Information Security Management Systems



Similar documents
Governance and Management of Information Security

Information Security Policy Best Practice Document

Domain 1 The Process of Auditing Information Systems

ISMS Implementation Guide

Domain 5 Information Security Governance and Risk Management

An Overview of ISO/IEC family of Information Security Management System Standards

Utica College. Information Security Plan

Information Security Management System Policy

Information Security Management System Information Security Policy

Information Security Policy

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Security Controls What Works. Southside Virginia Community College: Security Awareness

NEW SCHEME FOR THE INFORMATION SECURITY MANAGEMENT WITH ISO 27001:2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

NSW Government Digital Information Security Policy

Information Security: Business Assurance Guidelines

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

(Instructor-led; 3 Days)

IT Governance Dr. Michael Shaw Term Project

CLASSIFICATION SPECIFICATION FORM

Chayuth Singtongthumrongkul

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Information Security Program Management Standard

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Applying Integrated Risk Management Scenarios for Improving Enterprise Governance

Information Security and Risk Management

Information System Audit Guide

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Information Security Program CHARTER

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Microsoft s Compliance Framework for Online Services

Practical Overview on responsibilities of Data Protection Officers. Security measures

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Our Commitment to Information Security

Top Ten Technology Risks Facing Colleges and Universities

INFORMATION SECURITY MANAGEMENT POLICY

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Ensuring Cloud Security Using Cloud Control Matrix

Information Security Awareness Training

ISO 27001: Information Security and the Road to Certification

Privacy and Security Framework, February 2010

NSW Government Digital Information Security Policy

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

IT Governance: The benefits of an Information Security Management System

Information Security Policy

Cloud Security Trust Cisco to Protect Your Data

Information Resources Security Guidelines

University of Sunderland Business Assurance Information Security Policy

Terms of Reference for an IT Audit of

Plan Development Getting from Principles to Paper

The Importance of IT Controls to Sarbanes-Oxley Compliance

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

INFORMATION TECHNOLOGY SECURITY STANDARDS

ISO Information Security Management Systems Foundation

CITY UNIVERSITY OF HONG KONG

Data Governance Policy. Version October 2015

How to gain and maintain ISO certification

Network Security: Policies and Guidelines for Effective Network Management

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

Outsourcing and Information Security

IRAP Policy and Procedures up to date as of 16 September 2014.

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST

John Essner, CISO Office of Information Technology State of New Jersey

Competency Unit: Exemplar Global AU Management Systems Auditing

Self-Service SOX Auditing With S3 Control

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Third Party Security Requirements Policy

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

ADMINISTRATIVE POLICY # (2014) Information Security Roles and Responsibilities

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

R345, Information Technology Resource Security 1

Network Security Assessment

Translation Service Provider according to ISO 17100

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

How To Implement An Information Security Management System

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

IT Risk Management Era: Research Challenges and Best Practices. Eyal Adar, Founder & CEO Eyal@WhiteCyberKnight.com Chairman of the EU SRMI

Polish Financial Supervision Authority. Guidelines

IT Audit in the Cloud

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT

Guideline for Roles & Responsibilities in Information Asset Management

Transcription:

Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN

About Øivind Senior Adviser at the HE sector secretary for information security at UNINETT, the Norwegian NREN Have over 20 years experience with information security, IS awareness and risk assessments Certified IT auditor (CISA), ISO 27001 Lead Implementer and in Risk Management (CRISC) Member of ISACA Norway s Standard and Research Committee 17. juni 2014 SLIDE 2

About UNINETT Responsible for the Norwegian research and educational network Owned by the Ministry of Education 100 employees, budget 25 million euro Support 200 institutions with 300 000 users Corporate social responsibility Transparency Technology enthusiasm Provide collaboration tools for the higher education sector - FEIDE (joint electronic identity secure identification in the education sector) - Administrative systems - ecampus (ICT tools for research and teaching) HPC and mass storage resources Telephony and television solutions Manages the.no domain 17. juni 2014 SLIDE 3

Agenda Background and context Information Security Management Systems (ISMS) Information Security Policy Classification of Information 17. juni 2014 SLIDE 4

National Strategy for Information Security All state agencies shall have a management system for information security The management system should be based on recognized security standards The system's scope and level of detail has to be adapted to the risk appetite, scope and nature of the individual organizations 17. juni 2014 SLIDE 5

