Comparing Safety and Security Standards Updated version
|
|
|
- Edgar Arnold
- 9 years ago
- Views:
Transcription
1 Comparing Safety and Security Standards Updated version 3 rd Scandinavian Conference on SYSTEM AND SOFTWARE SAFETY Nicolás Martin-Vivaldi
2 Addalot - 25 year experience History Effect driven process improvement - Services: - Process Improvement - Software Quality - Software Safety - Supplier Management - Open Source Software References: Telecom Ericsson, Nokia, Sony, ST-Ericsson, Telenor, Telia, Automotive AtlasCopco, Autoliv, BMW, BorgWarner, Bosch, Consat, GM, Mecel, Saab, Stoneridge, Volvo Defense BAE Systems, EADS, FMV, Kockums, Kongsberg, Saab, Terma, Thales Finance & IT Emric, Ikano, Ikea, Lawson, Nordstedt, Palette, Point, Qlik, Readsoft, SEB, Tieto, Visma Offshore ABB, Berg Propulsion, DNV, Dolphin, FMC, Fugro, Saipem, Statoil, Wilhelmsen 2
3 Background Definitions - Safety is the absence of unacceptable risk - Security is protection or defense against attack, interference, or espionage. Used to be separated but are becoming more related - Telematics - Internet of Things Security risk Safety problem Both Security & Safety work are standard driven Any model differences? - A large and quite confusing area with many standards - Overview rather than in depth details 3
4 Security Standards Many different standards: ISO ISO / ISO / ISO 27005(*) IEC (*) SSAE 16 AICPA Trust Services Cybertrust CMM-I extensions CERT Resilience Management Model Common Criteria (*) Microsoft SDL (*) Included after WS comments 4
5 ISO : - ISO/IEC 27001:2005 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements : - ISO/IEC 27002:2005 has developed from BS7799, published in the mid-1990s. The British Standard was adopted by ISO/IEC as ISO/IEC 17799:2000, revised in 2005, and renumbered (but otherwise unchanged) in 2007 to align with the other ISO/IEC series standards. - ISO/IEC provides best practice recommendations on information security management for use by those responsible for initiating, implementing or maintaining information security management systems (ISMS) : - ISO/IEC 27005:2011provides guidelines for information security risk management and supports the general concepts specified in ISO/IEC and is designed to assist the satisfactory implementation of information security based on a risk management approach 5
6 ISO Contextual Requirements Figure out what your ISMS should apply to and clarify its scope. 5. Leadership Requirements Provide leadership Security policy. 6. Planning Requirements Manage risks and address opportunities Set security objectives and develop plans to achieve them. 7. Support Requirements Resources Competence Responsibilities Communication needs Managing information 8. Operational Requirements Plan and control your processes Security risk assessments Security risk treatment plan. 9. Evaluation Requirements Monitor, measure, analyze, and evaluate Set up an internal audit program and use it to evaluate your ISMS Review performance of your ISMS at planned intervals. 10. Improvement Requirements Identify nonconformities and take corrective actions Enhance performance of your ISMS. Generic Process management compliance - could replace Security with any other ity. Flexible when it comes to scope has to be defined by section 4 Little guidance on specific techniques, e.g. Figure out how 6
7 ISO (2005) Structure Security Policy Organization of Information Security Human Resources Security Asset Management Access Control Cryptography Physical And Environmental Security Operations security Communications Security Information Systems Acquisition, Development, Maintenance Supplier Relationships Information Security Incident management Information Security Aspects of Business Continuity Compliance Structure has changes somewhat to
8 27002: System acquisition, development and maintenance 14.1 Security requirements of information systems 14.2 Security in development and support processes Secure development policy System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages Secure system engineering principles - Principles for engineering secure systems shall be established, documented, maintained and applied to any information system implementation efforts Secure development environment Outsourced development System security testing System acceptance testing 14.3 Test data Still no specific guidelines 8
9 ISO Information security risk management The standard doesn't specify, recommend or even name any specific risk management method. It does however imply a continual process consisting of a structured sequence of activities, some of which are iterative: - Establish the risk management context - Quantitatively or qualitatively assess - Treat the risks appropriately, using those levels of risk to prioritize them; - Keep stakeholders informed throughout the process; and - Monitor and review risks, 9
