From the Lab to the Boardroom:
|
|
|
- Lenard Willis
- 10 years ago
- Views:
Transcription
1 From the Lab to the Boardroom: How to perform a Security Risk Assessment Like a Professional Doug Landoll, CISSP, CISA General Manager, Security Services En Pointe Technologies [email protected] (512) (877) 321-RISK
2 Agenda SRA Introduction Security Risk Assessment Project Phase 1: Project Definition Phase 2: Project Preparation Phase 3: Data Gathering Phase 4: Risk Analysis Phase 5: Risk Mitigation Phase 6: Recommendations SRA Project Management
3 Security Risk Assessment Introduction SRA Role SRA Definition SRA Need What SRA is NOT
4 Security Risk Assessment Role Risk Assessment threats / likelihood vulnerabilities / exploitation assets / impact risk / countermeasures Test & Review scanning audit of controls Operational Security patches incident handling training Risk Mitigation safeguard implementation additional controls
5 Security Risk Assessment Definition An objective analysis of the effectiveness of the current security controls that protect an organization s assets and a determination of the probability of losses to those assets.
6 Security Risk Assessment Need Risk High Security Improvements Lower Risk Security awareness training Security patches Security policy development Anti-virus updates Operating system hardening Incident handling Low Changing Threats and Environment Increase Risk Over Time New exploits New system functions New regulations Staff turnover Time
7 What SRA is NOT Term Gap Assessment Compliance Audit Definition A review of security controls against a standard. Verification that all required security controls are in place. Purpose To provide a list of controls required to become compliant. To attest to an organization s compliance with a standard. Security Audit A verification that specified security controls are in place. To attest to an organization s adherence to industry standards. Penetration Testing Vulnerability Scanning A methodical and planned attack on a system s security controls. An element of penetration testing that searches for obvious vulnerabilities. To test the adequacy of security controls in place. To test for the existence of obvious vulnerabilities in the system s security controls.
8 Security Risk Assessment Phases Project Definition Project Scope -Budget -Objective -Assets -Controls -Boundaries 1 Project Preparation Team Preparation -Select Team -Introduce Team 2 Project Preparation -Obtain Permission -Review Business Mission -Identify Critical Systems Project -Map Assets Scope -Identify Threats -Determine Expected Controls Administrative 3A Administrative Data Gathering -Policy Review -Procedure Review -Training Review -Organization Review -Interviews -Observation Technical Technical Data Gathering -Design Review -Configuration Review -Architectural Review -Security Testing 3B Physical Physical Data Gathering -Policy Review -Procedure Review -Observation -Inspection 3C Risk Analysis Determine Risk -Asset Valuation -Threat and Vulnerability Mapping -Calculate Risk -Create Risk Statements) -Obtain Team Consensus 4 Risk Mitigation Safeguard Selection -Safeguard Cost -Safeguard Effectiveness -Solution Sets 5 Recommendations Risk Recommendation -Risk Acceptance -Risk Mitigation -Risk Assignment 6 Documentation -Executive Summary -Report -Appendices -Presentation
9 1: Project Definition Scope clear understanding of project Budget (time and money) Objective (goal) Assets (named assets covered) Controls (administrative, physical, technical) Boundaries (technical, physical, organizational)
10 2. Project Preparation Team Selection Obtain permissions Review business mission Identify critical systems Map assets to critical systems Identify threats Determine expected controls
11 3. Data Gathering Administrative Policies, procedures, training, organizational structure, behaviors, personnel Physical Facility design, environmental controls, barriers, alarms, behaviors, response, documentation Technical Security architecture, device configuration, security testing
12 Current SRA Data Gathering Guidance How exactly do we assess mechanisms? [Ensure that] the organization s hiring and termination practices for staff take information security issues into account. [Assess whether] the organization uniformly enforces its security policies. Run Vulnerability Evaluation Tools on Selected Infrastructure Components [ensure you have the] correct tool...[and the] latest version...