The letter of allotment to the institutions from the Ministry of Education and Research The institutions shall: have contingency plans that should be based on regular risk and vulnerability assessments and perform annual emergency drills comply with applicable regulations and guidelines for information security, including having or introducing an information security management system built on the principles of recognized security standards continue to work with the follow-up of 22. July Commission's recommendations to strengthen risk awareness, security culture, attitudes and leadership

The Norwegian HE Sector s Secretary for Information Security Commissioned by Ministry of Education and Research Established due to the Office of the Auditor General criticism of how the HE sector was treated information security Shall support the research and education sector in information security issues The national guidelines for information security forms the basis for the Secretary's work 17. juni 2014 SLIDE 7

What we do Information Security Management Systems Policies, frameworks and methodologies Risk and vulnerability assessments Business impact assessments Information security continuity and disaster recovery plans Audits Templates and information material Information about the threat landscape Information security awareness Organize security conferences Security portal and blog International cooperation 17. juni 2014 SLIDE 8

Agenda Background and context Information Security Management Systems (ISMS) Information Security Policy Classification of Information 17. juni 2014 SLIDE 9

Where are management systems used? Corporate Governance - COSO ERM framework Financial - Economy Regulations Quality Control - ISO 9000 series IT management COBIT, TOGAF, ITIL, ISO 38500 HSE OHSAS 18001 Environmental Management - ISO 14001 Food security - ISO 22000 Information security - ISO 27000 series, COBIT 5 for IS, NIST, ISF Best Practice 17. juni 2014

Frameworks and standards Source: Jan T. Bjørnsen 2012 17. juni 2014 SLIDE 11

ISO 27001 ISMS process Establish Implement Maintain Improve Define the scope and IS policy Define risk assessment approach Identify and assess risks Evaluate options for risk treament Select controls (Annex A) Obtain management approval Prepare Statement of Applicability Implement risk treatment plan Implement controls Training and awareness Manage operations of the ISMS Manage resources of ISMS Detect and handle incidents Monitor ISMS Review and measure effectiveness Internal audit Management review Update security plans Implement identified improvements Take corrective actions Communicate actions and improvement 17. juni 2014 SLIDE 12

Establish Define the scope and IS policy Define risk assessment approach Identify and assess risks Evaluate options for risk treament Select controls (Annex A) Obtain management approval Prepare Statement of Applicability 17. juni 2014 SLIDE 13

ISO 27001 ISMS process Establish Implement Maintain Improve Define the scope and IS policy Define risk assessment approach Identify and assess risks Evaluate options for risk treament Select controls (Annex A) Obtain management approval Prepare Statement of Applicability Implement risk treatment plan Implement controls Training and awareness Manage operations of the ISMS Manage resources of ISMS Detect and handle incidents Monitor ISMS Review and measure effectiveness Internal audit Management review Update security plans Implement identified improvements Take corrective actions Communicate actions and improvement 17. juni 2014 SLIDE 14

Implement Implement risk treatment plan Implement controls Training and awareness Manage operations of the ISMS Manage resources of ISMS Detect and handle incidents 17. juni 2014 SLIDE 15

ISO 27001 ISMS process Establish Implement Maintain Improve Define the scope and IS policy Define risk assessment approach Identify and assess risks Evaluate options for risk treament Select controls (Annex A) Obtain management approval Prepare Statement of Applicability Implement risk treatment plan Implement controls Training and awareness Manage operations of the ISMS Manage resources of ISMS Detect and handle incidents Monitor ISMS Review and measure effectiveness Internal audit Management review Update security plans Implement identified improvements Take corrective actions Communicate actions and improvement 17. juni 2014 SLIDE 16

Maintain Monitor ISMS Review and measure effectiveness Internal audit Management review Update security plans 17. juni 2014 SLIDE 17

ISO 27001 ISMS process Establish Implement Maintain Improve Define the scope and IS policy Define risk assessment approach Identify and assess risks Evaluate options for risk treament Select controls (Annex A) Obtain management approval Prepare Statement of Applicability Implement risk treatment plan Implement controls Training and awareness Manage operations of the ISMS Manage resources of ISMS Detect and handle incidents Monitor ISMS Review and measure effectiveness Internal audit Management review Update security plans Implement identified improvements Take corrective actions Communicate actions and improvement 17. juni 2014 SLIDE 18

