Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM



Similar documents
Information Security Program CHARTER

CISM ITEM DEVELOPMENT GUIDE

Certified Information Security Manager (CISM)

Domain 1 The Process of Auditing Information Systems

(Instructor-led; 3 Days)

CISM ITEM DEVELOPMENT GUIDE

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

CLASSIFICATION SPECIFICATION FORM

Application for CISM Certification

The Value of Vulnerability Management*

Critical Systems Guidelines

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

COMMUNIQUE. Information Technology (IT) Governance Guidance

CISM Certified Information Security Manager

Certified Information Systems Auditor (CISA)

Subject Area 1 Project Initiation and Management

CISM (Certified Information Security Manager) Document version:

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

IT Governance. What is it and how to audit it. 21 April 2009

Information Security Governance:

Sytorus Information Security Assessment Overview

State of South Carolina Initial Security Assessment

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Microsoft s Compliance Framework for Online Services

Organizational Structure What Works

FFIEC Cybersecurity Assessment Tool

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE ( ) ON THIRD PARTY RELATIONSHIPS

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

How To Improve Your Business

Manag. Roles. Novemb. ber 20122

Domain 5 Information Security Governance and Risk Management

Governance and Management of Information Security

Information Security Managing The Risk

Information Security Management Systems

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

IT Risk & Security Specialist Position Description

Italy. EY s Global Information Security Survey 2013

Virginia Commonwealth University School of Medicine Information Security Standard

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Publication 805-A Revision: Certification and Accreditation

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Practical Approaches to Achieving Sustainable IT Governance

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

FISCAL PLAN RESPONSE TO THE AUDITOR GENERAL

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

State of South Carolina Policy Guidance and Training

Information security controls. Briefing for clients on Experian information security controls

S11 - Implementing IT Governance An Introduction Debra Mallette

Security Controls What Works. Southside Virginia Community College: Security Awareness

Office of Inspector General

The Top Ten Most Commonly Used Metrics in IT Development

LINUX / INFORMATION SECURITY

Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

Department of Information and Technology Management

Exam Name: Certified Information Security Manager

Feature. Developing an Information Security and Risk Management Strategy

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Information Security Specialist Training on the Basis of ISO/IEC 27002

Certification and Training

Business Continuity Plan

Office of the Chief Information Officer

IT Governance Regulatory. P.K.Patel AGM, MoF

Revised October 2013

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Based on 2008 Survey of 255 Non-IT CEOs/Executives

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Utica College. Information Security Plan

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

Data Security Incident Response Plan. [Insert Organization Name]

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HKITPC Competency Definition

EMC PERSPECTIVE. Information Management Shared Services Framework

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Supporting information technology risk management

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012

An enterprise grade information security & forensic technical team

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

SECURITY RISK MANAGEMENT

Candidate s Guide to the CISM Exam and Certification

Effective Software Security Management

INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO

Module 6 Essentials of Enterprise Architecture Tools

Driving Business Value. A closer look at ERP consolidations and upgrades

Transcription:

Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM

Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and responsibilities to ensure accountability identify and allocate resources to achieve InfoSec program objectives tell if an InfoSec program is achieving objectives

Security Program Composition Strategy Compliance Policy Monitoring Awareness Implementation

Infosec Program Definition Process by which an organization effects security In response to a management concern about information systems With respect to computers as assets, operational integrity, data confidentiality, assets controlled by software, or any combination of the above Default process owner is the highest ranking IT manager delegated the responsibility for addressing security concerns with respect to technology

