European Information Security
Promotion Programme
Contract nº IST - 2001 - 35200


Overview
Project
Partners
Users
Join Us
Publications
Events
Related Projects
   

Project

Multilanguage information

French version
Spanish version

Overall project structure
The project is divided in six workpackages:

  • Project Management
  • Dissemination and exploitation plan
  • Shared advisory infrastructure
  • Advisory distribution to SMEs
  • Deployment and integration of ICT security products
  • Measurement and Evaluation of Results

The most interesting from a user perspective are workpackages 3, 4 and 5.

Workpackage 3: Shared advisory infrastructure
The objective of workpackage 3 is to set up a "shared infrastructure" between the participating Centres of Expertise (established CERTs), in order to make available to the community (large enterprises and SMEs) a repository of preventative material and to take advantage of this effort to constitute a European network of expertise in that field.
The infrastructure will include vulnerability databases and it will address vulnerability inter-dependencies.

Workpackage 4: Advisory distribution to SMEs
The first objective of workpackage 4 is the definition and experimentation of a security advisory dissemination model targeted at SMEs.
The second objective is concerned with the particular technique needed to achieve the first objective - that being PKI usage in an "open" (as opposed to an Enterprise) environment - and having to deal with very large numbers of users (e.g. SMEs).
The third objective has to do with the way those preventative actions can be made available to SMEs and this will enable us to develop an "adapted" resource-funding model for this type of activity.

Workpackage 5: Deployment and integration of ICT security products
The maintenance of security products poses specific challenges to SMEs. Typically, SMEs have a limited amount of technical staff and keeping security products that have been deployed up to date with the most recent patches, signature files etc. can pose resource and logistical problems. In many cases SMEs require a service provider to distribute best practice information about their diverse security systems, releasing the technical staff within the SME to concentrate on the organisations core business. Given the diversity of requirements and solutions among SMEs, a relevant effort will be made to address different situations, extrapolating from the practical experience on the pilots, so that the results of this project can be used by a large number of European SMEs.
The recommendations made in workpackage 4, will be checked in "real life", in order to have a direct feedback from real SMEs. The objectives of this workpackage are:

To integrate the distribution of security advisories with the use of security products by SMEs. Thus, in addition to a security advisory being distributed, an SME may also receive the related information on how to correctly configure their firewall / IDS / virus scanner to deal with this vulnerability. Such information would be tailored to the type of perimeter security tools used by the SME.

To test the suitability and completeness of the information, implementing it directly to a selected number of SMEs across Europe (by each Centre of Expertise).

To automate the distribution of advisory information through the integration of automatic vulnerability scanning up to and including patch distribution and application.

Users involvment

Users may be involved in two ways:

  • As final users: typically SMEs receive and use the advisories and services either directly provided by the CERTs shared infrastructure, or through intermediaries
  • As intermediaries; typically ISP, ASP or Chambers of Commerce act as the intermediary between the EISPP and the end user. They may just deal with user registration and help desk, so that the overall structure can scale better, or they can add personalized services, like those that will be experimented in workpackage 5.

The figure shows some examples of how CERTs, intermediaries and SMEs interact (Hint: click on the picture to enlarge it).

Click to Enlarge

The following is an example of the benefits of a selective advisory service:

An SME receives alerts for all systems running in their environment including those, for example, from: Microsoft, Compaq, Sun, Oracle, Checkpoint. The result is information overload where the SME has neither the ability nor the time to select which advisories apply to their systems - so many problems remain unsolved.

EISPP provides the SME with alerts dealing with their specific systems - e.g. Checkpoint FW-1 running on Nokia platform, Oracle 8i running on Solaris 8, or MS Win2K. EISPP also provides pointers to IDS signatures / Virus updates to detect new vulnerabilities for Oracle 8i on a Solaris 8 platform. Moreover, EISPP adds expert commentary from the network of security experts throughout Europe. The result is security information that can be used more effectively.


@webmaster
Last Change 03/04/2003
© EISPP Consortion