Cyber Security Risk Mitigation Checklist
|
|
|
- Anissa West
- 10 years ago
- Views:
Transcription
1 Cyber Security Risk Mitigation Checklist
2 Contents Building a Risk Management AMI Program MDM Cyber Security Policy Communication Systems Personnel and Training Scada Operational Risks In Home Displays Insecure SDLC Risks Web Portals PhysicalSecurity Risks DR over AMI Third Party Relationship Interactive Thermal Storage Risks Advanced Volt / VAR Network Risks Platform Risks Application Layer Risks Conservation Vl Voltage Reduction
3 Building a Risk Management Program (1) Provide active executive sponsorship Active and visible support from executive management at each stage of planning, deploying, and monitoring security efforts is crucial to success. Assign responsibility for security risk management to a senior manager Define the system Have security risk mitigation, resource allocation decisions, and policy enforcement roll up to a clearly defined and executive with the requisite authority. Careful system definitions are essential to the accuracy of vulnerability and risk assessments and to the selection of controls that will provide adequate assurances of cyber security. Identify and classify critical cyber It is important to understand the assets that may need to be protected along with assets their classification (e.g., confidential information, private information, etc.) That way an informed decision can be made as to the controls needed to protect these assets that are commensurate with risk severity and impact to the business. Identify and document tthe electronic It is important tto understand dthe entry points into the organization that t an security perimeter(s) adversary may use as a starting point for going after the assets in order to build a threat model. The threat model than becomes an important component of the risk assessment.
4 Building a Risk Management Program (2) Identify and document the electronic security perimeter(s) Perform a vulnerability assessment Assess risks to system information and assets Select security controls Monitor and assess the effectiveness of controls using pre defined metrics It is important to understand the entry points into the organization that an adversary may use as a starting point for going after the assets in order to build a threat model. The threat model than becomes an important component of the risk assessment. Realistic assessments of (a) weaknesses in existing security controls and (b) threats t and their capabilities create the basis for estimating the likelihood lih of successful attacks. They also help to prioritize remedial actions. The risk assessment combines the likelihood of a successful attack with its assessed potential impact on the organization s mission and goals. It helps ensure that mitigation efforts target the highest security risks and select controls that are appropriate and cost effective for the organization. Appropriate management, operational, and technical controls cost effectively strengthen defenses and lower risk levels. In addition to assessed risks, selection factors might include the organization s mission, environment, culture, and budget. Effective testing and ongoing monitoring and evaluation can provide a level of confidence that security controls adequately mitigate the risks.
5 Cyber Security Policy (1) Assign responsibility or developing, implementing, and enforcing cyber security policy to a senior manager. Ensure that the senior manager has the requisite authority across departments to enforce the policy. Define security related related roles and responsibilities. Identify security aspects to be governed by defined policies. The development and implementation of effective security policies, plans, and procedures require the collaborative input and efforts of stakeholders in many departments of the organization. Assigning a senior manager to organize and drive the efforts, with the authority to make and enforce decisions at each stage, raises the chances of success. Employees at every organizational level have some kind of responsibility in developing or applying security policies and procedures. Defined roles and responsibilities will clarify decision making authority and responsibility at each level, along with expected behavior in policy implementation. Creating a multidisciplinary oversight committee ensure all stakeholders are represented. An effective security program requires policies and procedures that address a wide range of management, personnel, operational, and technical issues.
6 Cyber Security Policy (2) Document a brief, clear, high level policy statement for each issue identified. Reference lower level policy documents. Define the implementation plan and enforcement mechanisms. Define a policy management plan. The high level policy statements express three things: The organization management s commitment to the cyber security program The high level direction and requirements for plans and procedures addressing each area A framework to organize lower level documents Lower level policies, plans, and procedures give the details needed to put policy into practice. A careful roll out of the program, well documented policies that are accessible to personnel they affect, and clearly communicated consequences of violating policies will help ensure compliance. This will help maximize compliance by providing mechanisms to Request, approve, document, and monitor policy exceptions Request, approve, implement, and communicate changes to policies, plans, and procedures.