CISM InfoSec Manager Tasks Content Area 1 Information Security Governance Develop an information security strategy aligned with business goals and objectives. Align information security strategy with corporate governance. Develop business cases justifying investment in information security. Identify current and potential legal and regulatory requirements affecting information security. Identify drivers affecting the organization (e.g., technology, business environment, risk tolerance, geographic location) and their impact on information security. Obtain senior management commitment to information security. Define roles and responsibilities for information security throughout the organization. Establish internal and external reporting and communication channels that support information security. Content Area 2 Information Risk Management Establish a process for information asset classification and ownership. Implement a systematic and structured information risk assessment process. Ensure that business impact assessments are conducted periodically. Ensure that threat and vulnerability evaluations are performed on an ongoing basis. Identify and periodically evaluate information security controls and countermeasures to mitigate risk to acceptable levels Integrate risk, threat and vulnerability identification and management into lifecycle processes (e.g., development, procurement, and employment lifecycles) Program developed as part of these tasks must cover process by which all these other tasks are accomplished. Report significant changes in information risk to appropriate levels of management for acceptance on both a periodic and event-driven basis. Content Area 3 Information Security Program Development Develop and maintain plans to implement the information security strategy. Specify the activities to be performed within the information security program. Ensure alignment between the information security program and other assurance functions (e.g., physical, HR, quality, IT). Identify internal and external resources (e.g., finances, people, equipment, systems) required to execute the information security program. Ensure the development of information security architectures (e.g., people, processes, technology). Establish, communicate, and maintain information security policies that support the security strategy. Design and develop a program for information security awareness, training, and education. Ensure the development, communication, and maintenance of standards, procedures, and other documentation (e.g., guidelines, baselines, codes of conduct) that support information security policies. Integrate information security requirements into the organization's processes (e.g., change control, mergers and acquisitions) and life cycle activities (e.g., development, employment, procurement) Develop a process to integrate information security controls into contracts (e.g., with joint ventures, outsourced providers, business partners, customers, third parties). Establish metrics to evaluate the effectiveness of the information security program. Content Area 4 Information Security Program Management Manage internal and external resources (e.g., finances, people, equipment, systems) required to execute the information security program. Ensure that processes and procedures are performed in compliance with the organization s information security policies and standards. Ensure that the information security controls agreed to in contracts (e.g., with joint ventures, outsourced providers, business partners, customers, third parties) are performed Monitor, measure, test, and report on the effectiveness and efficiency of information security controls and compliance with information security policies. Ensure that information security is an integral part of the systems development process. Ensure that information security is maintained throughout the organization's processes (e.g., change control, mergers and acquisitions) and life cycle activities (e.g., development, employment, procurement) Ensure that noncompliance issues and other variances are resolved in a timely manner. Provide information security awareness, training and education to stakeholders (e.g., business process owners, users, information technology). Provide information security advice and guidance (e.g., risk analysis, control selection) to the organization. Content Area 5 Incident Management and Response Develop and implement processes for detecting, identifying, analyzing, and responding to information security incidents. Establish escalation and communication processes and lines of authority. Develop plans to respond to and document information security incidents. Establish the capability to investigate information security incidents (e.g., forensics, evidence collection and preservation, log analysis, interviewing) Develop a process to communicate with internal parties and external organizations (e.g., media, law enforcement, customers) Integrate information security incident response plans with the organization s Disaster Recovery (DR) and Business Continuity Plan (BCP). Organize, train, and equip teams to respond to information security incidents. Periodically test and refine information security incident response plans. Manage the response to information security incidents. Conduct reviews to identify causes of information security incidents, develop corrective actions, and reassess risk.

Information Security Governance Certified Information Security Manager Governance Tasks are: 1 Develop an information security strategy aligned with business goals and objectives. 2 Align information security strategy with corporate governance. 3 Develop business cases justifying investment in information security. 4 Identify current and potential legal and regulatory requirements affecting information security. 5 Identify drivers affecting the organization (e.g., technology, business environment, risk tolerance, geographic location) and their impact on information security. 6 Obtain senior management commitment to information security. 7 Defineroles and responsibilities for information security throughout the organization. 8 Establish internal and external reporting and communication channels that support information security.

Information Security Risk Management Certified Information Security Manager Risk Management Tasks are: 1 Establish a process for information asset classification and ownership. 2 Implement a systematic and structured information risk assessment process. 3 Ensure that business impact assessments are conducted periodically. 4 Ensure that threat and vulnerability evaluations are performed on an ongoing basis. 5 Identify and periodically evaluate information security controls and countermeasures to mitigate risk to acceptable levels 6 Integrate risk, threat and vulnerability identification and management into lifecycle processes (e.g., development, procurement, and employment lifecycles) 7 Report significant changes in information risk to appropriate levels of management for acceptance on both a periodic and event-driven basis.

Information Security Program Management Certified Information Security Manager Program Management Tasks are: 1 Manage internal and external resources required to execute the information security program. 2 Ensure that processes and procedures are performed in compliance with the organization s information security policies and standards. 3 Ensure that the information security controls agreed to in contracts are performed 4 Monitor, measure, test, and report on the effectiveness and efficiency of information security controls and compliance with information security policies. 5 Ensure that information security is an integral part of the systems development process. 6 Ensure that information security is maintained throughout the organization's processes and life cycle activities 7 Ensure that noncompliance issues and other variances are resolved in a timely manner. 8 Provide information security awareness, training and education to stakeholders. 9 Provide information security advice and guidance to the organization.

Incident Management and Response Certified Information Security Manager Incident Management and Response Tasks are: 1. Develop and implement processes for detecting, identifying, analyzing, and responding to information security incidents. 2. Establish escalation and communication processes and lines of authority. 3. Develop plans to respond to and document information security incidents. 4. Establish the capability to investigate information security incidents. 5. Develop a process to communicate with internal parties and external organizations. 6. Integrate information security incident response plans with the organization s Disaster Recovery (DR) and Business Continuity Plan (BCP). 7. Organize, train, and equip teams to respond to information security incidents. 8. Periodically test and refine information security incident response plans. 9. Manage the response to information security incidents. 10. Conduct reviews to identify causes of information security incidents, develop corrective actions, and reassess risk.

