Links

Why spend more money than you should on your information security and compliance efforts? This page is to create links for software and systems to implement information security and compliance on small budget. This list does not mean my endorsement for any of these products, unless specifically mentioned.

Full Disk Encryption and USB Drive Encryption

  1. TrueCrypt (http://www.truecrypt.org/)

PKI and Certificate Server

  1. Fedora Linux Dogtag (http://pki.fedoraproject.org/)
  2. OpenSSL (http://www.openssl.org/)

Email and File Encryption

  1. GnuPG (http://gnupg.org/)
  2. GPG4Win (http://www.gpg4win.org/)

Secure Instant Messaging

  1. eJabberd (http://www.ejabberd.im/)

VPN

  1. OpenVPN (http://www.openvpn.net/)

IDS and IPS

  1. OSSEC – Host Based IDS (http://www.ossec.net)
  2. SAMHAIN – Host Based IDS (http://www.la-samhna.de/samhain/)
  3. Snort – (www.snort.org)
  4. Snort Rules – Emerging Threats (http://rules.emergingthreats.net/open-nogpl/)

Event Correlation and System Monitoring

  1. Pandora – (http://pandorafms.org/)
  2. SEC – Simple Event Correlator (http://simple-evcorr.sourceforge.net/)
  3. ZENOS – Open Source system monitoring and management (http://community.zenoss.org/)
  4. ZABIX – Open source monitoring (http://www.zabbix.com/)
  5. Nagios – System monitoring (http://www.nagios.org/)

Firewalls

  1. Network
    1. Smoothwall (http://www.smoothwall.org/)
    2. Netfilter/iptables (http://www.netfilter.org/). Included in Linux distributions as well.
    3. IPCop (www.ipcop.org)
  2. Hostbased
    1. Netfilter/iptables (http://www.netfilter.org/). Included in Linux distributions as well.
  3. Web application firewalls
    1. Mod security (http://www.modsecurity.org/)
    2. Microsoft URL Scan (http://learn.iis.net/page.aspx/726/urlscan-overview/)

Free Open Source Intrusion Detection with Snort

  1. Snort IDS (http://www.snort.org)
  2. Also get my book on Snort at http://www.informit.com/title/0131407333

Identity Management

  1. OpenLDAP is open source and free LDAP system available on multiple platforms (http://www.openldap.org/)

Federated Identity Management System

  1. SourceID supports multiple protocols including SAML, Cardspace, Liverty, WS-Federation etc (http://www.sourceid.org/)
  2. OpenSAML libraries (http://www.opensaml.org)

Free Antivirus Solutions

  1. For non-commercial home use, Avast is a free software and available at http://www.avast.com/
  2. ClamAV is free and available on multiple platforms (http://www.clamav.net/)

Log Management

  1. Octopussy – Open Source Log Management (http://www.8pussy.org/)
  2. For small business – free version of Splunk (www.splunk.com)
  3. For medium to large business, consider using syslog-ng or rsyslog with MySQL backend for reporting and alerting. Most commercial log management systems don’t deliver. You may end up spending large amount of money and support cost with little “real” benefit by going with commercial solutions.

System/Application Vulnerability Assessment and Pen Testing

  1. Nessus (http://www.nessus.org)
  2. Nmap (http://www.nmap.org)
  3. Metasploit (http://www.metasploit.com/)
  4. Wireshark packet capture and analysis (http://www.wireshark.org/)
  5. Kismet Wireless detection and sniffing (http://www.kismetwireless.net/)
  6. Backtrack (http://www.remote-exploit.org/backtrack.html)
  7. Nexpose Community Edition Free Version (http://www.rapid7.com/products/nexpose-community-edition.jsp)
  8. Microsoft Baseline Security Analyzer (MBSA)
  9. Microsoft Security Assessment Tool (MSAT) provides basic security assessment and action items for an organization. This could be a first and basic step for small organizations.
  10. OpenVAS Vulnerability Scanner (http://www.openvas.org/) is like Nessus – client/Server
  11. SSL crypto verification and certificate checking – SSLscan, available on Linux. Use yum to download

Education and Awareness

  1. ENISA educational videos and posters (http://www.enisa.europa.eu/act/ar/act/ar/material/awareness-raising-video-clips)
  2. Web application and database security from Imperva videos (http://www.imperva.com/resources/videos.asp)

Security Check Lists and Other Documentation Resources

  1. NIST National Checklist Program Repository (http://web.nvd.nist.gov/view/ncp/repository)
  2. Cloud Computing Risk Analysis http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
  3. Multiple checklists available at http://iase.disa.mil/stigs/checklist/index.html

Free Information Security and Other Books/Software

  1. Bruce Perens open source series provides free PDFs of open source books. The link is: http://phptr.com/perens
  2. Linux resources and software information at http://www.findbestopensource.com/

Comments are closed.