IT Governance: The benefits of an Information Security Management System



Similar documents
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA

INFORMATION SYSTEMS. Revised: August 2013

ISO 27002:2013 Version Change Summary

Information Security Awareness Training

This is a free 15 page sample. Access the full version online.

ISO27001 Controls and Objectives

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Security Controls What Works. Southside Virginia Community College: Security Awareness

Information Security: Business Assurance Guidelines

ISO Controls and Objectives

Information security management systems Specification with guidance for use

ISO Information Security Management Systems Professional

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

INFORMATION TECHNOLOGY SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

ISMS Implementation Guide

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Understanding Management Systems Concepts

Using Information Shield publications for ISO/IEC certification

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

A Comparison of Oil and Gas Segment Cyber Security Standards

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

Information Blue Valley Schools FEBRUARY 2015

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

ISO 27001: Information Security and the Road to Certification

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Management: Understanding ISO 17799

Information Security Management. Audit Check List

Supplier Security Assessment Questionnaire

Governance and Management of Information Security

HP Security Assessment Services

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

INFORMATION SECURITY: UNDERSTANDING BS BS 7799 is the most influential, globally recognised standard for information security management.

Information System Audit Guide

IT Audit in the Cloud

ISSeG Integrated Site Security for Grids

Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors

Information Security Management Systems

Newcastle University Information Security Procedures Version 3

<Insert Picture Here> How to protect sensitive data, challenges & risks

Information security controls. Briefing for clients on Experian information security controls

TABLE OF CONTENTS INTRODUCTION... 1

Logging In: Auditing Cybersecurity in an Unsecure World

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences

Cloud Computing Governance & Security. Security Risks in the Cloud

ISO Information Security Management Systems Foundation

Information Technology Branch Access Control Technical Standard

Customer-Facing Information Security Policy

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Four Top Emagined Security Services

Electronic Information Security Policy - NSW Health

Information Shield Solution Matrix for CIP Security Standards

Hengtian Information Security White Paper

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

How small and medium-sized enterprises can formulate an information security management system

(Instructor-led; 3 Days)

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Threat Management: Incident Handling. Incident Response Plan

Microsoft s Compliance Framework for Online Services

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

SNAP WEBHOST SECURITY POLICY

RISK ASSESSMENT On IT Infrastructure Mr Pradhan P L & Prof P K Meher

Security Standards BS7799 and ISO17799

Network Security: Policies and Guidelines for Effective Network Management

I n f o r m a t i o n S e c u r i t y

Security and Privacy Controls for Federal Information Systems and Organizations

PII Compliance Guidelines

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd

Information Security Program Management Standard

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Security Risk Management Strategy in a Mobile and Consumerised World

CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 5/25/2011

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Domain 5 Information Security Governance and Risk Management

Central Agency for Information Technology

INFORMATION SECURITY PROCEDURES

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Information Security Policy

Transcription:

IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Speaker Biography Solution architect in the HP European security consulting practice 5 years experience in PKI, smart cards, SSO and security IT governance domain Worked on BS 7799 certification project for HP managed services Europe 2

Agenda What is an Information Security Management System (ISMS)? The Ten ISO 17799 Control Domains Do s and Don ts Commercial tools available BS 7799 Certification 3

IT Governance Business Management + IT management Controlling the risk technological solutions Complex/detailed yet apply across industries control the formulation and implementation of IT strategy and guide it in the proper direction for the purpose of achieving competitive advantages for the corporation 4

So Many Corporate Assets, So Little Protection 5 Today s Reality Vandalism Espionage Other Vendors Network Customer Enterprise Resources Remote Worker INTERNET EXTRANE T Web, App, Data Servers Office Workgroup Storage Farm Applications Server s Data Branch Offices INTRANET Tarnished Reputation Theft Legal Liability

What is an ISMS? Framework to manage the security risks within an organization Highlights Security policy Organizational setup for security personnel Risk assessment and management methodology Controls and how they are implemented Regular review Proper documentation 6

Plan-Do-Check-Act Process Model (PDCA)! " $ $ # 7

High Level Information Security Policy Who? Who is issuing the policy and who must abide by it. Where? Scope of the policy What? Preserving the confidentiality, integrity and availability of information Why? Business factors and nature of threats 8

Security Organization Appropriate personnel to manage security within the organization Information security manager Proper allocation of information security responsibility The management information security forum If necessary cross-functional Separate from operation and report directly to management 9

Asset List Assets that contribute to the fundamental business of the organization in scope Examples of asset include: Information assets Paper documents Software assets Physical assets People Company image and reputation Services High level asset definition i.e. group all routers together under heading routers Prioritize the assets with high, medium and low 10

Risk Assessment No one mandatory risk assessment methodology Choice of methodology depends on the organization Three questions for each major asset group in the asset list Potential threats Potential vulnerabilities Current controls in place One of the most important and time consuming step 11

