Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.



Similar documents
Top 20 Critical Security Controls

How To Manage Security On A Networked Computer System

Vulnerability Management

SANS Top 20 Critical Controls for Effective Cyber Defense

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Strengthen security with intelligent identity and access management

Critical Security Controls

Cybersecurity Health Check At A Glance

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

GFI White Paper PCI-DSS compliance and GFI Software products

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Cybersecurity The role of Internal Audit

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The Payment Card Industry Data Security Standard

Into the cybersecurity breach

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

PCI Compliance for Cloud Applications

IBM QRadar Security Intelligence April 2013

Attachment A. Identification of Risks/Cybersecurity Governance

ISO COMPLIANCE WITH OBSERVEIT

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Information security controls. Briefing for clients on Experian information security controls

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Extreme Networks Security Analytics G2 Vulnerability Manager

Logging In: Auditing Cybersecurity in an Unsecure World

State of Oregon. State of Oregon 1

Data Management Policies. Sage ERP Online

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

THE TOP 4 CONTROLS.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Achieving SOX Compliance with Masergy Security Professional Services

I n f o r m a t i o n S e c u r i t y

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Stay ahead of insiderthreats with predictive,intelligent security

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Symantec Consulting Services

OCIE CYBERSECURITY INITIATIVE

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Security. Security consulting and Integration: Definition and Deliverables. Introduction

ISO 27002:2013 Version Change Summary

5 TIPS FOR MAXIMIZING THE VALUE OF YOUR SECURITY ASSESSMENT

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Information Shield Solution Matrix for CIP Security Standards

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

What is Penetration Testing?

Central Agency for Information Technology

Endpoint Security for DeltaV Systems

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Critical Controls for Cyber Security.

2012 Data Breach Investigations Report

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Microsoft s Compliance Framework for Online Services

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

End-user Security Analytics Strengthens Protection with ArcSight

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

New PCI Standards Enhance Security of Cardholder Data

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

IBM Security QRadar Vulnerability Manager

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Standard CIP Cyber Security Systems Security Management

Security Overview. BlackBerry Corporate Infrastructure

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

The webinar will begin shortly

Payment Card Industry Data Security Standard

LogRhythm and NERC CIP Compliance

Looking at the SANS 20 Critical Security Controls

ISO Controls and Objectives

Leveraging Privileged Identity Governance to Improve Security Posture

IoT & SCADA Cyber Security Services

Secret Server Qualys Integration Guide

Sarbanes-Oxley Compliance for Cloud Applications

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Windows Operating Systems. Basic Security

THE BLUENOSE SECURITY FRAMEWORK

Under the Hood of the IBM Threat Protection System

Security Controls What Works. Southside Virginia Community College: Security Awareness

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

CyberArk Privileged Threat Analytics. Solution Brief

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Global Partner Management Notice

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

SANS Institute First Five Quick Wins

PII Compliance Guidelines

Miami University. Payment Card Data Security Policy

Healthcare Security Vulnerabilities. Adam Goslin Chief Operations Officer High Bit Security

Transcription:

ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7

01 INTRODUCTION If you re looking for a comprehensive, global framework to tailor your security program, then ISO 27002 may be right for your organization. Compliance doesn t equal security, but standards such as ISO 27002 can be a helpful tool for demonstrating your security posture to internal and external stakeholders. You can even opt to get certified by the International Organization for Standardization (ISO) to provide additional reassurance to customers and partners. Like any best practices around security controls, you ll get the most out of ISO 27002 if you read between the lines to understand the intent behind each guideline. We recommend you use the standard as a starting point and, where possible, go beyond the minimum requirements to take your security program to the next level. What is ISO 27002? ISO 27002 is an internationally recognized standard designed for organizations to use as a reference for implementing and managing information security controls. The standard is intended to be used with ISO 27001, which provides guidance for establishing and maintaining information security management systems. Many organizations use ISO 27001 and 27002 in conjunction as a framework for showing compliance with regulations where detailed requirements are not provided, for example Sarbanes-Oxley Act (SOX) in the U.S. and the Data Protection Directive in the EU. Published in October 2013, the latest version of ISO 27002 covers 14 security controls areas (numbered from 5 to 18), with implementation guidance and requirements for each specific control. How Rapid7 Can Help Rapid7 products and services can help organizations address controls recommended in ISO 27002 as follows: is a threat exposure management solution that can help organizations identify and classify their assets (8.1 and 8.2), audit password policies (9.2.4, 9.3.1, 9.4.3), identify and prioritize vulnerabilities (12.6.1), and more. Metasploit is a penetration testing solution that can help organizations validate vulnerability exploitability (12.6.1), audit the effectiveness of network segmentation (13.1.3), conduct technical compliance tests (18.2.3), and more. AppSpider is a web application security assessment solution that can help organizations test the security of web applications (14.2.3, 14.2.8, 14.2.9). is an intruder analytics solution that can help organizations monitor user access to the network (9.1.2, 9.2.3, 9.2.5), collect and analyze events (12.4.1, 12.4.2, 12.4.3), assist in incident response (16.1.4, 16.1.7), and more. Rapid7 can provide Cyber Security Services to perform an assessment of an organization s current state of controls against the ISO 27002 framework and identify gaps in their security program. Rapid7 can also develop and review security policies (5.1.1, 5.1.2), provide security awareness training (7.2.2), conduct penetration tests (14.2.8, 14.2.9, 18.2.3), respond to security incidents (16.1.5, 16.1.7), and more. Rapid7.com ISO 27002 Compliance Guide 1