13 SRA Data Gathering Performance SRA Execution hero lead more than process lead (and not enough heroes) Checklist-based (misapplied and misinterpreted) SRA Scope and Rigor Unclear scope of assessment (boundaries, techniques, mechanisms) Unclear rigor of assessment (skills, time expended, analysis) SRA Results Not standardized Not comparable Not repeatable
14 Data Gathering Performance Labor intensive Lots of data, activities, hours Project Control Issues Organizing and presenting data Tracking progress Ensuring appropriate coverage Little structure or guidance A structured approach to data gathering
15 What's Needed General approach to improve current data gathering Less reliance on heros More repeatable and comparable results Standardized approach Clear rigor and coverage
16 The RIIOT Approach The RIIOT Approach Provides a general approach to improve SRA data gathering Works with current commercial or proprietary approaches Supplements current SRA approaches, commercial or proprietary
17 The RIIOT Approach to Data Gathering Organizes the task of gathering volumes of data on a wide variety of controls. Identifies the 5 methods to data gathering Maps appropriate method for each security mechanism Lists data gathering techniques for each method/mechanism pair Introduced in Security Risk Assessment Handbook
18 Detail Solution There are 5 Methods of Gathering Data R I I O T Review documentation Interview Key Personnel Inspect Controls Observe Behaviour Test Controls
19 RIIOT: Review Documentation R Key Mechanisms (Controls) Rules, configurations, networks, architectures, physical layouts, and other mechanisms. Important Elements: Review for: Clarity Content, Correctness, Completeness, Consistency Expected Elements Review
20 Example Review Procedures Objective Sub-topic Review Tips Gather information from past security review efforts to improve data gathering in the current security risk assessment Mission Statement System Components & Boundaries Roles & Responsibilities Check mission statements recorded in other reports against the ones provided to you. If they are different ask key personnel why this has changed? Review named system components and indicated system boundaries and compare them to the current statement of work. If they are different ask key personnel for an explanation. Look for any components, subsystems, areas, or interfaces that have not been included in the last or present assessment. For example, some organizations never include physical security as a part of the assessment. Determine if the lack of review for organizational elements is a vulnerability. Look for definitions of roles and responsibilities from previous reviews. Specifically, look for responsibilities such as running an internal vulnerability scan, account review, or other security activities.
21 RIIOT: Interview Key Personnel I Key Mechanisms (Controls) Duties and responsibilities Process and procedure (practice and knowledge) History of incidents
22 RIIOT: Interview Key Personnel I Important Elements: Determine Subjects, Interviewer Review Relevant Document (Prepare) Determine Objective for Interview Confirmation of information Measurement of security awareness Identification of interviewee vulnerabilities Determine ability to perform duties Determine Type of Interview guided, fixed response, conversational, open-ended Prepare questions / questionnaire
23 Example Interview Procedure Security ProgramInterview Questions Objective Sub-Topic Question Determine existence and adequacy of security controls within information security program Security Awareness Policy Development Risk Assessment Security Review Do you have a list of all users who need training and have received it? Where are the records kept? Do these records include a signature of the student and the instructor? When were the policies last updated? How long did it take to get themapproved? How were users informed of their change? New signatures? How often are risk assessments performed? By whom? What is their relationship to the organization or any of its security controls? Did they recommend products? Did you buy them? Do you think other departments are following the policies you set for them(operations, monitoring, development)? Would it surprise you if I told you they were not? Do you have any annual or periodic report on the security posture of your organization?
24 RIIOT: Inspect Controls I Inspection: Assess security mechanisms Performed where testing is infeasible, ill-advised or out of scope Key Mechanisms (controls): Fire suppression system Glass break alarm
25 RIIOT: Inspect Controls I Important Elements List controls Visitor control, configuration files, smoke detectors, incident response handling. Verify information gathered Determine vulnerabilities Inspect against industry standards, checklists, common vulnerabilities, or against experience and judgement. See example (next slide) Document and review findings
26 Example Inspection Procedure Security Lighting Inspection Checklist Objective Key Topics Example Questions Determine existence and adequacy of security controls within lighting system. Sabotage Single Point of Failure Access Control Tour areas critical to lighting systems to determine susceptibility to sabotage Switchyards Transformers Circuit breakers Power lines Engine generators UPSs Inspect lighting system to determine if security lighting systems have any single points of failure Single lighting circuit Power supply on a single circuit breaker Single power grid Inspect access controls on areas containing lighting system components.
27 RIIOT: Observe Behavior O Observation: View organization response and behavior of various situations Key Mechanisms Enforcement of policy (visitor control, media control, security awareness) Techniques Observe key behaviors Cause situations that enact policy Example, put your visitor badge in your pocket
28 Example Observation Procedure Technical Control Claim Observation Test or Procedure Check Audit Logs Anti-Virus Systems Screen Savers All security relevant events are audited and reviewed. System prevents virus infection Updates are performed regularly Users cannot block scans or updates All workstations have active screen savers with passwords Review audit logs for security relevant events that transpired during the onsite. Wait a few days after an auditable event and check to see when the event was first reviewed. Be aware of viruses that may be circulating during the time of the assessment. Determine from observation if the virus is having an effect on the information system. When given the chance to interview users or inspect a workstation, check to see if the latest updates have been applied. Also check to see if scans or updates can be blocked. General observations of user behavior and workstations viewed while onsite.