Information Security & IT Governance Infosec program evolution 1970 2006 Chief Security Administrator Ambassador from the IT Governor

Ambassadors need a home base What does your org chart look like? President President President CFO COO CFO CIO COO CFO CRO COO CIO CPO CAO CIO YOU YOU YOU Whose support do you need to make organization-wide policy?

Information Security & IT Governance There are five basic outcomes of effective security governance: Strategic alignment Risk management Value delivery Resource management Performance measurement What does management want from the security program? What constitutes success? This can only be done in conjunction with whoever commissioned the program. CISM Program Development Task 1: Develop & maintain plans to implement the InfoSec strategy. Source: IT Governance Institute

ISM is the point of escalation for security issues that may require investigation Security Management Program Overview Compliance Strategy Strategic Alignment with business/organization objectives Policy ISM writes and publishes Monitoring ISM reviews critical configurations on a periodic basis, and maintains metrics on security configuration and logs of user activity Implementation Awareness ISM conducts classes and publishes announcements Via the security review process as well as occasional security-specific projects, ISM contributes secure architecture, design, and engineering strategy

Risk Management is business driven and comprises: Credit Risk Market Risk Operational Risk Information technology Information Security

Information Security Risk Assessment All business functions have vulnerabilities, however Vulnerabilities!= Exploits Threats!= Exploits Vulnerabilities + Threats!= Exploits Vulnerabilities + Threats allow Exploits Exploits!= Damage Exploits + Service/Data/Financial Loss = Damage Controls minimize probability of Exploits Evaluation of expectation of damage must be continuous. Controls must be proportionate to damage expectation.

Risk/Reward Tradeoff IT Environment

Value Delivery Controls $ Controls Damage Damage IT Environment

Information Security Strategy Task 2: Specify the activities to be performed within the InfoSec program. Process Metrics Organizational workflow designed to achieve management goals for information protection. Measurable artifacts that demonstrate management goals for information protection are met. Both must be transparent enough to allow executive/business management to understand where & how support is required to maintain Information Security Objectives.

InfoSec Program Stages Use executive and stakeholder support to create steering committee Use steering committee to draft policy Create policy awareness and identify gaps Implement prevention, detection and correction processes STAGE 1 STAGE 2 STAGE 3 STAGE 4

Human Resources and Legal take the lead on many issues, Product Owners, Operations Managers contribute Operations Managers and Internal Audit have primary responsibility, Managers of platform maintenance contribute Security Management Program Contributors Compliance Monitoring Strategy Prevention Correction Detection Implementation Technology Steering Committee, Outsource Management, Legal, Physical Security, and other executive management Policy Awareness Subject Matter Experts, Technology Architects, Product Owners, Managers of Platform Maintenance, Systems Administrators, Operations Managers, Executive Assistants All stakeholders contribute Legal and Human Resources take the lead on many issues, Business Application and Data Owners, Operations and Product Managers reinforce

Human Resources and Legal take the lead on many issues, Product Owners, Operations Managers contribute Operations Managers and Internal Audit have primary responsibility, Managers of platform maintenance contribute Security Management Program Contributors Compliance Monitoring Strategy Prevention Correction Detection Implementation Technology Steering Committee, Outsource Management, Legal, Physical Security, and other executive management Policy Awareness Subject Matter Experts, Technology Architects, Product Owners, Managers of Platform Maintenance, Systems Administrators, Operations Managers, Executive Assistants All stakeholders contribute Legal and Human Resources take the lead on many issues, Business Application and Data Owners, Operations and Product Managers reinforce

InfoSec Resources Task 3: Ensure alignment between the InfoSec program & other assurance functions. Executive Management Steering Committee Chief Risk Officer Chief Privacy Officer Information Security Manager Director of IT Operations IT Site Operations Manager IT Implementation Management IT Subject Matter Experts Application Architects IT Project Managers IT Product Owners Security Administrators Business Application Owner Business Data Owner Procurement Manager Compliance Manager Physical Security Organization Compliance, Legal, HR take the lead on many issues, Product Owners, Site Operations Managers contribute Operations Managers and Internal Audit have primary responsibility, MDs of platform maintenance contribute Compliance Monitoring Strategy Implementation Technology Council in coordination with Outsource Management, IT Compliance, Information Protection Counselor, Physical Security, and other executive management Policy Awareness Subject Matter Experts, Application Architects, Product Owners, MDs of Platform Maintenance, Security Managers, Site Operations Managers, Digital Identity Liaisons All stakeholders contribute Legal, Compliance, and HR take the lead on many issues, Business Application and Data Owners, Project Managers reinforce

