How To Manage Information Technology



Similar documents
Integrated Information Management Systems

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

De Nieuwe Code voor Informatiebeveiliging

iso20000templates.com

SPICE auf der Überholspur. Vergleich von ISO (TR) und Automotive SPICE

Information security audit (IS audit) - A guideline for IS audits based on IT-Grundschutz

Cyber Security From product to system solution

ISO Information Security Management Systems Foundation

ISO/IEC Part 1 the next edition. Lynda Cooper project editor for ISO20000 part 1

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Preparation Guide. EXIN IT Service Management Associate Bridge based on ISO/IEC 20000

SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards

Benchmark of controls over IT activities Report. ABC Ltd

ISO/IEC 27001:2013 webinar

2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee , Bonn

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL

Fall June S o f t w a r e I m p r o v e m e n t G r o u p ( S I G )

Information Security Management Systems

Certified Information Security Manager (CISM)

2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee , Bonn

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Preparation Guide. EXIN IT Service Management Associate based on ISO/IEC 20000

Domenico Raguseo. IT Governance e Business Technology (approfondimenti su ITIL)

IT Governance: The benefits of an Information Security Management System

ISMS Implementation Guide

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

List of courses offered by Marc Taillefer

Governance and Management of Information Security

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS

Hong Kong Information Security Group TRAINING AGENDA

The new Family of Standards & ISO/IEC 27001

How To Understand The Differences Between The 2005 And 2011 Editions Of Itil 20000

Build yourself a risk assessment tool

Details for the structure and content of the ETR for Site Certification. Version 1.0

EXIN Foundation in IT Service Management based on ISO/IEC 20000

A Structured Comparison of Security Standards

Certifying Information Security Management Systems

Practical implementation of ISO / 27002

Standardising privacy and security for the cloud

The CMDB at the Center of the Universe

Exam : EX Title : ITIL Foundation Certificate in IT Service Management. Ver :

INFORMATION SYSTEMS. Revised: August 2013

CYBERSECURITY SLAs: MANANGING REQUIREMENTS AT ARM S LENGTH

ITIL V3 and ISO/IEC 20000

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

ITIL: What is it? How does ITIL link to COBIT and ISO 17799?

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?

ITIL Service Lifecycle Stream

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Introduction to ITIL for Project Managers

Information Security Management Systems

Understanding Management Systems Concepts

Sicherheit durch Open Source?! Markus Hennig CTO, Astaro

1. Verzeichnis der ITIL V3 Service Strategy Prozesse

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Agile Information Security Management in Software R&D

CMS Policy for Configuration Management

Recent Advances in Automatic Control, Information and Communications

Domain 5 Information Security Governance and Risk Management

Information Security Awareness Training

Service management: what standards can do for business the example of FitSM Cloud Security Alliance - All Rights Reserved.

An Overview of ISO/IEC family of Information Security Management System Standards

Information security PROVIDING PERSONAL AND PROFESSIONAL DEVLOMENT FOR IT LEADERS

Information Security Development Trends

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000

Frameworks for IT Management

ETSI TS : Electronic Signatures and Infrastructures (ESI): Policy

How small and medium-sized enterprises can formulate an information security management system

NIST National Institute of Standards and Technology

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Method- and Tool-Support for a Customer-Integrated Assembly Process

Free ITIL v.3. Foundation. Exam Sample Paper 4. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass

Tutorial on Service Level Management in e- Infrastructures State of the Art and Future Challenges. The FedSMProject Thomas Schaaf & Owen Appleton

1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects

Improving Residual Risk Management Through the Use of Security Metrics

ITIL QUALIFICATION SCHEME & ROLE-BASED TRAINING MATRIX WHITE PAPER

Enterprise Security Management. IT risks put business at risk.

Introduction: ITIL Version 3 and the ITIL Process Map V3

The Future of Best Practices in IT Service Management - ITIL Version 3 Explained

Foundation Bridge in IT Service Management (ITSM) according to ISO/IEC Specification Sheet. ISO/IEC Foundation Bridge TÜV SÜD Akademie

Business Continuity Management

EUROPEAN WORKSHOP ON INDUSTRIAL COMPUTER SYSTEMS

itsmf USA Problem Management Community of Interest

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd

Key-Words: - The improved model of ITIL 2011 framework, new process model, Cabinet Office, final upgrade of ITIL, Service Portfolio Management.