02 DETAILED CONTROLS MAPPING Below is a mapping of ISO 27002 controls to the Rapid7 products and services that can address at least part of the requirements. Please refer to the ISO/IEC 27002:2013 document on www.iso.org for a complete description of each control and detailed requirements. Control Category Control Description Product/Service How Rapid7 Can Help 5. Information security policies 5.1 Management direction for information security 5.1.1 Policies for information policy 5.1.2 Review of the policies for information security 7. Human resource security 7.2 During employment 7.2.2 Information security awareness, education and training 8. Asset management 8.1 Responsibility for assets Define, approve, and communicate a set of policies for information security. Review policies at planned intervals or if significant changes occur. Provide appropriate awareness education and training to all employees. Security Program Development Cyber Security Maturity Assessment Security Awareness Training Rapid7 can help organizations build an effective security program taking into account their business strategy, compliance requirements, and the threat landscape. Rapid7 can perform an assessment of an organization s current state of controls, policies, and procedures, and identify tactical and strategic initiatives for improving security. Rapid7 can provide customizable security awareness training to help employees understand security risks. 8.1.1 Inventory of assets Identify organizational assets and maintain an inventory of these assets. enables assets to be tagged with contextual information, including assigning an asset owner. automatically detects the primary user of each asset. 8.1.2 Ownership of assets Assign an asset owner for assets maintained in the inventory. enables assets to be tagged with contextual information, including assigning an asset owner. automatically detects the primary user of each asset. Rapid7.com ISO 27002 Compliance Guide 2

8.2 Information classification 8.2.1 Classification of information Classify information and assets in terms of value, criticality and sensitivity. enables assets to be tagged with contextual information, including classifying an asset s criticality. enables assets to be tagged as critical. 8.3 Media handling 8.3.1 Management of removable media 9. Access control Implement procedures to manage the use of removable media. can measure part of this control by providing the ability to audit whether autoplay is allowed on devices. 9.1 Business requirements of access control 9.1.2 Access to networks and network services 9.2 User access management 9.2.3 Management of privileged access rights 9.2.4 Management of secret authentication information 9.2.5 Review of user access rights 9.3 User responsibilities 9.3.1 Use of secret authentication information Limit user access to the network and monitor use of network services. Restrict and control allocation and use of privileged access rights. Control allocation of passwords and change default vendor passwords. Review user access rights at regular intervals and after any changes. Ensure users are following the organization s password policies. 9.4 System and application access control provides ability to monitor configurable network zones and access policies, and alerts on violation of these policies. monitors use of administrative accounts, and alerts on new admin accounts and account privilege escalation. automatically scans the entire network to identify systems that are configured with default credentials. automatically detects accounts that are shared between multiple users. provides visibility of all user accounts, including local, domain, and cloud services accounts. provides fully customizable policy scanning to audit passwords for minimum complexity and length. automatically detects user credentials that may have been compromised in third-party breaches. 9.4.1 Information access restriction 9.4.2 Secure log-on procedures Restrict access to information and applications based on access control policy. Control access to systems and applications by a secure log-on procedure. can partially help with this control by monitoring access to key applications, and alerting on unauthorized or suspicious usage. can measure part of this control by providing the ability to audit account lockout configurations, including maximum failed log-on attempts. automatically detects unauthorized access, and alerts on brute force attempts and unusual authentication activity. Rapid7.com ISO 27002 Compliance Guide 3

