![]() ACAS Challengesĭeploying ACAS into your environment will require training, personnel resources, and time. Assessing the security posture of the DoD’s infrastructure is now easier than ever. As you can imagine, this reporting capability can be very beneficial as leadership now has the ability to view policy, vulnerability compliance, and total IT assets across the enterprise. This allows the DoD to deploy SC at various levels with all of them reporting to one or more main SC instances. ![]() One of the neat features of SC is the ability to roll-up SC instances for reporting purposes. SC can collect scan data from all PVS and Nessus instances to provide custom dashboard and reports. Security Center (SC) is the central management console for the configuration of Nessus & PVS. PVS provides the ability to discover new hosts added to a network, find out which ports are passing traffic across the network, identify when applications are compromised, and monitor mobile devices connected to your network. Please note that PVS is not an IDS and does not replace one in your network. While Nessus monitors device vulnerabilities, PVS monitors the network traffic traversing your network for vulnerabilities. The main purpose of Passive Vulnerability Scanner (PVS) is to monitor network traffic at the packet level. The library of Nessus plugins (audit files) is massive and is updated almost daily to account for the latest threat vectors. In the DoD world, the compliance with STIGS is just as important as the compliance with software vulnerabilities. This is one of the main advantages of Nessus over DoD’s previous scanner, Retina. Nessus is the scanning component of ACAS that is compliant with not only CVE vulnerability identifiers, but also DISA STIGs. Many security practitioners are familiar with the product Nessus as it’s been around for many years. Below is a breakdown of some of the ACAS components and some of the challenges an agency may face when deploying ACAS. The switch to ACAS was done in an effort to more unify security assessment reporting so that leadership can view and measure the overall security posture of the entire IT infrastructure. The new DISA program awarded Tenable the DoD contract in 2012 and the deployment of ACAS throughout the enterprise has been occurring slowly but surely. The Assured Compliance Assessment Solution (ACAS) is a suite of COTS applications that each meet a variety of security objectives and was developed by Tenable.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |