Securing the EVO Cyber Security Considerations

Size: px
Start display at page:

Download "Securing the EVO Cyber Security Considerations"

Transcription

1 A Whitepaper prepared from the EVOp Cyber Security Advisory Board Workshop 7 th November 2012

2 CONTENTS 1. Background: Securing the EVO EVO Cyber Security Advisory Board Cyber Security Advisory Board Workshop EVO Security Policy Framework Key Security Considerations for the EVO Striking the Right Balance (Confidentiality, Integrity & Availability) Cloud Security Data Protection Methods (Encryption & Other) Application Security EVO Portal Security EVO Security Resource Considerations Other Cyber Security Considerations... 8 Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 1 of 8

3 GLOSSARY OF TERMS & ABBREVIATIONS Terminology BAU BIL CSAB CSO EVO GRC Impact Assessment NERC Risk Appetite Risk Assessment Risk Profile SIRO SPF Definition Business as Usual Business Impact Level Cyber Security Advisory Board Chief Security Officer or Cyber Security Officer Environmental Virtual Observatory Governance, Risk and Compliance A process aimed at structuring and supporting the development of policies. It identifies and assesses the problem at stake and the objectives pursued. It identifies the main options for achieving the objective and analyses their likely impacts in the economic, environmental and social fields. It outlines advantages and disadvantages of each option and examines possible synergies and trade-offs. Natural Environmental Research Council The level of risk that an organisation is prepared to accept, before action is deemed necessary to reduce it. It represents a balance between the potential benefits of innovation and the threats that change inevitably brings on. The identification, evaluation, and estimation of the levels of risks involved in a situation, their comparison against benchmarks or standards, and determination of an acceptable level of risk. An evaluation of an organisation's willingness to take risks, as well as the threats to which an organisation is exposed. Senior Information Risk Owner Security Policy Framework Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 2 of 8

4 1. Background: Securing the EVO The Environmental Virtual Observatory (EVO) is a pilot project for the development of new cloud-based applications for accessing, interrogating, modelling and visualising environmental data. By developing local and national scale exemplars, the EVO is demonstrating how cloud technologies can make environmental monitoring and decision making more efficient, effective and transparent to the whole community. The role of the Cyber Security Advisory Board (CSAB) is to advise the core EVO team regarding security considerations for the commercialisation phase of the project. The secure handling of environmental data, models and tools is a major consideration in the design of the EVO; such security will be vital in meeting the expectations of international data providers and will ensure that the EVO can scale rapidly without compromising the integrity and availability of critical environmental information. The pilot project has been funded by NERC (Natural Environment Research Council) and will draw to a successful close at the end of The commercialisation of the project is now imminent. NERC has already proposed a base level of funding for this programme, commencing in 2013 and continuing for four years. In addition, a wider call for international funding is being launched via the Belmont Forum 1 and security is one of the allocated funding streams being considered. This whitepaper is intended to inform the EVO and its future investors of the key Cyber Security considerations, from which the scope for an EVO Security Policy Framework can be developed. This whitepaper is not intended to be a security architecture design document. The key objective of this document is to ensure that all possible security threats have been considered in the development of a Security Policy Framework, which will ultimately govern the implementation and delivery of the EVO service from commercialisation through to maturity and beyond. 2. EVO Cyber Security Advisory Board In order to ensure a depth and breadth of knowledge relevant to the cyber security requirements of the EVO project, considerable thought was given to the composition of the Cyber Security Advisory Board. In particular, our aim was to bring together a team of subject matter experts who could accurately represent the broad perspectives of the anticipated EVO user community, namely: Government and Defence organisations, Industry, Academia and the public. In light of this, the following individuals were appointed to the EVO Cyber Security Advisory Board: Mohan Koo Managing Director, Dtex Systems Sir Edmund Burton Chairman, Information Assurance Advisory Council Howard Schmidt Former Cyber Security Coordinator, the White House Neil Fisher VP Security, Unisys Mark Gittins Director, Lockheed Martin Oliver Hoare Former Head of Information Assurance & Cyber Security, Government Olympic Executive Matthew Dagnall Head of Technical Architecture, Information Assurance & IT Security, Met Office Rajan Koo Technical Services Director, Dtex Systems Sadie Creese Professor of Cyber Security, Oxford University Angela Sasse Head of Information Security Research, University College London 1 Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 3 of 8

