Host Based Security System: Difference between revisions

Content deleted Content added
No edit summary
m clean up spacing around commas and other punctuation fixes, replaced: ,h → , h (2)
 
(32 intermediate revisions by 26 users not shown)
Line 1:
{{Short description|Department of Defense suite of software applications}}
{{OrphanUpdate|date=June 20112019}}
 
The '''Host Based Security System''' ('''HBSS''') is the official name given to the United States [[United States Department of Defense|Department of Defense]] (DOD) [[Commercialcommercial off-the-shelf|commercial-off-the-shelf]] (COTS) suite of software applications used within the DOD to monitor, detect, and counter attacks againstdefend the DOD computer networks and systems. The [[Enterprise-wide Information Assurance and computer Network Defense Solutions Steering Group]] (ESSG) sponsored the acquisition of the HBSS System for use within the DOD Enterprise Network. HBSS is deployed on both the [[NIPRNet|Non-Classified Internet Protocol Routed Network]] (NIPRNet) and [[SIPRNet|Secret Internet Protocol Routed Network]] (SIPRNet) networks, with priority given to installing it on the NIPRNet. HBSS is based on [[McAfee|McAfee, Inc]]'s [[ePolicy Orchestrator]] (ePO) and other McAfee point product security applications such as [[Host Intrusion Prevention System]] (HIPS).
 
== History ==
Seeing the need to supply a comprehensive, department-wide security suite of tools for DOD System Administrators, the ESSG started to gather requirements for the formation of a host-based security system in the summer of 2005. In March 2006, [[BAE Systems]] and McAfee were awarded a contract to supply an automated host-based security system to the department. After the award, 22 pilot sites were identified to receive the first deployments of HBSS.<ref>''{{Cite web|date=2010-06-19|title=Host Based Security System'', (HBSS)|url=http://www.disa.mil/hbss/index.html, 3|access-date=2021-08-18|archive-url=https:/13/web.archive.org/web/20100619104318/http://www.disa.mil/hbss/index.html|archive-date=2010-06-19}}</ref> During the pilot roll out, DOD System Administrators around the world were identified and trained on using the HBSS software in preparation for software deployment across DOD.
 
On October 9, 2007, the [[Joint Task Force for Global Network Operations]] (JTF-GNO) released [[Communications Tasking Order]] (CTO) 07-12 (''Deployment of Host Based Security System (HBSS)'') mandating the deployment of HBSS on all Combatant Command, Service and Agency (CC/S/A) networks within DOD with the completion date by the 3rd quarter of 2008.<ref>''Host{{Cite Based Security System HBSS)'',web|date=2010-12-05|title=infoexchange|url=http://www.afcea.org/events/landwarnet/08/infoexchange.asp, 3|access-date=2021-08-18|archive-url=https:/13/web.archive.org/web/20101205013909/http://www.afcea.org/events/landwarnet/08/infoexchange.asp|archive-date=2010-12-05}}</ref> The release of this CTO brought HBSS to the attention of all major department heads and CC/S/A's, providing the ESSG with the necessary authority to enforce its deployment. Agencies not willing to comply with the CTO now risked being disconnected from the DOD [[Global Information Grid]] (GIG) for any lack of compliance.
 
Lessons learned from the pilot deployments provided valuable insight to the HBSS program, eventually leading to the [[Defense Information Systems Agency]] (DISA) supplying both pre-loaded HBSS hardware as well as providing an HBSS software image that could be loaded on compliant hardware platforms. This proved to be invaluable to easing the deployment task on the newly trained HBSS System Administrators and provided a consistent department-wide software baseline. DISA further provided step-by-step documentation for completing an HBSS baseline creation from a freshly installed operating system. The lessons learned from the NIPRNet deployments simplified the process of deploying HBSS on the SIPRNet.
Line 15:
* March 27, 2007: The ESSG approved the HBSS for full-scale deployment throughout the DoD enterprise
* October 9, 2007: The [[Joint Task Force for Global Network Operations|JTF-GNO]] releases CTO 07-12
* November, 2009: The [[United States Air Force|Air Force]] awarded [[Northrop Grumman|Northrop Grumman, Inc.]] with the deployment of HBSS on the SIPRNet<ref>Henry Kenyon, ''Northrop Grumman Wins Air Force SIPRNET Contract'', http://www.afcea.org/signal/signalscape/index.php/2009/11/northrop-grumman-wins-air-force-siprnet-contract/, 3/13/2010 {{Dead link|date=August 2021}}</ref>
 
== HBSS components ==
Throughout its lifetime, HBSS has undergone several major baseline updates as well as minor maintenance releases. The first major release of HBSS was known as Baseline 1.0 and contained the McAfee ePolicy orchestrator engine, HIPS, [[software compliance profiler]] (SCP), [[rogue system detection]] (RSD), [[asset baseline manager]] (ABM), and assets software. As new releases were introduced, these software products have evolved, had new products added, and in some cases, been completely replaced for different products.
 
