Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?



Similar documents
Security Domain Roadmap

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

The Value of Vulnerability Management*

Supplier Information Security Addendum for GE Restricted Data

Cybersecurity and internal audit. August 15, 2014

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Information & Asset Protection with SIEM and DLP

Managed Security Services for Data

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INCIDENT RESPONSE CHECKLIST

a Disaster Recovery Plan

Enterprise Security Tactical Plan

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Italy. EY s Global Information Security Survey 2013

How To Manage Security On A Networked Computer System

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

THE TOP 4 CONTROLS.

University of Pittsburgh Security Assessment Questionnaire (v1.5)

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Information Technology Security Review April 16, 2012

SRA International Managed Information Systems Internal Audit Report

Security Patch Management

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

How To Ensure The C.E.A.S.A

SIEM Implementation Approach Discussion. April 2012

Supplier Security Assessment Questionnaire

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Total Protection for Compliance: Unified IT Policy Auditing

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Payment Card Industry Data Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Managing IT Security with Penetration Testing

MSP Service Matrix. Servers

Nine Steps to Smart Security for Small Businesses

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Cisco IPS Tuning Overview

Information Technology Policy

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Best Practices for Building a Security Operations Center

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

PCI Requirements Coverage Summary Table

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Current IBAT Endorsed Services

End-user Security Analytics Strengthens Protection with ArcSight

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Continuous Network Monitoring

External Supplier Control Requirements

IBM Global Technology Services Preemptive security products and services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Breaking down silos of protection: An integrated approach to managing application security

Cisco Advanced Services for Network Security

Five keys to a more secure data environment

LogRhythm and NERC CIP Compliance

Clavister InSight TM. Protecting Values

Information Security: A Perspective for Higher Education

Managed Services. Business Intelligence Solutions

PII Compliance Guidelines

IBM Internet Security Systems

Achieving PCI Compliance Using F5 Products

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Case Study: Hiring a licensed Security Provider

Virginia Commonwealth University School of Medicine Information Security Standard

IBM Endpoint Manager Product Introduction and Overview

IT Risk & Security Specialist Position Description

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

"Service Lifecycle Management strategies for CIOs"

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

FFIEC Cybersecurity Assessment Tool

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Guide to Vulnerability Management for Small Companies

Security Controls for the Autodesk 360 Managed Services

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Metrics that Matter Security Risk Analytics

Ovation Security Center Data Sheet

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

The Role of Security Monitoring & SIEM in Risk Management

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

Sample Vulnerability Management Policy

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Cyber Security for NERC CIP Version 5 Compliance

Attachment A. Identification of Risks/Cybersecurity Governance

Transcription:

Information Security Incident Management Program What is an Incident Management Program? It is a coordinated program of people, processes, tools and technology, which prevents and manages information security threats, vulnerabilities and incidents in order to minimize their impact on a company or organization. Why is it needed? To protect a company s brand and reputation To protect a company s intellectual property To ensure a company s uninterrupted ability to conduct business To avoid lost customers and revenue To avoid the cost of lost productivity To avoid the cost of cleaning up the effects of security incidents on the IT infrastructure

Normal Attack & Response Timeline Months/Weeks Before Days Before weeks Before Time of Extreme danger Days After weeks After Months/Weeks After Assessment Prevention/Protection Analytics/Forensics Detection

Ideal Attack & Response Timeline Days/Weeks Before Milliseconds Before Hours Before Time Zero Attack Milliseconds After Hours After Days/Weeks After Assessment Prevention/Protection Analytics/Forensics Detection Small amount of Danger time

Operational Management Program Value Threats Vulnerabilities Incidents Globally prevent, detect and manage IT security threats, vulnerabilities, and incidents to minimize their impact on your organization Incident ID and Assessment Standards End User Awareness Defined Crisis Management Coordinated Mgmt. Reporting Defined and Shared Policies and Processes Defined Roles and Responsibilities Knowledge Mgmt. Operational Management Program Value Defined Escalations/Handoffs Consistent Escalation Thresholds Continuous Improvement Relevant Training Standard Tools Program Metrics Effective Communications

