Vous êtes sur la page 1sur 5

TRIP WIRE

Tripwire is an open source, free software security and data integrity tool for
monitoring and alerting on specific file change(s) on a range of systems.

ROOT CAUSE ANALYSIS:

Root cause analysis (RCA) is a method of problem solving used for


identifying the root causes of faults or problems. It is widely used in IT
operations, telecommunications, industrial process control, accident analysis
medicine, healthcare industry etc. RCA can be decomposed into four steps:

 Identify and describe clearly the problem.


 Establish a timeline from the normal situation up to the time the problem
occurred.
 Distinguish between the root cause and other causal factors (e.g., using event
correlation).
 Establish a causal graph between the root cause and the problem.

CAUSE ANALYSIS TOOLS:

Cause analysis tools are helpful tools for conducting a root cause
analysis for a problem or situation. They include:

 Cause and effect diagram


 Scatter diagram
 Control chart
 Five Whys
 Tree diagram
 Change Analysis
 Barrier Analysis
 Event and casual factor analysis
 Management Oversight and Risk Tree Analysis

CASE STUDY: Major Banking Institution, Securing a multinational bank’s


hybrid cloud enterprise.

This multinational banking institution has been around for over 100 years,
dedicated to helping a customer base of over 20 million people in countries all over
the world.

PROBLEM:

In order to serve such a large customer base and keep financial services
at competitive rates, they’ve taken advantage of the latest in cloud technology to
reduce the operating costs of their IT infrastructure and outward-facing services—
from online banking apps to mortgage calculators. In doing so, they’ve migrated
many of these customer-facing services to operate in all of the major cloud
platforms, including Microsoft Azure, Google Cloud and soon Amazon Web
Services. It’s a challenge for organizations adopting cloud infrastructure to properly
secure those environments due to the elasticity and short lifespan of servers, as well
as the ever-growing presence of containers.

SOLUTION:

This banking institution implemented Tripwire® Enterprise integrated


with Tripwire IP360TM for complete risk assessment of their hybrid enterprise.
Virtual images are assessed for configuration compliance and checked for over
130,000 vulnerabilities before they ever hit the deployment pipeline and the
continuous integration systems responsible for automatically deploying finished
systems.

By taking this critical step, they’re able to remediate vulnerabilities and


misconfigurations before reaching product environments. This process greatly
reduces the chance of risks and vulnerabilities making it into their cloud
environments as well. From there, the rest of the integrity management process
follows each system throughout its lifespan.

FIVE WHYS

5 Whys, or 5Y, is a powerful tool for getting to the root cause of a problem,
and an effective way to expose weaknesses in your systems or processes.

PROBLEM
Adopting different cloud infrastructures for properly securing the hybrid environments in a bank is difficult

WHY
Due to vulnerabilities and misconfigurations

WHY
Due to the major problem of unauthorized access

WHY
Increased chance of higher level risks

WHY
Due to malware detection

WHY
Causes deployment of continuous integration services

BARRIER ANALYSIS:

Barrier analysis is a rapid assessment tool used in behaviour


change projects. The purpose of barrier analysis is to identify behavioural
determinants, so that more effective behaviour change, communication messages,
strategies, and supporting activities can be developed.

BARRIER ANALYSIS IN TRIPWIRE:

It deals with an introduction to our research analyzing human factors


and their influence on an effective information security management system,
and then installment explored some of the background knowledge on the subject,
including Force Field Analysis (FFA) and the GOAL-Driven Risk
Management Model. The last part will look at modelling human factors in
information security management systems.

Analysing human factors

Force Field Analysis


BARRIERS

Goal Driven Risk Management


Model

Modeling human factors

CHANGE ANALYSIS:

Change analysis is a Root Cause Analysis technique that uses the


precise specification of a single deviation (problem or adverse event) so
that changes and/or differences (potential causal factors) can be found by
comparison to closely related un-deviated situations.
CHANGE ANALYSIS IN TRIP WIRE:

The proposed work attempts to analyze the human factors in a


proactive way for an effective information security management system. We adopt
a combination of force field analysis method and goal-driven risk management
model to support modelling the human factors. The aim is to understand what
should be an ideal situation for an organization considering human issues for
overall IS matters.

Most of the clients prefer the ITIL Information Technology


Infrastructure Library framework for managing their IT services, ITIL describes
processes, procedures, tasks, and checklists which are not organization-specific nor
technology-specific, but can be applied by the banking institution towards strategy,
delivering value, and maintaining a minimum level of competency.

Vous aimerez peut-être aussi