7 Personnel and Training Adequately vet candidates for hire. Provide a level of confidence that new hires are trustworthy. Establish a security awareness program. Train employees who have access to protected assets. Enforce least privilege access to cyber assets and periodically review access privileges. Ensure that all personnel have an understanding of sensitive information and common security risks, and basic steps to prevent security breaches. Further, ensure that personnel develop habits that would make them less susceptible to social engineering attacks. Ensure that employees who have electronic or physical access to critical assets know how to handle the assets securely and how to report and respond to cyber security incidents. Ensure that employees have only the privileges they need to perform their jobs.
8 Operational Risks Perform periodic risk assessment e and admitigation, tgato including threat analysis and vulnerability assessments. Control, monitor, and log all access to protected assets. Redeploy or dispose of protected assets securely. Define and enforce secure change control and configuration management processes. Create and document incident handling policies, plans, and procedures. Create and document contingency plans and procedures. Train employees in incident handling and contingency plans. Maintain a fresh picture pctueof the teeffectiveness ect e essof the te organization s security control versus threats facing the organization. Prevent unauthorized access to assets; Detect unauthorized access to assets; Enforce accountability. Ensure that the redeployment or disposal of cyber berassets does not inadvertently expose sensitive information to unauthorized entities. Ensure that system changes do not break security controls established to protect cyber assets. Ensure that the organization is prepared to act quickly and correctly to avert or contain damage after a cyber security incident. Ensure that the organization is prepared to act quickly and correctly to recover critical assets and continue operations after a major disruption. Ensure that personnel responsible for responding to cyber incidents or major disruptions have a firm grasp of response plans and can execute them under stress.
9 Insecure SDLC Risks Document Misuse / Abuse Cases Think of ways in which system functionality can be abused so that protections can be built in to prevent that abuse. Document Security Requirements Explicitly call out security requirements of the system so that software can be designed, implemented, and tested to ensure that these requirements have been met. Build a Threat Model Enumerate the ways in which an adversary may try to compromise the system so that the system can be designed from the get go to resist these attacks. Perform Architecture Risk Analysis Compare the system s architecture against a threat model to ensure that sufficient security controls are in place to prevent successful attacks. Define Secure Implementation Guidelines Ensure that developers use defensive programming techniques when implementing the system in order to avoid introducing security weaknesses.
10 Insecure SDLC Risks Perform Secure Code Reviews Perform Risk Based Security Testing Have Penetration Testing Conducted Build a Secure Deployment and Operations Guide Ensure that software complies with security implementation guidelines, that security controls are properly implemented, and that the implementation itself does not introduce any new security risks. Run through top risks identified during threat modeling and architecture risk analysis process to ensure that the system has been designed and implemented in a way that mitigates these risks. Gain assurance from a qualified third party that the software built by your organization is secure. Provide the teams deploying and operating the software in production with whatever knowledge they need to have to ensure that software security requirements are met.
11 Physical SecurityRisks Document, implement, and maintain a physical py security plan. The organization must document and implement the technical and procedural controls for monitoring physical access at all access points at all times. All physical access attempts (successful or unsuccessful) should be logged to a secure central logging server. Physical access logs should be retained for at least 90 days. Each physical security system must be tested at least once every three years to ensure it operates correctly. Testing and maintenance records must be maintained at least until the next testing cycle. Outage records must be retained for at least one calendar year. Ensures that physical py security is considered in a structured manner that can be tracked. Ability to detect unauthorized access attempts. Take appropriate action if unauthorized access occurred. Ability to detect unauthorized access attempts. Take appropriate action if unauthorized access occurred. Ability to perform historical analysis of physical access. Ensure that proper physical security posture is maintained. Ability to understand what was tested and improve testing procedures. Ability to investigate causes of outages and tie them to unauthorized physical py access.