10 IEC (formerly ISA-99) A series of standards, technical reports, and related information that define procedures for implementing electronically secure Industrial Automation and Control Systems (IACS) It introduces the concepts of zones and conduits as a way to segment and isolate the various sub-systems in a control system. - A zone is defined as a grouping of assets that share common security requirements and has a security level capability. - Any communications between zones must be via a defined conduit. All ISA standards and technical reports are organized into four categories: - General, concepts, models, terminology, security metrics and security life cycles for IACS. - Policies and Procedures, creating and maintaining an effective IACS security program (Owner) - System, system design guidance and requirements for the secure integration of control systems - Component, specific product development of control system products Product development requirements - Defines the development process that should be used to create products that make up the industrial automation and control system. - Covering requirements design implementation test & verification 10
11 SSAE 16 SSAE 16, Statement on Standards for Attestation Engagements 16, is a regulation created by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA) for redefining and updating how service companies report on compliance controls. SSAE 16 is the reporting standard for all service auditors reports from June 15 th, 2011, and beyond. SSAE 16 was preceded by SAS 70, which had been in effect since April Accountants know that they cannot test security which is probably why the TSPC are so vague. Security professionals have the right security standards, but they do not understand what assurance is, or how it is achieved. J. Long 11
12 SSAE 16, SOC s (Service Organization Controls) SSAE 16 SOC 1 report suffers from the same fundamental problem that the SAS 70 had before it: the controls are self-defined. SOC 2(internal) and SOC 3 (external) reports are aligned with the AICPA Trust Services Principles and Criteria (TSPC). These principles are focused on five areas: - Security: Unauthorized access to systems (physical and logical) is prevented through controls. - Confidentiality: Sensitive information labeled as confidential is protected with adequate controls (customer data and systems would likely fall into this category). - Privacy: Personal information is collected and managed in accordance with the AICPA Generally Accepted Privacy Principles. - Availability: Systems are designed with uptime and availability in mind, and continuity of system operations is maintained. - Processing Integrity: All system processing activities are accurate, authorized and complete. Types - Type 1: Snapshot - Type 2: Period, 6 or 12 months ISAE 3402 is the international version of the US SAEE16 (with some modifications) 12
13 AICPA Trust Services Principles and Criteria (TSPC) CC1.2 CC1.3 CC1.4 CC3.0 CC3.1 CC3.2 CC3.3 CC4.0 CC4.1 Responsibility and accountability for designing, developing, implementing, operating, monitoring, maintaining, and approving the entity s system controls are assigned to individuals within the entity with authority to ensure policies and other system requirements are effectively promulgated. Personnel responsible for designing, developing, implementing, operating, monitoring, and maintaining the system affecting [insert the principle(s) being reported on; for example, security, availability, processing integrity, and confidentiality] have the qualifications and resources to fulfill their responsibilities. The entity has established employee conduct standards, implemented employee candidate background screening procedures, and conducts enforcement procedures to enable it to meet its commitments and requirements as they relate to [insert the principle(s) being reported on; for example, security, availability, processing integrity, and confidentiality]. Common Criteria Related to Risk Management and Design and Implementation of Controls The entity (1) identifies potential threats that would impair system [insert the principle(s) being reported on; for example, security, availability, processing integrity, and confidentiality] commitments and requirements, (2) analyzes the significance of risks associated with the identified threats, and (3) determines mitigation strategies for those risks (including controls and other mitigation strategies). The entity designs, develops, and implements controls, including policies and procedures, to implement its risk mitigation strategy. The entity (1) identifies and assesses changes (for example, environmental, regulatory, and technological changes) that could significantly impact the system of internal control for [insert the principle(s) being reported on; for example, security, availability, processing integrity, and confidentiality] and reassesses risks and mitigation strategies based on the changes and (2) reassesses the suitability of the design and deployment of control activities based on the operation and monitoring of those activities, and updates them as necessary. Common Criteria Related to Monitoring of Controls The design and operating effectiveness of controls are periodically evaluated against [insert the principle(s) being reported on; for example, security, availability, processing integrity, and confidentiality] commitments and requirements. 13
