Security Management Practices. Keith A. Watson, CISSP CERIAS



Similar documents
The Protection Mission a constant endeavor

<Insert Picture Here> How to protect sensitive data, challenges & risks

Domain 1 The Process of Auditing Information Systems

Computer Security: Principles and Practice

Risk Management Guide for Information Technology Systems. NIST SP Overview

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Information Security Training for SysAdmins. Center for Education and Research in Information Assurance and Security, Purdue University

Domain 5 Information Security Governance and Risk Management

ELECTRONIC INFORMATION SECURITY A.R.

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Applied Security Metrics

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

ISACA PROFESSIONAL RESOURCES

SANS Top 20 Critical Controls for Effective Cyber Defense

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

Security Enhanced Linux and the Path Forward

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

INFORMATION SYSTEMS. Revised: August 2013

HIPAA Compliance Evaluation Report

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Office of Inspector General

Critical Controls for Cyber Security.

Jumpstarting Your Security Awareness Program

Information Technology Security Review April 16, 2012

ISMS Implementation Guide

NIST National Institute of Standards and Technology

Information Security Program Management Standard

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Hardening the Soft Middle: Securing your IT Infrastructure through Configuration Baselining

Information Technology Branch Access Control Technical Standard

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Oct 29 th, 2013 Importance of Security Awareness training John Ecken

ISO 27002:2013 Version Change Summary

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE

State of Oregon. State of Oregon 1

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

INFORMATION TECHNOLOGY SYSTEMS ASSET MANAGEMENT GUIDELINE

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Information Security Program CHARTER

Vendor Audit Questionnaire

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

Cybersecurity and internal audit. August 15, 2014

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Microsoft Technologies

PATCH MANAGEMENT POLICY IT-P-016

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

How small and medium-sized enterprises can formulate an information security management system

SECURITY RISK MANAGEMENT

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Page 1 of 45. IT Grundschutz Compliance on Amazon Web Services

Information Systems Security Certificate Program

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

Information Technology. A Current Perspective on Risk Management

Office of Inspector General

Information Security Awareness Training

Chapter 1 The Principles of Auditing 1

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Defending Against Data Beaches: Internal Controls for Cybersecurity

Mandatory Access Control in Linux

Cloud Computing Security: Public vs. Private Cloud Computing

Cybersecurity: What CFO s Need to Know

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Nessus Agents. October 2015

Storage Sharing Application Guide

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

Presented by Evan Sylvester, CISSP

Security Controls in Service Management

Central Agency for Information Technology

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN

FREQUENTLY ASKED QUESTIONS

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

End-user Security Analytics Strengthens Protection with ArcSight

CORPORATE INFORMATION SECURITY WORKING GROUP

Defining, building, and making use cases work

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Four Top Emagined Security Services

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Transcription:

Security Management Practices Keith A. Watson, CISSP CERIAS

Overview The CIA Security Governance Policies, Procedures, etc. Organizational Structures Roles and Responsibilities Information Classification Risk Management 2

The CIA: Information Security Principles Confidentiality Allowing only authorized subjects access to information Integrity Allowing only authorized subjects to modify information Availability Ensuring that information and resources are accessible when needed 3

Reverse CIA Confidentiality Preventing unauthorized subjects from accessing information Integrity Preventing unauthorized subjects from modifying information Availability Preventing information and resources from being inaccessible when needed 4

Using the CIA Think in terms of the core information security principles How does this threat impact the CIA? What controls can be used to reduce the risk to CIA? If we increase confidentiality, will we decrease availability? 5

Security Governance Security Governance is the organizational processes and relationships for managing risk Policies, Procedures, Standards, Guidelines, Baselines Organizational Structures Roles and Responsibilities 6

Policy Mapping Laws, Regulations, Requirements, Organizational Goals, Objectives General Organizational Policies Functional Policies Procedures Standards Guidelines Baselines 7

Policies Policies are statements of management intentions and goals Senior Management support and approval is vital to success General, high-level objectives Acceptable use, internet access, logging, information security, etc 8

Procedures Procedures are detailed steps to perform a specific task Usually required by policy Decommissioning resources, adding user accounts, deleting user accounts, change management, etc 9

Standards Standards specify the use of specific technologies in a uniform manner Requires uniformity throughout the organization Operating systems, applications, server tools, router configurations, etc 10

Guidelines Guidelines are recommended methods for performing a task Recommended, but not required Malware cleanup, spyware removal, data conversion, sanitization, etc 11

Baselines Baselines are similar to standards but account for differences in technologies and versions from different vendors Operating system security baselines FreeBSD 6.2, Mac OS X Panther, Solaris 10, Red Hat Enterprise Linux 5, Windows 2000, Windows XP, Windows Vista, etc 12

Organizational Structure Organization of and official responsibilities for security vary BoD, CEO, BoD Committee CFO, CIO, CSO, CISO Director, Manager IT/IS Security Audit 13

Typical Org Chart Board of Directors/Trustees President CIO Security Director Project Security Architect Enterprise Security Architect Security Analyst System Auditor 14

Security-Oriented Org Chart Board of Directors/Trustees President CIO IT Audit Manager Security Director System Auditor Enterprise Security Architect Security Analyst Project Security Architect 15

Further Separation Board of Directors/Trustees President Audit Committee Internal Audit CIO IT Audit Manager Security Director System Auditor Enterprise Security Architect Security Analyst Project Security Architect 16

Organizational Structure Audit should be separate from implementation and operations Independence is not compromised Responsibilities for security should be defined in job descriptions Senior management has ultimate responsibility for security Security officers/managers have functional responsibility 17

Roles and Responsibilities Best Practices: Least Privilege Mandatory Vacations Job Rotation Separation of Duties 18

Roles and Responsibilities Owners Determine security requirements Custodians Manage security based on requirements Users Access as allowed by security requirements 19

Information Classification Not all information has the same value Need to evaluate value based on CIA Value determines protection level Protection levels determine procedures Labeling informs users on handling 20

Information Classification Government classifications: Top Secret Secret Confidential Sensitive but Unclassified Unclassified 21

Information Classification Private Sector classifications: Confidential Private Sensitive Public 22

Information Classification Criteria: Value Age Useful Life Personal Association 23

Risk Management Risk Management is identifying, evaluating, and mitigating risk to an organization It s a cyclical, continuous process Need to know what you have Need to know what threats are likely Need to know how and how well it is protected Need to know where the gaps are 24

Identification Assets Threats Threat-sources: man-made, natural Vulnerabilities Weakness Controls Safeguard 25

Analysis/Evaluation Quantitative Objective numeric values Cost-Benefit analysis Guesswork low Qualitative Subjective intangible values Time involved low Guesswork high 26

Remedy/Mitigation Reduce Use controls to limit or reduce threat Remove Stop using it Transfer Get insurance or outsource it Accept Hope for the best 27

Summary Security Management practices involve balancing security processes and proper management and oversight Risk Management is a big part of managing holistic security of an organization 28