12 Third Part Relationship Risks (1) Perform due diligence on each vendor and partner organization to understand their business, financial, and security track record Ask the right questions during the RFP process to understand the security posture and practices at the partner organization, and also understand whether their offerings meet the security requirements as defined by the cooperatives. Compare the security policies and procedures of a third party against your organization s own security policy to ensure compliance. Review the hiring and personnel background checks practices of your vendors and partners to ensure that they comply with your organization s policies Conduct periodic audits and monitoring of the thirdparty organization to ensure adherence to their security policies and procedures Verify business, financial, and security reputation of your vendor / partner organization. Ensure the security practices at the vendor / partner organization comply with your own organization s security policy. Ensure that the purchased product / service meets your organization s security requirements. Make sure that your vendor / partner organization s background checks during hiring process are consistent with your own. If people who work at your vendor / partner are not trustworthy, nor is anything they produce. Make sure that your vendor / partner complies with their own security policies and procedures.
13 Third Part Relationship Risks (2) For software purchases, request a trusted independent third party review and report outlining the discovered security weaknesses in the product Ensure that service level agreement (SLAs) and other contractual tools are properly leveraged to ensure that vendors and partners live up to their obligations. For instance, if a breach occurs at a partner organization, there needs to be a provision to have your organization notified of the full extent of the breach as soon as the information is available Request evidence from software vendors that their software development lifecycle makes use of building security in activities Ask your organizations vendors and partners about the process that they use to ensure security of the components and services that they receive from their own suppliers to ascertain appropriate due diligence. Increased guarantee that the product supplied by your vendor / partner is secure. Contractual obligation that helps your organization transfer some of the security risks. Ensure that the product supplied to your organization by your vendor / partner has been designed and built with security in mind Ensure that none of the third party components that your vendor / partner used in their product introduce security weaknesses.
14 Network Risks (1) Restrict user assigned devices to specific network segments Firewalls and other boundary security mechanisms that filter or act as a proxy for traffic from network segment to another of a different security level should default to a deny all stance. Requests for allowing additional services through a firewall or other boundary protection mechanisms should be approved by the Information Security Manager. Least privilege through network segmentation Security by default Centrally managed access driven by business need The flow of electronic communications should be controlled. Confine sensitive electronic communication to Client systems should communicate with internal servers; these established trust zones. internal servers should not communicate directly with external systems, but should use an intermediate system in your organization s DMZ. The flow of traffic should be enforced through boundary protection mechanisms. Protect data in transit. Protect DNS traffic. Use secure routing protocols or static routes. Deny use of source routing. Preserve confidentiality and integrity of data in transit. Ensure that data is routed to the right parties. Avoid information disclosure of internal routing Prevent denial of service attacks
15 Network Risks (2) Use technologies like firewalls and virtual LANs (VLANs) to properly Achieve network segmentation to achieve segment your organization s network to increase compartmentalization compartmentalization (e.g., machines with access to business services like e mail should not be on the same network segment as your SCADA machines). Routinely review and test your firewall rules to confirm expected behavior. Separate development, test, and production environments. Ensure channel security of critical communication links with technologies like Transport Layer Security (TLS). Where possible, implement Public Key Infrastructure (PKI) to support two way mutual certificate based authentication between nodes on your network. Avoid production data leaks into test environments. Have controls in place around access to and changes in the production environment. Secure data in transit Ensure that proper certificate and key management practices are in place. Ensure that cryptographic protection is not Remember that cryptography does not help if the encryption key is easy to undermined through improper certificate or compromise. Ensure that keys are changed periodically and that they can key management be changed right away in the event of compromise.