14 Cybertrust by Verizon Five critical control groups: Policy: should include areas as access control, antivirus, data handling, third-party communications, and Internet usage, and help desk policies. Human: Human resources that can affect the organization's overall security posture, such as security policies, management procedures, training, hiring, corrective actions and general information awareness. Physical: includes the power source, water supply, doors, alarms, ventilation. In addition, organization's backup, failover, and disaster recovery systems and locations. Device: Includes physical computers, operating systems deployed as Internet servers, database servers, firewalls, routers, switches and desktop computers. Network: Addresses the network interfaces that enable computers and other devices to provide Internet-based users with desired services. Examples of such devices include routers, firewalls, switches, hubs, security domains, wiring/cabling, modems, and DNS. Little about development processes Seems to be focused on operations 14
15 Security by Design with CMMI Extended CMMI with new areas: Process Management - SG1: Establish an Organizational Capability to Develop Secure Products Project Management - SG1: Prepare and Manage Project Activities for Security - SG2: Manage Product Security Risk Engineering: Security Requirements and Technical Solution - SG1: Develop Customer Security Requirements and Secure Architecture and Design - SG2: Implement the Secure Design Engineering: Security Verification and Validation - SG1: Perform Security Verification - SG2: Perform Security Validation 15
16 CERT Resilience Management Model Engineering - Asset Definition and Management - Controls Management - Resilience Requirements Development - Resilience Requirements Management - Resilient Technical Solution Engineering - Service Continuity Enterprise Management Operations Process Management Not very informative TS ENG: Goals and Practices SG1 Establish Guidelines for Resilient TS Development - SP1 Identify General Guidelines - SP2 Identify Requirements Guidelines - SP3 Identify Arch and Design Guidelines - Guidelines for designing resilience into software and systems are identified. - SP4 Identify Implementation Guidelines - SP5 Identify Assembly and Integration Guidelines SG2 Develop Resilient TS Dev. Plans SG3 Execute the Dev. Plan 16
17 Common Critera (related ISO/IEC ) Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements (SFRs and SARs respectively) through the use of Protection Profiles (PPs), vendors can then implement and/or make claims about the security attributes of their products, and testing laboratories can evaluate the products to determine if they actually meet the claims. Target Of Evaluation (TOE) the product or system that is evaluated through - Protection Profile (PP) a document, typically created by a user or user community, which identifies security requirements for a class of security devices relevant to that user - Security Target (ST) the document that identifies the security properties of the target of evaluation - Security Functional Requirements (SFRs) specify individual security functions which may be provided by a product. The Common Criteria presents a standard catalogue of such functions. Focus on the security requirements and the evaluation of the same! Little focus on the implementation 17
18 Microsoft SDL SDL = Security Development Lifecycle Concrete development practices based on Microsoft s own development Can be integrated with other processes Each practice is supported by training and guidelines Concrete and understandable 18
19 Software security training Secure design - Attack surface reduction - Defense in depth - Principle of least privilege - Secure defaults Threat modeling - Overview of threat modeling - Design implications of a threat model - Coding constraints based on a threat model Secure coding - Buffer overruns (for applications using C and C++) - Integer arithmetic errors (for applications using C and C++) - Cross-site scripting (for managed code and Web applications) - SQL injection (for managed code and Web applications) - Weak cryptography Security testing - Differences between security testing and functional testing - Risk assessment - Security testing methods Privacy - Types of privacy-sensitive data - Privacy design best practices - Risk assessment - Privacy development best practices - Privacy testing best practices 19
20 SDL Practice 12: Fuzz Testing Fuzz testing is a specialized form of dynamic analysis used to induce program failure by deliberately introducing malformed or random data to an application. 20
