From the Lab to the Boardroom:



Similar documents
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security Controls for the Autodesk 360 Managed Services

Cybersecurity Health Check At A Glance

Supplier Security Assessment Questionnaire

Client Security Risk Assessment Questionnaire

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Supplier Information Security Addendum for GE Restricted Data

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

White Paper. Information Security -- Network Assessment

Best Practices For Department Server and Enterprise System Checklist

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

System Security Plan University of Texas Health Science Center School of Public Health

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Data Management Policies. Sage ERP Online

CHIS, Inc. Privacy General Guidelines

Understanding Sage CRM Cloud

UF IT Risk Assessment Standard

IT Security. Securing Your Business Investments

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Cisco Advanced Services for Network Security

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Security Management. Keeping the IT Security Administrator Busy

NIST National Institute of Standards and Technology

PCI DSS Requirements - Security Controls and Processes

Remote Deposit Terms of Use and Procedures

Level I - Public. Technical Portfolio. Revised: July 2015

ASDI Full Audit Guideline Federal Aviation Administration

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

SUPPLIER SECURITY STANDARD

1 Introduction 2. 2 Document Disclaimer 2

Information Technology Risk Management

Achieving Compliance with the PCI Data Security Standard

Estate Agents Authority

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SRA International Managed Information Systems Internal Audit Report

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Conducting Security System Site Surveys

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

IT - General Controls Questionnaire

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

PCI-DSS Penetration Testing

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

FormFire Application and IT Security. White Paper

Information Technology Security Review April 16, 2012

H.I.P.A.A. Compliance Made Easy Products and Services

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Supplier IT Security Guide

Domain 1 The Process of Auditing Information Systems

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Security Overview. BlackBerry Corporate Infrastructure

Guide to Vulnerability Management for Small Companies

Adobe Systems Incorporated

Office of Inspector General

Information Blue Valley Schools FEBRUARY 2015

Nine Steps to Smart Security for Small Businesses

HIPAA Security COMPLIANCE Checklist For Employers

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The Value of Vulnerability Management*

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

Cyber Essentials Questionnaire

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

HIPAA Security Alert

Tk20 Network Infrastructure

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Becoming PCI Compliant

UF Risk IT Assessment Guidelines

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Security for NG9-1-1 SYSTEMS

What is Penetration Testing?

How To Secure Your System From Cyber Attacks

Lessons Learned CIP Reliability Standards

SECURITY. Risk & Compliance Services

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Hosts HARDENING WINDOWS NETWORKS TRAINING

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

TRIPWIRE NERC SOLUTION SUITE

Transcription:

From the Lab to the Boardroom: How to perform a Security Risk Assessment Like a Professional Doug Landoll, CISSP, CISA General Manager, Security Services En Pointe Technologies dlandoll@enpointe.com (512) 310-2228 (877) 321-RISK

Agenda SRA Introduction Security Risk Assessment Project Phase 1: Project Definition Phase 2: Project Preparation Phase 3: Data Gathering Phase 4: Risk Analysis Phase 5: Risk Mitigation Phase 6: Recommendations SRA Project Management

Security Risk Assessment Introduction SRA Role SRA Definition SRA Need What SRA is NOT

Security Risk Assessment Role Risk Assessment threats / likelihood vulnerabilities / exploitation assets / impact risk / countermeasures Test & Review scanning audit of controls Operational Security patches incident handling training Risk Mitigation safeguard implementation additional controls

Security Risk Assessment Definition An objective analysis of the effectiveness of the current security controls that protect an organization s assets and a determination of the probability of losses to those assets.

Security Risk Assessment Need Risk High Security Improvements Lower Risk Security awareness training Security patches Security policy development Anti-virus updates Operating system hardening Incident handling Low Changing Threats and Environment Increase Risk Over Time New exploits New system functions New regulations Staff turnover Time

What SRA is NOT Term Gap Assessment Compliance Audit Definition A review of security controls against a standard. Verification that all required security controls are in place. Purpose To provide a list of controls required to become compliant. To attest to an organization s compliance with a standard. Security Audit A verification that specified security controls are in place. To attest to an organization s adherence to industry standards. Penetration Testing Vulnerability Scanning A methodical and planned attack on a system s security controls. An element of penetration testing that searches for obvious vulnerabilities. To test the adequacy of security controls in place. To test for the existence of obvious vulnerabilities in the system s security controls.

