APPLYING MEHARI TO A FICTITIOUS COMPANY
|
|
|
- Baldric Campbell
- 10 years ago
- Views:
Transcription
1 METHODS APPLYING MEHARI TO A FICTITIOUS COMPANY September 2000 Version 1.0 Methods Committee CLUB DE LA SECURITE DES SYSTEMES D INFORMATION FRANÇAIS 30, Rue Pierre Sémard Paris Mail : [email protected] Web :
2 Acknowledgements The CLUSIF wishes to honor with special thanks the persons who have made possible such a document : Olivier ANTOINE Student Jacques BOUSTANI Student Dominique BUC Buc S.A. Roland COLONGES Ministry of Defense Marie-Hélène COURBIS Euriscom Guillaume DE LA ROCHEFOUCAULD Individuel André DENIS A. Denis Consultants Didier DRAPEAU Syn@rgy Annie DUPONT J.A.A. Guy ESTIVAL Michelin Jacques GONIK Consultant Matthieu GRALL Student Paul GRASSART Clusif Jean-Christophe KEIB Student Rachid MESBAHI F.N.M.F Gérard MOLINES Interbrew Cobrew Didier MONNIER C.A.N.S.S.M. Gilbert VAISSIERE Arès Applying MEHARI to a fictitious company CLUSIF 2000
3 Table of contents 1 INTRODUCTION CLUSIFRANCE The MEHARI Process The method s phases PHASE 1 STRATEGIC SECURITY PLAN Risk measurement system and security objectives Company assets : resources classification Step 1 : define the activity domains and processes Step 2 : detect the sensitive processes Step 3 : determine the impact criteria Step 4 : establish the seriousness thresholds Step 5 : inventory the resources Step 6 : classify the resources Security policy Management Charter PHASE 2 SECURITY OPERATIONAL PLANS Audit of the current situation Step 1 : perform cell breakdown Step 2 : perform the audit Step 3 : generate the audit results Assessment of scenario seriousness Step 1 : replicating a standard scenario Step 2 : calculation of efficiency Step 3 : calculation of the detail status Step 4 : calculation of potentiality Step 5 : calculation of impact reduction Step 6 : calculation of impact Step 7 : calculation of seriousness Security operational plan PHASE 3 COMPANY OPERATIONAL PLAN Choosing representative indicators Elaboration of a company security indicator spread sheet Balancing and arbitration between units APPENDICES APPENDIX A : COMPANY ACTIVITY DOMAINS APPENDIX B APPENDIX C APPENDIX D Applying MEHARI to a fictitious company CLUSIF 2000
4 1 Introduction This document is intended for the use of persons wishing to apply the MEHARI method. The MEHARI process is described through a study carried out on a fictitious company, CLUSIFRANCE. As prerequisite to a good understanding of this document, a thorough assimilation of the method is mandatory. 1.1 CLUSIFRANCE CLUSIFRANCE is a privately owned company (Turnover ), whose main activity is to manufacture and sell ready-to-wear clothing. The company has two distant locations : headquarters in Paris La Défense and a plant in Nîmes. The IT infrastructure supporting the various activities of the Company is based on a LAN on each site, a WAN insuring sites interconnection, and on computers (mainframe, office server, work-stations ). 1.2 The MEHARI Process The process consists of three phases : Strategic Security Plan (SSP) : - Risk measurement system and security objectives, - Company assets : resources classification, - Security policy, - Management charter ; Security Operational Plans (SOP) : - Audit of the current situation, - Assessment of scenario seriousness, - Formulation of security requirements - Drawing up of the security operational plan; Company Operational Plan (COP) : - Selection of representative indicators, - Elaboration of a company security indicators synthesis work-sheet, - Balancing and arbitration between units. Applying MEHARI to a fictitious company CLUSIF 2000
5 Introduction The method s phases Risk measurement system and security objectives Company values : resource classification Security policy Management chart Security strategic plan Phase 1 Preliminary study : investigated domain, scenario basis, classification recapture Phase 2 - Unit Z Phase 2 - Unit Y Phase 2 - Unit X Current situation audit Scenario seriousness assessment Security requirements definition Operational security plan Phase 2 Selection of representative indicators Drawing up a company security indicator chart Balancing and arbitrating between units Company operational plan Phase 3 CLUSIF Applying MEHARI to a fictitious company
6 2 Phase 1 strategic security plan The Strategic Security Plan (SSP) is drawn up with Corporate Management. Its aim is to set security objectives for the Company so that all actions which are undertaken and implemented throughout the Company (distant locations included) work towards these same objectives and protect resources depending on their classification. The SSP is the reference for operational units as far as decisions to be taken with respect to security are concerned. This phase requires participation of the company s top management as well as that of its middle management. Applying MEHARI to a fictitious company CLUSIF 2000
7 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 Phase 1 strategic security plan Risk measurement system and security objectives The objective of this section is to particularize decision grids related to risks. CLUSIF Applying MEHARI to a fictitious company
8 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 2 Phase 1 strategic security plan 2.2 Company assets : resources classification The objective of this section is to classify company resources. Step 1 : Define the activity domains Step 2 : Detect the sensitive processes Step 3 : Determine the impact criteria Step 5 : Inventory the resources Step 4 : Define the seriousness thresholds Step 6 : Classify the resources Applying MEHARI to a fictitious company CLUSIF 2000
