Risk Management. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke



Similar documents
ISMS Implementation Guide

Road map for ISO implementation

Information Security Team

Information System Audit Guide

Practical Overview on responsibilities of Data Protection Officers. Security measures

Managing Network-related Risk for SMEs

Security Risk Assessment

SECURITY. Risk & Compliance Services

Building Reference Security Architecture

UoB Risk Assessment Methodology

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Risk Management Guide for Information Technology Systems. NIST SP Overview

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Internet threats: steps to security for your small business

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Information Technology Engineers Examination

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Cisco Security Optimization Service

Attachment A. Identification of Risks/Cybersecurity Governance

Looking at the SANS 20 Critical Security Controls

Regulations on Information Systems Security. I. General Provisions

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

Outsourcing and Information Security

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Ensuring Cloud Security Using Cloud Control Matrix

Service Catalog. it s Managed Plan Service Catalog

About This Document. Response to Questions. Security Sytems Assessment RFQ

Preparing your Domain to transfer from Go Daddy

Information Security It s Everyone s Responsibility

OCIE CYBERSECURITY INITIATIVE

Information Security Awareness Training

Threat Modeling. A workshop on how to create threat models by creating a hands-on example

Risk Analysis and Risk Management

Security Control Standard

Malicious Mitigation Strategy Guide

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Preparing yourself for ISO/IEC

Information Technology Branch Access Control Technical Standard

Jumpstarting Your Security Awareness Program

Cyber Security. John Leek Chief Strategist

NSW Government Digital Information Security Policy

Policy : Enterprise Risk Management Policy

Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh

EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

The Ministry of Information & Communication Technology MICT

Security in Space: Intelsat Information Assurance

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

University of Aberdeen Information Security Policy

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0

Intel Enhanced Data Security Assessment Form

ISO COMPLIANCE WITH OBSERVEIT

They Did What?!? How Your End Users Are Putting You At Risk

The Business Case for Security Information Management

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Information security risk management using ISO/IEC 27005:2008

IS INFORMATION SECURITY POLICY

Injazat s Managed Services Portfolio

Client information note Assessment process Management systems service outline

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

How To Audit Health And Care Professions Council Security Arrangements

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information security management systems Specification with guidance for use

Incident Reporting Guidelines for Constituents (Public)

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Defending Against Data Beaches: Internal Controls for Cybersecurity

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

Information Security Basic Concepts

Cybercrime Prevention and Awareness

POL ENTERPRISE RISK MANAGEMENT SC51. Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT:

Integrated Management System Software

How To Prevent Hacker Attacks With Network Behavior Analysis

Exam 1 - CSIS 3755 Information Assurance

Protect Yourself in the Cloud Age

Cybersecurity Health Check At A Glance

HOSTING SERVICES AGREEMENT

An Information Security and Privacy Perspective for Procurement Services Projects

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-

Log Management for the University of California: Issues and Recommendations

HIPAA: Compliance Essentials

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

FortiGuard Web Content Filtering versus Websense March 2005

ISO Information Security Management Systems Foundation

Transcription:

Risk Management Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke

Goals Participants are able to design their own RM process Participants understand the ISO27001 requirements Participants know how to perform a Risk Analysis

Risk Management - what ISO27001 says 6.1 Actions to address risks and opportunities 6.1.1 General When planning for the information security management system, the organization shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to: a) ensure the information security management system can achieve its intended outcome(s); b) prevent, or reduce, undesired effects; and c) achieve continual improvement. The organization shall plan: d) actions to address these risks and opportunities; and e) how to 1) integrate and implement the actions into its information security management system processes; and 2) evaluate the effectiveness of these actions.

Risk Management - what ISO 27001 says 6.1.2 Information security risk assessment The organization shall define and apply an information security risk assessment process that: a) establishes and maintains information security risk criteria that include: 1) the risk acceptance criteria; and 2) criteria for performing information security risk assessments; b) ensures that repeated information security risk assessments produce consistent, valid and comparable results; c) identifies the information security risks: 1) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and -> CIA 2) identify the risk owners;

Risk Management - what ISO 27001 says d) analyses the information security risks: 1) assess the potential consequences that would result if the risks identified in 6.1.2 c) 1) were to materialize; 2) assess the realistic likelihood of the occurrence of the risks identified in 6.1.2 c) 1); and 3) determine the levels of risk; e) evaluates the information security risks: 1) compare the results of risk analysis with the risk criteria established in 6.1.2 a); and 2) prioritize the analysed risks for risk treatment. The organization shall retain documented information about the information security risk assessment process.

