Critical Controls for Cyber Security. www.infogistic.com



Similar documents
Looking at the SANS 20 Critical Security Controls

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

The Protection Mission a constant endeavor

SANS Top 20 Critical Controls for Effective Cyber Defense

Jumpstarting Your Security Awareness Program

THE TOP 4 CONTROLS.

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Security Management. Keeping the IT Security Administrator Busy

Check Point and Security Best Practices. December 2013 Presented by David Rawle

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Attachment A. Identification of Risks/Cybersecurity Governance

Network/Cyber Security

INCIDENT RESPONSE CHECKLIST

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Top 20 Critical Security Controls

The Role of Security Monitoring & SIEM in Risk Management

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Section 12 MUST BE COMPLETED BY: 4/22

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Assessing the Effectiveness of a Cybersecurity Program

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Information Technology Risk Management

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Security Policy for External Customers

External Supplier Control Requirements

Network Security Administrator

Cybersecurity Health Check At A Glance

NERC CIP VERSION 5 COMPLIANCE

ABB s approach concerning IS Security for Automation Systems

Client Security Risk Assessment Questionnaire

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

ICANWK406A Install, configure and test network security

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Patch and Vulnerability Management Program

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Introduction to Cyber Security / Information Security

White Paper: Consensus Audit Guidelines and Symantec RAS

Best Practices For Department Server and Enterprise System Checklist

GE Measurement & Control. Cyber Security for NEI 08-09

OCIE CYBERSECURITY INITIATIVE

Information Blue Valley Schools FEBRUARY 2015

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

HIPAA: Compliance Essentials

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Goals. Understanding security testing

Critical Security Controls

Verve Security Center

Information Shield Solution Matrix for CIP Security Standards

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Protecting Organizations from Cyber Attack

Cyber Security for NERC CIP Version 5 Compliance

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Designing a security policy to protect your automation solution

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

Risk Management Guide for Information Technology Systems. NIST SP Overview

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

BKDconnect Security Overview

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

1B1 SECURITY RESPONSIBILITY

Chapter 1 The Principles of Auditing 1

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

SCAC Annual Conference. Cybersecurity Demystified

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Protecting critical infrastructure from Cyber-attack

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

QUESTIONS & RESPONSES #2

F G F O A A N N U A L C O N F E R E N C E

Office of Inspector General

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Transcription:

Critical Controls for Cyber Security www.infogistic.com

Understanding Risk Asset Threat Vulnerability

Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability of critical assets to specific threats Determine the risk Identify/implement controls to reduce risks

Enterprise IT Infrastructure Social Engineering Insider Threats Vendors & Employees Key Loggers Hacking Weak Algorithms Malicious code Denial of Service Natural Disasters Access Controls

Implementation of Controls Controls are identified and applied to reduce the risk Controls can be of two types Technology Based Process Based Can be categorized across Technical (IPS, IDS, Firewall, DLP, IAM, SIEM, etc) Physical (Bio Metrics, Electronic Locks etc, Barriers etc) Administrative (Policies, Procedures, Manuals)

Balance of Technology & Process Process Technology

20 Critical Controls for Cyber Security Background Joint Efforts of US Department of Defense Nuclear Laboratories of US Department of Energy US CERT US Department of Homeland Security Defense Signal Directorate Australia Centre for Protection of Critical Infrastructure UK National Institute of Standards & Technology (NIST) SANS Institute Leading to Consortium for Cyber Security Action

20 Critical Controls for Cyber Security Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 6: Application Software Security Critical Control 7: Wireless Device Control Critical Control 8: Data Recovery Capability Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control Critical Control 17: Data Loss Prevention Critical Control 18: Incident Response and Management Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises

Categorizing Critical Controls Control Process Technology Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Continuous Vulnerability Assessment and Remediation Malware Defenses Application Software Security Wireless Device Control

Categorizing Critical Controls Control Process Technology Data Recovery Capability Security Skills Assessment and Appropriate Training to Fill Gaps Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Limitation and Control of Network Ports, Protocols, and Services Controlled Use of Administrative Privileges Boundary Defense Maintenance, Monitoring, and Analysis of Audit Logs

Categorizing Critical Controls Control Process Technology Controlled Access Based on the Need to Know Account Monitoring and Control Data Loss Prevention Incident Response and Management Secure Network Engineering External Penetration Tests & Contextual Risk Management

Vulnerability Assessment & Continuous Remediation Technology Acquire and Implement a Vulnerability Scanning Tool Emphasis on database, networks, web, servers, applications, SCADA(if applicable) Process Frequency of scanning Reporting Mechanism Action Plans Contingency planning for patch management Compare results with previous scans Strict Monitoring/Auditing of Access

Application Software Security Technology For Web Applications install Web Application Firewall For other applications have a Next Generation Firewall Process In-house developed applications must be tested for security and code review. Test in-house-developed and third-party-procured web and other application software for coding errors and malware insertion,

Security Skills Assessment Technology Online Training Programs for Security Awareness Process Develop a Security Awareness Program at all levels KPI must be defined Security awareness must be enforced through HR Capability and Capacity Development

Data Loss Prevention Technology Install and implement a Data Loss Prevention Solution Process Policies and Procedures Classification of Information Business Work Flow Incident Management

Governance Risk & Compliance Technology Implement a GRC suite Process Business Process Mapping Modules may include Policy Management Risk Management Incident Management Vendor Management Audit Management Risk Management Work Flow Definitions Integrity Monitoring

Furnishing Technology Security Analytics Smart ID Email Security IAM Malware Analysis Vulnerability Scanning Encryption Policies & Awareness Physical Perimeter Internal Network Host Application Data GRC BMS NGIPS NGFW Host Based Protection X factor Authentication DLP

Symptoms of Vulnerable Organizations I understand process, I understand technology, but how to integrate them? Which best practices suit my organization? There are too many, I am confused? We are too busy in our day to day security operations? No one follows the process here? Frequently change the security technology in place?

Answer