9 Phase 1 strategic security plan Step 1 : define the activity domains and processes Step 1 consists in drawing a map of the company. A cartography of the company allows the definition of activity domains and of their processes (cf. annex A). CLUSIFRANCE has the following activity domains : Production ; Human Resources ; Logistics ; Purchasing ; Sales ; Marketing ; Accounts-Finance. For instance in the activity domain "Purchasing" the following processes are present : Supplier follow-up ; Inventory management Step 2 : detect the sensitive processes In this step, it is required to interview the company managers in order to identify the sensitive processes. According to the company s top and middle managers, the vital processes are the following : "Supplier follow-up" in the "Purchasing" domain ; "Manufacture" in the "Production" domain ; "Administration of the orders" in the "Sales" domain. Taking into account that the Mehari process must be the same for every sensitive process, one only develops in this study the process "Supplier follow-up". The latter allows the purchasing manager to better select the raw material suppliers in taking prices, quality and delivery terms into account. The result for CLUSIFRANCE is a better competitiveness and the resulting turnover Step 3 : determine the impact criteria In this step, the question to be raised with the managers is that of the impact on the company in terms of operations, finance or image in case of dysfunction of one of the vital processes. We will therefore determine the impact criteria which can affect CLUSIFRANCE in case of dysfunction of the process "Supplier follow-up" of the "Purchasing" activity domain. The selected impact criteria are (cf. annex B) : fall in CLUSIFRANCE turnover ; fall in CLUSIFRANCE production Step 4 : establish the seriousness thresholds In this step, it is required to establish the four seriousness threshold levels related to every selected impact criteria (cf. annex B) : Level 1: Without significant damage on the company operations. CLUSIF Applying MEHARI to a fictitious company
10 2 Phase 1 strategic security plan Level 2: Significant damage on the competitive position of the company operations. Level 3: Serious damage not endangering a company domain. Level 4: Extremely serious damage endangering the company. The thresholds related to the impact criteria "Fall in turnover" follow : Level 1: fall in turnover of ; Level 2: fall in turnover of ; Level 3: fall in turnover of ; Level 4: fall in turnover of ; The thresholds related to the impact criteria "Fall in production" follow : Level 1: one day production outage ; Level 2: five days production outage ; Level 3: one month production outage ; Level 4: one month or more production outage ; Step 5 : inventory the resources Every process is linked to an information system. This information system exists thanks to resources of different types (cf. annex C) : Premises ; Human resources ; Support structure; Computer data processing ; Data. For the process "Supplier follow-up" of the "Purchasing" activity domain, the only resources to be studied are the following : headquarter offices (Premises) ; purchasing manager (Human resources) ; AS400 (Support structure) ; purchasing application (Computer data processing) ; supplier data base (Data) Step 6 : classify the resources The objective of step 6 is to classify the resources selected in step 5. Setting up a resource classification consists in analyzing whether a loss in availability, integrity or confidentiality of a resource can lead to one of the selected impact criteria and, if the answer is yes, at what maximum level. This level becomes the resource classification for the item in question (availability, integrity or confidentiality). For every one of these resources, one considers the following questions : What would happen if the resource were not available? (Availability) ; What would happen if the resource were not reliable? (Integrity) ; What would happen if the resource were accessed by unauthorized third parties? (Confidentiality). This step allows therefore to determine an individual value for every resource. Applying MEHARI to a fictitious company CLUSIF 2000
11 Phase 1 strategic security plan 2 Only the resource "supplier data base" is further discussed here, and one considers the questions : What would happen if the supplier data base were not available? (Availability) ; What would happen if the supplier data base were not reliable? (Integrity) ; What would happen if the supplier data base were accessed by unauthorized third parties? (Confidentiality). The unavailability of the supplier data base impacts directly the process "Supplier follow-up" because the latter is completely computerized. One considers therefore that the value of the supplier data base is equal to 3. CLUSIF Applying MEHARI to a fictitious company
12 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 2 Phase 1 strategic security plan 2.3 Security policy The security policy allows, starting from the objectives set forth by Corporate Management, to determine the general orientation with respect to security. CLUSIFRANCE Corporate Management requests that the following items be insured : production ; confidentiality and integrity of manufacturing secrets ; availability of communications with the plant ; updating of production plans. The security policy will therefore define the general company choices with regard to security. Applying MEHARI to a fictitious company CLUSIF 2000