Improve Implement identified improvements Take corrective actions Communicate actions and improvement 17. juni 2014 SLIDE 19

ISO 27001 ISMS process Establish Implement Maintain Improve Define the scope and IS policy Define risk assessment approach Identify and assess risks Evaluate options for risk treament Select controls (Annex A) Obtain management approval Prepare Statement of Applicability Implement risk treatment plan Implement controls Training and awareness Manage operations of the ISMS Manage resources of ISMS Detect and handle incidents Monitor ISMS Review and measure effectiveness Internal audit Management review Update security plans Implement identified improvements Take corrective actions Communicate actions and improvement 17. juni 2014 SLIDE 20

ISMS Document Hieracy ISMS Design Scope Policy Risk assessment plan etc. Procedures Principles Describes processes who,what, when, where Work instructions Describes how tasks and spesific activities are executed Documents and records Provides compliance to ISMS requirements 17. juni 2014 SLIDE 21

Risk treatment is the essential activity 17. juni 2014 SLIDE 22

The structure of controls (Ref. ISO 27002:2013) Information security policies Organization of information security Personal security Asset management Access control Cryptography Physical and environmental security Operations security Communication security System acquisition, development and maintenance Supplier relationships Incident handling Business continuity Compliance Describe the controls in the statement of applicability (SOA). Also explain why controls are omitted 17. juni 2014 SLIDE 23

The main elements of a IS management system based on ISO 27001:2013 Policy (focus, goals and guidelines) Define acceptable risk Systematic and periodic risk assessments Action plan for implementing selected security controls Events and exception handling Improve Maintain Establish Implement Systematic internal audits Management reviews on planned intervals Around these elements are requirements for management commitment, resources, document content, taxonomy, monitoring results and continuous improvement. 17. juni 2014 SLIDE 24

Internal control activities Risk assessment Management review Establish and maintain controls Build competence and culture Monitoring and event handling Information and communication Measurement, evaluation and auditing 17. juni 2014 SLIDE 25

Information Security Functions BoD CEO Information Security Steering committé Internal Audit CISO IT manager Security team IT team 17. juni 2014 SLIDE 26

Monitoring the HE sector - example Policy Risk assessment Business impact assessment Information security continuity plan Audit Management review Information security management system! 17. juni 2014 SLIDE 27

Agenda Background and context Information Security Management Systems (ISMS) Information Security Policy Classification of Information 17. juni 2014 SLIDE 28

Campus Best Practice Documents 17. juni 2014 SLIDE 29

Best Practice Documents from UNINETT Information Security Policy Guidelines for Classification of Information Link to Geant site http://www.geant.net/network/ca mpus-best- Practice/Pages/Security.aspx 17. juni 2014 SLIDE 30

ISO 27001 about IS Policy Top management shall establish an information security policy that: is appropriate to the purpose of the organization includes information security objectives or provides the framework for setting information security objectives includes a commitment to satisfy applicable requirements related to information security includes a commitment to continual improvement of the information security management system The information security policy shall: be available as documented information be communicated within the organization be available to interested parties, as appropriate 17. juni 2014 SLIDE 31

Basic requirements for an IS Policy An information security policy must be possible to implement and enforce be concise and easy to understand balance protection with productivity express why it is established describe what it covers define the responsibilities and contact points specify how the deviations will be handled 17. juni 2014 SLIDE 32

Content of UFS 126 Information Security Policy Information security policy with goals and strategy Roles and responsibilities Principles for information security Structure of governing documents 17. juni 2014 SLIDE 33

Security goals <University> is committed to safeguard the confidentiality, integrity and availability of all physical and electronic information assets of the institution to ensure that regulatory, operational and contractual requirements are fulfilled. The overall goals for information security at <University> are the following: Ensure compliance with current laws, regulations and guidelines. Comply with requirements for confidentiality, integrity and availability for <University>'s employees, students and other users. Establish controls for protecting <University>'s information and information systems against theft, abuse and other forms of harm and loss. Motivate administrators and employees to maintain the responsibility for, ownership of and knowledge about information security, in order to minimize the risk of security incidents. 17. juni 2014 SLIDE 34