Security Risk Assessment Phases Project Definition Project Scope -Budget -Objective -Assets -Controls -Boundaries 1 Project Preparation Team Preparation -Select Team -Introduce Team 2 Project Preparation -Obtain Permission -Review Business Mission -Identify Critical Systems Project -Map Assets Scope -Identify Threats -Determine Expected Controls Administrative 3A Administrative Data Gathering -Policy Review -Procedure Review -Training Review -Organization Review -Interviews -Observation Technical Technical Data Gathering -Design Review -Configuration Review -Architectural Review -Security Testing 3B Physical Physical Data Gathering -Policy Review -Procedure Review -Observation -Inspection 3C Risk Analysis Determine Risk -Asset Valuation -Threat and Vulnerability Mapping -Calculate Risk -Create Risk Statements) -Obtain Team Consensus 4 Risk Mitigation Safeguard Selection -Safeguard Cost -Safeguard Effectiveness -Solution Sets 5 Recommendations Risk Recommendation -Risk Acceptance -Risk Mitigation -Risk Assignment 6 Documentation -Executive Summary -Report -Appendices -Presentation

1: Project Definition Scope clear understanding of project Budget (time and money) Objective (goal) Assets (named assets covered) Controls (administrative, physical, technical) Boundaries (technical, physical, organizational)

2. Project Preparation Team Selection Obtain permissions Review business mission Identify critical systems Map assets to critical systems Identify threats Determine expected controls

3. Data Gathering Administrative Policies, procedures, training, organizational structure, behaviors, personnel Physical Facility design, environmental controls, barriers, alarms, behaviors, response, documentation Technical Security architecture, device configuration, security testing

Current SRA Data Gathering Guidance How exactly do we assess mechanisms? [Ensure that] the organization s hiring and termination practices for staff take information security issues into account. [Assess whether] the organization uniformly enforces its security policies. Run Vulnerability Evaluation Tools on Selected Infrastructure Components [ensure you have the] correct tool...[and the] latest version...

SRA Data Gathering Performance SRA Execution hero lead more than process lead (and not enough heroes) Checklist-based (misapplied and misinterpreted) SRA Scope and Rigor Unclear scope of assessment (boundaries, techniques, mechanisms) Unclear rigor of assessment (skills, time expended, analysis) SRA Results Not standardized Not comparable Not repeatable

Data Gathering Performance Labor intensive Lots of data, activities, hours Project Control Issues Organizing and presenting data Tracking progress Ensuring appropriate coverage Little structure or guidance A structured approach to data gathering

What's Needed General approach to improve current data gathering Less reliance on heros More repeatable and comparable results Standardized approach Clear rigor and coverage

The RIIOT Approach The RIIOT Approach Provides a general approach to improve SRA data gathering Works with current commercial or proprietary approaches Supplements current SRA approaches, commercial or proprietary

The RIIOT Approach to Data Gathering Organizes the task of gathering volumes of data on a wide variety of controls. Identifies the 5 methods to data gathering Maps appropriate method for each security mechanism Lists data gathering techniques for each method/mechanism pair Introduced in Security Risk Assessment Handbook

Detail Solution There are 5 Methods of Gathering Data R I I O T Review documentation Interview Key Personnel Inspect Controls Observe Behaviour Test Controls

RIIOT: Review Documentation R Key Mechanisms (Controls) Rules, configurations, networks, architectures, physical layouts, and other mechanisms. Important Elements: Review for: Clarity Content, Correctness, Completeness, Consistency Expected Elements Review

Example Review Procedures Objective Sub-topic Review Tips Gather information from past security review efforts to improve data gathering in the current security risk assessment Mission Statement System Components & Boundaries Roles & Responsibilities Check mission statements recorded in other reports against the ones provided to you. If they are different ask key personnel why this has changed? Review named system components and indicated system boundaries and compare them to the current statement of work. If they are different ask key personnel for an explanation. Look for any components, subsystems, areas, or interfaces that have not been included in the last or present assessment. For example, some organizations never include physical security as a part of the assessment. Determine if the lack of review for organizational elements is a vulnerability. Look for definitions of roles and responsibilities from previous reviews. Specifically, look for responsibilities such as running an internal vulnerability scan, account review, or other security activities.

RIIOT: Interview Key Personnel I Key Mechanisms (Controls) Duties and responsibilities Process and procedure (practice and knowledge) History of incidents

RIIOT: Interview Key Personnel I Important Elements: Determine Subjects, Interviewer Review Relevant Document (Prepare) Determine Objective for Interview Confirmation of information Measurement of security awareness Identification of interviewee vulnerabilities Determine ability to perform duties Determine Type of Interview guided, fixed response, conversational, open-ended Prepare questions / questionnaire

Example Interview Procedure Security ProgramInterview Questions Objective Sub-Topic Question Determine existence and adequacy of security controls within information security program Security Awareness Policy Development Risk Assessment Security Review Do you have a list of all users who need training and have received it? Where are the records kept? Do these records include a signature of the student and the instructor? When were the policies last updated? How long did it take to get themapproved? How were users informed of their change? New signatures? How often are risk assessments performed? By whom? What is their relationship to the organization or any of its security controls? Did they recommend products? Did you buy them? Do you think other departments are following the policies you set for them(operations, monitoring, development)? Would it surprise you if I told you they were not? Do you have any annual or periodic report on the security posture of your organization?