How To Manage A Service Transition

Security Controls What Works. Southside Virginia Community College: Security Awareness

Which statement about Emergency Change Advisory Board (ECAB) is CORRECT?

Service Asset & Configuration Management PinkVERIFY

ITIL: Continual Service Improvement

Was muss ein Unternehmen im Griff haben, wenn es IT einsetzt? Jimmy Heschl

Governance For Compliance The Convergence of Central and Distributed IT Compliance Presented to VASCAN Conference 2009

Name: Lynda Cooper Date: November 24th. Revising ISO/IEC to fit the future of service management

Security metrics to improve information security management

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008

Transcription:

Nachweis der erreichten Sicherheit durch Prüfungen nach Standards?! DECUS Rheinlandtreffen St. Augustin, 18.11.2004 Bundesamt für Sicherheit in der Informationstechnik

ISO/IEC nicht ISO/IEC 2. Standards 1. Basics Sicherheitsmanagement Darstellungsmerkmale Bewertungskriterien 3. Charakteristika 4. Fazit

Securing business processes Business needs Customer requests Critical business processes Information Processing Service/ Product delivery ICT Support

Relationship between I and ICT The more Information is processed by Information and communications technology the more ICT is required to secure Information!

ISO/IEC nicht ISO/IEC 2. Standards 1. Basics Sicherheitsmanagement Darstellungsmerkmale Bewertungskriterien 3. Charakteristika 4. Fazit

Standard will guide you on your way BS 7799-2 IS 17799 IS 13335 BSI IT BPM IS 21827 ISF FSoGP

ISO/IEC-Standards on Management TR 13335: Guidelines for the Management of IT (GMITS) IS 13335: Management of information and communications technology security (MICTS) IS 17799: Code of Practice for Information Management IS 21827: System Engineering - Capability Maturity Model TR 13569: Banking and other financial services --------------------------------------------------------------------------------------- Study period on information security management systems => NP on ISMS requirements (IS 24743) NP on ISM metrics and measurement (IS 24742) [ISO/IEC JTC 1 SC 27 WG 1]

Some more non ISO-Standards (German) IT Baseline Protection Manual (IT BPM) (British) ISMS - Specification with Guidance for Use (BS 7799-2) --------------------------------------------------------------------------------------- ISF: The Forum s Standard of Good Practice (FSoGP) ISACA: Control objectives for information and related technologies (Cobit) NIST: An Introduction to Computer - The NIST Handbook (SP- 800-12) --------------------------------------------------------------------------------------- Information Technology Infrastructure Library (ITIL)...

Benefit and effort of assessment What a standard is able to do! What a standard is expected to do! Peer-to-peer comparison makes no sense -> classification scheme

ISO/IEC nicht ISO/IEC 2. Standards 1. Basics Sicherheitsmanagement Darstellungsmerkmale Bewertungskriterien 3. Charakteristika 4. Fazit

Using which standard what for? Peer-to-peer comparison makes no sense -> classification scheme Black box comparison -> characteristics: subject, audience, granularity, certificate standard fits to users s problem White box comparison -> characteristics: purpose, focus, statement application of standard supports user s intention

IS 17799 Code of practice for information security management (fast track of BS 7799-1, under revision since 2000, now FDIS)... guidelines and principles for initiating, implementing, maintaining, and improving information security management... -> what to do -> security officer... each area introduced by a description of the goal ( objective ) and structured into subchapters ( controls ) with different depth new: control statement, implementation guidance, other information... covers several control areas such as policy, organization, asset management, personnel, physical security, operational issues, access control, systems aquisistion & development, incident management, business continuity, and compliance new: risk assessment and treatment checklist without priority/ sequence BUT: no metric defined in order to support the assessment

17799 - Control areas Business Continuity Policies Information and Communications Technology Compliance Checking Personnel Operational Issues Organization Incident Management Physical & Environmental Configuration & Change Management Asset Management [See IS 17799]

IS 13335 Management of Information and Communications Technology (MICTS = the new GMITS) part 1: concepts and models for ICT security management (now IS) part 2: techniques for ICT security risk management (now 4thWD)... to assist the implementation of information security... -> how to do -> security officer... covers security elements and relationships, ICT policy, organizational aspects, security management functions, risk management process... contains techniques for ICT risk management which can be used to assess security requirements and risks, and help to initiate and followup appropriate safeguards concepts/models, and techniques without pre-scribing BUT: no metric defined to check whether the techniques are in place

