The internet is full of data… and full of data about data (metadata). It is presented to us in many ways. There are tables and lists and graphs (Oh My!), all just a mouse-click away (or maybe two, or seven, or maybe you need pages to get through it). However, there are many reasons you may want your data in a different format. Perhaps you need a new way to gather/present data for accessibility reasons, or perhaps you simply need to be able to save it offline. Maybe you want to send a memo to your boss (or professor) showing how many people have cloned your GitHub repo (or, in the case of my demo, we’ll demonstrate how many people have starred it). Maybe your organization requires a listing of trouble tickets that requires some field manipulation that the GUI itself cannot perform. Or maybe you want to leave your job as a software developer and become a social media specialist, so you’d like to quantify your twitter popularity in a spreadsheet… So, let’s learn about APIs!
If you’ve ever had to work in an IT shop bound by regulations and policies,
you know how much of a hassle it can be to integrate new infrastructure and
application components, while maintaining a compliant posture.
2018 has barely begun and we’ve already been hit with significant bad news about cyber vulnerabilities. Among others already disclosed during the new calendar year, both Intel and VMware have announced that major cyber flaws have been discovered in their products. And, of course, attempts to fix these issues are having negative impacts on some common anti-virus products.
This is certainly not unique to these tech giants since barely a week goes by without some significant cybersecurity flaw or breach being uncovered. It’s safe to say that these disturbing reports will not be coming to an end anytime soon.
Although it may sometimes feel like it, this doesn’t mean that we should all throw our hands up about how hopeless the cybersecurity situation has become. We can only play the hands we’ve been dealt, and that requires continued efforts at locking down our systems with the many powerful tools we have at our disposal.
Cyber Hygiene Best Practices
Whichever tools you determine are appropriate for your security needs, none will be effective unless one first follows sound cyber hygiene practices. Among the most important of these is ensuring your underlying system adheres to the latest security best practices and is, at the very least, compliant with industry standards and government cybersecurity regulations. Breaches that are advanced by either willful or negligent disregard for these universally acknowledged best practices can be hard to explain – or forgive.
While best practice “table stakes” can be overwhelmingly voluminous and complex to implement and maintain, one does not have to go it alone. In many cases, it’s now possible to transition an existing DevOps platform to a best practices DevSecOps approach, then maintain systems compliance via automated self-healing Continuous Diagnostics and Mitigation (CDM) routines.
Open Source Help
A powerful Open Source offering now available to help address this is known as SIMP (Systems Integrity Management Platform). SIMP was originally developed within the US Intelligence Community to enhance their own ATO (Authority to Operate, federal-speak for C&A) and compliance efforts and is now available for anyone to leverage via GitHub. It only seems fair that we can take advantage of SIMP since it was our tax dollars that funded its development!
Currently riding on the open source DevOps automation technology known as Puppet, SIMP continually scans an environment (in either a development and/or production phase) and provides current system status against a range of cybersecurity benchmarks. Among these are NIST 800-53, NIST 800-171, FIPS 140-2, HIPAA, SOX, PCI-DSS, DISA STIG and others. SIMP can operate within either an on-prem and/or cloud environment and, should a vulnerability be found, can automatically apply remediation actions to immediately correct the flaw, or simply report this information back for further study and action.
With SIMP’s ability to enhance the C&A process, as well as help ensure systems remain compliant once deployed, an organization’s human IT assets can confidently turn their focus to other urgent cyber issues that require attention.
For more information on this Open Source tool, visit the SIMP project website at simp-project.com, or download it at github.com/NationalSecurityAgency/SIMP.