5 3. Cyber Security Advisory Board Workshop With the objective of producing this whitepaper, a CSAB workshop was held to explore the key cyber security considerations for commercialisation of the EVO. The details of the workshop are as follows: EVO Cyber Security Advisory Board Workshop - 7 th November 2012 Lockheed Martin Cyber Innovation Centre: Chester House, Farnborough Aerospace Centre, Farnborough, Hampshire, GU14 6TQ Chaired by: Mohan Koo Managing Director, Dtex Systems Attendees: Neil Fisher VP Security, Unisys Mark Gittins Director, Lockheed Martin Oliver Hoare Former Head of Information Assurance & Cyber Security, Government Olympic Executive Matthew Dagnall Head of Technical Architecture, Information Assurance & IT Security, Met Office Bridget Emmett Project Director, Environmental Virtual Observatory Gordon Blair Lead Architect, Environmental Virtual Observatory Yehia El-khatib Technical Lead, Environmental Virtual Observatory Rajan Koo Technical Services Director, Dtex Systems Peer Reviewed by: Sir Edmund Burton Chairman, Information Assurance Advisory Council Howard Schmidt Former Cyber Security Coordinator, the White House Angela Sasse Head of Information Security Research, University College London Sadie Creese Professor of Cyber Security, Oxford University 4. EVO Security Policy Framework As one of the fundamental outputs from the CSAB workshop, all members agreed that the EVO will need to establish a Security Policy Framework (SPF) which will provide a foundation for security governance across all areas of the EVO project. This framework will ensure a security by design approach is undertaken throughout the plan, build and operate phases of the project. In a similar manner to the approach adopted by UK government 2, the SPF will define the standards, best practice guidelines 3 and approaches that are required to protect EVO assets (people, information and infrastructure), as well as the information assets of EVO users and suppliers of content. The SPF will focus on the outcomes that are required to achieve a proportionate and risk managed approach to security, without hampering the effectiveness of the EVO s core functionality. In order for this to be achieved, it is of vital importance that every EVO user adopts security best practices as a part of their daily routine. This will be driven by effective communication and enforcement of the SPF. While we may refer to the government SPF regarding general principles for creating such a framework, it is critical that the EVO SPF is designed specifically for the needs of the EVO and its users. This will be achieved by undertaking the appropriate Risk and Impact Assessments to gain a clear understanding of both the risk profile and risk appetite of the EVO, from which proportionate levels of security can be determined Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 4 of 8

6 5. Key Security Considerations for the EVO The CSAB has proposed six (6) key areas of security which will need to be considered in detail as part of the EVO commercialisation process. These key areas are defined in the following sub-sections, with all security considerations posed as questions which the cyber security team will need to answer during the early planning stages of commercialisation. 5.1 Striking the Right Balance (Confidentiality, Integrity & Availability) A clear understanding of the core principles and their corresponding priorities is important in the Security by Design approach. Additional core principles that should be considered include Non-repudiation, Authentication and Privacy. It is also clear that the importance of each core principal will vary based on security standards, classifications and the target audiences for each model, tool and data set. Some of the key questions for this section will include: How should these be prioritised (e.g. does Availability hold a higher priority than Data Integrity)? Confidentiality (multiple levels of access rights) How far do we rely on the cloud provider to uphold these levels of security? Where does their responsibility stop and ours start? Currently there is no agreement with data source owners as to what happens if source data becomes unavailable. What controls should be in place to mitigate these risks? What is the Availability requirement placed on EVO data? (i.e. what happens if high priority users depend on this information, e.g. emergency services?) If I am a high priority user, how does the EVO capture, retain and maintain my critical dependencies for immediate access when I need it? How should the EVO consider Non-repudiation, Authentication and Privacy, when attempting to strike the right balance? Classification of data, models and tools will be based on the Business Impact Levels (BIL) defined in the SPF and should be simple and easy to follow. How can we empower users to understand and follow EVO security standards and classifications? 5.2 Cloud Security Considerations associated with cloud security are generally separated by security concerns related to cloud providers and those related to their customers (i.e. the EVO). In the continuously evolving domain of cloud security, the Cyber Security Advisory Board will provide important guidance to ensure the right cloud providers are chosen and all cloud security issues are considered. The following questions should form part of this consideration: Proper due-diligence of chosen service provider(s) Is this an outsourced service or should the Cyber Security Advisory Board oversee an internally managed function? Negotiating the terms of the Service Level Agreement Where/how should security responsibilities be divided between the EVO and the provider? How will the EVO differentiate between user to portal and application to data communications (by acknowledging that security requirements may differ between the two)? A hybrid cloud deployment model (i.e. a combination of private and public clouds) may be a practical approach towards maintaining a balance between innovation and security. Should this be managed by a single provider and how will the security considerations be applied? Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 5 of 8