16 Network Risks (3) Ensure confidentiality of data traversing your networks. If channel level encryption is Secure data in transit not possible, apply data level encryption to protect the data traversing your network links. Ensure integrity of data traversing your networks through use of digital signatures and signed hashes. If TLS not used, ensure that other protections for man in the middle attacks exist. Use time stamps to protect against replay attacks. Preserve data integrity Ensure availability of data traversing your networks. If a proper acknowledgement Detect failures and promote fault (ACK) is not received from the destination node, ensure that provisions are in place to tolerance resend the packet. If that still does not work, reroute the packet via a different network link. Implement proper physical security controls to make your network links harder to compromise. Ensure that only standard, approved, and properly reviewed communication protocols are used on your network. Use intrusion detection systems (IDS) to detect anomalous behavior on your network. If anomalous behavior is encountered, have a way to isolate the potentially compromised nodes from the rest of the network. Use proven protocols that have been examined for security weaknesses Detect intrusions
17 Network Risks (4) Ensure that a sufficient number of data points exist from devices on your network before the smart grid takes any actions based on that data. Never take actions based on the data coming from network nodes that may have been compromised. Avoid taking actions based on incorrect data. Ensure that all settings used on your network hardware have been set to their secure settings and that you fully understand the settings provided by each piece of hardware. Do not assume that default settings are secure. Secure configuration Disable all unneeded network services. Routinely review your network logs for anomalous / malicious behavior via automated and manual techniques. Ensure that sufficient redundancy exists in your network links so that rerouting traffic is possible if some links are compromised. Before granting users access to network resources, ensure that they are authenticated and authorized using their own individual (i.e., non shared) credentials. Reduce attack surface Intrusion detection Continuity of operations Enforce accountability
18 Network Risks (5) Limit remote access to your networks to an absolute minimum. When required, use Prevent unauthorized access technologies like Virtual Private Networks (VPN) to create a secure tunnel after properly authenticating the connecting party using their individual credentials. In addition to user name and password, also use a separate technology (an RSA ID like device) to provide an additional factor of authentication. Implement remote attestation techniques for your field devices (e.g., smart meters) to ensure that their firmware has not been compromised Require a heart beat from your field equipment at an interval known to the piece of equipment and to the server on your internal network. If a heart beat is missed or comes at the wrong time, consider treating that piece of equipment as compromised / out of order and take appropriate action. Ensure that the source of network time is accurate and that accurate time is reflected on all network nodes for all actions taken and events logged. Prevent unauthorized modification of firmware on field equipment Detect tampering with field equipment Maintain accurate network time Document the network access level that is needed for each individual or role at your Maintain control and least privilege of organization and grant only the required level of access to these individuals or roles. access to network resources All exceptions should be noted. All equipment connected to your network should be uniquely identified and approved for use on your organization s network. Control hardware that gets connected to your organization s network
19 Platform Risks (1) Ensure latest security patches are applied to all software running on your network hosts Ensure the latest antivirus / antimalware software runs regularly Ensure that all unneeded services and interfaces (e.g., USB interface) are turned off on these hosts. Ensure that the hosts run only services and applications that are absolutely necessary Ensure that system logs are checked regularly and any abnormalities are investigated Run software to monitor for file system changes. Ensure that all access attempts and any elevation of privilege situations are properly logged and reviewed. Ensure that passwords are of sufficient complexity and changed periodically. Ensure that all security settings on your hosts are configured with security in mind. Patch known weaknesses so that they cannot be exploited Detect known viruses and/or malware Minimize attack surface Minimize attack surface Detect intrusions / attack attempts (both external and internal) Detect system malware infections and unauthorized changes Detect intrusions / attack attempts (both external and internal) Prevent unauthorized access Prevent unauthorized access
20 Platform Risks (2) Ensure that authentication is required prior to gaining access to any services / applications running on your network hosts and that it cannot be bypassed. Make use of a centralized directory like LDAP to manage user credentials and access permissions. Ensure that users have only the minimum privileges needed to do their job functions. If an elevation of privilege is needed, grant it for the minimum amount of time needed and then return the privileges to normal. Ensure that all software updates are properly signed and coming from a trusted source. Prevent the ability to change field device settings without proper authentication. Changes to field device settings should be reported and logged in a central location. These logs should be reviewed frequently. If possible, verify integrity of firmware running on field equipment via remote attestation techniques. Consult with the equipment vendor for assistance. If remote attestation fails, the affected field device should be considered compromised, and should be isolated. Prevent unauthorized access Enforce the principle of least privilege; Prevent unauthorized access; Make it easy to change passwords; Make it easy to revoke access; Make it easy to enforce password complexity; Malware protection Maintain confidence in data coming from field devices by ensuring that they have not been tampered with Maintain confidence in data coming from field devices by ensuring that they have not been tampered with
