Building Reference Security Architecture



Similar documents
Developing the Corporate Security Architecture. Alex Woda July 22, 2009

The Information Security Problem

(Instructor-led; 3 Days)

CESG Certification of Cyber Security Training Courses

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

I. Introduction to Privacy: Common Principles and Approaches

BUY ONLINE FROM:

Security Controls What Works. Southside Virginia Community College: Security Awareness

Information Security Basic Concepts

Information Blue Valley Schools FEBRUARY 2015

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Architecture Guidelines Application Security

Enterprise Security Architecture Concepts and Practice

Bellevue University Cybersecurity Programs & Courses

Securing the Service Desk in the Cloud

Implementing Cisco IOS Network Security v2.0 (IINS)

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

How To Secure Your Data Center From Hackers

Critical Controls for Cyber Security.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Introduction to Cyber Security / Information Security

Eleventh Hour Security+

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Security from a customer s perspective. Halogen s approach to security

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Tenzing Security Services and Best Practices

Compliance and Security Challenges with Remote Administration

How Reflection Software Facilitates PCI DSS Compliance

Does your Citrix or Terminal Server environment have an Achilles heel?

How To Manage Security On A Networked Computer System

Passing PCI Compliance How to Address the Application Security Mandates

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Using Foundstone CookieDigger to Analyze Web Session Management

Information & Asset Protection with SIEM and DLP

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Central Agency for Information Technology

Complying with PCI Data Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

HIPAA Privacy & Security White Paper

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

Certified Information Systems Auditor (CISA)

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

IT Networking and Security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Security Controls for the Autodesk 360 Managed Services

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Chapter 1 The Principles of Auditing 1

Injazat s Managed Services Portfolio

Tim Bovles WILEY. Wiley Publishing, Inc.

Security Threat Risk Assessment: the final key piece of the PIA puzzle

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Security + Certification (ITSY 1076) Syllabus

Enterprise Security Architecture

The Seven Habits of State-of-the-Art Mobile App Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

BM482E Introduction to Computer Security

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Achieving PCI Compliance Using F5 Products

The Protection Mission a constant endeavor

IDS for SAP. Application Based IDS Reporting in the ERP system SAP R/3

Architecture & Change Management

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

CISA TIMETABLE (4 DAYS)

Networking: EC Council Network Security Administrator NSA

Creating a Corporate Integrated Data Environment through Stewardship

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Thick Client Application Security

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Network and Security Controls

Online Lead Generation: Data Security Best Practices

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

IAPP Privacy Certification

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

March

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

THE BLUENOSE SECURITY FRAMEWORK

SANS Top 20 Critical Controls for Effective Cyber Defense

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Achieving PCI-Compliance through Cyberoam

Introduction to IT Security

Big Data, Big Risk, Big Rewards. Hussein Syed

Transcription:

Information Security, Privacy and Compliance Building Reference Security Architecture Bob Steadman, Sr. Director Predrag Zivic, Sr. Security Architect

Information Security Too many organizations still consider their information security as an administrative cost, something that is done in the back office and in the nature of an insurance policy. Information security is the way we ensure the integrity of our data and protect the privacy and confidentiality of our competitive information and the data entrusted to us by our customers and employees. Information security is truly everybody s business. As our customers often interface with us through our computer systems, information security is part and parcel of the goods and services that we offer. Jim Gaston Information Security Strategies for successful management

Loblaw Overview Loblaw Companies Limited ( Loblaw ) is Canada's largest food distributor and a leading provider of general merchandise products, drugstore, and, financial products and services President's Choice Financial services offer core banking, a popular MasterCard, PC Financial auto, home, travel and pet insurance as well as the PC Points loyalty program

Loblaw Overview Over 134,000 full and part-time colleagues across Canada in over 1,000 stores Number of ongoing initiatives ERP (SAP) implementation Revamp of Supply Chain Warehouse Transportation And many more

OVERVIEW OF INFORMATION SECURITY STRATEGY Information Security's Three Spheres of of Influence Guided by by our our Three Spheres of of Influence for for Risk and Reward, we we have been able to to identify, define, and draft a roadmap for for how information security should be be implemented within the the Loblaw operational environment. Security Architecture 4Policy 4People 4Process Preventative Controls 4Technology 4Tools 4Techniques Information Security Governance Detective Elements 4Managing 4Monitoring 4Review Benefits of of Information Security's Information Security Strategy Understanding our our information security drivers by by translating them into into business requirements. Aligning the the information security strategic plan plan with with the the business vision, mission and and tolerance for for risk. risk. Developing strategies to to align align information security with with Loblaw s IT, IT, business, and and corporate strategies and and initiatives. Establishing accountability, authority and and responsibility for for information security across Loblaw. Communicating and and encouraging consistent and and appropriate security decisions and and investments. Monitoring the the threat landscape and and aligning the the information security initiatives and and plans to to proactively address the the threats. Integrating security into into core core business management processes. Defining information security measurement requirements on on the the state state and and success of of the the information security program to to provide real-time indications of of the the health of of information security.

ISPC Principles Guiding Principles: Awareness of information handling and protection responsibilities; Compliance with information security controls; Ethics as an integral component of information handling and protection; Appropriately protect information as a strategic resource that has value; Information security controls are cost-effective and risk-responsive; Protection of Customer, Patient and Personal Information; Compliance with Laws and Regulations; and Maintain auditability of decisions and actions. Technical Principles: Access based on least privilege; and Defence in depth approach to information security.

