management decision? 5) Is there any simple and
powerful way to follow for configuration
management?
3 XML-BASED RESOURCE
INFORMATION DESCRIPTION
In this paper, we propose an XML-based
representation of gathered specification.
<?xml version="1.0" encoding="UTF-8"?>
<CERT id="test1">
<header>
<notice id="2003-A-0014"></notice>
<topic>Multiple Vulnerabilities in Microsoft IE</topic>
</header>
<reference targets="">
<link1>Microsoft Advisory MS03-040</link1>
<url1>http://www.microsoft.com/technet/security</url1>
<link2>CERT CC</link2>
<url2>http://www.kb.cert.org/vuls/id/865940</url2>
<link3>Security Focus</link3>
<url3>http://www.securityfocus.com/advisories/5725</url3>
</reference>
<assessment>
<priorit y>High</priori ty>
<release><date><year>2003</ year><month>October</month>
<day>16</day></ date></release>
<acknowledgement suspense=""><date><year>2003</year>
<month>Oct ober</mont h><day>21</ day></date>
</acknowledgement>
<compliance suspense=""><date><year>2003</year>
<month>December </month><day>15</ day>
</date></ compliance>
</assessment>
<summary>
<para>This IAVA notice addresses two critical ...</para>
</s ummary>
<technical overview="">
<para>A change has been made to the way IE....</para>
</technical>
<vulnerable systems="">
<operating system="">
<os1>window XP Professional</os1>
<os2>window XP Home Edition</os2>
<os3>window Millenium</os3>
<os4>window 2000</os4>
<os5>window 98</os5>
<os6>window NT 4.0 SP6A</os6>
<os7>window server 2003</os7>
</operating>
<database/>
<web application="">
<ie 1>IE5.01</ie 1>
<ie 2>IE5.5</ie2>
<ie 3>IE6.0</ie3>
<ie4>IE6.0 for window server 2003</ie4>
</web>
<language/>
<tools/>
<etc/>
</vulnerable>
<actions compliance="">patch for IE(828750)</actions>
<attached>MS03-040 information</attached>
</ CERT>
<?xml version="1.0" encoding="UTF-8"?>
<ECP id="test2">
<header >
<notice id=""></notice>
<title>ECP Initiation Submittal Form</title>
</header>
<information A ="">
<Date Submitted="">11/17/03</Date>
<Proposed Title="">CERT IAVB </Proposed>
<Description><para>CERT ...</para></Description>
<Reason forchange="">Vulnerability..</Reason>
<Proposed Priority="">3</Proposed>
<IM critical="">No</IM>
<Delivery Order="">Contract Number..</Delivery>
<Information System="">B</Information>
<Other System="">None</Other>
<Type>Sustainment</Type>
<Phas e>3</Phase>
<Changed Code="">No</Changed>
<COTS Used="">No</COTS>
<Table Updated="">No</Table>
<Hardware Changed="">No</Hardware>
<Interface Expected="">No</Interface>
<Migration Potential="">No</Migration>
<Relevant ECP="">No</Relevant>
</information>
<Initiator>
<PO><Name>John Smith</Name>
<Phone>123-345-6789</Phone>
<Email>John. Smith@agency. mil</Email>
<Organization>Agency</Organization>
</PO>
<Technical POC=""><Name>Noah Yoo</Name>
<Phone>987-654-4321</Phone>
<Email >Noah.Yoo@company.com</Email>
<Organization>Company</Organization>
</Technical>
</Initiator>
<Supporting Documentattached="">
<List1>CERT-IAVB 2003-B-0007</List1>
<List2>MS Security Bulletin MS03-041</List2>
<List3>Vulnerability Notice 838572</List3>
<List4>CERT Advisory CA-2003-27</List4>
<List5>Developer Test Plan</List5>
<List6>Developer Test Result</List6>
<List7>Engineering Analysis Report</List7>
<List8>Developmental Test Plan and Result</List8>
</Supporting>
<IA Impacts="">
<Model Security="">No</Model>
<Posture Security="">Yes</Posture>
<Standard>No</ Standa rd>
<PnP>No</PnP>
<SSAA>No</ SSAA>
<HIPAA>No</HIPAA>
</I A>
</ECP>
<?xml version="1.0" encoding="UTF-8"?>
<CERT id="test1">
<header>
<notice id="2003-A-0014"></notice>
<topic>Multiple Vulnerabilities in Microsoft IE</topic>
</header>
<reference targets="">
<link1>Microsoft Advisory MS03-040</link1>
<url1>http://www.microsoft.com/technet/security</url1>
<link2>CERT CC</link2>
<url2>http://www.kb.cert.org/vuls/id/865940</url2>
<link3>Security Focus</link3>
<url3>http://www.securityfocus.com/advisories/5725</url3>
</reference>
<assessment>
<priorit y>High</priori ty>
<release><date><year>2003</ year><month>October</month>
<day>16</day></ date></release>
<acknowledgement suspense=""><date><year>2003</year>
<month>Oct ober</mont h><day>21</ day></date>
</acknowledgement>
<compliance suspense=""><date><year>2003</year>
<month>December </month><day>15</ day>
</date></ compliance>
</assessment>
<summary>
<para>This IAVA notice addresses two critical ...</para>
</s ummary>
<technical overview="">
<para>A change has been made to the way IE....</para>
</technical>
<vulnerable systems="">
<operating system="">
<os1>window XP Professional</os1>
