Security Architecture & Risk Assessment



Similar documents
March

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

How To Manage Security On A Networked Computer System

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

SECURITY. Risk & Compliance Services

Achieving Compliance with the PCI Data Security Standard

Introduction to Cyber Security / Information Security

Certified Information Systems Auditor (CISA)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Chapter 1 The Principles of Auditing 1

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

GE Measurement & Control. Cyber Security for NEI 08-09

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Best Practices For Department Server and Enterprise System Checklist

Network Security Administrator

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Network and Security Controls

Security Controls What Works. Southside Virginia Community College: Security Awareness

Best Practices for PCI DSS V3.0 Network Security Compliance

SonicWALL PCI 1.1 Implementation Guide

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Basics of Internet Security

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Developing Network Security Strategies

Brainloop Cloud Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

IBX Business Network Platform Information Security Controls Document Classification [Public]

Secure networks are crucial for IT systems and their

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

University of Pittsburgh Security Assessment Questionnaire (v1.5)

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Fortinet Solutions for Compliance Requirements

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Network Segmentation

Information Security Services

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Altius IT Policy Collection Compliance and Standards Matrix

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

A Rackspace White Paper Spring 2010

Achieving PCI Compliance Using F5 Products

Information Security Policy

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

A Comparison of Oil and Gas Segment Cyber Security Standards

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

CISCO IOS NETWORK SECURITY (IINS)

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Information Security and Risk Management

Tenzing Security Services and Best Practices

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Network Security Guidelines. e-governance

Information Technology Branch Access Control Technical Standard

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Weighted Total Mark. Weighted Exam Mark

Presented by Evan Sylvester, CISSP

How To Protect Yourself From A Hacker Attack

Securing the Service Desk in the Cloud

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Using Skybox Solutions to Achieve PCI Compliance

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

Security aspects of e-tailing. Chapter 7

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Cloud Contact Center. Security White Paper

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Two Approaches to PCI-DSS Compliance

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

External Penetration Assessment and Database Access Review

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Cyber Security Metrics Dashboards & Analytics

Course Title: Penetration Testing: Security Analysis

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Managing internet security

Overcoming PCI Compliance Challenges

PCI Requirements Coverage Summary Table

HOW SECURE IS YOUR PAYMENT CARD DATA?

ICANWK406A Install, configure and test network security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Transcription:

Security Architecture & Risk Assessment April 28, 2005 André Carrington, P.Eng, CISSP, CISM

What is critical to improve security in your organization? Top management support Alignment with business objectives Business case value analysis Involvement of staff & business process owners Sufficient resources Being prepared for incidents Managing expectations

Agenda Threats and risks Threat-Risk & Gap assessment Enterprise security architecture Wireless security architecture

Recent Incidents Bank of America loses tapes re 1.2 million federal workers Ameritrade loses backup tapes in shipping re 200,000 clients Keyloggers & wire transfer fraud in attempted theft of 220m from Sumitomo Mitsui bank Bank of America sued by a customer whose Trojan-infected computer permitted an unauthorized transaction for USD $90,000 Phishing and Trojans cause losses of 12m for UK banks in 2004 Theft of 1.4 million credit cards from DSW Shoe data warehouse Sovereign bank is suing DSW Shoe with respect to the VISA CISP

Recent Incidents II DNS attacks redirect/capture traffic to financial & retail web sites americanexpress.com; citicards.com; adp.com; walmart.com; cnn.com; etc. Lowe s credit-card system attacked through wireless access points ChoicePoint, a background check company, provided information on 145,000 consumers to fraudulent businesses; ~750 confirmed ID thefts. Former IT Manager indicted on computer crime charges Records of many similar cases are found on the US DOJ web site

Losses reported

Limitations of data Aggregate data Not specific to industry, region Coarse data Few specifics on controls that failed and the IT infrastructure & services Reputation loss/impact difficult to quantify Impact variables media spin; law suits; expectations/brand Operational losses not accurate

Agenda Threats and risks Threat-Risk & Gap assessment Enterprise security architecture Wireless security architecture

Threat-Risk Models Source: Threat-risk model concept developed by André Carrington.

Threat-Risk Model L T : LIKELIHOOD OF THREAT V : VULNERABILITY I : IMPACT Source: ISO 13335 (GMITS)

Likelihood vs. Impact ImpactI : IMPACT Low Medium High L T : LIKELIHOOD Likelihood OF THREAT High 5 8 9 Medium 3 6 7 Low 1 2 4 Source: RCMP TRA Guide

More complex tables L T : LIKELIHOOD OF THREAT V : VULNERABILITIES I : IMPACT Source: ISO 13335 (GMITS)

Formulae Variables: L=Likelihood; I=Impact; V=Vulnerability; N=Nature of threat; S=Safeguards; A=Asset value Values: QL=Qualitative; HML=high, medium, low; 1..n=rank from 1 to n Source: Formulae developed by André Carrington.