SECURITY LCL S DIRECTIVES STRUCTURE Loblaw Hierarchical Set of Information Security Governance Directives Loblaw Information Security Program Mandate Loblaw Information Security Principles Awareness Accountability Ethical Value Risk Management Protection of Customer, Patient, and Personal Information Compliance Auditability Loblaw Information Security Policy Loblaw Information Security Standards Classification and Labeling Access Control Network Security Server Handling Malicious and Unauthorized Code Software Acquisition and Development Desktop Security Cryptography E-mail Security Mobile Device and Media Protection Wireless Security Logging Monitoring and Reporting Security Incident Management Third Party Security Compliance Windows Server Security Loblaw Information Security Guidelines UNIX Server Security Information Handling & Disposal Secure Software Development Lifecycle In In efforts to to establish the fundamental building blocks required for for the information security program, Loblaw constituted a hierarchical directives structure that links the information security policy with the adopted principles and in in turn with the supporting standards and guidelines.

The Security Balance Security is balancing act between ease of access to information and protecting information from increasing threats Not possible to make information processing resources available without restriction and still be able to offer reasonable protection of their integrity and trustworthiness. To maintain some feasible level of security, some balance must be found between two positions. Must consider the organization s appetite for risk when assessing where the appropriate balance lies.

TOGAF & ISPC Architecture

ISPC Contextual Architecture Business Requirements Legislation (SOX, 57-109) FIPPA/PHIPA ISPC Framework ISPC Principles Security & Privacy Policy Confidentiality Integrity Availability Privacy TOGAF Processes ITIL/ITSM

ISPC Architecture Baseline Definition of security attributes Confidentiality, Integrity, Availability & Privacy CONFIDENTIALITY INTEGRITY AVAILABILITY PRIVACY Restricted High High High Confidential Medium Medium Medium Internal Low Low Low Public No No No Security Operations must support defined ISPC attributes

ISPC Conceptual Architecture No Trust Zone Low Trust Zone Medium Trust Zone High Trust Zone Information Flow SOA, WS Flow Security Attributes Confidentiality, Integrity, Availability, Privacy No CIA No Privacy Low CIA Low Privacy Medium CIA Medium P High CIA High Privacy Conceptual Trust Tiers with Security Attributes Applied

TOGAF & ISPC Architecture Contextual Enterprise Security & Privacy Conceptual Enterprise Security & Privacy Logical Enterprise Security & Privacy

ISPC Logical Services Security & Privacy Attribute Confidentiality Integrity Availability Privacy Security Operation Processes (Operational Services) Logical Security Service Identification, Authentication, Authorization, Encryption. Security Management Authentication, Authorization, Digital Sign, Hashing, Data Input Validation., Content Inspection, Security Management Clustering, Load Balancing, High Availability, Security Management, BCP Consent, Authorization, Anonymous /Pseudo, Digital Sign, Encryption, Audit Log Vulnerability Management, Incident Management, Audit Log Management (Event Management), User Administration, Change Management Hash/sign, encryption, content inspection, validation, anonymous, pseudo, consent are going to be referred to message & data protection controls hereinafter

ISPC Logical Architecture No Trust Zone Low Trust Zone Medium Trust Zone High Trust Zone Software Logical Layers Web Application, WS, Middleware, Message, Database Information Flow Hardware Logical Layers Physical (building), Network, Systems, SAN Security & Privacy Services Security Operation Processes Identification, Authentication, Authorization, Message & Data Protection, Audit (Log), Security Management, BCP

ISPC Physical Services Logical Security Service Identification Authentication Authorization Message and Data Protection Audit Log Service Security Management BCP & DRP Vulner. Mgmt, Incident Mgmt, Change Mgmt User Administration Physical Security Mechanism Username, Token/Card, Biometric Password, Token/Card, Biometric, EAS, OTP, PKI, Combination of Mechanisms MAC, RBAC, ACL (FW), Consent, DAC PKI, SSL, AES, DES (encryption), Anonymous, Pseudo Algorithm, MD5, SHA-1 (hashing), Scrambling, Proxy, Application firewall, Field level checks, Anti-virus/worm/trojan, IPS Action log, error log, message log, event log, transaction log collection & correlation, Mgmt of FW, IDS, HIDS, IAM, Security Awareness, Security Policy, ITSM processes BIA, Documented Plans and Tests ITIL Remedy, Scanners IAM/CSI toolset

ISPC Physical Architecture (per zone) Sample Trust Zone Information Flow Software INFO-Structure Component Web Application/Service, Middleware, Message, Database Hardware INFO-Structure Components Physical, Network, Systems, SAN Identification Service Username, Token Mechanisms Authentication Service Passwd, Cert/Token, EAS Mechanisms Authorization Service RBAC, MAC, ACL, Consent Mechanisms Message & Data Protection Service PKI, AES, SSL, MD5, SHA, Pseudo,Sign Audit Log Service Logging, Collection, Correlation, Arch. Security Management FW, IDS, IAM, Log, ITSM Mechanisms BCP & DRP Service Plans, Tests Mechanisms Security Operation Processes Remedy (ITIL), CA CSI

ISPC Architecture Methodology Business Assets Labeling Sensitivity of Project(s) Risk Assessment (PIA) Conceptual Logical Physical Security & Privacy Architecture Security Posture Assessment Security & Privacy Implementation Security & Privacy Operation

ISPC Reference Security Architecture Questions? Thank you!