Operational Security Management Information Flow Employees Customers Vendors STAKEHOLDERS Information Security Physical Security Information Technology Privacy Audit Communications PARTNERS Help Desk Operations Global Network Operations HR / ER Citizens Law Enforcement Intelligence Sources Third-parties OTHER Management Businesses Functions Public Relations Legal Threat Analysis Vulnerability Detection Malware/AV Compliance Incident Response Team Countermeasures Investigations & Forensics IDS/IPS Functional Area s Monitoring & Reporting Security Operations, Escalation & Crisis Management Program Administration & Analysis Program Rollout & Awareness Corporate Crisis Management Team IT & Information Security Management Teams

Security Management Technical Architecture Host Based Host Based Compliance tools ISS Scanner Appscan SOA Mgr Solsoft Compliance Tools Network Devices Network Device Change Network CI Data IDR Black Ice SecurID ISS Real Secure Nessus Symantec Network Intrusion Events Desktop Intrusion Events Security Events Authentication Events Virus Events Correlated Events Security Events SEM Select Access Select Federation Auth/ autorisation Events Tripwire Security Events Compliance Monitoring Events. Auth. Service Select Audit Active Directory LDAP Server Server Inventory Auth Server / Desktop CI Data Radia OV Service Desk User Data User Data Select identity SAP HR/ CRM Desktop Inventory Trend Micro Authentication Service OVO Radius Host Change Managed Firewall VPN Client Inventory Database Desktop

Security Incident Management Consulting STATEMENT OF WORK Create Goals & Scope; Gather information in Planning Meetings PHASE 2 DESIGN & IMPLEMENT PHASE 1 ASSESS & PLAN Validate Goals & Scope STAKEHOLDER NEEDS* Identify Stakeholders Define Business Value Drivers CURRENT STATE* Gather information to assess FUTURE STATE Determine desired state GAP ANALYSIS Due Diligence; Group & prioritize gaps BUSINESS IMPACT ASSESSMENT* Reinforce obvious gaps & Identify new Prioritize risk; RTO, RPO Review Risk Appetite/ Business Impact ORGANIZE Establish Project Management Structure Prepare Detailed Project Work Plans Establish Objectives Program Areas DESIGN & DOCUMENT Build Program & Program Area Handbook: Roles & Responsibilities Processes Tools Vendor & Inventory Templates Define Partner & Functional Area Agreements REPORTING Establish program metrics reporting baseline: Weekly Monthly Annually IMPLEMENT* Report Vulnerability correlation Incident reporting Prepare/ Implement Program & Program Area Tools: - SIM Handbooks - Risk Level Matrix (per business impact assessment) - Crisis Management Handbook COMMUNICATIONS Business Continuity Disaster Recovery GAP CLOSURE PLAN Identify & Prioritize Transformation Projects Prepare Implementation Framework Create Project Plan TRAIN/BUILD AWARENESS Create, develop, deliver training & awareness MAINTENANCE Develop/implement Maintenance Plan *Incident Cost Calculator may be used in pre-sales and as indicated. ORANGE CAPS = Report/Deliverable RTO: Recovery Time Objective RPO: Recovery Point Objective

Incident Management Program Components Incident Management Program Areas Threat Analysis & Response Network Intrusion Detection & Response Vulnerability Detection Escalation & Crisis Management Countermeasures Anti-Virus Information Security Incident Response Team Security Monitoring & Reporting Program Administration & Analysis Investigations & Forensics Patch Management Program Rollout & Awareness

Threat Analysis and Response The Threat Analysis and Response Team: Proactively researches and monitors security-related information to identify information security threats that may impact your organization Threats are analyzed for their impact to your organization and assigned a risk classification Informational alerts and remediation requirements are developed and distributed to the appropriate parties throughout your company This process ensures threats are consistently addressed in a timely manner throughout the enterprise

Network Intrusion Detection and Response The Network Intrusion Detection and Response Team: The Network Intrusion Detection and Response Team: Proactively monitors the Internet-facing infrastructure for signs of network intrusions and other anomalous activities, traffic, etc. This involves ensuring that network intrusion detection sensor (IDS) alerts are properly addressed. Assists the Information Security Incident Response Team (ISIRT) in addressing detected attacks in real time Works in close cooperation with the Infrastructure Network Team related to the deployment and tuning of networkbased intrusion detection sensors

Vulnerability Detection The Vulnerability Detection Team: Conducts regular ongoing vulnerability scans/probes of the Internet-facing infrastructure to identify key high-risk vulnerabilities Provides vulnerability data to the Information Security Incident Response Team (ISIRT) so that the vulnerabilities are addressed Conducts special request scans of the infrastructure Rescans vulnerable systems to assess remediation status Assists in the management of exception requests related to vulnerability remediation

Escalation & Crisis Management The Information Security Escalation & Crisis Management Team: The Information Security Escalation & Crisis Management Team: Prepares for and addresses those unique information security-related incidents that are anticipated to cause significant impact or have caused enterprise-wide severe impact or interruption.

