Introduction to Information Assurance. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems



Similar documents
INFORMATION SECURITY & IT COMPLIANCE. Eric A Hibbard, Hitachi Data Systems

Preparing for a Security Audit: Best Practices for Storage Professionals

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Introduction to Storage Security

Domain 5 Information Security Governance and Risk Management

SNIA Storage Security Best Practices

GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Best Practices for Key Management for Secure Storage. Walt Hubis, LSI Corporation

LeRoy Budnik, Knowledge Transfer

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Cloud Archiving. Paul Field Consultant

Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Cloud Archive & Long Term Preservation Challenges and Best Practices

THE EVOLUTION OF INFORMATION SECURITY GOALS

Practical Storage Security With Key Management. Russ Fellows, Evaluator Group

The Secret Sauce of ILM The ILM Assessment Core. Bob Rogers, Application Matrix

The Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems

Status Report on Storage Security Initiatives

The Protection Mission a constant endeavor

ARCHIVING FOR DATA PROTECTION IN THE MODERN DATA CENTER. Tony Walker, Dell, Inc. Molly Rector, Spectra Logic

Cloud Storage Security with a Focus on CDMI. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

SNIA Storage Security Best Practices. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Agile Information Security Management in Software R&D

ABCs of Data Encryption for Storage. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

Certification for Information System Security Professional (CISSP)

The Information Assurance Process: Charting a Path Towards Compliance

in the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP

Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE

Information Security Program CHARTER

Archive and Preservation in the Cloud - Business Case, Challenges and Best Practices. Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Information Security Managing The Risk

Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

15 Best Practices For Comparing Data Protection With Cloud Media Server

SECURITY. Risk & Compliance Services

Security Transcends Technology

GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

CISM (Certified Information Security Manager) Document version:

Building the Business Case for the Cloud

Building Security In:

Trends in Application Recovery. Andreas Schwegmann, HP

IT Governance: The benefits of an Information Security Management System

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI (616)

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Preparing for the Convergence of Risk Management & Business Continuity

How To Create A Cloud Backup Service

Domain 1 The Process of Auditing Information Systems

Cloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Certified Information Systems Auditor (CISA)

Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle

Service Measurement Index Framework Version 2.1

A Comparison of Oil and Gas Segment Cyber Security Standards

Application Intrusion Detection

SECURITY RISK MANAGEMENT

Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Information Security in Business: Issues and Solutions

Interoperable Cloud Storage with the CDMI Standard

CLASSIFICATION SPECIFICATION FORM

INFORMATION SECURITY STRATEGIC PLAN

Impact of New Internal Control Frameworks

Feature. Developing an Information Security and Risk Management Strategy

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

How To Write A National Cybersecurity Act

Securing the Cloud - Using Encryption and Key Management to Solve Today's Cloud Security Challenges

Security Overview. BlackBerry Corporate Infrastructure

Information Security and Risk Management

FINRA Publishes its 2015 Report on Cybersecurity Practices

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

How To Improve Your Business

Security Controls What Works. Southside Virginia Community College: Security Awareness

Frameworks for IT Management

Guidance for Addressing Cybersecurity in the Chemical Sector. Version 2.0 December 2004

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Deduplication s Role in Disaster Recovery. Thomas Rivera, SEPATON

How To Ensure Security In A System

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

ISO27001 Controls and Objectives

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Cyber Security solutions

Cybersecurity The role of Internal Audit

Transcription:

Introduction to Information Assurance Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

Abstract Many organizations face the task of implementing data protection and data security measures to meet a wide range of requirements. With increasing frequency, storage managers and professionals are being asked to handle elements of this protection, which are often presented in the form of a security checklist. However, checklist compliance by individuals who are missing a basic background in Information Assurance is a quick recipe for trouble. At its core, Information Assurance is about ensuring that authorized users have access to authorized information at the authorized time. Further, it doesn t matter whether the information is in storage, processing, or transit, and whether threatened by malice or accident. This session provides an introduction to Information Assurance as well as details that will help storage personnel better understand its applicability in their own environments. 3

A Little Background Previously, SNIA included an Introduction to Storage Security tutorial, which focused on basic concepts and best practices The focus has now shifted to foster improved interactions with the security and audit professionals Storage security best practices are presented in a separate tutorial that mirrors the SNIA Technical Proposal on the subject 4

What is Information Assurance (IA)? Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. SOURCE: National Information Assurance Glossary (CNSS Instruction No. 4009) 5 5