Risk Management No mandatory risk management methodology Choose one of the four approaches below for identified risks Accept Mitigate Avoid Transfer Must have management support and sign-off 12

What is an ISMS? Framework to manage the security risks within an organization Highlights Security policy Organizational setup for security personnel Risk assessment and management methodology Controls and how they are implemented Regular review Proper documentation 13

ISO17799 Control Domains 1) Security policy 2) Security organisation 3) Asset classification and control 4) Personnel security 5) Physical and environmental security 6) Communications and operations security 7) System access control 8) System development and maintenance 9) Business Continuity Planning (BCP) 10) Compliance 14

Security Policy Ensure support from management in securing an organization Existence of a security policy Regular review and update of policy 15

Security Organisation Management of information security within the organization There should be adequate information security staff as well as proper procedures to approve information security procedures. Maintenance of the information security standard when outsourcing Control of information security when the organization is accessed by a third party 16

Asset Classification & Control Assets Information assets Paper documents Software assets Physical assets People Company image and reputation Services Classifies them correctly in order to provide an adequate level of protection Necessary for the risk assessment 17

Personnel Security Security in job definition and resource assignment Appropriate information security training Appropriate handling and reporting of security incidents and malfunctions Similar to ITSM incident management 18

Physical and Environmental Security Secure areas to prevent holes in physical perimeters Equipment security to prevent harm to an organization s physical assets General controls related to physical security Clear desk clear screen Removal of property 19

Communications and Operations Security Operations Correct and secure operation of the organization System planning and acceptance to minimize the risk of systems failure Protection against malicious software Secure handling of media in order to avoid damage Communications Network management Exchanges of information and software in transit, electronically, etc Both Maintaining availability and traceability of information, i.e. good housekeeping 20

System Access Control The existence of an access control policy User access management User responsibilities (password use and equipment) Network access control Complementary to network control in previous section Operating system access control Application access control Monitoring system access and use Ensure adequate logging Mobile computing and teleworking Ensure correct authorization and authentication when working remotely 21

System Development & Maintenance Security requirements of systems The business should specify security requirements along with other requirements Security in application systems Avoid misuse or loss of user data Cryptographic controls in system development Security of information used in development Protection of system test data Access control to program source libraries Security in development and support processes Change control procedures Technical review of operating systems or software packages change 22

Business Continuity Planning (BCP) Organizations must have a process for creating, testing and updating the BCP Analysis possible risks Establish framework Write plan Test, maintain and reassess on a continuous basis 23

Compliance Compliance with legal requirements Intellectual property laws, data protection and privacy laws, cryptographic regulations, etc Reviews of security policy and technical compliance Making sure that the system is compliant with policy and industry standards Efficiency and effectiveness of the system audit 24

ISO17799 Control Domains Security policy Security organisation Asset classification and control Personnel security Physical and environmental security Communications and operations security System access control System development and maintenance Business Continuity Planning (BCP) Compliance 25

Documentation and Audit Documentation Consistent format Accessible to relevant parties - online Audit Third party is the best Internal and self assessment also acceptable 26

Do s Plan before doing Limit scope define clearly the scope of the ISMS Get buy-in from all functions an approach to implementing security that is consistent with the organisational culture security policy, objectives and activities that reflect business objectives Educate and communicate Effective marketing of security to all managers and employees Distribute guidance on information security policy and standards to all employees and contractors Provide appropriate training and education 27

Don ts Design, document and then let it rot Let technology dictate Follow textbook Get stuck on details Manage every risk Accept when cost of managing risk is higher than accepting it 28

Commercial tools CobiT Control Objectives for Information and Related Technology COBRA Contains Risk assessment and control compliance Octave Operationally Critical Threat, Asset, and Vulnerability Evaluation ASSET (NIST) Free, developed by government Documentation specific to ISO 17799 GMITS PD 3000 29

BS 7799 Derived from ISO 17799 Specification for designing, documenting and implementing an ISMS more important than controls Basis for certification 30

Case study - HP Managed Services EMEA Why obtain certification? Customer demand Reduce internal cost of managing security Advantages Adapt ISMS as the security plan for all delivery centers Incorporate BS 7799 requirements into performance measurements Difficulties Fit already existing model into BS 7799 framework Define a clear scope Future Certify all delivery centers 31

Information Security Management System 32

Summary ISMS is a framework for managing RISK in enterprise (PDCA) Risk assessment & Risk Management Start small, plan before doing, and educate ISO 17799 Ten control domains BS 7799 Certification 33

Thank you Katerina Cai Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Bibliography IT Governance: Data Security & BS 7799/ISO 17799 by Alan Calder and Steve Watkins 2002 ISO/IEC 17799:2000(E) Code of Practice for Information Security Management Geneva:ISO 2000 www.iso.ch BS 7799-2:2002 Information Security Management Systems Specification with Guidance for Use. London: BSi, September 2002 www.bsi-global.com 35

Backup slides