Countermeasures The Information Security Countermeasures Team: Conducts regular and targeted scanning for specific critical information security vulnerabilities and/or compromised systems Delivers a customized payload to the impacted system which results in the mitigation of the vulnerability and/or the remote shut-down/disabling of the impacted system

Anti-Virus The Information Security Anti-Virus Team: The Information Security Anti-Virus Team: Plans and implements the company s AntiVirus strategy (e.g., choice of tools, tool deployment, etc.) Obtains and tests new versions of AntiVirus tools when they are made available Facilitates the communication of AntiVirus strategy, directions and tools available

Information Security Incident Response Team (ISIRT) The Information Security Incident Response Team (ISIRT): The Information Security Incident Response Team (ISIRT): Is a global team with corporate-wide responsibilities pertaining to receiving, assessing, responding to, addressing and managing information security incidents Depending on the severity of incidents, ISIRT will own, hand-off, address, or escalate security incidents, thus ensuring incidents are handled commensurate with their level of risk

Infosec Security Monitoring and Reporting The Information Security Monitoring and Reporting Team: The Information Security Monitoring and Reporting Team: Monitors patching compliance related to high-risk vulnerabilities for internal systems where these conditions can be remotely detected Works closely with regional and business security teams, IT delivery teams, and other teams within Information Security and the Information Security Incident Management Program.

Program Administration and Analysis The Program Administration and Analysis Team: Collects, consolidates, analyzes and provides specific audience-based reports related to the functional programs within the Information Security Threat, Vulnerability and Incident Management Program This Team also conducts strategic planning and budgeting and leads the program/project management and maintenance activities within the Program.

Investigations and Forensics The Information Security Investigations & Forensics Team: The Information Security Investigations & Forensics Team: Addresses serious information security related incidents which involve civil, criminal, administrative, disciplinary, brand and/or financial implications Works closely with internal partners such as Legal, HR/ER, Media Relations and Security and external parties such as law enforcement and government authorities Has ability to recover, decrypt, and analyze IT-related data and report, present, and represent such data in civil, criminal, and administrative proceedings

Patch Management The Information Security Patch Management Team: Works in conjunction with Threat Analysis and Response and Vulnerability Detection program areas Provides system owners with remediation information related to high-risk vulnerabilities affecting the company s infrastructure Creates weekly reports which track number of vulnerable systems detected and number of systems remediated

InfoSec Program Rollout and Awareness The Information Security Program Rollout and Awareness Team: The Information Security Program Rollout and Awareness Team: Develops and delivers end-user and partner-focused communications and awareness activities to increase understanding, use of, and compliance related to the Information Security Threat, Vulnerability and Incident Management Program.

Typical Lifecycle (Primarily Depicting Reactive Processes) Dashboard Authorized New System/ Application Monitoring/ Reporting New Threat/ Vulnerability Proactive Threat Discovery Build Configuration Incident Report Unauthorized Device Unauthorized Action Receive Report of of Incident System/ Network Monitoring Compliance Monitoring Incident Detection Threat Threat Investigation/ Severity Analysis Assignment Threat and Vulnerability Database Targeted Vulnerability Testing Incident Response Crisis Management Remediation Actions Compliance Testing Post Mortem Investigation Request Incident Resulting from Investigation Investigation Triggers Incident Initiation Incident Management Intrusion Detection Vulnerability Detection Crisis Mgmnt Investigations & Forensics Threat Analysis Anti-Virus Incident Response Team Countermeasures Countermeasures Countermeasures Compliance Monitoring Monitoring and Reporting Program Administration & Analysis Program Rollout & Awareness