21 Summary of Security Standards Strong in Administrative systems / Data centers Mainly organisational aspects - Policy - Strategy - Roles & Responsibilities - Management awareness - Formalized handovers High focus on operations - Facilities - Personnel (screening, education ) - Data management - Risks Little guidance on actual development (except SDL and IEC-62443) Most standards lack levels (Swedish Armed Forces have security classes) Models exist for checking different security threats: eg STRIDE - Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, Elevation of privilege 21
22 Safety Standards Many different standards - Automotive ISO Machine IEC Medical device IEC 62304, Process IEC Railway EN 50126, 50128, 50129, IEC Aerospace RTCA DO-178C In summary - Some requirements on organisational level: - Safety policy and culture, Safety lifecycle, QMS, Safety responsible, Training and qualification measures - High focus on the specific delivery - Safety Concept and Goals with different safety level (e.g. SIL) are reached through - Technical solutions (e.g. redundancy, diversity) - Relevant methods (e.g. defensive programming) 22
23 Conclusions Security and Safety standards have in general little overlap Meeting one will not cover the other Security can learn from Safety SILs and related techniques Safety can learn from Security on organisational level 23
24 Excellent firms don't believe in excellence - only in constant improvement and change. In Search of Excellence - Tom Peters [email protected]
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
Security Levels in ISA-99 / IEC 62443
Summary Assessment of the security protection of a plant A Security Protection Level has to be assessed in a plant in operation A Protection Level requires both: The fulfillment of the policies and procedures
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
The rocky relationship between safety and security
The rocky relationship between safety and security Best practices for avoiding common cause failure and preventing cyber security attacks in Safety Systems Abstract: An industry practice reflected in the
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016
Understanding SOC Reports for Effective Vendor Management Jason T. Clinton January 26, 2016 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2012 Wolf & Company, P.C. Before we
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)
kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR) June 2015 Table of Contents CASPR... 2 FIPS 140-2: Security Requirements For Cryptographic Modules... 2 Federal
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Cloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group [email protected] Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Cisco and VMware Virtualization Planning and Design Service
Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
CASPR Commonly Accepted Security Practices and Recommendations
hhhhhhhhhhhhhh CASPR Commonly Accepted Security Practices and Recommendations CASPR is an open-source project aimed at documenting the information security common body of knowledge through commonly accepted
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 [email protected] Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd
BS 25999 Business Continuity Management By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd 1 Contents slide BSI British Standards 2006 BS 25999(Business Continuity) 2002 BS 15000
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
The Security Development Lifecycle. Steven B. Lipner, CISSP [email protected] Senior Director Security Engineering Strategy Microsoft Corp.
The Security Development Lifecycle Steven B. Lipner, CISSP [email protected] Senior Director Security Engineering Strategy Microsoft Corp. 2 Overview Introduction A look back Trustworthy Computing
ISA-99 Industrial Automation & Control Systems Security
ISA-99 Industrial Automation & Control Systems Security Jim Gilsinn National Institute of Standards & Technology (NIST) Engineering Laboratory ISA99 Committee Addresses Industrial Automation and Control
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).
Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
NEW SCHEME FOR THE INFORMATION SECURITY MANAGEMENT WITH ISO 27001:2013
NEW SCHEME FOR THE INFORMATION SECURITY MANAGEMENT WITH ISO 27001:2013 INTRODUCTION The Organization s tendency to implement and certificate multiple Managements Systems that hold up and align theirs IT
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION
48 IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION MATÚŠ HORVÁTH, MARTIN JAKUB 1 INTRODUCTION Managerial work is directly dependent on information, it is therefore
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
Information Technology Auditing for Non-IT Specialist
Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs
1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim [email protected] Gary E. Murphy [email protected] Michael J. Decker [email protected]
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Quality Manual ISO 9001:2015 Quality Management System
Quality management input comprises the standard requirements from ISO 9001:2015 which are deployed by our organization to achieve customer satisfaction through process control. Quality Manual ISO 9001:2015