Security goals (cont.) Ensure that <University> is capable of continuing their services even if major security incidents occur. Ensure the protection of personal data (privacy). Ensure the availability and reliability of the network infrastructure and the services supplied and operated by <University>. Comply with methods from international standards for information security, e.g. ISO/IEC 27001. Ensure that external service providers comply with <University>'s information security needs and requirements. Ensure flexibility and an acceptable level of security for accessing information systems from offcampus. 17. juni 2014 SLIDE 35

Security strategy <University>'s current business strategy and framework for risk management are the guidelines for identifying, assessing, evaluating and controlling information related risks through establishing and maintaining the information security policy (this document). It has been decided that information security is to be ensured by the policy for information security and a set of underlying and supplemental documents. In order to secure operations at <X University> even after serious incidents, <University> shall ensure the availability of continuity plans, backup procedures, defense against damaging code and malicious activities, system and information access control, incident management and reporting. 17. juni 2014 SLIDE 36

Security strategy (cont.) The term information security is related to the following basic concepts: Confidentiality: The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Integrity: The property of safeguarding the accuracy and completeness of assets. Availability: The property of being accessible and usable upon demand by an authorized entity. 17. juni 2014 SLIDE 37

Security strategy (cont.) Some of the most critical aspects supporting <X University>'s activities are availability and reliability for network, infrastructure and services. <X University> practices openness and principles of public disclosure, but will in certain situations prioritize confidentiality over availability and integrity. Every user of <X University>'s information systems shall comply with this information security policy. Violation of this policy and of relevant security requirements will therefore constitute a breach of trust between the user and <X University>, and may have consequences for employment or contractual relationships.. Chancellor/President of <University> 17. juni 2014 SLIDE 38

Principles for information security in the template document Risk management Security organization Classification and control of assets Information security in connection with users of the institutions services Information security regarding physical conditions IT communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Continuity planning Compliance Controls from ISO 27002 or COBIT 4.1 Security Guidelines can be used here 17. juni 2014 SLIDE 39

Example of principles Risk management 3.1.1 Risk assessment and management <University>'s approach to security should be based on risk assessments. <University> should continuously assess the risk and evaluate the need for protective measures. Measures must be evaluated based on <University>'s role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the information systems should be performed annually. 17. juni 2014 SLIDE 40

How to implement the Information Security Policy? Preparations Start-up meeting with executive/top management (Important!) One-day on-site audit / review Interviews with key personnel Review of the received documentation Prepare report COBIT 4.1 Assurance Guide or ISO 27003 Annex C Information about internal auditing, can be used as a guideline for the audit 17. juni 2014 SLIDE 41

Roadmap for implementing the IS policy Perform an initial audit or an assessment of the organisation Draft the policy before workshop (Based on UFS 126) Arrange the policy workshop Internal adaptation by the management Review by other stakeholders Approval by the Board Implement the policy; publishing, information, training Revision process after 6-12 months 17. juni 2014 SLIDE 42

Overall recommendations for ISMS Establish Security Policy which adhere to ISO 27002 or COBIT, and implement it, including a selection of procedures Establish the role of Chief Information Security Officer (CISO) and formally anchor the responsibility for information security in senior management Identify business critical assets (Information, Servers, Resources etc.) Perform risk assessments on business critical assets with respect to confidentiality, integrity and availability Establish a security architecture based on the concept of security levels Develop Information Security Continuity Plan and ICT Disaster Recovery Plan 17. juni 2014 SLIDE 43

Agenda Background and context Information Security Management Systems (ISMS) Information Security Policy Classification of Information 17. juni 2014 SLIDE 44

UFS 136 Guidelines for Classification of information Recommendation on how to classify information Examples of how information objects that are frequently used in the higher education sector can be classified References to relevant standards, laws and regulations 17. juni 2014 SLIDE 45

Example of metadata types that should be classified Information owner (Organization unit, role or process) Content (Eg. Research data) Legal authority (Eg. Privacy Act) Storage location or computer system Security Classification (Open, Internal, Confidential) Security Needs (Confidentiality, Integrity, Availability) Max. downtime Why has the information conservation value? (Historical, Legal etc.) Personal Information? Open data in the public sector? Archive Key Storage Period Disposal method 17. juni 2014 SLIDE 46

Thanks! Øivind Høiem, CISA CRISC Senior advisor information security oivindh@uninett.no 17. juni 2014 SLIDE 47