Information Security Incident Management Program Incident Management Tools An effective Incident Management Program requires specific tools be developed. Examples include: Security Incident Cost Calculator Risk Assessment Matrix Crisis Management Manual Incident Management Handbook Each tool must be customized for the specific business structure and IT infrastructure of a given company It is difficult for a company to develop these tools without outside help

Incident Management Tools Security Incident Cost Calculator Incident Management Program Per Incident Cost Instructions - Please fill in all fields highlighted in yellow. Productivity Loss Totals by System Administrator Total AP Japan EMEA Latin America # of Servers Affected Average # of Hours of Server Downtime 0 Average # of Users on Server During This Time 0 # of Clients or PCs Affected Average # of Hours of Client or PC Downtime 0 Average # of Users on Clients or PCs During This Time 0 # of Employees Reading Messaging # of Hours Reading Messaging per Employee # of Employees Required to Perform Actions # of Hours Implementing Required Actions per Employee Hourly Rate per Employee Productivity Loss Subtotal #VALUE! #VALUE! #VALUE! #VALUE! #VALUE! Call Center Costs # of Support Calls 0 Average Length of Call (in Hours) 0 Cost per Call or Hour

Considerations for calculating the cost of security incidents Know your downtime cost: per hour, per day, per Business Unit Productivity Number employees impacted x hours out x burdened hours = Revenue Direct loss Compensatory payment Lost future revenues Billing losses Investment losses Financial performance Revenue recognition Cash flow Payment guarantees Credit rating Stock price Damaged reputation Customers Suppliers Financial markets Banks Business partners Temporary employees Equipment rental Other expenses Overtime & travel costs Extra shipping expenses

Incident Management Tools Risk Assessment Matrix A Risk Assessment Matrix provides a quick and consistent way to evaluate the risk severity of an information security threat, vulnerability or incident. It standardizes escalation triggers, thresholds and actions across the Incident Management Program. The Risk Assessment Matrix serves as a strong guideline for the initiation of a crisis or escalation and contains a series of metrics to help users identify the level of escalation. Scores are assigned in the areas of: The likelihood of an information security threat, vulnerability, or incident impacting the IT Infrastructure and The potential impact if the threat, vulnerability, or incident begins to impact the IT Infrastructure (including, but not limited to brand, financials, employees, customers, data/information loss, etc.)

Incident Management Tools Risk Assessment Matrix The likelihood score is multiplied by the potential impact score, giving a Risk Score which is used to identify the predetermined actions to be undertaken Risk Level Risk Score Risk Score and Level Matrix Action/Response Deadlines for required actions Examples Crisis 16-20 Action A Deadline A Example A High 12-15* Action B Deadline B Example B Medium 5-11 Action C Deadline C Example C Low 1-4 Action D Deadline D Example D Likelihood Rating 5 INCIDENT Probability of risk event impacting Immediate: Currently Likelihood Matrix THREAT ASSESSMENT Attractiveness to Attackers 1 VULNERABILITY REMEDIATION Is exploit code currently available? Risk Mitigation Activity Impact Rating External (#) Systems Internal (#) Access Impact Matrix Data and Information XXXX Proprietary # of Customers/ Information Employees Affected Critical Systems, Applications and Downtime Financial ($) Brand 4 Imminent: Very attractive 3 3 Likely: Attractive 2 2 Not likely: Somewhat attractive 1

Incident Management Tools Crisis Management Manual The Crisis Management Manual is a tool to assist on-call crisis managers in the event of an Information Security related crisis. The Manual creates a standard process for managing highprofile incidents to ensure an immediate, appropriate, and consistent response to a geographic or worldwide crisis situation. This enables the Crisis Manager to take control of the crisis environment and manage the flow of information to most effectively protect the organization In addition to aiding the Crisis Manager, the Manual contains tools, templates, flow charts, checklists and processes and outlines the responsibilities of other critical parties in the management of a crisis

Incident Management Tools Incident Management Program Handbook The Handbook is a tool utilized by all members of the Incident Management Program. It contains all job descriptions, roles and responsibilities, processes and tools documentation for each of the Program components. The Handbook provides a standard, easily accessible repository for securing all important Program documentation which lends consistency and stability to the IM Program. The Handbook is primarily utilized in a virtual manner with all documents undergoing regular scheduled review and update