FISMA: Difference between revisions
Jump to navigation
Jump to search
Line 24: | Line 24: | ||
= Web security = | = Web security = | ||
* [https://www.invicti.com/ Invicti] security scan. [https://www.invicti.com/web-vulnerability-scanner/manuals/installing/installing-invicti-desktop/ Netsparker] | * [https://www.invicti.com/ Invicti] security scan. [https://www.invicti.com/web-vulnerability-scanner/manuals/installing/installing-invicti-desktop/ Netsparker] | ||
** missing X-Frame-Options header which means that this website could be at risk of a clickjacking attack. Remedy: Sending the proper X-Frame-Options in HTTP response headers that instruct the browser to not allow framing from other domains. | |||
** (Apache & SSH) Version Disclosure from http response. Configure your web server to prevent information leakage from the SERVER header of its HTTP response. | |||
** Weak Ciphers Enabled. Attackers might decrypt SSL traffic between your server and your visitors. For Apache, you should modify the SSLCipherSuite directive in the httpd.conf. ''' SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4''' | |||
= NIST-NVD = | = NIST-NVD = |
Revision as of 13:13, 18 August 2022
Federal Information Security Modernization Act (FISMA)
Vocabulary
- General Accountability Office (GAO) audit
- Authorization to Operate (ATO)
- Risk Management Framework (RMF)
A complete FISMA package includes at least the following artifacts:
- FIPS-199 System Categorization
- E-Authentication Threshold or Risk Analysis (eTA/eRA)
- Business Impact Assessment (BIA) (may be documented in Contingency Plan)
- System Security Plan (SSP)
- Privacy Impact Assessment (PIA)
- Interconnection Agreements (e.g., ISA and/or MOUs), if applicable
- Configuration Management Plan (CMP)
- Contingency Plan (CP)
- Contingency Plan Exercise Report (if Moderate or High impact FIPS rated)
- Security Assessment Plan (SAP)
- Security Assessment Report
- Plan of Action and Milestones (POA&M)
- ATO Letter signed by Federal Authorizing Official (AO)
- AC/IA (access control/identify authentication) SOP
Web security
- Invicti security scan. Netsparker
- missing X-Frame-Options header which means that this website could be at risk of a clickjacking attack. Remedy: Sending the proper X-Frame-Options in HTTP response headers that instruct the browser to not allow framing from other domains.
- (Apache & SSH) Version Disclosure from http response. Configure your web server to prevent information leakage from the SERVER header of its HTTP response.
- Weak Ciphers Enabled. Attackers might decrypt SSL traffic between your server and your visitors. For Apache, you should modify the SSLCipherSuite directive in the httpd.conf. SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4
NIST-NVD
National Vulnerability Database https://nvd.nist.gov/vuln, Full Listing
Apache, nginx, ssl versions
- determine the OpenSSL version
openssl version
- How To Check the Version of Apache? (In 3 Ways)
httpd -v # or /usr/local/apache/bin/httpd -v
- Use helper.sh to Look Up Version Info
/opt/nginx-controller/helper.sh version # OR nginx -v # OR /opt/nginx/sbin/nginx -v
Docker
FIPS Certified Containerization: The Rise of the Enterprise Container Platform