Implementation Details |
Maintaining currency by periodically reviewing public and vendor information
sources
|
|
|
|
There are a rich set of information sources available to
you for staying current on emerging intruder trends, attack scenarios,
security vulnerabilities, methods for their detection, and guidance to
address them. You need to ensure that you set aside time on a daily basis
to review and, potentially, take action based on the knowledge and guidance
provided in these information sources. |
|
General security information |
Both broad and detailed information on a wide range of information,
computer, and network security topics can be found at www.cert.org/other_sources/other_teams.html
and include the following:
-
AUSCERT Australian
Computer Emergency Response Team
-
CERT/CC Computer
Emergency Response Team Coordination Center
-
CIAC
Computer Incident Advisory Capability
-
COAST
Computer Operations Audit and Security Technology
-
DFNCERT German
Computer Emergency Response Team
-
FIRST
Forum of Incident Response and Security Teams
-
SANS
SANS Institute
-
USENIX
Advanced Computing Systems Association
-
Security Reference
Index maintained by Telstra
|
|
Security fixes and patches |
Monitor security fixes and patches that are produced by
the vendors of your equipment and obtain and install all that apply.
|
|
Advisories |
Subscribe to advisories that are issued by various security
indicent response teams and update your systems against those threats that
apply to your site's technology. Sites that publish such advisories
include:
|
|
Mailing lists and USENET newsgroups |
Read relevant mailing
lists and USENET newsgroups to keep up to date with the latest information
being shared by fellow administrators. |
|
Security tools |
It is important to regularly review sites that contain a
wide range of useful and publicly available security tools. These
include:
See also the security improvement practice Identify
and install tools that aid in detecting signs of intrusion and the
supporting implementation Identifying
tools that aid in detecting signs of intrusion. |