What is Information Assurance (IA)? Information assurance defines and applies a collection of policies, standards, methodologies, services, and mechanisms to maintain mission integrity with respect to people, process, technology, information, and supporting infrastructure. Information assurance provides for confidentiality, integrity, availability, possession, utility, authenticity, nonrepudiation, authorized use, and privacy of information in all forms and during all exchanges. Source: Information Assurance Architecture, Keith D. Willett, 2008, CRC Press, ISBN: 978-0-8493-8067-9 6

Aspects of Information Assurance Security Engineering Systems Information Engineering Security Computer Science Disaster Recovery Business Continuity Fraud Examination Governance Forensic Science Privacy Management Science Criminology Military Science 7

IA Core Principles Confidentiality ensures the disclosure of information only to those persons with authority to see it. Integrity ensures that information remains in its original form; information remains true to the creators intent Availability information or information resource is ready for use within stated operational parameters Possession information or information resource remains in the custody of authorized personnel Authenticity information or information resources conforms to reality; it is not misrepresented as something it is not 8

IA Core Principles (cont.) Utility information is fit for a purpose and in a usable state Privacy ensures the protection of personal information from observation or intrusion as well as adherence to relevant privacy compliances Authorized Use ensures cost-incurring services are available only to authorized personnel Nonrepudiation ensures the originator of a message or transaction may not later deny action 9

IA Architecture (IA 2 ) Framework Basic conceptual structure for defining and describing an information assurance architecture Risk (root driver) may be expressed in terms of business drivers and technical drivers Six architectural views: people, policy, business process, system and application, information/data, and infrastructure A single statement of risk may be stated from the perspective of nine IA Core Principles, each from one of the six different IA 2 views, or 54 perspectives on that single risk. 10

Information Assurance Process Enumeration and classification of the information assets (e.g., data/information technology and value) Risk assessment (vulnerabilities and threats) Risk analysis (probabilities/likelihood and impacts) Risk management (treatment) Test and review Repeat 11

Information Assurance Information Security Information Dependability Confidentiality, Integrity, Availability, Accountability... Reliability, Availability, Fault Prevention, Avoidance and Tolerance, Performance... Ability to recover From failures/faults And security attacks Source: Information Assurance Dependability and Security in Networked Systems, Qian, Joshi, Tipper, Krishnamurthy, 2008, New York, ISBN: 978-0-12-373566-9. 12

A Few Words on Information Security 13

IA vs. Information Security (InfoSec) Both involve people, processes, techniques, and technology (i.e., administrative, technical, and physical controls) Information assurance and information security are often used interchangeably (incorrectly) InfoSec is focused on the confidentiality, integrity, and availability of information (electronic and non-electronic) IA has broader connotations and explicitly includes reliability, access control, and nonrepudiation as well as a strong emphasis on strategic risk management ISO information security management standards (ISMS) are more closely aligned with IA 14

Common Security Frameworks ISO/IEC 27002:2005 The Code of Practice for Information Security Management & ISO/IEC 27001:2006 Information Security Management - Requirements IT Governance Institute (ITGI), Control Objectives for Information and related Technology (COBIT) Version 4.1 Committee of Sponsoring Organizations (COSO) of the Treadway Commission Federal Financial Institutions Examination Council (FFIEC) National Institute of Standards and Technology (NIST), Recommended Security Controls for Federal Information Systems (Special Publication 800-53) Canadian Institute of Chartered Accountants (CICA), Information Technology Control Guidelines (ITCG) UK Office of Government Commerce (OGC), Information Technology Infrastructure Library (ITIL), Security Management 15

The Security Paradigm Principle 1: Principle 2: Principle 3: Principle 4: Principle 5: Principle 6: Principle 7: Principle 8: Principle 9: The Hacker Who Breaks into Your System Will Probably Be Someone You Know Trust No One, or Be Careful About Whom You Are Required to Trust Make Would-Be Intruders Believe They Will Be Caught Protect in Layers While Planning Your Security Strategy, Presume the Complete Failure of Any Single Security Layer Make Security a Part of the Initial Design Disable Unneeded Services, Packages, and Features Before Connecting, Understand and Secure Prepare for the Worst SOURCE: Peter H. Gregory, Solaris Security, 2000 by Prentice Hall PTR, ISBN 0-13-096053-5 16

Basic Security Concepts & Principles Security Requires Auditability and Accountability Access Control Confidentiality Integrity Asset Availability Security is an Integral Element of Sound Management Security Should be Costeffective Security also requires Risk Management Comprehensive and Integrated Approach Life-cycle Management Security Responsibilities and Accountability Should Be Made Explicit 17

