Computer Security: Principles and Practice



Similar documents
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

California State University, Chico. Information Security Incident Management Plan

Best Practices For Department Server and Enterprise System Checklist

Guide to Vulnerability Management for Small Companies

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Data Management Policies. Sage ERP Online

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

Cybersecurity Health Check At A Glance

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Incident Response Plan for PCI-DSS Compliance

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Computer Security: Principles and Practice

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Risk Management Guide for Information Technology Systems. NIST SP Overview

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Office of Inspector General

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

ICANWK406A Install, configure and test network security

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

GFI White Paper PCI-DSS compliance and GFI Software products

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

How To Protect Your Network From Attack From Outside From Inside And Outside

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

Policy Title: HIPAA Security Awareness and Training

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

PCI Data Security Standards (DSS)

Basics of Internet Security

Data Security Incident Response Plan. [Insert Organization Name]

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Feedback Ferret. Security Incident Response Plan

Cryptography and Network Security Chapter 1

Defensible Strategy To. Cyber Incident Response

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Security Policy JUNE 1, SalesNOW. Security Policy v v

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Security Controls What Works. Southside Virginia Community College: Security Awareness

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Miami University. Payment Card Data Security Policy

Supplier Security Assessment Questionnaire

ABB s approach concerning IS Security for Automation Systems

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

The Protection Mission a constant endeavor

CHIS, Inc. Privacy General Guidelines

Capital District Vulnerability Assessment

HIPAA Security Alert

Security Standard: Servers, Server-based Applications and Databases

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

COSC 472 Network Security

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CSC 474 Information Systems Security

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Network and Security Controls

Cisco Advanced Services for Network Security

White Paper How Noah Mobile uses Microsoft Azure Core Services

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Better secure IT equipment and systems

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Managing internet security

Computer and Network Security Policy

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

PCI DSS Requirements - Security Controls and Processes

Network Security Policy

Transcription:

Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown

Implementing IT Security Management

Controls or Safeguards controls or safeguards are practices, procedures or mechanisms which may protect against a threat, reduce a vulnerability, limit the impact of an unwanted incident, detect unwanted incidents and facilitate recover classes of controls: management operational technical

Technical Controls

Lists of Controls CLASS Management Management Management Management Operational Operational Operational Operational Operational Operational Operational Operational Operational Technical Technical Technical Technical CONTROL FAMILY Risk Assessment Planning System and Services Acquisition Certification, Accreditation, and Security Assessments Personnel Security Physical and Env ironmental Protection Contingency Planning Configuration Management Maintenance System and Information Integrity Media Protection Incident Response Awareness and Training Identification and Authentication Access Control Audit and Accountability System and Communications Protection

Residual Risk

Cost-Benefit Analysis conduct to determine appropriate controls greatest benefit given resources available qualitative or quantitative show cost justified by reduction in risk contrast impact of implementing it or not management chooses selection of controls considers if it reduces risk too much or not enough, is too costly or appropriate fundamentally a business decision

IT Security Plan provides details of what will be done what resources are needed who is responsible should include risks, recommended controls, action priority selected controls, resources needed responsible personnel, implementation dates

Implementation Plan Risk (Asset/Threat) Hacker attack on Internet Router Level of Risk High Recommended Controls 1. disable external telnet access 2. use detailed auditing of privileged command use 3. set policy for strong admin passwords 4. set backup strategy for router config file 5. set change control policy for the router configuration Prio rity 1 1. 2. 3. 4. 5. Selected Controls Required Resources 1. 3 days IT net admin time to change & verify router config, write policies; 2. 1 day of training for net admin staff Responsible Persons John Doe, Lead Network Sys Admin, Corporate IT Support Team Start End Date 1- Feb- 2006 to 4- Feb- 2006 Other Comments 1. need periodic test & review of config & policy use

Security Plan Implementation given plan documents what is required identified personnel perform needed tasks to implement new or enhanced controls may need system configuration changes, upgrades or new system installation or development of new / extended procedures with support from management monitored to ensure process correct when completed management approves