13 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 Phase 1 strategic security plan Management Charter This section consists in formalizing a trust agreement between the employer and the employees, agreement in which must appear the following : personnel and company rights, duties and responsibilities sanctions and their characterization in case of violation CLUSIF Applying MEHARI to a fictitious company
14 3 Phase 2 security operational plans The security objectives (as defined in phase 1) must be achieved in every company location. Every person responsible for operational security must therefore, with respect to resources which concern him/her, ensure that these objectives are met. He/she will be the person responsible for applying any adequate measures suggested by the Security Operational Plan (SOP) as a result of the analytical or of the global approach in every unit. This phase is intended to perform a risk analysis either through an analytical approach or through a global approach. This will be done in every autonomous unit or in groups of autonomous homogeneous units. Applying MEHARI to a fictitious company CLUSIF 2000
15 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 Phase 2 security operational plans Audit of the current situation Step 1 : perform cell breakdown Step 1 : Perform cell breakdown Step 2 : Perform the audit Step 3 : Generate the audit results In a company such as CLUSIFRANCE with several sites and several computer systems, the answers to audit questions will be different depending on the audited parties. For instance, with respect to the authentication service, the answers will no doubt be different on the "Management Information System hosted on the Headquarter mainframe" and on the "travelling salesman Information System". Performing the audit must point out these differences in order to have a true picture of the vulnerability of the actual systems. This task is made easier by cell breakdown. Security services (and therefore questions belonging to these services) are gathered in cell types within the knowledge base, making it easier to identify the profile of those answering the questions (one cell type gathering the questions intended for a certain profile). In practice, the issue to be considered for every group of questions is : how many copies should I make of this set of questions to go and interview different people who will give different answers to these questions. Thus the kind of cells which every cell type must be broken in will be determined. That is the Cellular Breakdown. CLUSIF Applying MEHARI to a fictitious company
16 3 Phase 2 security operational plans We have selected for CLUSIFRANCE the following breakdown : Entity : CLUSIFRANCE Sites : Headquarters in LA DEFENSE (92) Plant in NIMES Premises : Headquarters general power supply and air conditioning facilities Plant general power supply and air conditioning facilities Headquarters computer rooms Plant computer rooms Headquarters offices Plant offices Technical domains : Management information system hosted on the headquarters mainframe Manufacturing information system on the NIMES application server Travelling salesman information system Step 2 : perform the audit For every cell, the person(s) implied in this cell and who have the right profile for that cell will be interviewed. Due to the dichotomy characteristics of the audit questions, the person interviewed must give every question a YES or NO answer (in case of doubt or of a partially affirmative answer, one will choose to answer NO in order to err on the safe side) Step 3 : generate the audit results All answers given to the questions are consolidated in order to score the sub-service to which they belong. This calculation involves a weighed average ranging from 0 to 4 plus, possibly, a notion of maximum and minimum thresholds. The Max threshold is used for questions which are absolutely necessary within a sub-service ; it corresponds to the maximum limit of the quality level which a sub-service can achieve when one has answered No to these questions. Conversely the Min threshold is used for questions which are sufficient within a sub-service ; it corresponds to the minimum score achieved when one has answered Yes to these questions. Quite naturally, should several questions within a sub-service trigger different Max thresholds, one will select the lowest MAX threshold. Conversely should several questions within a sub-service trigger different Min thresholds, one will select the highest MIN threshold. In case of conflict between MAX and MIN thresholds (i.e. when a MAX threshold is triggered which has a value lower than triggering the MIN threshold), then the MAX threshold will prevail. These audit results can be used to generate vulnerability tables for every cell and to draw the related diagrams (wheel spokes or more generally any diagram classically used to represent a set of values). Applying MEHARI to a fictitious company CLUSIF 2000