21 Application Layer Risks Implement security activities and gates into your organization s software development lifecycle (SDLC) (please refer to checklist under Insecure SDLC Risks section for additional detail) Request independent party software security assessments of the applications being purchased to gauge the software s security posture. Your organization develops software that does not have security weaknesses Gain confidence that third party software your organization purchases does not have security weaknesses
22 Advanced Metering Infrastructure (1) Ask software and hardware (with embedded software) vendors for evidence (e.g., g, third party assessment) that their software is free of software weaknesses Perform remote attestation of smart meters to ensure that their firmware has not been modified Make use of the communication protocol security extensions (e.g., MultiSpeak security extensions) to ascertain the data integrity and origin integrity of smart meter data Establish and maintain secure configuration management processes (e.g., when servicing field devices or updating their firmware) Ensure that all software (developed internally or procured from a third party) is developed using security aware SDLC. Apply a qualified third party security penetration testing to test all hardware and software components prior to live deployment Ensure that smart meters and their data are not compromised Ensure that smart meters and their data are not compromised Ensure that smart meters and their data are not compromised Ensure that smart meters and their data are not compromised Ensure that smart meters and their data are not compromised Ensure that smart meters and their data are not compromised
23 Advanced Metering Infrastructure (2) Decouple identifying end user information (e.g., household address, GPS coordinates, etc.) from the smart meter. Use a unique identifier instead. Implement physical security controls and detection mechanisms when tampering occurs Ensure that a reliable source of network time is maintained Disable remote disconnect feature that allows to shut down electricity remotely using a smart meter Preserve user privacy Ensure that smart meters and their data are not compromised Ensure that timely smart grid decisions are taken based on fresh field data Prevent unauthorized disruption / shutdown of segments of the electrical grid
24 Meter Data Management Data arriving to be stored in the MDM does not come from a compromised meter Data arriving to be stored in the MDM is syntactically and semantically valid The system parsing the data arriving in the MDM should make use of all the appropriate data validation and exception handling techniques The MDM system has been designed and implemented using security aware SDLC The MDM system had passed a security penetration test by a qualified third party Cleanse data stored in the MDM from all private information. Gracefully handle denial of service attempts (from compromised meters) Only data from uncompromised meters is stored in the MDM Prevent storing bad data in MDM and prevent potentially harmful / malicious data from compromising the system Prevent storing bad data in MDM and prevent potentially harmful / malicious data from compromising the system Prevent storing bad data in MDM and prevent potentially harmful / malicious data from compromising the system Prevent storing bad data in MDM and prevent potentially harmful / malicious data from compromising the system Promote user privacy Protect MDM system from attacks originating from smart meters
25 Communication Systems (1) Ensure data integrity Ensure origin integrity Use proven communications protocols with build in security capabilities Ensure confidentiality of data where appropriate Ensure proper network segmentation Have a third party perform network security penetration testing Implement sufficient redundancy Protect from man in the middle attacks Protect from replay attacks Use proven encryption techniques Use robust key management techniques Secure communications Secure communications Secure communications Secure communications Compartmentalization, least privilege, isolation, fault tolerance Higher assurance that communications are secure Fault tolerance Secure communications Secure communications Secure communications Secure communications
26 Communication Systems Activity ii / Security Control Ensure data integrity Secure communications Ensure origin integrity Secure communications Use proven communications protocols with build in security Secure communications capabilities Ensure confidentiality of data where appropriate Secure communications Ensure proper network segmentation Compartmentalization, least privilege, isolation, fault tolerance
27 SCADA (1) Appoint a senior security manager with a clear mandate Conduct personnel security awareness training Apply basic network and system IT security practices (e.g., regular security patches, run antivirus, etc.) Ensure that software running in the SCADA environment (e.g., either internal or external) has been built with security in mind and reviewed for security by a qualified third party Enforce the principle of least privilege granting user access to SCADA resources Ensure proper physical security controls Perform monitoring, logging, and ensure that people can be held accountable for their actions Avoid making critical control decisions without human confirmation Make security somebody ss responsibility Help improve the people aspect of security Make your SCADA environment more difficult to compromise Protect from the perils of insecure software Least privilege of access Supplement IT security controls with physical controls Intrusion detection, forensic analysis, holding people accountable. Put the human operator in control