Risk Management - what ISO 27001 says 6.1.3 Information security risk treatment The organization shall define and apply an information security risk treatment process to: a) select appropriate information security risk treatment options, taking account of the risk assessment results; b) determine all controls that are necessary to implement the information security risk treatment option(s) chosen; NOTE Organizations can design controls as required, or identify them from any source. c) compare the controls determined in 6.1.3 b) above with those in Annex A and verify that no necessary controls have been omitted; NOTE 1 Annex A contains a comprehensive list of control objectives and controls. Users of this International Standard are directed to Annex A to ensure that no necessary controls are overlooked. NOTE 2 Control objectives are implicitly included in the controls chosen. The control objectives and controls listed in Annex A are not exhaustive and additional control objectives and controls may be needed.

Risk Management - what ISO 27001 says d) produce a Statement of Applicability that contains the necessary controls (see 6.1.3 b) and c)) and justification for inclusions, whether they are implemented or not, and the justification for exclusions of controls from Annex A; e) formulate an information security risk treatment plan; and f) obtain risk owners approval of the information security risk treatment plan and acceptance of the residual information security risks. The organization shall retain documented information about the information security risk treatment process. NOTE The information security risk assessment and treatment process in this International Standard aligns with the principles and generic guidelines provided in ISO 31000

Risk Management - what ISO 27001 says 8.2 Information security risk assessment The organization shall perform information security risk assessments at planned intervals or when significant changes are proposed or occur, taking account of the criteria established in 6.1.2 a).the organization shall retain documented information of the results of the information security risk assessments. 8.3 Information security risk treatment The organization shall implement the information security risk treatment plan. The organization shall retain documented information of the results of the information security risk treatment.

Risk Management Definition Risk Management is: A systematic application of management policies, procedures and practices to the activities of communicating, consulting, establishing the context, and identifying, analyzing, evaluating, treating, monitoring (2.28) and reviewing risk. Process Flow on separate document

BIA Business Impact Assessment How important are your business processes for you Confidentiallity, Integrity, Availability Critical, Important, Normal See Separate Template

BIA Matrix

Risk Management products Statement Of Applicability (SOA) Business Impact Analyses (BIA) -> BIA form separate Baseline (basis) Matrix controls vs. threats Risk Analysis Risk Treatmentplan, Implementationplan or Yearplan

Risk Treatment Plan Risk Control Action Responsible person Operational resources Ready on? Status

Risk Analysis Domain Registration comapny XYZ Risk Control Rest Risk Action Status Domain Registration Unauthorized access to information Layered networks Direct connection to DB Only thru application Unauthorized access to information Logical access man Unauthorized access to information or change of nameserver details Extra service to registrars Hardware failure Redundant hardware Unavailability location Standby on 2 e location Unauthorized access to information Unavailability by incidents Secured connection via SSL whitelisting epp. Logging of application and systems.

Technical Risk Analysis Internal XYZ network Threat Cause Control L I R Infection internal XYZ network Infection internal XYZ network Infection via employee laptop Preach policy. from outside -> inside MAC adress filtering. Infection via non-xyz devices 802.1x on internal network Certificate Infection by USB No boot/input from USB Alternative input (mail) Phishing Phishing mails Anti-Spam & Phishing box Awareness H M M M L L M M M

Questions? Any questions? Don t hesitate to ask!

Exercises Create the contents of the Risk Management Manual (10m) (4/5 persons) Specify (rest) risks for domain registration (15min) (4/5 persons) What would be a possible outcome of the BIA Domain Registration? (5 min) (all)

Exercise 1: Contents Risk Management Manual Choise for Risk Man method Planning Risk Analysis sessions (6.1.2.a2) Risk acceptance criteria Risk owners Process flow BIA Baseline -> Matrix (Threats and Controls) + SOA Risk Treatment plan Risk Analysis Threat Cause Potential consequences Likelihood Impact Control Rest Risk Accepted (y/n) Action Owner

Exercise 1: Contents Risk Management Manual Risk acceptance criteria High Medium Low Negligible Critical N N N Y Important N N Y/N (Risk Owner) Y Normal N Y/N (Risk Owner) Y Y

Exercise 2: Risk Domain Registration Domain Registration Threat Cause Potential consequences Likelyhood Impact Control Rest Risk Accepted (y/n) Action Owner Unauthorised access to database Hack Registrar userid Domainnames compromised H H 2-factor authentication Yes N Implement 2-factor authentication Pino

Exercise 3: BIA Domain registration Confidentiality = Critical, Integrity=Critical, Availability=critical See Template