7 How will governance, risk and compliance (GRC) be managed between EVO and the cloud provider? Data Storage and Residency What are the legal and regulatory requirements to be considered, collectively and by region? Recovery What are the considerations for secure consistent backups and restoration of cloud based resources? Strong authentication, authorisation and auditing mechanisms must form part of the foundation. How should these be implemented and managed? Are Geographical Computing and Virtualisation key considerations for the EVO within a cloud based environment? Isolated Networks What security considerations must be made when segregating EVO networks from supplier and/or customer networks? What is the best method for customers to gain secure access to cloud-based resources? How should Resource Management be designed to prevent denial of service (DoS) attacks? How will anomalous activities by EVO users (e.g. highly resource intensive actions, or abnormal requests) be identified and managed to ensure that availability and general security are preserved? 5.3 Data Protection Methods (Encryption & Other) Perimeter or layer protection methods (i.e. firewalls and IDS/IPS) are common focal points in the protection of data. Whilst these methods serve their place, an additional consideration for the EVO is security of the systems that will store and process the most sensitive data. Implementation of appropriate encryption methods may be a suitable method for ensuring that data is protected within the data centre(s), not just at the perimeter. Understanding the ideal encryption methods and how and when to implement them is vital in maintaining the high performance of EVO virtual modelling and the transmission of live data (such as river levels, realtime temperatures, etc.). Some of the considerations regarding data protection methods will include: Data Classification Effective implementation of data classification can simplify encryption requirements and generate improvements in data centre performance and utilisation. Who is responsible for classifying data at the point of entry into the system and/or once a model has been created? In addition, who will be responsible and accountable for governing such classification. Data Separation/Segregation How should these be aligned to support data classification or other specific project security requirements? Key Management Systems The security that encryption offers is only as good as the systems used to store and manage the encryption keys. What key management systems are appropriate for EVO data? For what purposes will the EVO process sensitive data and what conditions need to be satisfied in order to do so? Encryption of data in transit and data at rest What methods should be considered and how might these impact performance? What other means of protection should be considered as alternative or complementary to encryption based methods? What type of Risk Assessment(s) should be undertaken during development of the SPF to determine the appropriate levels of protection? Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 6 of 8

8 5.4 Application Security Whenever an EVO application interacts with suppliers and customers (end users), both the data and the application itself must be protected. As the EVO is expected to allow end users to create data workflows to modify how data is analysed, it will be important to keep an audit trail of user activities and alert on behaviour which falls outside the norm. Just as important is the need to have an audit trail for all activities undertaken on any database which stores critical EVO information. Application security considerations should include: What key threats/attacks must be considered? What auditing mechanisms are required to detect and alert on irregular activity (i.e. Database Activity Monitoring (DAM), User Activity Monitoring (UAM) etc.)? What is the appropriate level of Protective Monitoring and how should high risk activities be defined, identified and mitigated? Outside of username/password and web-access control systems, do advanced Identity Management (IdM) systems need to be considered? What is the best approach for incorporating security into the EVO software development process? What security mechanisms will ensure malicious or faulty applications are verified before being uploaded to sensitive EVO areas? How should the EVO differentiate between user to portal and application to data communications in order to determine the appropriate security requirements for each? Flexible standards such as INSPIRE and WPS are essential to promote innovation. How do we protect end points and applications from accidental or deliberate misuse to ensure that such flexibility is not exploited? 5.5 EVO Portal Security The EVO portal will aggregate content from all of the EVO systems providing a means for users to explore a variety of data sources and execute simulations and models in the cloud. It is vital that portal security ensures that only an authorised user can generate requests to the applications server(s). The following are some of the portal security considerations: Due diligence on the portal provider Is this an outsourced service or an internal responsibility to be overseen by the Cyber Security Advisory Board? If this an outsourced service, where should the division of security responsibilities be drawn? In the event of an outsourced arrangement, negotiation of any SLAs will have a critical impact on the security of the EVO portal. What are the key considerations for such negotiations? Outside of general internet security best practises, what are the EVO specific portal security requirements? Identity Assurance will be critical for Portal Security and Integrity. How will such assurance be managed and who will be responsible? How will identities and roles be mapped, particularly where a single identity may have multiple roles and/or responsibilities? As the EVO user base and volume of content continues to grow, how will the mechanisms for portal security scale? Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 7 of 8