Security Training / Awareness responsible personnel need training on details of design and implementation awareness of operational procedures also need general awareness for all spanning all levels in organization essential to meet security objectives lack leads to poor practices reducing security aim to convince personnel that risks exist and breaches may have significant consequences

Security Awareness Issues organization s s security objectives, strategies, policies need for security, general risks to organization understanding why security controls are used roles and responsibilities for various personnel the need to act in accordance with policy and procedures, consequences of unauthorized actions the need to report any security breaches observed and to assist with their investigation

Implementation Followup security management is cyclic, repeated need to monitor implemented controls evaluate changes for security implications otherwise increase chance of security breach have a number of aspects which may indicate need for changes in previous stages of process

Maintenance need continued maintenance and monitoring of implemented controls to ensure continued correct functioning and appropriateness tasks include: periodic review of controls upgrade of controls to meet new requirements check system changes do not impact controls address new threats or vulnerabilities goal to ensure controls perform as intended

Security Compliance audit process to review security processes to verify compliance with security plan using internal or external personnel usually based on checklists to check suitable policies and plans were created suitable selection of controls were chosen that they are maintained and used correctly often as part of wider general audit

Change and Configuration Management change management is the process to review proposed changes to systems evaluate security and wider impact of changes part of general systems administration process cf. management of bug patch testing and install may be informal or formal configuration management is keeping track of configuration and changes to each system to help restoring systems following a failure to know what patches or upgrades might be relevant also part of general systems administration process

Incident Handling need procedures specifying how to respond to a security incident given will most likely occur sometime reflect range of consequences on org codify action to avoid panic e.g. mass email worm exploiting vulnerabilities in common apps propagating via email in high volumes should disconnect from Internet or not?

Types of Security Incidents any action threatening classic security services unauthorized access to a system unauthorized viewing by self / other of information bypassing access controls using another users access denying access to another user unauthorized modification of info on a system corrupting information changing information without authorization unauthorized processing of information

Managing Security Incidents

Detecting Incidents reports from users or admin staff encourage such reporting detected by automated tools e.g. system integrity verification tools, log analysis tools, network and host intrusion detection systems, intrusion prevention systems updated to reflect new attacks or vulnerabilities costly so deployed if risk assess justifies admins must monitor vulnerability reports

Responding to Incidents need documented response procedures how to identify cause of the security incident describe action taken to recover from it procedures should identify typical categories of incidents and approach taken to respond identify management personnel responsible for making critical decisions and their contacts whether to report incident to police / CERT etc

Documenting Incidents need to identify vulnerability used and how to prevent it occurring in future recorded details for future reference consider impact on org and risk profile may simply be unlucky more likely risk profile has changed hence risk assessment needs reviewing followed by reviewing controls in use

Case Study: Silver Star Mines given risk assessment, identify controls clearly many categories not in use general issue of systems not being patched or upgraded plus need for contingency plans SCADA: add intrusion detection system info integrity: better centralize storage email: provide backup system

Implementation Plan Risk (Asset/Threat) All risks (generally applicable) Reliability and integrity of SCADA nodes and network Integrity of stored file and database information Availability & integrity of Financial, Procurement, & Maintenance/ Production Systems Availability, integrity and confidentiality of email Level of Risk Recommended Controls Priority Selected Controls 1. configuration and periodic maintenance 1 1. policy for servers 2. 2. malicious code / SPAM / spyware 3. prevention 4. 3. audit monitoring, analysis, reduction and 5. reporting on servers 4. contingency planning and incident response policies and procedures 5. system backup and recovery procedures High 1. intrusion detection & response system 2 1. Extreme 1. audit of critical documents 2. document creation & storage policy 3. user security education and training 3 1. 2. 3. High - - (general controls) High 1. contingency planning backup email service 4 1.

Summary security controls or safeguards management, operational, technical supportive, preventative, detection / recovery IT security plan implementation of controls implement plan, training and awareness implementation followup maintenance, compliance, change / config management, incident handling