UIIPA - Security Risk Management. June 2015



Similar documents
Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

IoT & SCADA Cyber Security Services

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

Certified Identity and Access Manager (CIAM) Overview & Curriculum

THE BLUENOSE SECURITY FRAMEWORK

Adopting Cloud Computing with a RISK Mitigation Strategy

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

INFORMATION TECHNOLOGY SECURITY STANDARDS

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15

Security Requirements for Wireless Local Area Networks

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Risk Management Guide for Information Technology Systems. NIST SP Overview

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Microsoft s Compliance Framework for Online Services

Risk & Audit Committee California Public Employees Retirement System

05.0 Application Development

Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision A

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Certified Information Systems Auditor (CISA)

Hands on, field experiences with BYOD. BYOD Seminar

Software Application Control and SDLC

ISSECO Syllabus Public Version v1.0

Cyber Security solutions

How To Protect Your Data From Theft

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

ISO 27002:2013 Version Change Summary

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Strategic Information Security. Attacking and Defending Web Services

How To Secure Cloud Computing

Overview TECHIS Carry out risk assessment and management activities

Appendix B: Mapping Cybersecurity Assessment Tool to NIST

PCI Solution for Retail: Addressing Compliance and Security Best Practices

8070.S000 Application Security

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Supplier Security Assessment Questionnaire

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Cloud security architecture

ISO Controls and Objectives

ISO27001 Controls and Objectives

Production in the Cloud

Big Data, Big Risk, Big Rewards. Hussein Syed

Responsible Big Data Governance: Preventing Regulatory Overreaction

EA-ISP-012-Network Management Policy

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Central Agency for Information Technology

UF IT Risk Assessment Standard

Information security controls. Briefing for clients on Experian information security controls

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

4.10 Information Management Policy

Secure By Design: Security in the Software Development Lifecycle

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Information Security Program

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Security Controls What Works. Southside Virginia Community College: Security Awareness

Cybersecurity The role of Internal Audit

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Professional Services Overview

From Chaos to Clarity: Embedding Security into the SDLC

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Guide to Developing a Cyber Security and Risk Mitigation Plan

Legislative Language

Information Security Program Management Standard

Information Security Policy

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Enterprise Risk Management taking on new dimensions

Information Security Team

<Insert Picture Here> How to protect sensitive data, challenges & risks

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Appendix A: Mapping Baseline Statements to FFIEC IT Examination Handbook

Infrastructure Information Security Assurance (ISA) Process

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Data Storage Security, Cloud Computing and Virtualization

ILM: Tiered Services & The Need For Classification

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

An Information Security and Privacy Perspective for Procurement Services Projects

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Transcription:

UIIPA - Security Risk Management June 2015 1

Introduction Tim Hastings, Chief Information Security Officer State of Utah - Department of Technology Services Tim Hastings has more than 16 years of experience in assessing and developing information technology, security and privacy processes and controls. Tim specializes in security risk and compliance, working with his clients to build security management programs aimed at achieving compliance, reducing risk and providing enterprise value. Tim also understands the importance of evaluating business drivers when incorporating technology and security enablers into the enterprise structure. This understanding comes from a diverse background of services including financial internal and external auditing, performance auditing, quality assurance reviews and data analytics for clients in a variety of industries including technology, telecommunications, public sector, health care, insurance, oil & gas, manufacturing, higher education and consumer business. Session Objectives Security risk management strategies Secure development lifecycle Secure development principles 2

Agenda 3 Data classification Security risk assessment Common user security risks & mitigating techniques Physical security Social threats Logical security Mobile devices A call to action

Data classification & Security risk assessment 4

Protecting data stores 5 Moving from protection at the perimeter to protection as close to the data as possible.

How do we implement this? 6 Locate Data Assess Risk Identify Classes Implement Protection What data do I have? Where is it? In an application On a file share In email Paper copies 3 rd parties Is it confidential? What would happen if I lose it? How hard would it be to recreate? Is it regulated? How would we continue to operate? Based on confidentiality Based on business criticality Based on regulations Make your list meaningful, but brief Protection required for each class Enterprisewide versus system specific

Data store identification Work with IT and business leadership to identify data stores used in operations For more complex processes, use flow charts Identify and limit rogue data stores 7

Assess risk 8 Confidentiality Data Protection Integrity Availability All 3 should be balanced for a strong security program Remember that all data sources do not have the same criticality

Example classification: Highly Confidential Identify classes 9 Personal data combined with health or financial data Regulated data(fti, HIPPA, Etc) Confidential Intellectual property Sensitive Names and addresses of customers Private Enterprise financial data Public Public website content

Implement security protection 10 Decide on needed security controls based on classification (i.e. should all highly confidential classified data be encrypted?) Decide which controls should be enterprise wide and which should be application specific Track risks and corrective controls for completion Revisit classifications and risks identified periodically

Secure Development Lifecycle 11

Secure SDLC 12 Source: http://www.cisco.com/web/about/security/cspo/csdl/index.html

Guiding Principles 13 Domain Security foundation Risk based Principle Security policy Integrate security into technology SDLC Delineate physical and logical boundaries Developer training Identify and reduce risk Assume external systems are insecure Implement tailored security controls Consider controls while processing, transmitting and storing data Consider custom development Source: Summarized from http://csrc.nist.gov/publications/nistpubs/800-27a/sp800-27-reva.pdf

Guiding Principles 14 Domain Ease of use Increase resilience Principle Consider security standards (even open source) Develop security requirement with common business language Consider designs open for new technology Strive for operational ease of use Implement layers of security Design controls to limit damage and recover quickly Plan for expected threats Identify and respond to vulnerabilities Segment systems based on classification/function Design monitoring controls Exercise resilience controls Source: Summarized from http://csrc.nist.gov/publications/nistpubs/800-27a/sp800-27-reva.pdf

Guiding Principles 15 Domain Reduce Vulnerabilities Network Principle Strive for simplicity Minimize trusted elements Implement least privilege Secure disposal Test for vulnerabilities and flaws Consider physical and logical controls Authenticate users and processes Use unique identities Source: Summarized from http://csrc.nist.gov/publications/nistpubs/800-27a/sp800-27-reva.pdf

Vulnerability Identification Example 16

A call to action 17

What should we do? 1. Identify and understand your data sources 2. Create a risk-based approach to your information security program 3. Integrate security into SDLC 4. Formalize security requirements, development and testing 18

Questions? Tim Hastings Chief Information Security Officer, State of Utah 1 State Office Building, 6 th Floor Salt Lake City, UT 84114 Phone: 801.538.3298 thastings@utah.gov 19