Security Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. In many cases, so-called security-configuration guides are used as a basis for security hardening. These guides describe secure configuration settings for components such as operating systems and standard applications. Rigorous testing of security-configuration guides and automated mechanisms for their implementation and validation are necessary since erroneous implementations or checks of hardening guides may severely impact systems' security and functionality. At Siemens, centrally maintained security-configuration guides carry machine-readable information specifying both the implementation and validation of each required configuration step. The guides are maintained within git repositories; automated pipelines generate the artifacts for implementation and checking, e.g., PowerShell scripts for Windows, and carry out testing of these artifacts on AWS images. This paper describes our experiences with our DevOps-inspired approach for authoring, maintaining, and testing security-configuration guides. We want to share these experiences to help other organizations with their security hardening and, thus, increase their systems' security.
翻译:安全强化是信息技术系统配置过程,以确保系统部件及其处理或储存的数据的安全。在许多情况下,所谓的安全配置指南被用作安全强化的基础。这些指南描述了操作系统和标准应用程序等部件的安全配置设置。对安全配置指南及其实施和验证自动化机制进行严格测试是必要的,因为对强化指南的错误实施或检查可能会严重影响系统的安全和功能。在西门子,中央维护的安全配置指南载有机器可读信息,具体说明每个所需配置步骤的实施和验证。指南保存在Git仓库内;自动管道生成用于实施和检查的文物,例如Windows的PowerShell脚本,并在AWS图像上对这些文物进行测试。本文描述了我们用DevOps启发的方法编写、维护、测试安全配置指南的经验。我们要分享这些经验,以帮助其他组织加强安全,从而加强其系统的安全。