<os2>window XP Home Edition</os2>
<os3>window Millenium</os3>
<os4>window 2000</os4>
<os5>window 98</os5>
<os6>window NT 4.0 SP6A</os6>
<os7>window server 2003</os7>
</operating>
<database/>
<web application="">
<ie 1>IE5.01</ie 1>
<ie 2>IE5.5</ie2>
<ie 3>IE6.0</ie3>
<ie4>IE6.0 for window server 2003</ie4>
</web>
<language/>
<tools/>
<etc/>
</vulnerable>
<actions compliance="">patch for IE(828750)</actions>
<attached>MS03-040 information</attached>
</ CERT>
<?xml version="1.0" encoding="UTF-8"?>
<ECP id="test2">
<header >
<notice id=""></notice>
<title>ECP Initiation Submittal Form</title>
</header>
<information A ="">
<Date Submitted="">11/17/03</Date>
<Proposed Title="">CERT IAVB </Proposed>
<Description><para>CERT ...</para></Description>
<Reason forchange="">Vulnerability..</Reason>
<Proposed Priority="">3</Proposed>
<IM critical="">No</IM>
<Delivery Order="">Contract Number..</Delivery>
<Information System="">B</Information>
<Other System="">None</Other>
<Type>Sustainment</Type>
<Phas e>3</Phase>
<Changed Code="">No</Changed>
<COTS Used="">No</COTS>
<Table Updated="">No</Table>
<Hardware Changed="">No</Hardware>
<Interface Expected="">No</Interface>
<Migration Potential="">No</Migration>
<Relevant ECP="">No</Relevant>
</information>
<Initiator>
<PO><Name>John Smith</Name>
<Phone>123-345-6789</Phone>
<Email>John. Smith@agency. mil</Email>
<Organization>Agency</Organization>
</PO>
<Technical POC=""><Name>Noah Yoo</Name>
<Phone>987-654-4321</Phone>
<Email >Noah.Yoo@company.com</Email>
<Organization>Company</Organization>
</Technical>
</Initiator>
<Supporting Documentattached="">
<List1>CERT-IAVB 2003-B-0007</List1>
<List2>MS Security Bulletin MS03-041</List2>
<List3>Vulnerability Notice 838572</List3>
<List4>CERT Advisory CA-2003-27</List4>
<List5>Developer Test Plan</List5>
<List6>Developer Test Result</List6>
<List7>Engineering Analysis Report</List7>
<List8>Developmental Test Plan and Result</List8>
</Supporting>
<IA Impacts="">
<Model Security="">No</Model>
<Posture Security="">Yes</Posture>
<Standard>No</ Standa rd>
<PnP>No</PnP>
<SSAA>No</ SSAA>
<HIPAA>No</HIPAA>
</I A>
</ECP>
Figure 3: Vulnerability Notice XML and ECP XML for
CM
Figure 3 is an example of demonstrating a
specification described with XML format.
In the
column, an example of IA vulnerability information
is given, and the ECP submittal form based on XML
representation is given in the right column. Using
proposed lightweight XML representation; we
generate a simple, powerful, and customized model
for enhancing the model for configuration
management for mitigating IA vulnerability.
4 RESOURCE-AWARE
CONFIGURATION
MANAGEMENT STEPS
We can observe each step smoothly processed based
on XML DOM tree(W3C, 2000). Strengthening the
security model and security posture is possible using
a proposed model. Furthermore, we upgrade and
customize system resource information as the
resource ontology. The full version of this research
had detailed information about resource information.
If we use updating resource information, it is
possible for us to describe the security accreditation
boundary more clearly and realistically by applying
the workstation level information.
..
..
..
..
..
..
..
IAVN
First Analysis
System
Engineer
System
Administrator
..
ECP* Process
..
..
..
..
..
..
..
..
Second Analysis
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
SE SA
IA
..
..
..
..
..
..
CM** Approval
System
Administrator
Deployment &
Troubleshooting
Security
Patch
Installation
To Sites
Resource Ontology
Remote SPM
..
..
..
..
..
..
..
..
..
..
..
..
..
..
W /S-level SPM
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
..
W1-SPM W2-SPM
Wn-SPM
Rem ote Sites
.
.
.
.
.
.
.
.
……
** Configuration Management
* Engineering Change Proposal
Figure 4: XML-Based CM Steps
Figure 4 is a graph based on architecture design
similar to that shown previously. The root node is
described as a monitor and the hierarchical
information as a tree. A leaf is a user level or
changing status. In other words, using DOM tree
representation, an information entity holding
vulnerability information and changing information
on configuration management is represented as the
same model.
Through comparing the previous DOM tree and
current version, we recognize which elements of the
security profile information are changed. As an
input, given user security user information and
security log files are used. While comparing the
ICEIS 2005 - INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION
520