3. The US NIST Special Publication 800-70 introduces a national repository and recommendations for using security checklists. It says:
A security configuration checklist (also referred to as a lockdown guide, hardening guide, security guide, security technical implementation guide [STIG], or benchmark) is essentially a document that contains instructions or procedures for configuring an IT product to an operational environment, for verifying that the product has been configured properly, and/or for identifyingunauthorised configuration changes to the product.
Considering the definition of security checklists, answer the following questions.
(a) NIST recommends that organisations should apply security checklists to reduce the number of vulnerabilities that attackers can attempt to exploit and to lessen the impact of successful attacks. Why do you think that checklists would be useful for this purpose? Suggest four separate benefits. [8 marks]
(b) Will using a security checklist allow an organisation to eliminate all security risks associated with a system or product? Justify your answer. [3 marks]
(c) NIST has established a National Checklist Programme (NCP) to build a central checklist repository. What role do you think a NCP can play in software security? [3 marks]
(d) Discussing the role of BSIMM in organisational software security, describe how the NCP might connect to it. [3 marks]
(e) The picture below illustrates how users of checklists can apply them.
i. Apart from selecting checklists for the wanted IT products, suggest two further questions that users may ask of (and may be described in) a Checklist’s metadata, to decide if they want to use it. [2 marks]
ii. What further criteria would you propose to rank or improve checklists, and decide whether a checklist is fit for purpose? Make at least two suggestions. [2 marks]
iii. Would you make any criticisms about the potential use of checklists? Motivate your answer.