Automated Security Configuration Checklist for a Cisco IPsec VPN Router using SCAP 1.2

被引:0
|
作者
Peterside, Gabriel Biedima [1 ]
Zavarsky, Pavol [1 ]
Butakov, Sergey [1 ]
机构
[1] Concordia Univ Edmonton, Informat Syst Secur Management, Edmonton, AB, Canada
关键词
SCAP; Security Automation; IPsec VPN;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For large enterprises running many different operating systems, applications, and multi-vendor devices, the task of reviewing the security state of a broad range of devices and business areas in order to either comply with security requirements from regulations or detect risks such as misconfigured devices, out-of-date software, etc., is time-consuming, error-prone, and expensive. Although humans are important in the security assessment process, they are unable to keep up with the task, and may introduce inconsistencies which could further make organizations vulnerable to security breaches. Security automation provides a solution to this challenges. In this paper, a common security automation protocol, Security Content Automation Protocol (SCAP) version 1.2, was leveraged to develop an automated secure configuration checklist which can be used by security professionals to rapidly and consistently audit network edge devices such as a Cisco IPsec VPN router to ensure secure configuration per the baseline.
引用
收藏
页码:355 / 360
页数:6
相关论文
共 6 条
  • [1] SCAP Benchmark for Cisco Router Security Configuration Compliance
    Hlyne, Chit Nyi Nyi
    Zavarsky, Pavol
    Butakov, Sergey
    [J]. 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 270 - 276
  • [2] Automated Security Configuration Checklist for Apple iOS Devices using SCAP v1.2
    Adetunji, Akinbobola Oluwaseun
    Butakov, Sergey
    Zavarsky, Pavol
    [J]. 2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 120 - 124
  • [3] Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator
    Kurniawan, Dwi Ely
    Arif, Hamdani
    Nelmiawati, N.
    Tohari, Ahmad Hamim
    Fani, Maidel
    [J]. 1ST INTERNATIONAL CONFERENCE ON ADVANCE AND SCIENTIFIC INNOVATION, 2019, 1175
  • [4] ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies
    Aslam, Mudassar
    Gehrmann, Christian
    Bjorkman, Mats
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 (28-39) : 28 - 39
  • [5] Implementing High Performance VPN Router using Cavium's CN2560 Security Processor
    Lee, Sang Su
    Lee, Sang Woo
    Jeon, Yong Sung
    Kim, Ki Young
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 9, 2005, 9 : 137 - 139
  • [6] Automated Identification of Security-Relevant Configuration Settings Using NLP
    Stockle, Patrick
    Wasserer, Theresa
    Grobauer, Bernd
    Pretschner, Alexander
    [J]. PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,