17 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 Phase 2 security operational plans 3 These tables and diagrams allow to report company vulnerability. Although this is not the final aim of the MEHARI method, this makes it easier to compare cells of the same type and will allow a follow-up in time of this vulnerability. For instance, the vulnerability table and the associated diagram for the cell covering the Nîmes plant will be : Sub-Service Wording Score 211 take into account earthquake risks 0, take into account areas prone to floods (river floods, overflows, sewers...) 3, take into account areas prone to storms (tornado, typhoon,..) 1, take into account areas prone to avalanches 4, take into account airport related risks 4, take into account industrial risks related to the site 4, take into account areas presenting vandalism/terrorism risks (difficult social 2,67 context) 311 hide the existence of a sensitive area 0, fence in the site 2, ensure a perimeter surveillance service (detectors around the site, patrols) 0, install site access control 3, set up convoys 4, ensure a security equipment surveillance service 3, Partition off mark up boundaries for sensitive premises 4,00 CLUSIF Applying MEHARI to a fictitious company
18 3 Phase 2 security operational plans 3.2 Assessment of scenario seriousness Step 1 : replicating a standard scenario The MEHARI knowledge base supplies a list of standard scenarios and also the six formulas indicating the sub-services used for every type of measure (Structural, Dissuasive, Preventive, Protective, Palliative, Recovery). Take for instance scenario 6.22 : Data alteration due to a data entry error during data entry. In order to quantify structural measures, we have the formula : MIN(121,171), meaning that the sub-services 121 : "Sensitize and train with respect to security" and 171: "Ensure personnel motivation" are involved in the quantification of these structural measures. When one considers all the sub-services involved in the quantification of the six types of measures applicable for this scenario, one realizes that they belong to the cell types Entity and Technical domains. We will therefore say that this scenario depends on these two cell types. As our cell breakdown has 1 entity and 3 technical domains, we have three possibilities to carry out this scenario (result of all possible cell combinations). This is what we call replicating a standard scenario on the cells. All replicated scenarios which are deemed to be relevant will have then to be quantified Step 2 : calculation of efficiency For a standard scenario and the associated cells (for instance scenario 6.22 seen earlier carried out in the cells labeled "Entity" and "Management information system hosted on the headquarters mainframe", one calculates for every type of measure (Structural, Dissuasive, Preventive, Protective, Palliative, and Recovery), the efficiency of the measure : EFF-STRU, EFF-DISS, EFF-PREV, EFF-PROT, EFF-PALL, EFF-RECOV. To do this, one uses the formulas associated to every type of measure of the standard scenario under study. For our scenario, the efficiency of protective measures is Step 3 : calculation of the detail status The value of every efficiency must be adjusted in order to obtain the 6 STATUS : STATUS-EXPO, STATUS-DISS, STATUS-PREV, STATUS-PROT, STATUS-PALL, STATUS-RECOV. 1,5 EFF-PROT < 2,5 therefore STATUS-PROT = Step 4 : calculation of potentiality One deduces potentiality STATUS-P from the three STATUS dealing with potentiality (STATUS-EXPO, STATUS-DISS, STATUS-PREV) by using the grid corresponding to the type of scenario (P-MALEVOLENCE, P-ERROR, P-ACCIDENT). Scenario : Data alteration due to an entry error is of the Error type. One gets : STATUS-EXPO = 2 STATUS-PREV = 3 Therefore potentiality is 2. Applying MEHARI to a fictitious company CLUSIF 2000
19 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase Step 5 : calculation of impact reduction Phase 2 security operational plans 3 One deduces impact reduction STATUS-IR from the three STATUS dealing with impact (STATUS-PROT, STATUS-PALL, STATUS-RECOV) by using the grid corresponding to the nature of the scenario (IR_AVAILABILITY, IR_INTEGRITY, IR_CONFIDENTIALITY). Scenario : Data alteration due to an entry error is of the Integrity nature. One gets : STATUS-PROT = 2 STATUS-PALL = 1 STATUS-RECOV = 2 Therefore impact reduction is Step 6 : calculation of impact One determines impact STATUS-I from STATUS-IR and from the resource classification (value) by using the corresponding grid. With STATUS-RI = 1and the value of the resource Supplier data base being 3, one gets impact = Step 7 : calculation of seriousness One deduces the disaster seriousness value as a function of STATUS-P and STATUS-I by using the risk aversion grid. With STATUS-P = 2 and STATUS-I = 3, one gets seriousness = 3 for scenario : Data alteration due to an entry error. Note : The global approach would have consisted in the direct attribution of values to the detail STATUS through a general assessment, and resumption of the process starting with step Security operational plan The method s goal is to propose solutions, therefore to select those measures best suited to mitigate security breaches considering the security policy and the allotted budget. The method will deliver a set of specific measures aimed at decreasing the seriousness of scenarios which have been studied, and also a set of general measures making up a good practice code. The specific measures are determined through the concept of security requirement. CLUSIF Applying MEHARI to a fictitious company