9 5.6 EVO Security Resource Considerations As the EVO commences commercialisation, a core team will need to be assigned with responsibility for developing the SPF and driving cyber security as a BAU function. The following are some of the key considerations in relation to the resourcing requirements: If the CSAB maintains a non-operational strategic advisory role, who will be tasked with implementing cyber security strategy and ensuring that the SPF is well communicated and enforced? Will this be a dedicated resource or will the core EVO team share this responsibility? If responsibility is shared, how will governance be enforced? Given that the EVO team currently operates under a consortium based structure, how will cyber security collaboration be encouraged and how will SPF compliance be enforced? (For example, a CSO or SIRO Council could be formed, where each consortium member appoints someone to be responsible for their compliance). How will security training and awareness be managed and implemented throughout the plan, build and operate phases of the project? 5.7 Other Cyber Security Considerations While the six (6) sub-sections above cover the key cyber security considerations for the EVO project as it enters the commercialisation phase, the following are some additional areas which should also be considered: The legal implications for commercialisation of the EVO have been considered in parallel to the cyber security considerations. What are the legal concerns which will have an impact on security and vice versa? How will the EVO ensure that the approach to interdependent legal and security issues is joined up? Should development of the project be aligned with any particular Cyber Security standards such as ISO27001/2? If so, will this standard be adequate to cover future technology requirements, including rapidly evolving mobile device security requirements? Are there any other domain specific security considerations and how should these be approached by the EVO? Copyright Natural Environment Research Council (NERC). All Rights Reserved. Page 8 of 8

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

API Management: Powered by SOA Software Dedicated Cloud

API Management: Powered by SOA Software Dedicated Cloud Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Securing Your Data In The Cloud: an insiders perspective

Securing Your Data In The Cloud: an insiders perspective Securing Your Data In The Cloud: an insiders perspective INTRODUCTION As the increasing use of cloud computing and other technologies is changing the world of data management, keeping your data private

More information

Practical Overview on responsibilities of Data Protection Officers. Security measures

Practical Overview on responsibilities of Data Protection Officers. Security measures Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency mvl@agpd.es Security measures Agenda: The rol of DPO on security measures

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact info@uxcconsulting.com.au http://www.uxcconsulting.com.au This summary

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

Polish Financial Supervision Authority. Guidelines

Polish Financial Supervision Authority. Guidelines Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Ensuring security the last barrier to Cloud adoption

Ensuring security the last barrier to Cloud adoption Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

NERC CIP Tools and Techniques

NERC CIP Tools and Techniques NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com (843) 619-0050 October

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Chair Cabinet Committee on State Sector Reform and Expenditure Control

Chair Cabinet Committee on State Sector Reform and Expenditure Control Office of the Minister of State Services Chair Cabinet Committee on State Sector Reform and Expenditure Control REPORT OF THE GOVERNMENT CHIEF INFORMATION OFFICER ON THE REVIEW OF PUBLICLY ACCESSIBLE INFORMATION

More information

BYOD Guidance: Architectural Approaches

BYOD Guidance: Architectural Approaches GOV.UK Guidance BYOD Guidance: Architectural Approaches Published Contents 1. Service separation 2. Scenario 1: Exposing internal web applications 3. Scenario 2: Exposing email, calendar and contacts This

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012 GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions

Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions Financial Conduct Authority Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions Introduction 1. A firm has many choices when designing its operating model

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

<risk> Enterprise Risk Management

<risk> Enterprise Risk Management Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single,

More information

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

February 2015 Issue No: 5.2. CESG Certification for IA Professionals February 2015 Issue No: 5.2 CESG Certification for IA Professionals Issue No: 5.2 February 2015 The copyright of this document is reserved and vested in the Crown. This document may not be reproduced or

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Overview TECHIS60341. Carry out security architecture and operations activities

Overview TECHIS60341. Carry out security architecture and operations activities Overview The protection of information, services and systems relies on a range of technical and procedural activities, often grouped in a framework. The framework will contain technical and logical, physical

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

Regulations on Information Systems Security. I. General Provisions

Regulations on Information Systems Security. I. General Provisions Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

JOB DESCRIPTION/PERSON SPECIFICATION

JOB DESCRIPTION/PERSON SPECIFICATION JOB DESCRIPTION/PERSON SPECIFICATION A POSITION DETAILS DIVISION: Business Support JOB TITLE: MIS Security Analyst DEPARTMENT/BUSINESS SECTOR: MIS REPORTING TO: MIS Security Manager GRADE: 11 B KEY RESPONSIBILITIES

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Information System Audit Guide

Information System Audit Guide Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE

More information

FACING SECURITY CHALLENGES

FACING SECURITY CHALLENGES 24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

Technology Risk Management

Technology Risk Management 1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy THCCGCG9 Version: 01 The information governance strategy outlines the CCG governance aims and the key objectives of its governance policies. The Chief officer has the overarching

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

Information Security Plan May 24, 2011

Information Security Plan May 24, 2011 Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker. Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM MICROSOFT DYNAMICS CRM SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S MICROSOFT DYNAMICS CRM CAPABILITY INTRODUCTION Lockheed Martin offers a

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and

More information

Electronic Payment Schemes Guidelines

Electronic Payment Schemes Guidelines BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es

More information

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully

More information