29 RIIOT: Test Controls T Key Mechanisms: Firewalls, servers, open door alarms, motion sensors. Important elements Documentation (repeatability, trouble shooting) Coverage (sampling or complete)
30 RIIOT: Test Controls Types of testing T Information accuracy Verify information obtained through interviews and documents Vulnerability testing Test for the presence of known vulnerabilities Penetration Testing Exercise discovered vulnerabilities to demonstrate failure to enforce policy Techniques Vulnerability scanners Shuffle test
31 Example Test Procedure Physical Control Claim Testing Procedure Door and Locks Doors and locks are in good working order. Doors and locks are adequately protected. Timed Closure Test: Open the door to a 90 degree angle and time how long it takes to close. A rule of thumb is six (6) to eight (8) seconds is reasonable. Doors that close slower are susceptible to tailgating. Closing Latch Test: Open door just one inch. Let go and witness if the door closes shut or stays open due to the friction or pressure of the latch. Protected Latch Test. Inspect door to determine if the door latch is exposed to the outside. This basically means there is a lack of shielding between the door frame and the door near the door handle. If latch is exposed, attempt to defeat the mechanism through the use of a credit card, butter knife, or other tool. Motion Sensor Activated Doors. Attempt to circumvent door lock through unprotected gaps in the door. Methods include sliding a coat hanger with a piece of foil on the end through the door gap. The motion and heat of the foil could trip the motion sensor to open the door as is someone from the inside was approaching.
32 4. Risk Analysis High critical Medium important Low useful Risk Asset Frequent Probable Conceivable Improbable Remote Threat Easy Moderate Difficult Extremely Difficult Vul. nerability Countermeasures
33 5. Risk Mitigation Safeguard selection Cost (time, money, training, integration) Effectiveness Solution sets Policy, training, product, procedures, sanctions
34 Risk recommendation Acceptance Mitigation Assignment Documentation Executive summary Report Appendices Presentation 6. Recommendations
35 Backup Slides For use during Q&A (if needed)
36 Detail Solution There are 5 Methods of Gathering Data R I I O T Review documentation Interview Key Personnel Inspect Controls Observe Behaviour Test Controls
37 SRA Basics Likelihood Threats Impact Vulnerabilities Assets
38 RIIOT Application Controls Review Documents Interview Key Personnel Inspect Controls Observe Behavior Test Controls Monitoring Technology X X Audit Logs X X X X Logical Access Controls X X Checksums X * Encryption X X * Anti-virus System X X X Single Sign On Systems X * Two-Factor Authentication X * Identity Management Systems X X X Automated Password Policies X X Password Crackers Password Generators Data Backup Technologies X X X X
39 Backup Slides Security Organization Maturity Level 3: The Security Organization C-level reporting oversight, governance, operations complete security focus Level 2: The Security Team security guy with a staff assigned responsibility IT focused only no oversight Level 1: The Security Guy admin with security interest default responsibility activities include only those thing interesting
40 SRA Method Roundup SRA Basis What unbiased Repeatable Expert How Facilitated X X Process X X X Questionnaire X X X Tool X X X Interview X X X X
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
ASDI Full Audit Guideline Federal Aviation Administration
ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
1 Introduction 2. 2 Document Disclaimer 2
Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Conducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
PCI-DSS Penetration Testing
PCI-DSS Penetration Testing Adam Goslin, Co-Founder High Bit Security May 10, 2011 About High Bit Security High Bit helps companies obtain or maintain their PCI compliance (Level 1 through Level 4 compliance)
Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM
Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.
As your trusted financial partner, Maps Credit Union is committed to helping you assess and manage risks associated with your business online banking. We recommend that you do a periodic risk assessment
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Lessons Learned CIP Reliability Standards
Evidence for a requirement was not usable due to a lack of identifying information on the document. An entity should set and enforce a "quality of evidence" standard for its compliance documentation. A
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Hosts HARDENING WINDOWS NETWORKS TRAINING
BROADVIEW NETWORKS Hosts HARDENING WINDOWS NETWORKS TRAINING COURSE OVERVIEW A hands-on security course that teaches students how to harden, monitor and protect Microsoft Windows based networks. A hardening
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