20 3 Phase 2 security operational plans If a security sub-service, effective at the level of a given cell, has an effect on the seriousness of a scenario, one considers that there is, for this sub-service, and because of this scenario, a service requirement. Service requirements form the selection basis for specific measures. Proceed as follows to prioritize the measures : Classify service requirements in decreasing order of importance ; Determine, through an overview of the scenarios which call for the sub-service with the highest global requirement, whether this sub-service is selected and, if the answer is positive, the corresponding quality level ; Re-assess the resulting scenario seriousness and the new service requirements ; Recycle the process. We can thus see that we are dealing with an iterative process which allows the step-by-step construction of an optimized action plan. General measures correspond to security sub-services which are not called for by any of the standard scenarios; they do not directly partake in the mitigation of scenario seriousness but make up a sort of good practice code with respect to security. They are directly given for every cell type by the MEHARI knowledge base. This construction of the action plan corresponds to the method s analytical approach. In the case of a global approach, the selection of these measures is performed with the help of : services associated with scenarios the seriousness of which is 3 or 4 (unacceptable or unbearable risks) ; services associated with scenarios selected in the strategic plan ; services corresponding to general measures. Applying MEHARI to a fictitious company CLUSIF 2000
21 4 Phase 3 company operational plan The Company Operational Plan (COP) is the consolidation of security actions undertaken in every unit. It is the phase where security indicators must be implemented in order to follow the trends in the overall company security level. These indicators will allow to monitor the company sensitive and sore points and will let the company General Management follow the trends in the overall security level versus the set objectives. The COP will lead to the development of an indicator spread sheet and will thus give an opportunity of balancing between company units. Note : Should new requirements appear (due to the very life of the company) the security policy and objectives must be modified and phases 1 to 3 repeated. Applying MEHARI to a fictitious company CLUSIF 2000
22 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 4 Phase 3 company operational plan 4.1 Choosing representative indicators Considering the security objectives set by General Management in phase 1 (SSP) the selection of indicators will deal with the following scenarios : In order to ensure production : Departure of strategic operations personnel This scenario directly involves Human Resources Fire in a waste paper basket This scenario directly involves the site premises In order to ensure confidentiality and integrity of manufacturing secrets : Logic bomb placed in software by a user This scenario directly involves computer data processing Loss of files due to theft in a desk This scenario directly involves the support structures In order to ensure availability of communications means with the plant : Accidents or serious failure such that a computer hardware resource becomes unavailable (server, network, LAN, WAN, etc.) This scenario directly involves computer data processing In order to ensure production planning update : Malevolent destruction of software by an unauthorized person This scenario directly involves computer data processing Data alteration due to an error in data entry This scenario directly involves the data Applying MEHARI to a fictitious company CLUSIF 2000
23 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 Phase 3 company operational plan Elaboration of a company security indicator spread sheet The spread sheet will for instance allow the assessment of the seriousness of scenarios selected in the last step. The assessment of the seriousness level will be reviewed per a frequency set by the company. This spread sheet is under the responsibility of the ISSO (Information Systems Security Officer). CLUSIF Applying MEHARI to a fictitious company
24 Métrique des risques et objectifs Audit de l'existant Choix d'inidicateurs représentatifs Valeurs de l'entreprise : classification des ressources Plan Stratégique Plan Opérationnel Politique de sécurité Etape préparatoire : domaine couvert, base de scénarios, reprise de classification,.. Evaluation de la gravité des scénarios Elaboration d'un tableau de bord de la sécurité de l'entreprise Plan Opérationnel d'entreprise Expression des besoins Rééquilibrages et arbitrages entre unités Charte de management Phase 1 Phase 2 - Unité Z Phase 2 - Unité Y Phase 2 - Unité X Phase 2 Phase 3 4 Phase 3 company operational plan 4.3 Balancing and arbitration between units Budgetary balancing and arbitration between units will be determined taking into account the available resources (human and financial) which the company can grant the different units in order for them to implement the security operational plans. Applying MEHARI to a fictitious company CLUSIF 2000
25 5 APPENDICES Applying MEHARI to a fictitious company CLUSIF 2000
26 Applying MEHARI to a fictitious company CLUSIF 2000
27 5.1 APPENDIX A : COMPANY ACTIVITY DOMAINS PURCHASING SUPPLIER FOLLOW UP INVENTORY MANAGEMENT MARKETING STUDY THE MARKET RESEARCH (PRODUCT) CONCEIVE THE PRODUCT LAUNCH THE PRODUCT HUMAN RESOURCES PAYROLL TRAINING PERSONNEL FOLLOW UP PRODUCTION MANUFACTURE PRODUCTION PLANNING ACCOUNTING FINANCE ACCOUNTS TREASURY MANAGE FINANCES LOGISTICS SHIPMENTS PLANNING LOGISTICS MANAGEMENT OPTIMIZE INVENTORIES AND FLOWS SALES ORDER MANAGEMENT CUSTOMER FOLLOW UP (AFTER SALES) SELL FINISHED GOODS SALES FORCE MANAGEMENT
