MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 7 S ECURITY M ANAGEMENT P RACTICES In theory there is no difference between theory and practice,

Slides:



Advertisements
Similar presentations
1 of 21 Information Strategy Developing an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy Developing.
Advertisements

Software Quality Assurance Plan
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
More CMM Part Two : Details.
Management of Information Security, 4th Edition
Data Ownership Responsibilities & Procedures
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Information Security Policies and Standards
TEL2813/IS2820 Security Management
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Management of Information Security Chapter 06 Security Management Models And Practices Security can only be achieved through constant change, through.
Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT
Security Management Practices
Computer Security: Principles and Practice
Lecture 8: Risk Management Controlling Risk
Configuration Management
Stephen S. Yau CSE , Fall Security Strategies.
Complying With The Federal Information Security Act (FISMA)
Security Management Practices
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
Continual Service Improvement Process
Information Systems Security Computer System Life Cycle Security.
N By: Md Rezaul Huda Reza n
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
NIST Special Publication Revision 1
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
MANAGEMENT of INFORMATION SECURITY Second Edition.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 6: THE EIGHT STEP PROCESS FOCUS: This chapter provides a description of the application of customer-driven project management.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
SecSDLC Chapter 2.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Software Project Configuration Management
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
The value of the metrics standards within our compliance frameworks
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 7 S ECURITY M ANAGEMENT P RACTICES In theory there is no difference between theory and practice, but in practice there is… (Attributed to multiple sources, including Yogi Berra and Jan L.A. Van de Snepscheut)

Objectives Upon completion of this chapter you should be able to: – List the elements of key information security management practices – Describe the key components of a security metrics program – Identify suitable strategies for the implementation of a security metric program – Discuss emerging trends in the certification and accreditation of U.S. federal IT systems

Introduction Value Proposition – Organizations strive to deliver the most value with a given level of investment – Developing and using sound and repeatable information security management practices makes accomplishing this more likely

Benchmarking To generate a security blueprint – Organizations usually draw from established security models and practices – Another way is to look at the paths taken by organizations similar to the one for which you are developing the plan Benchmarking – Following the existing practices of a similar organization, or industry-developed standards – Can help to determine which controls should be considered – Cannot determine how those controls should be implemented in your organization

Recommended Security Practices Best Practices – Security efforts that seek to provide a superior level of performance in the protection of information – Considered among the best in the industry – Balance the need for information access with the need for adequate protection – Demonstrate fiscal responsibility – Companies with best practices may not be the best in every area

The Gold Standard Some organizations prefer to implement the most protective, supportive, and yet fiscally responsible standards they can Gold standard – A model level of performance that demonstrates industrial leadership, quality, and concern for the protection of information – Implementation requires a great deal of financial and personnel support

Selecting Recommended Practices Choosing which recommended practices to implement can pose a challenge for some organizations – In industries that are regulated by governmental agencies, government guidelines are often requirements – For other organizations, government guidelines are excellent sources of information and can inform their selection of best practices

Selecting Recommended Practices Considerations for selecting best practices – Does your organization resemble the identified target organization of the best practice? – Are you in a similar industry as the target? – Do you face similar challenges as the target? – Is your organizational structure similar to the target? – Are the resources you can expend similar to those called for by the best practice? – Are you in a similar threat environment as the one assumed by the best practice?

Limitations to Benchmarking and Recommended Practices The biggest barrier to benchmarking – Organizations don’t talk to each other A successful attack is viewed as an organizational failure, and is kept secret, insofar as possible More and more security administrators are joining professional associations and societies like ISSA and sharing their stories and lessons learned – An alternative to this direct dialogue is the publication of lessons learned

Baselining A value or profile of a performance metric against which changes in the performance metric can be usefully compared Process of measuring against established standards Baseline measurements of security activities and events are used to evaluate the organization’s future security performance

Self-Assessment People: –Do you perform background checks on all employees with access to sensitive data, areas, or access points? –Would the average employee recognize a security issue? –Would they choose to report it? –Would they know how to report it to the right people?

Self-Assessment Processes –Are enterprise security policies updated on at least an annual basis, employees educated on changes, and consistently enforced? –Does your enterprise follow a patch/update management and evaluation process to prioritize and mediate new security vulnerabilities? –Are the user accounts of former employees immediately removed on termination? –Are security group representatives involved in all stages of the project life cycle for new projects?

Technology –Is every possible route to the Internet protected by a properly configured firewall? –Is sensitive data on laptops and remote systems encrypted? –Do you regularly scan your systems and networks, using a vulnerability analysis tool, for security exposures? –Are malicious software scanning tools deployed on all workstations and servers? Self-Assessment

Performance Measures Costs, benefits and performance of InfoSec – Are measurable, despite the claim of some CISOs that they are not Measurement requires the design and ongoing use of an InfoSec performance management program based on effective performance metrics

InfoSec Performance Management The process of designing, implementing and managing the use of collected data elements called measures –To determine the effectiveness of the overall security program Measures are data points or computed trends that indicate the effectiveness of security countermeasures or controls

InfoSec Performance Management Organizations use three types of measures – Those that determine the effectiveness of the execution of information security policy (ISSPs) – Those that determine the effectiveness and/or efficiency of the delivery of information security services – Those that assess the impact of an incident or other security event on the organization or its mission