13335 - Risk activities Communicate/ Document & report Assess risks Establish context Identify risks Analyse risks Evaluate risks Treat risks Monitor & review [See IS 13335-2]

BS 7799-2 Information security management systems - Specification with guidance for use (new NP in ISO/IEC, now FCD)... based on the PDCA-model (by Deming) -> management system -> senior management...defines key elements such as general requirements, establishing an maintaining ISMS, documentation requirements, management commitment, resource management, general review requirements, review input, review output, internal audits, continual improvements, corrective and prevention action... emphasises systematic approach to risk assessment mingles operative and management processes BUT: no parameters/ indicators to measure effectiveness/ performance

IT BPM IT Baseline Protection Manual... focuses on ICT security -> what AND how to do -> security officer and administrator... based on the risk assessment methodology and risk treatment option of IS 13335... comprises criteria to select safeguards based on typical technical components & methodology to evaluate security level (based on a published assessment scheme)... deals with security activities/ elements supported by in-depth implementation guidance & gives background information on threats/ vulnerabilities listed in catalogues AND: defines metric to support assessment and to check whether techniques are in place

IT BPM - assess risks Identify risks IT Structure analysis: Document technical topology (network plan) Draw up inventory of assets (systems/applications) Reduce complexity (by grouping) Analyse risks Analysis of protection requirements Baseline protection modelling Supplementary security analysis Evaluate risks (compliance) checking: Compare implementation against catalogues Evaluate non-conformities Document results

IT BPM - assessment self-declaration certificate Produce an audit report based on a defined methodology and a published scheme documentation Model & Check Logical clusters of technical components (=set of IT assets) Entry level A Advanced level B Complete level C

Black box comparison - summary subject audience granularity certificate IS 17799 Information officer Medium No IS 13335 Informations- & communications technology security officer Medium No BS 7799-2 Information Senior management Low Yes BSI IT-BPM Informations- & communications technology security officer & administrator High Yes

Using which standard what for? Peer-to-peer comparison makes no sense -> classification scheme Black box comparison -> characteristics: subject, audience, granularity, certificate standard fits to users s problem White box comparison -> characteristics: purpose, focus, statement application of standard supports user s intention

Sicherheitsmanagement ist... die Gesamtheit aller Tätigkeiten und Zielsetzungen zum Erreichen und Aufrechterhalten eines angemessenen Sicherheitszustands basierend auf einer entsprechenden Aufbau- und Ablauforganisation bezogen auf die Bedürfnisse einer Organisation unter Mitwirkung aller Mitglieder mittels bestimmter Mittel und Verfahren ausgerichtet auf Kunden-/ Mitarbeiterzufriendenheit, langfristigen Geschäftserfolg sowie gesellschaftlichen Nutzen.

... from the view of a process approach Strategies, Policies,... Parameters, Indicators,... Business needs/ policy Prozess: Activities & Sub-processes level/ plan Roles & Responsibilities, Principles,... People, Budget,...

management process Design plan Operation Integration/ Deployment

management system Goals Metrics policy Organization Resources

Business needs Engineer requirements Policy Detect events React on incidents Functionality What is to do to secure? Select controls level Implement controls plan detect, protect, react

Business needs Assurance Document results Report deviations level Review requirements What was done to be ensured? Monitor controls Policy Asses risks plan accept, avoid, REDUCE, transfer

Assessing Business needs fulfilled! policy Procedures performed! Conformance? plan level realised! Non-technical compliance? Technical compliance?

Assessing (cont.) Management System Performance/ Efficiency? Quality/ Effectiveness? Management Process Doing things right! Doing the right things!

White box comparison - summary purpose focus statement IS 17799 Process/ System Functionality Conformance IS 13335 System/ Process Functionality/ Assurance Conformance BS 7799-2 System Assurance Conformance BSI IT-BPM Process/ System Functionality/ Assurance Conformance/ Compliance

ISO/IEC nicht ISO/IEC 2. Standards 1. Basics Sicherheitsmanagement Darstellungsmerkmale Bewertungskriterien 3. Charakteristika 4. Fazit

Process(es) Intro Environment Business needs/ policy level/ plan

Vielen Dank für Ihre Aufmerksamkeit!??????? Fragen?