28 Applying MEHARI to a fictitious company CLUSIF 2000
29 DOMAIN PROCESS DESCRIPTION MARKETING Functions dealing with product research and launch. Study the market Anticipate market, techniques and competition evolution, determine the requirements to be met. Research products Research products for distribution : contact manufacturers, test the products, assess the opportunities. Conceive the product Conceive new products : conceive and prototype formulas, technically test the products, certifications. Launch the product Launch new products : commercially test the products, establish use, storage and transport recommendations, formulate manufacturing and quality control processes, set list prices, carry out promotion. PURCHASING Functions dealing with supplier contract negotiations and follow up, and with raw materials inventory management. Follow up suppliers Set up and follow up supplier contracts : negotiate raw material contracts, place orders, manage supplier accounting. Manage inventories Manage raw material inventories, determine and plan supplies. SALES Functions dealing with selling products. Manage orders Administratively process customer orders. Follow up customers After sales customer files follow up. Commercialize finished products Sell the company s products : all activities concurring to triggering sales. Manage the sales force Pilot the act of selling which hinges on the customervendor relationship. ACCOUNTS-FINANCE Functions dealing with financial and accounting matters. Account for Produce and publish the different accounting and legal documents. Manage treasury Collect payments, pay bills, manage the bank account and the treasury plan. Manage finances Establish mid and long term finance plans, obtain the financial resources. Applying MEHARI to a fictitious company CLUSIF 2000
30 5 APPENDICES DOMAIN PROCESS DESCRIPTION PRODUCTION Functions dealing with design, planning and carrying out production. Manufacture Carry out production : manufacture, package, handle, control raw materials, intermediates and finished goods quality, store raw materials, inventory finished products. Plan production Plan production runs : manage raw material and intermediates inventory, determine and plan supplies, launch production runs, commit to and meet production delivery terms. HUMAN RESOURCES Functions dealing with the management of human resources with communications and with personnel promotion. Ensure pay Calculate and plan pay roll, manage employee stock plans. Ensure training Ensure personnel training : inventory training requirements, establish training plans, organize training sessions. LOGISTICS Functions dealing with transport and depots follow up. Manage Human Resources Plan transport Pilot logistics Optimize inventories/flows Negotiate and control individual objectives, train, recruit, anticipative personnel management. Plan transport according to the written requirements. Adapt the company s logistics infrastructure to the requirements, considering the set objectives. Optimize the use of depot and transport resources according to the requirements. Applying MEHARI to a fictitious company CLUSIF 2000
31 APPENDICES APPENDIX B TYPE OF CRITERIA PRODUCTION OPERATIONS COMMERCIAL SOCIAL RELATIONS DATA CONFIDENTIALITY LEGAL Drop in turnover Drop in profit margin Drop in stock price Drop in financial year result Drop in exceptional result Drop in production or in yields Unavailability of supplies Unavailability of product Plan objectives not achieved Loss of other third parties Loss of customer Loss of supplier Loss of personnel Loss of assets Loss of market share Accidents Involving personnel Strike, lock-out Personnel dissatisfaction IMPACT CRITERIA Public image deterioration Deterioration of relationships with third parties Loss of customer confidence Damage to a third party Marketing data disclosure Purchasing data disclosure Financial conditions data disclosure Technical and technological data disclosure Legal suit THE FOUR SERIOUSNESS THRESHOLDS TO BE USED FOR EVERY SELECTED IMPACT CRITERIA THRESHOLD WORDING 1 Without significant damage to the company operations. 2 Significant damage on company operations, its competitive position or its image. 3 Serious damage not endangering a major company activity. 4 Extremely serious damage jeopardizing the company or one of its major activities. CLUSIF Applying MEHARI to a fictitious company
32 5 APPENDICES 5.3 APPENDIX C LIST OF RESOURCES ASSOCIATED WITH A PROCESS RESOURCE TYPE PREMISES HUMAN RESOURCES SUPPORT STRUCTURE DATA PROCESSING DATA RESOURCE EXAMPLE Headquarter offices Paris office Nîmes office Operations personnel Purchasing manager Network administrator Logic security manager IBM AS400 Server NT PC WIN 95/98 Commercial management program Purchasing program Payroll program Supplier data base Order data base Customer data base Applying MEHARI to a fictitious company CLUSIF 2000
33 APPENDICES APPENDIX D LISTE OF PROFILES CODE FUNCTION ISSO Information System Security Officer PM Project Manager PSM Physical Security Manager GM General Management NTSM Network and Telecommunication Security Manager SYSM System Manager U User LSM Logic Security Manager DPM Data Processing Manager OM Operations Manager UPM User Programs Manager DBA Data Base Administrator CLUSIF Applying MEHARI to a fictitious company
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari.