RIIOT: Inspect Controls I Inspection: Assess security mechanisms Performed where testing is infeasible, ill-advised or out of scope Key Mechanisms (controls): Fire suppression system Glass break alarm

RIIOT: Inspect Controls I Important Elements List controls Visitor control, configuration files, smoke detectors, incident response handling. Verify information gathered Determine vulnerabilities Inspect against industry standards, checklists, common vulnerabilities, or against experience and judgement. See example (next slide) Document and review findings

Example Inspection Procedure Security Lighting Inspection Checklist Objective Key Topics Example Questions Determine existence and adequacy of security controls within lighting system. Sabotage Single Point of Failure Access Control Tour areas critical to lighting systems to determine susceptibility to sabotage Switchyards Transformers Circuit breakers Power lines Engine generators UPSs Inspect lighting system to determine if security lighting systems have any single points of failure Single lighting circuit Power supply on a single circuit breaker Single power grid Inspect access controls on areas containing lighting system components.

RIIOT: Observe Behavior O Observation: View organization response and behavior of various situations Key Mechanisms Enforcement of policy (visitor control, media control, security awareness) Techniques Observe key behaviors Cause situations that enact policy Example, put your visitor badge in your pocket

Example Observation Procedure Technical Control Claim Observation Test or Procedure Check Audit Logs Anti-Virus Systems Screen Savers All security relevant events are audited and reviewed. System prevents virus infection Updates are performed regularly Users cannot block scans or updates All workstations have active screen savers with passwords Review audit logs for security relevant events that transpired during the onsite. Wait a few days after an auditable event and check to see when the event was first reviewed. Be aware of viruses that may be circulating during the time of the assessment. Determine from observation if the virus is having an effect on the information system. When given the chance to interview users or inspect a workstation, check to see if the latest updates have been applied. Also check to see if scans or updates can be blocked. General observations of user behavior and workstations viewed while onsite.

RIIOT: Test Controls T Key Mechanisms: Firewalls, servers, open door alarms, motion sensors. Important elements Documentation (repeatability, trouble shooting) Coverage (sampling or complete)

RIIOT: Test Controls Types of testing T Information accuracy Verify information obtained through interviews and documents Vulnerability testing Test for the presence of known vulnerabilities Penetration Testing Exercise discovered vulnerabilities to demonstrate failure to enforce policy Techniques Vulnerability scanners Shuffle test

Example Test Procedure Physical Control Claim Testing Procedure Door and Locks Doors and locks are in good working order. Doors and locks are adequately protected. Timed Closure Test: Open the door to a 90 degree angle and time how long it takes to close. A rule of thumb is six (6) to eight (8) seconds is reasonable. Doors that close slower are susceptible to tailgating. Closing Latch Test: Open door just one inch. Let go and witness if the door closes shut or stays open due to the friction or pressure of the latch. Protected Latch Test. Inspect door to determine if the door latch is exposed to the outside. This basically means there is a lack of shielding between the door frame and the door near the door handle. If latch is exposed, attempt to defeat the mechanism through the use of a credit card, butter knife, or other tool. Motion Sensor Activated Doors. Attempt to circumvent door lock through unprotected gaps in the door. Methods include sliding a coat hanger with a piece of foil on the end through the door gap. The motion and heat of the foil could trip the motion sensor to open the door as is someone from the inside was approaching.

4. Risk Analysis High critical Medium important Low useful Risk Asset Frequent Probable Conceivable Improbable Remote Threat Easy Moderate Difficult Extremely Difficult Vul. nerability Countermeasures

5. Risk Mitigation Safeguard selection Cost (time, money, training, integration) Effectiveness Solution sets Policy, training, product, procedures, sanctions

Risk recommendation Acceptance Mitigation Assignment Documentation Executive summary Report Appendices Presentation 6. Recommendations

Backup Slides For use during Q&A (if needed)

Detail Solution There are 5 Methods of Gathering Data R I I O T Review documentation Interview Key Personnel Inspect Controls Observe Behaviour Test Controls

SRA Basics Likelihood Threats Impact Vulnerabilities Assets

RIIOT Application Controls Review Documents Interview Key Personnel Inspect Controls Observe Behavior Test Controls Monitoring Technology X X Audit Logs X X X X Logical Access Controls X X Checksums X * Encryption X X * Anti-virus System X X X Single Sign On Systems X * Two-Factor Authentication X * Identity Management Systems X X X Automated Password Policies X X Password Crackers Password Generators Data Backup Technologies X X X X

Backup Slides Security Organization Maturity Level 3: The Security Organization C-level reporting oversight, governance, operations complete security focus Level 2: The Security Team security guy with a staff assigned responsibility IT focused only no oversight Level 1: The Security Guy admin with security interest default responsibility activities include only those thing interesting

SRA Method Roundup SRA Basis What unbiased Repeatable Expert How Facilitated X X Process X X X Questionnaire X X X Tool X X X Interview X X X X