Basic Security Concepts & Principles Security Requires Training and Awareness Continual Reassessment Security Must Respect Ethical and Democratic Rights Other Basic Security Principles Choke point Consistency Control of the periphery Defense in depth Deny upon failure Diversity of defense Interdependency Override Reliability Simplicity Timeliness Universal applicability/ participation Weakest link 18

Approaches to Applying Principles Security by Obscurity Strategy Basic premise is stealth / hiding The Perimeter Defense Strategy More of a concentrated effort in defense Defense between insiders and outsiders Defense in Depth Strategy (Recommended) Employs a number of operationally interoperable and complementary technical and non-technical layers of defense May use enclaves for stronger regions of defense 19

Security is People-based Problem If you think technology can solve your security problems, then you don t understand the problems and you don t understand the technology. it is far more effective to think of security as an ongoing process of "risk management" that includes not just protection, but also detection and reaction mechanisms Bruce Schneier, Secrets & Lies ISBN 0-471-25311-1 20

A Few Words on Risk 21

Risk Management Lifecycle Inventory 2 3 Prioritize 1 Policy 4 Vulnerabilities Digital Assets 5 Threats 9 Compliance 8 Measure 7 Remediation 6 Risk 22

The Security Big Picture SOURCE: ISO/IEC 15408-1:2005, Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model, Common Criteria v2.3, http://www.iso.ch 23

Risk Treatment Decision-making Process RISK ASSESSMENT RISK ASSESSMENT RESULTS RISK TREATMENT OPTIONS RISK AVOIDANCE RISK TRANSFER RISK REDUCTION RISK RETENTION RESIDUAL RISKS No IS THE RISK ACCEPTABLE? Yes RISK ACCEPTANCE BASED ON: ISO/IEC 27005:2008, Information technology -- Security techniques Information Security Risk Management, http://www.iso.ch 24

Balancing Cost & Risk High Best Current Practices Risk Costs and Risks In Balance ( Sweet Spot ) Cost Cost Defined Lowest } Discretionary Area 0 (Unattainable) Low Minimum Security 1996 2000 Ray Kaplan All Rights Reserved High Source: Ray Kaplan, CISSP, A Matter of Trust, Information Security Management Handbook, 5 th Edition. Tipton & Krause, editors. 25

Final Thoughts 26

Information Assurance Summary The root driver behind IA is risk Effective IA requires integration from inception and not after-the-fact bolt-ons Good business practice is the complement to compliance requirements 27

Security Versus Compliance Data Security Proactive Defense-in-depth Physical, technical and administrative control areas Preventive, detective and corrective control types Compliance Reactive Accountability Traceability Monitoring & Reporting Risk Management Often the driver for security 28

Last Words The weak link in the security chain is most often the human element. Security IS a people problem! Manage the risks or mitigate the consequences A holistic approach to security includes the people, the organization, governance, process and, lastly, technology. Expectations of the security program - keeping the organization out of trouble and out of the headlines, while doing it for as little money possible Implementing firewalls and hardening systems are not really security issues any longer but operational issues 29

Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracksecurity@snia.org Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee Eric A. Hibbard, CISSP, CISA Ray Kaplan, CISSP 30

For More Information 31

SNIA Security SNIA Security Technical Work Group (TWG) Focus: Requirements, architectures, interfaces, practices, technology, educational materials, and terminology for storage networking. http://www.snia.org/tech_activities/workgroups/security/ Storage Security Industry Forum (SSIF) Focus: Marketing collateral, educational materials, customer needs, whitepapers, and best practices for storage security. http://www.snia.org/ssif 32

Useful Printed Resources Information Assurance Architecture, Keith D. Willett, 2008, CRC Press, ISBN: 978-0-8493-8067-9 Information Assurance Managing Organizational IT Security Risks, Joseph G. Boyce and Dan W. Jennings, 2002, Butterworth Heinemann, ISBN: 0-7506-7327-3 Information Assurance Dependability and Security in Networked Systems, Qian, Joshi, Tipper, Krishnamurthy, 2008, Morgan Kaufmann, ISBN: 978-0- 12-373566-9 A Practical Guide to Security Engineering and Information Assurance, Debra S. Herrmann, 2001, Auerbach Publications, ISBN: 978-0-8493-1163-5 Information Security Architecture An Integrated Approach to Security in the Organization, Jan Killmeyer Tudor, 2001, AUERBACH, ISBN: 978-0-8493-9988-6 Enterprise Security Architecture A Business-Driven Approach, Sherwood, Clark, Lynas, 2005, CPM Books, ISBN: 978-1-57820-318-5 33