InfoSec Performance Management Critical factors for the success of an information security performance program – Strong upper level management support – Practical information security policies and procedures – Quantifiable performance measures – Results oriented measures analysis

InfoSec Metrics InfoSec metrics – Applying statistical and quantitative approaches of mathematical analysis to the process of measuring the activities and outcomes of the InfoSec program Metrics means detailed measurements Measures refers to aggregate, higher-level results – The two terms are used interchangeably in some organizations

Questions to answer before collecting, designing, and using measures – Why should these statistics be collected? – What specific statistics will be collected? – How will these statistics be collected? – When will these statistics be collected? – Who will collect these statistics? – Where (at what point in the function’s process) will these statistics be collected? InfoSec Metrics

Building the ISM Program An information security measures program – Must be able to demonstrate value to the organization Necessary even with strong management support Capability Maturity Model Integrated (CMMI) – One of the most popular references that support the development of process improvement and performance measures – Developed by The Software Engineering Institute at Carnegie Mellon

Building the ISM Program Another popular approach –NIST SP R1: Performance Measurement for Information Security –Major activities The identification and definition of the current information security program Development and selection of specific measures to gauge the implementation, effectiveness, efficiency, and impact of the security controls

Source: Course Technology/Cengage Learning (Based on NIST SP Rev. 1)

Specifying InfoSec Measures Assess and quantify what will be measured – One of the critical tasks While InfoSec planning and organizing activities may only require time estimates – You must obtain more detailed measurements when assessing the effort spent to complete production tasks and the time spent completing project tasks

Collecting InfoSec Measures Some thought must go into the processes used for data collection and record keeping Once the question of what to measure is answered – The how, when, where, and who questions of metrics collection must be addressed Designing the collection process requires consideration of the metric’s intent – Along with a thorough knowledge of how production services are delivered

Collecting InfoSec Measures Determine whether the measures used will be macro- focus or micro-focus – Macro-focus measures examine the performance of the overall security program – Micro-focus measures examine the performance of an individual controller or group of controls within the information security program Or use both macro- and micro-focus measures in a limited assessment

Collecting InfoSec Measures Organizations manage what they measure – It is important to prioritize individual metrics in the same manner as the performance they measure Use a simple low-, medium-, or high-priority ranking system – Or a weighted scale approach Involves assigning values to each measure based on its importance in the overall information security program, and on the overall risk mitigation goals and the criticality of the systems

Collecting InfoSec Measures Performance targets – Make it possible to define success in the security program – Many measures have a 100% target goal Other types of performance measures – Those that determine relative effectiveness, efficiency, or impact of information security on the organization’s goals Are more subjective and require solid native and subjective reasoning

Source: NIST SP , Rev 1 Collecting InfoSec Measures

Table 7-2b Example performance measures documentation Source: NIST SP , Rev 1 Collecting InfoSec Measures

Candidate Measures Percentage of the organization's information systems budget devoted to information security Percentage of high vulnerabilities mitigated within organizationally defined time periods after discovery Percentage space of remote access points used to gain unauthorized access Percentage of information systems personnel that have received security training Average frequency of audit records review and analysis for inappropriate activity

Candidate Measures Percentage of new systems that have completed certification and accreditation (C&A) prior to their implementation Percentage approved and implemented configuration changes identified in the latest automated baseline configuration Percentage of information systems that have conducted annual contingency plan testing

Candidate Measures Percentage of users with access to shared accounts Percentage of incidents reported within required time frame per applicable incident category Percentage of system components that undergo maintenance in accordance with formal maintenance schedules Percentage of media that passes sanitization procedures testing Percentage of physical security incidents allowing unauthorized entry into facilities containing information assets

Candidate Measures Percentage of employees who are authorized access to information systems only after they sign an acknowledgment that they have read and understood the appropriate policies Percentage of individuals screened before being granted access to organizational information and information systems Percentage of vulnerabilities remediated within organization-specified time frames Percentage of system and service acquisition contracts that include security requirements and/or specifications

InfoSec Performance Measurement Implementation Information security performance measures must be implemented and integrated into ongoing information security management operations It is insufficient to simply collect these measures once – Performance measurement is an ongoing, continuous improvement operation

Figure 7-2 Information security measurement program implementation process Source: Course Technology/Cengage Learning Collecting InfoSec Measures

Reporting InfoSec Performance Measures Listing the measurements collected does not adequately convey their meaning Decisions must be made about how to present correlated metrics Consider to whom the results of the performance measures program should be disseminated, and how they should be delivered

Emerging Trends In Certification And Accreditation Accreditation – The authorization of an IT system to process, store, or transmit information. – It is issued by a management official and serves as a means of assuring that systems are of adequate quality – Challenges managers and technical staff to find the best methods to assure security, given technical constraints, operational constraints, and mission requirements

Emerging Trends In Certification And Accreditation Certification – The comprehensive evaluation of the technical and nontechnical security controls of an IT system Supports the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements – Organizations pursue accreditation or certification to gain a competitive advantage Also provides assurance to customers

Summary Introduction Security management practices Emerging trends in certification and accreditation