Tools to automate & guide Source: Ontario MBS TRA tool BITS Basel Kalculator [sic]

Tools also provide lists Source: Australian TRA standard

Limitations of TRA The adversary s SKRAMO is not known Skills Knowledge Resources Authority Motives Objectives Source: Donn Parker

ROI or subjective decision? Security Risk Involuntary risk of unknown value cannot be avoided Explicit sources of risk are not identifiable Adversaries skills, knowledge, resources, authority, motives and objectives (SKRAMO) are unknown Adversaries normally lie, cheat, deceive, and act irrationally ROI is negative, unknown, and not provable: Positive benefit = absence of unknown possible loss Negative result is unlimited, unknown loss Risk assessment is not verifiable because results are obscure Limited resources are allocated for risk assessment Business risk Voluntary discretionary investment decision can be made Competitors are known Competitors SKRAMO is known Predictable competitors normally follow ethical practices ROI is zero or positive and can be easily demonstrated: Positive benefit is measurable profit Loss is limited to investment Risk assessment is verifiable by obvious results Generous resources are allocated for risk assessment -- Donn Parker (with permission) Source: Donn Parker

Security trade-offs are subjective and depend on power and agenda* That said, you can still appeal to objectivity via benchmarking & principles. *Source: Bruce Schneier

Gap assessment, standards & benchmarking

Opportunities to Share or Benchmark HTCIA Information Security Forum (ISF) International Information Integrity Institute (I-4) CoBIT Online Consulting organizations Other fora: FIRST, BITS, etc.

Agenda Threats and Risks Threat-Risk & Gap assessment Enterprise security architecture Wireless security architecture

Context of Security Architecture Standard Operating Procedures Architecture Principles & policy Program foundation

A wireless security solution Source: Based on diagrams developed by Andre Carrington for Center for Internet Security Wireless Benchmark using DoD graphics

Security Architecture Conceptual and functional architecture Services & channels Requirements Decision points Design alternatives & decisions Principles Network zones Logical components Object interaction diagrams & state models

Network Zones

Security Architecture checklist Prevent Authorization, Authentication, Access Control, Confidentiality, Audit Logging, System Integrity, Data Integrity and Non-Repudiation Auditing, Ethical Hacking, Compliance Review, Vulnerability Analysis Detect Host Intrusion Detection, Network Intrusion Detection, Honey pots/tokens Log Review, Event Correlation, Fraud Detection Respond Incident Response, Forensics, Recovery, Duress Alarms, Monitoring Enable Role-Based Access Control, Single Sign-On, Provisioning & Identity Management, Digital Signature, Privacy Enhancing Technologies Virtual Private Networking, Secure E-mail, etc.

A wireless security solution Source: Based on diagrams developed by Andre Carrington for Center for Internet Security Wireless Benchmark using DoD graphics

Security architecture principles I Trade-offs Trade-offs are a part of security design: Cost Time-to-market Performance / Efficiency Usability Need to know / Least privilege User groups and privileges ACLs on files, tables, objects, libraries, etc. Firewall & VPN rules (ACLs) Role-based access control

Security architecture principles II Weakest link People can be deceived (social engineering) Weak passwords trump strong security Physical access trumps strong logical access controls Avoid non-secure protocols in system administration e.g. telnet, tftp, r-commands, vnc, weak configurations of RDP & X- Windows, etc. Avoid non-secure protocols in untrusted zones ftp, smb, pop3, wep, etc. Corollary: Segregate different levels of risk DMZ vs. Internal network Prevent read-up and write-down Isolate risks / reduce complexity B2C, B2B, Outbound Internet Access, Inbound VPN Access Application tiers: client web server integration server DBMS Separate FTP servers from Web servers

Security architecture principles III Keep It Simple (KISS) Simple & specialized components are more secure Reduce, limit and customize: interfaces & services E.g. hardening, stored procedures Avoid infamous services & protocols Defense-in-depth / Fail-safe Multiple safeguards of different types: Firewall; Hardening; Logging; File Integrity checking Fail-safe design: DMZ; VLANs that fail-closed; deny-all rules; Non-admin. application users; Chroot/jailed services Database views; session timeout Input validation, buffers, race conditions, infinite loops Stack-heap protection, garbage collection

Security architecture principles IV Use Industry Standards, Guidance & Regulations ISO 13335, ISO 7498-2, NIST: SP 800 Series & DISA STIGs VISA & Mastercard PCI Data Security (formerly CISP/SDP) CIS, NSA, IATFF, BITS, etc. ISO 17799, Basel II, SB1386, etc. Vendor guidance Training and Certification Obscurity is a weak logical security control

Security architecture principles V Built-in not bolted on Centralization & Automation Logging, Intrusion Detection & Event Management Authentication servers for users & devices Centralized User Administration / Single Sign On (to some extent) Vulnerability assessment & reporting

Agenda Threats and risks Threat-Risk & Gap assessment Enterprise security architecture Wireless security architecture

A wireless security solution Source: Based on diagrams developed by Andre Carrington for Center for Internet Security Wireless Benchmark using DoD graphics

Is this a better design? Source: Based on diagrams developed by Andre Carrington for Center for Internet Security Wireless Benchmark using DoD graphics

Scalability? Source: Based on diagrams developed by Andre Carrington for Center for Internet Security Wireless Benchmark using DoD graphics

Thank-you for your time.

Profile Mr. Carrington is a consultant with 13 years of professional experience in IT security and e-business integration. He has devised security architectures, performed risk assessments and developed e-commerce applications for banks, insurance companies and other private and public sector organizations. Mr. Carrington is a systems design engineer from the University of Waterloo, a Certified Information Systems Security Professional and a Certified Information Security Manager. He has secret (level II) clearance with the Government of Canada. André Carrington, P.Eng, CISSP, CISM