As of January, 2011, HBSS is currently at Baseline 4.5, Maintenance Release 2.0 (MR2). MR2 contains the following software:
 
=== HBSS Baseline 4.5 MR2 components ===
As of January, 2011, HBSS is currently at Baseline 4.5, Maintenance Release 2.0 (MR2). MR2 contains the following software:
{| class="wikitable collapsible" style="width:100%;"
|-
! As of January, 2011, HBSS is currently at Baseline 4.5, Maintenance Release 2.0 (MR2). MR2 contains the following software:
|-
| <div style="height: 500px;overflow:-moz-scrollbars-vertical;overflow-y:auto;">
 
==== Microsoft products ====
{| class=redtable border=1wikitable
|-
! Software application
Line 58 ⟶ 52:
 
==== Optional products/components ====
{| class=redtable border=1wikitable
|-
! Software application
Line 64 ⟶ 58:
|-
| Symantec SEP/SAV integration extension
| 1.3, plugin 1.2666
|-
| McAfee VirusScan Enterprise
| 8.7.0.570 (evaluation)
|-
| McAfee VirusScan Enterprise 8.7 extension
| 8.7.0.195
|-
| McAfee VirusScan report extension
| 1.1.0.154
|}
 
==== SIPRNet-only products/components ====
{| class=redtable border=1wikitable
|-
! Software application
Line 87 ⟶ 81:
| Rollup Extender
| 1.2.8
|}
</div>
|}
 
== How HBSS works ==
The heart of the HBSS is the McAfee ePolicy orchestrator (ePO) management engine. The engineMcAfee istools are responsible for:
* Providing a consistent front-end to the point products
* Consolidating point product data for analysis
Line 100 ⟶ 92:
 
<!----==== Security compliance profiler ====
The security compliance profiler (SCP) was one of the original products provided in HBSS Baseline 1.0. It was removed from HBSS as of Baseline 2.0 and replaced with the policy auditor component. The SCP is an integral component of ePO that provides enterprise-wide reporting on security patches, including the Microsoft® operating systems.<ref>'''System Compliance Profiler''', http://www.mcafee.com/us/enterprise/products/promos/system_security_management/epolicy_orchestrator/compliance_profiler.html, 3/14/2010</ref>
---->
 
Line 125 ⟶ 117:
 
==== Device control module/data loss prevention ====
The DCM component of HBSS was introduced in HBSS Baseline 2.0 specifically to address the use of USB devices on DOD networks. JTF-GNO CTO 09-xxx, ''removable flash media device implementation within and between Department of Defense (DOD) networks'' was released in March, 2009 and allowed the use of USB removable media, provided it meets all of the conditions stated within the CTO. One of these conditions requires the use of HBSS with the DCM module installed and configured to manage the USB devices attached to the system.<ref>Tom{{Cite Conway, ''DODweb|date=2011-01-20|title=DoD Can Safely Use USB'', Securely {{!}} Blog Central|url=http://blogs.mcafee.com/enterprise/public-sector/dod-can-use-usb-securely, (security insights blog), 3|access-date=2021-08-18|archive-url=https:/9/2010web.archive.org/web/20110120192355/http://blogs.mcafee.com/enterprise/public-sector/dod-can-use-usb-securely|archive-date=2011-01-20}}</ref> The DCM was renamed to the data loss prevention (DLP) in HBSS Baseline 3.0 MR3.
 
==== Assets publishing service ====
Line 131 ⟶ 123:
 
== Obtaining HBSS ==
According to JTF-GNO CTO 07-12, all DOD agencies are required to deploy HBSS to their networks. DISA has made HBSS software available for download on their [[Public key infrastructure|PKI]] protected [https://patches.csd.disa.mil/ patch server]. Users attempting to download the software are required to have a [[commonCommon accessAccess cardCard]] (CAC) and be on a .mil network. DISA provides software and updates free of charge to DOD entities.
 
Additionally, HBSS administrators require the satisfactory completion of HBSS training and are commonly appointed by the unit or section commander in writing.
 
== Learning HBSS ==
In order to receive and administer an HBSS system, system administrators must satisfactorily complete online or in class HBSS training as well as be identified as an HBSS administrator. Online training takes 30 hours to complete while in class training requires four days, excluding travel. An advanced HBSS class is also available to HBSS administrators wishing to acquire a more in-depth knowledge of the system. HBSS online and in class training is managed by DISA and information pertaining to these training classes can be obtained at the DISA [http://iase.disa.mil Information Assurance Support Environment] (IASE) website.
 
== HBSS support ==
The DISA Risk Management Executive Office (RE) formerly [[field security office]] (FSO) provides free technical support for all HBSS Administrators through their help desk. DISA has three tiers of support, from Tier I to Tier III. Tier I and Tier II support is provided by DISA FSO, while Tier III support is provided by McAfee. DISA FSO Support is available using one of the following methods:<ref>''IA{{Cite Tools'',web|date=2010-02-12|title=DoD Information Assurance Tools|url=http://iase.disa.mil/tools/index.html, 3|access-date=2021-08-18|archive-url=https:/14/web.archive.org/web/20100212232302/http://iase.disa.mil/tools/index.html|archive-date=2010-02-12}}</ref>
 
{|
|Email: disa.tinker.eis.mbx.cdk21-esmosthbss-service-desk [at] csd.disamail.mil
|-
|Commercial (405) 739-5600
|-
|[[Defense Switched Network|DSN]]: 339850-56000032
|-
|Toll Free: 800844-490347-16432457
|}
 
Line 155 ⟶ 145:
 
== References ==
<!--- See http://en.wikipedia.org/wiki/Wikipedia:Footnotes on how to create references using <ref></ref> tags which will then appear here automatically -->
{{Reflist}}
 
== External links ==
* [http://www.afcea.org/signal/articles/templates/200904SIGNALConnections.asp?articleid=1909&zoneid=258 End-Point Security Spreads Throughout Military]
* [http://www.afcea.org/signal/signalscape/index.php/2009/11content/?q=northrop-grumman-wins-air-force-siprnet-contract/ Northrop Grumman Wins Air Force SIPRNET Contract ]
* [http://www.afcea.org/events/landwarnet/08/infoexchange.asp Host Based Security System (HBSS)]
* [http://iase.disa.mil Information Assurance Support Environment]
* [http://www.mcafee.com McAfee, Inc.]