MEHARI 2010 Overview April 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard, 75009
RISK MANAGEMENT - Concepts and Methods
WHITE PAPER RISK MANAGEMENT - Concepts and Methods Methods Commission / Espace Méthodes CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Sémard, 75009 PARIS Tel. : +33 1 53 25 08 80 Fax : +33
Continuity of Operations Planning. A step by step guide for business
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
MEHARI 2010 Information risk management method ISO/IEC 27005 compliant
MEHARI 2010 Information risk management method ISO/IEC 27005 compliant Exceeding the basic guidelines of the standard allows for a real management of risk. Février 2011 Risk Management using ISO 27005
MEHARI 2010. Evaluation Guide for security services. May 2010. Methods working group
MEHARI 2010 Evaluation Guide May 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard,
Risk analysis and treatment Guide. August 2010. Methods Commission. Please post your questions and comments on the forum: http://mehari.
METHODS MEHARI 2010 Risk analysis and treatment Guide August 2010 Methods Commission Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Policy on the Security of Informational Assets
Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources
EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH
EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH OIOS conducted an audit of information and communications technology (ICT) governance
Business Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
Company Management System. Business Continuity in SIA
Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT
Prepared by Rod Davis, ABCP, MCSA November, 2011
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
GUIDE TO IMPLEMENTING A REGULATORY FOOD SAFETY AUDITOR SYSTEM
GUIDE TO IMPLEMENTING A REGULATORY FOOD SAFETY AUDITOR SYSTEM FEBRUARY 2016 2 Contents Introduction... 4 Scope and objectives... 5 Scope... 5 Objectives... 5 Responsibilities... 5 The role of the licensee
Creating a Business Continuity Plan for your Health Center
Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Interactive-Network Disaster Recovery
Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) System Categorization: Moderate Version 1.5 May 30, 2013 Prepared by: Security & Compliance Services (SCS) and Infrastructure
DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE
DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE Lisa Harrington President, lharrington group llc Associate Director Supply Chain Management Center Robert H. Smith School of Business
IT Disaster Recovery and Business Resumption Planning Standards
Information Technology Disaster Recovery and Business IT Disaster Recovery and Business Adopted by the Information Services Board (ISB) on May 28, 1992 Policy No: Also see: 500-P1, 502-G1 Supersedes No:
Section VI Principles of Laboratory Biosecurity
Section VI Principles of Laboratory Biosecurity Since the publication of the 4th edition of BMBL in 1999, significant events have brought national and international scrutiny to the area of laboratory security.
APPENDIX G-Emergency Response Plan Template
APPENDIX G-Emergency Response Plan Template BSDW-ERP Template 10/04 EMERGENCY RESPONSE PLAN WATER SECTOR Public Water System Name: PWSID No: Physical Address: City: State: Zip Code: General Phone Number:
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Business Continuity Planning for Risk Reduction
Business Continuity Planning for Risk Reduction Ion PLUMB [email protected] Andreea ZAMFIR [email protected] Delia TUDOR [email protected] Faculty of Management Academy of Economic Studies
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
Technical Proposition. Security
Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net [email protected] Why Read this Technical Proposition?
