
    • (Apache & SSH) Version Disclosure from http response. Configure your web server to prevent information leakage from the SERVER header of its HTTP response.
    • Weak Ciphers Enabled. Attackers might decrypt SSL traffic between your server and your visitors. For Apache, you should modify the SSLCipherSuite directive in the httpd.conf. SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4

NIST-NVD

National Vulnerability Database https://nvd.nist.gov/vuln, Full Listing

Apache, nginx, ssl versions

Docker

FIPS Certified Containerization: The Rise of the Enterprise Container Platform