9.4.3 Password management system 12. Operations security 12.2 Protection from malware 12.2.1 Controls against malware 12.4 Logging and monitoring Password management systems should ensure quality passwords. Implement detection and prevention controls to protect against malware. 12.4.1 Event logging Record user activities, exceptions, faults, and information security events. 12.4.2 Protection of log information 12.4.3 Administrator and operator logs Protect log information against tampering and unauthorized access. Log and review system administrator and operator activities regularly. 12.6 Technical vulnerability management 12.6.1 Management of technical vulnerabilities 13. Communications security Evaluate the organization s exposure to vulnerabilities and address associated risks. 13.1 Network security management Metasploit Metasploit Managed Services provides ability to audit password policy configurations, including complexity, expiry, re-use and encryption. Metasploit tests password quality with online brute-force attacks, offline password cracking, and credentials re-use. scans every Windows workstation to check that: URL filtering and website reputation scanning are enabled; E-mail clients are configured to block certain attachments; Anti-malware software is installed, enabled and up-to-date. detects known malicious processes on endpoints, and identifies unauthorized software that is rare or unique. collects logs, correlates events by user, machine and IP, and analyzes for anomalies and suspicious activities. saves logs from various sources in a secure, offsite location, and alerts on event log files being deleted. provides visibility of all administrator activities, including local, domain and cloud service admin accounts. automatically scans the entire network for vulnerabilities and prioritizes for remediation based on risk. Metasploit automatically tests the exploitability of vulnerabilities to demonstrate exposure for prioritization. correlates vulnerability data with event logs to provide additional user context to incidents. Rapid7 can provide a fully-managed, cloudbased vulnerability management service operated on a monthly or quarterly basis. Rapid7.com ISO 27002 Compliance Guide 4

13.1.3 Segregation in networks Segregate groups of information services, users and systems on networks. 13.2 Information transfer policies and procedures Metasploit UserInsight Metasploit automates the task of testing whether network segmentation is operational and effective. provides ability to monitor configurable network zones and access policies, and alerts on violation of these policies. 13.2.1 Information transfer policies and procedures Protect the transfer of information through all types of communication facilities. 14. System acquisition, development and maintenance can partially help with this control by providing visibility into usage of cloud-based communications or storage services. 14.2 Security in development and support process 14.2.3 Technical review of applications after operating platform changes 14.2.8 System security testing 14.2.9 System acceptance testing Review and test business critical applications when operating platforms change. Conduct testing of security functionality during development. Conduct acceptance testing for new information systems, upgrades and new versions. 16. Information security incident management AppSpider AppSpider Penetration Testing Services AppSpider Penetration Testing Services AppSpider can be used to dynamically scan applications when operating platforms change to identify vulnerabilities. AppSpider integrates with continuous integration tools to identify vulnerabilities within the development lifecycle. Rapid7 can perform manual penetration testing on web and mobile applications to identify security weaknesses. AppSpider can be used to dynamically scan new applications, upgrades and new versions to identify vulnerabilities. Rapid7 can perform manual penetration testing on web and mobile applications to identify security weaknesses. 16.1 Management of information security incidents and improvements 16.1.1 Responsibilities and procedures 16.1.4 Assessment of and decision on information security events 16.1.5 Response to information security incidents 16.1.7 Collection of evidence Establish responsibilities and procedures for response to security incidents. Assess events to decide if they are to be classified as security incidents. Respond to security incidents according to documented procedures. Define and apply procedures for identification and collection of evidence. Incident Response Program Development Incident Response Services Incident Response Services Rapid7 can perform an assessment of the organization s current preparedness and help develop an incident response plan. uses behavioral analytics to detect security incidents and speeds up assessment of security events by providing instant user context and incident investigation tools. Rapid7 can help organizations with all stages of incident response from analysis and detection to containment and remediation. provides ability to map findings to an interactive timeline and produce a final report for communication. Rapid7 can help organizations develop an incident response plan and define evidence collection and documentation processes. Rapid7.com ISO 27002 Compliance Guide 5

18. Compliance 18.2 Information security reviews 18.2.1 Independent review of information security 18.2.3 Technical compliance review Review approach to managing information security at planned intervals. Review compliance with policies and standards regularly. Cyber Security Maturity Assessment Metasploit Penetration testing services Rapid7 can perform an assessment of an organization s current state of controls, policies and procedures, and identify tactical and strategic initiatives for improving security. provides auditing and reporting capabilities for assessing compliance with security policies and standards. Metasploit allows organizations to simulate real-world attacks and test effectiveness of security controls. Rapid7 can perform penetration tests on network infrastructure and applications to test the security of information systems. Rapid7.com ISO 27002 Compliance Guide 6

03 ABOUT RAPID7 Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security. We combine our extensive experience in security data and analytics and deep insight into attacker behaviors and techniques to make sense of the wealth of data available to organizations about their IT environments and users. Our solutions empower organizations to prevent attacks by providing visibility into vulnerabilities and to rapidly detect compromises, respond to breaches, and correct the underlying causes of attacks. Rapid7 is trusted by more than 4,150 organizations across 90 countries, including 34% of the Fortune 1000. To learn more about Rapid7 or get involved in our threat research, visit www.rapid7.com. Rapid7.com ISO 27002 Compliance Guide 7