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1
PUBLIC POWER CORPORATION S.A. INFORMATION TECHNOLOGY DIVISION CENTRAL SYSTEMS SUPPORT SECTION IT SYSTEMS SECURITY SUBSECTION PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
Frequently asked questions. FP7 Financial Guide
Frequently asked questions FP7 Financial Guide Budgetary matters Eligible costs of a project What are the criteria for determining whether the costs of a project are eligible? First of all, costs must
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
Does it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
RiskManagement ESIEE 06/03/2012. Aloysius John March 2012
RiskManagement MOTIS ESIEE 06/03/2012 Aloysius John March 2012 Risk Management is a Introduction Process for Project manager to identify factors that may more or less affect the success or the achievement
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Cisco Disaster Recovery: Best Practices White Paper
Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2
RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT
RESERVE BANK OF VANUATU DOMESTIC BANK PRUDENTIAL GUIDELINE NO 12 OPERATIONAL RISK MANAGEMENT 1. This Guideline outlines a set of principles that provide a framework for the effective management of operational
Answers to Review Questions
Tutorial 2 The Database Design Life Cycle Reference: MONASH UNIVERSITY AUSTRALIA Faculty of Information Technology FIT1004 Database Rob, P. & Coronel, C. Database Systems: Design, Implementation & Management,
Politique de sécurité de l information Information Security Policy
Politique de sécurité de l information Information Security Policy Adoptée par le Conseil d administration Le 10 novembre 2011 Adopted by the Board of Directors on November 10, 2011 Table of contents FOREWORD
Approved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009
RECORDS AND INFORMATION Approved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009 PURPOSE Penn West recognizes that responsible
Security Risk Assessment
Security Risk Assessment Applied Risk Management July 2002 What is Risk? Risk is: Something that creates a hazard A cost of doing business Risk can never be eliminated, merely reduced to an acceptable
BME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased
IBM s Approach to Disaster Recovery and Business Continuity
IBM Global Services IBM s Approach to Disaster Recovery and Business Continuity Lausanne, May, 2008 Gérard Vanel, IBM certified Managing Consultant IT infrastructure, BCRS Integrated Technology Services
5-02-15. Andres Llana, Jr. INSIDE. Upper Management s Role; Delegating Responsibilities; Minimum Plan Outline; Business Impact Analysis
5-02-15 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES CONTINGENCY PLANNING FOR SMALL- TO MEDIUM-SIZED BUSINESSES Andres Llana, Jr. INSIDE Upper Management s Role; Delegating Responsibilities;
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
Business Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
PAPER-6 PART-3 OF 5 CA A.RAFEQ, FCA
Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-3 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning
Your Documents. Our Management. DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning Dr. Robert L. Bailey, CRM, MIT, ECMp L E A R N M O R E A B O U T D A S T A A T W W W. D R M.
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Elements Of An Effective Export Compliance Program
Elements Of An Effective Export Compliance Program Renee Osborne Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce Effective
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS
SUPERVISORY AND REGULATORY GUIDELINES Guidelines Issued: 22 December 2015 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS 1. INTRODUCTION 1.1 The Central Bank of The Bahamas ( the Central
Security Controls in Service Management
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
Business Impact Analysis (BIA) and Risk Mitigation
Texas Emergency Management Conference 2015 Business Impact Analysis (BIA) and Risk Mitigation Alan Sowell, COOP Unit Supervisor Paul Morado, COOP Unit Planner BIA Implementation Process BIA Private Sector
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
Unit Guide to Business Continuity/Resumption Planning
Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions
Audit Report on the New York City Police Department Data Center 7A06-093
Audit Report on the New York City Police Department Data Center 7A06-093 August 14, 2006 THE CITY OF NEW YORK OFFICE OF THE COMPTROLLER 1 CENTRE STREET NEW YORK, N.Y. 10007-2341 WILLIAM C. THOMPSON, JR.
Information System Audit Guide
Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE
INTERNET BANKING AGREEMENT & DISCLOSURE
INTERNET BANKING AGREEMENT & DISCLOSURE This Agreement and Disclosure sets forth your and our rights and responsibilities concerning the use of our Internet Banking Product. In this Agreement, the words
How To Manage A Financial Institution
BUSINESS CONTINUITY MANAGEMENT GUIDELINE April 2010 Table of Contents Preamble...3 Introduction...4 Scope...5 Coming into effect and updating...6 1. Continuity and resumption of business...7 2. Sound and
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL.
Internal Audit Report on January 2010 2010 January - English - Information Technology - Security Access - FINAL.doc Contents Background...3 Introduction...3 IT Security Architecture,Diagram 1...4 Terms
Business Continuity Planning Guide
Business Continuity Planning Guide For Small Businesses Prepared by the City of Vaughan Emergency Planning Department 1 Business Continuity Planning Business Continuity Planning (BCP) is a planning process
Operational Risk Management Policy
Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well