28 SCADA (2) Avoid making critical control decisions based on too few data points Avoid taking critical control decisions based on data points from compromised field devices or based on data that has been tampered with Ensure proper network segmentation in the SCADA environment Ensure sufficient fault tolerance and redundancy in the SCADA environment Develop and test business continuity and disaster recovery plans Use individual (rather than shared) user login accounts with strong passwords Ensure that all hardware authentication settings have been changed from their default values Avoid taking erroneous actions at the SCADA level Avoid taking erroneous actions at the SCADA level Segregate critical control systems from the rest of your organization s corporate environment to promote compartmentalization Plan for failure and continuation of operations Plan for failure and continuation of operations Prevent unauthorized access and promote accountability. Prevent unauthorized access
29 In Home Displays & Web Portals Ensure that the software running on the in home displays are free of software weaknesses, especially if they are remotely exploitable. Ensure the integrity of data shown on the user s in home display Ensure the anonymity and privacy of data (where appropriate) pertaining to electricity usage patterns such that it cannot be tied back to the consumer Perform remote attestation of IHDs to alert the control center when unauthorized firmware updates occur Request third party security penetration testing of IHDs Ensure that attackers cannot remotely control IHDs of users Integrity of data sent to the user Privacy of user s s electrical usage data Knowing when IHDs have been tampered with and should not longer be trusted Assurance that deployed system has an adequate security posture
30 Demand Response Over AMI Same activities and security controls described in the AMI section above Authenticate and validate all control signals coming from the control center to the smart meters Provide consumers a feature to turn off remote control of in house electric devices via smart meters in the event that meters become compromised. Financial penalties should apply however if this action is taken frivolously where no evidence of meter compromise exists. Prevent unauthorized control of electric devices in the consumer s home Consumers should have a default overwrite ability if their smart meters become compromised. However, financial penalties should apply if consumers make use of default overwrite capability frivolously.
31 Interactive Thermal Storage Ensure that the software running on the device controlling the electrical water heaters is free of software weaknesses, especially if they are remotely exploitable. Request third party security assessment of all software used to control the electrical water heater Conduct a security penetration test Build in mechanism to authenticate and validate control signals for the electrical water heater Built in safe guards into the operation of the electrical water heater (e.g., never go above a certain temperature, etc.). This should already come standard on most if not all water heaters. Provide a manual override mechanism where users can prevent their electrical heater from being controlled remotely Ensure that attackers cannot remotely control electrical water heaters of users Ensure that attackers cannot remotely control electrical water heaters of users Ensure that attackers cannot remotely control electrical water heaters of users Ensure that attackers cannot remotely control electrical water heaters of users Ensure human safety Ensure human safety
32 Advanced Volt/VAR Control Ensure that software controlling distribution feeders is free of security weaknesses Implement physical security controls and detection mechanisms when tampering occurs Perform sufficient authentication and validation of all control data bound for distribution feeders Ensure that a human(s) has to review and authorize any changes to electrical distribution feeders Ensure that there are built in safeguards in hardware Prevent unauthorized control of distribution feeders Prevent unauthorized control of distribution feeders Prevent unauthorized control of distribution feeders Prevent unauthorized control of distribution feeders Ensure safe behavior when failures occur
33 Conservation Voltage Reduction Ensure that software controlling voltage regulators and monitors is free of security weaknesses Implement physical security controls and detection mechanisms when tampering occurs Perform sufficient authentication and validation of all control data bound for voltage regulators and coming from voltage monitors Ensure that a human(s) has to review and authorize any changes to voltage Prevent unauthorized voltage reduction behavior Prevent unauthorized voltage reduction behavior Prevent unauthorized voltage reduction behavior Prevent unauthorized voltage reduction behavior Ensure that there are built in safeguards in Ensure safe behavior bh when failures fil occur hardware
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Guide to Developing a Cyber Security and Risk Mitigation Plan
NRECA / Cooperative Research Network Smart Grid Demonstration Project Guide to Developing a Cyber Security and Risk Mitigation Plan DOE Award No: DE-OE0000222 National Rural Electric Cooperative Association,
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
CloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Using Remote Desktop Clients
CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