InfoSec Roles and Responsibilities Task 4: Identify internal & external resources required to execute the InfoSec program Where a person performs this role: Manages the lifecycle of IT applications and platforms An associated InfoSec process responsibility is: Security Review Participation Security Requirements Capture Application Security Design Change Control A sample key performance indicator is: Security-policy-compliant systems configuration Business requirements for confidentiality, integrity, and availability are documented Technical implementation plans for meeting business process security requirements Secure archive, retrieval, and compilation of organization-maintained source code and product customizations Security Upgrade Management Testing and application of security software fixes Procures IT services Security Requirements Capture Formal requirements for security in all Requests for Product Information and Proposals Contract Requirements Business requirements for confidentiality, integrity, and availability in information service provider and technology maintenance contracts Given realms of business operation, resource identification involves not only specifying areas of responsibilities, but also making use of existing business and operational process.

Segue into Architecture Task 5: Ensure the development of InfoSec architectures.

Security Controls Design

Efficiency and Effectiveness Outlook Inventory Strategy Internal Alerts Synthesis Compliance Monitoring Context Policy Awareness Implementation External Alerts From: Alert Service - Vulnerabilities Subject: VULNERABILITY ALERT!!! Date: 5/10/2006 1:20 PM Summary: A buffer overflow has been discovered in the XYZ software that can be exploited to gain administrative access. Impact: Denial of service; possible code execution Severity: 2 (Medium) Corrective Action: Administrators are advised to upgrade to the latest version of XYZ, Version 12.3, available at: http://www.xyz.com ( http://www.xyz.com ) END ALERT Best Practices ISO ISF ISACA Information Security Governance Establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. Information Risk Management Identify and manage information security risks to achieve business objectives. Information Security Program Development Create and maintain a program to implement the information security strategy. Information Security Program Management Oversee and direct information security activities to execute the information security program. Incident Management and Response Plan, develop, and manage a capability to detect, respond to, and recover from information security incidents.

Best Practices Comparison Security Requirements Risk-Based Security Tests Risk Analysis External Review Abuse Cases Risk Analysis Code Review Penetration testing Security Operation Requirements and Use Cases Architecture and Design Test Plans Code Tests and Test Results Feedback from the Field Source: Software Security

Detailed Control Design/Assessments

Security Awareness Task 6: Establish, communicate, & maintain InfoSec policies that support the InfoSec strategy. Basic - applies to all, even if there is just one, e.g. Google Appliance, Stratus Architectural - warranted where data exposure warrants redundant controls Database Management Systems Network Telecommunications etc etc etc Operating System Platform - warranted where multiple instances warrant consistency UNIX Microsoft z/os etc etc etc Situational - applies to process more than technology Internet and Third Party Personal Computing Security Service Level Agreement Vendor Access etc etc etc Application - applies to business applications whether developed in house or externally

Security Training Task 7: Design and develop a program for InfoSec awareness, training, & education.

Layers of support Task 8: Ensure the development, communication, & maintenance of standards, procedures, & other documentation that support InfoSec policies. Policy Standards Graphic shows hierarchy rather than overlap required to enforce consistency. Procedures Guidelines

Security Controls Implementation Task 9: Integrate InfoSec requirements into the organization's processes & life cycle activities. Plan-Do-Check-Correct The COBIT version Plan-Secure-Confirm-Remediate A popular Software Vulnerability guide version Prepare-Detect-Respond-Improve Carnegie Mellon s CERT version Observe-Orient-Decide-Act A US Military version Restrict-Run-Recover A Big 4 consultant s version Compliance Monitoring Strategy Prevention Detection Correction Implementation Policy Awareness Source: COBIT

Security Service-level Agreements Task 10: Develop a process to integrate InfoSec controls into contracts.

Security Metrics Task 11: Establish metrics to evaluate the effectiveness of the InfoSec program.

Performance Measurement Cement the relationship between the InfoSec Program and IT Governance with meaningful report, such as: Risk Management: Stability and auditability of prevention measures. Incident Response and Recovery Preparedness. Value Delivery: Earned value analysis on projects plus overall trend analysis on the ISM portfolio, complete with updated projections based on variance analysis. Resource Management: Staffing, technology and organizational dependency data used in analysis of facilitation and/or impact to the security program. Performance measurement: Metrics that verify that control activities are achieving desired results. For example, an automated monitoring of security configuration and feedback on user anomaly reports

Security Metric Examples

Discussion