Achieving the United Arab Emirates (UAE) Information Assurance Standard with Tripwire Enterprise

Tripwire Enterprise and Foundational Security Controls Across your Enterprise

Keeping sensitive data and assets safe is the goal of regulatory cybersecurity frameworks such as the United Arab Emirates (UAE) Information Assurance Standard. Mitigating cyber threats and ensuring the development of a secure national information and communications infrastructure and cyberspace is a strategic priority for the UAE. To this end, the UAE Information Assurance (IA) Standard acts as a critical element to provide requirements for elevating the level of IA across all implementing entities in the UAE.

However, the benefits of this technology adoption come with a rapidly-evolving set of cyber threats. These threats stem from a wide range of sources— hacktivists, issue-motivated groups, and organized cybercrime syndicates—and represent national security concerns that can potentially disrupt critical national services and compromise critical information assets.

Compliance with these standards will raise the level of national IA and help the UAE progress towards a more resilient national information and communication infrastructure and cyberspace. The purpose of the UAE IA Standard is to provide requirements to raise the minimum level of protection of information assets and supporting systems across all implementing entities in the UAE. The following pages show how Tripwire solutions map to its technical controls

 

Image
UAE IA Results – PRIORITY 1
Asset Management

The technical control covered in Tripwire® Enterprise will assist in the compliance auditing and management of removable media policies. This establishes the baseline for the general use and connection of IT networks. 

 
 
 
 
 
 

 

Image
UAE IA Results – PRIORITY 2
 
Physical and Environmental Security

The objective of this policy is to prevent loss, damage, theft or compromise of assets and interruption to the entity’s activities. The technical control covered in Tripwire Enterprise will ensure that unattended equipment has appropriate protection.

 
 
 
 
 
 
 
Image
UAE IA Results – PRIORITY 2
Communications

This policy establishes the protection of information being changed within and between entities.

 
 
 
 
 
 
 

 

Image
UAE IA Results – PRIORITY 2
Operations Management

The purpose of this policy is to ensure the effective operational control of the security functions related to information and information systems.

 
 
 
 
 
 
 
 
Image
UAE IA Results – PRIORITY 3
Access Control

The objective of this policy is to institute access control at the user, application, network and operating system level as well as for mobile computing.

 
 
 
 
 
 

 

Image
Information Systems Acquisition,  Development and Maintenance
Information Systems Acquisition, Development and Maintenance

The objective of this policy is to prevent information misuse or unauthorized modification and to elevate security levels in applications during development, as well as to manage technical vulnerabilities.

 
 
 
 
 

 

 
Image
UAE Information Assurance  Dashboard in Tripwire Enterprise
 
UAE Information Assurance Dashboard in Tripwire Enterprise

UAE IA recommends checking the integrity of the assets and the regular review of system security, system logs and the integrity of system configurations.

 

 

 

 

 

 

What is Tripwire Enterprise?

Tripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management. Organizations can use these solutions together for a complete end-to-end SCM solution, or use its file integrity monitoring or policy management solutions on their own to address today’s pressing security and compliance challenges—while building a foundation that positions them to address tomorrow’s. The suite lets security, compliance and operations teams rapidly achieve a foundational level of security across your entire enterprise, including on-premise, cloud and industrial assets, by reducing the attack surface, increasing system integrity and delivering continuous compliance. Tripwire has taken its original host-based intrusion detection tool, which could simply detect changes to files and folders, and expanded it into a robust file integrity monitoring (FIM) solution, able to monitor detailed system integrity: files, directories, registries, configuration parameters, DLLs, ports, services, protocols, etc. Additional enterprise integrations provide granular endpoint intelligence that supports threat detection and policy and audit compliance.

Image
original host-based intrusion detection tool