Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.

Slides:



Advertisements
Similar presentations
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Advertisements

Control and Accounting Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Service Design – Section 4.5 Service Continuity Management.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Unit # 3: Information Security and Risk Management
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
The CPA Profession Chapter 2.
Corporate Ethics Compliance *
Introduction to Network Defense
Internal Auditing and Outsourcing
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Chapter 2.  The first chapter focused on threats  The rest of the book focuses on defense  In this chapter, we will see that defensive thinking is.
Information Systems Security Computer System Life Cycle Security.
Copyright © 2015 Pearson Education, Inc. Chapter 2 Chapter 2.
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Internal Control in a Financial Statement Audit
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Planning Chapter 2. Orientation The first chapter focused on threats The rest of the book focuses on defense In this chapter, we will see that defensive.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.
Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chapter 9: Introduction to Internal Control Systems
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Introduction to Information Security
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.
Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Security Threats Severity Analysis
INFORMATION SYSTEMS SECURITY and CONTROL
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

 Justify the need for formal management processes.  Explain the plan–protect–respond security management cycle.  Describe compliance laws and regulations.  Describe organizational security issues.  Describe risk analysis.  Describe technical security infrastructure.  Explain policy-driven implementation.  Know governance frameworks. 2 Copyright Pearson Prentice Hall 2013

3

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 4

 Security is all about Defense  Corporation is all about Profit ◦ Tension between the two  How to justify Defense  How to ensure Defense doesn’t stifle Profit/Opportunity Copyright Pearson Prentice-Hall

 Technology Is Concrete ◦ Can visualize devices and transmission lines ◦ Can understand device and software operation  Management Is Abstract  Management Is More Important ◦ Security is a process, not a product (Bruce Schneier) 6 Copyright Pearson Prentice Hall 2013

7

8 A failure in any component will lead to failure for the entire system Copyright Pearson Prentice Hall 2013

 Complex ◦ Cannot be managed informally  Need Formal Processes ◦ Planned series of actions in security management ◦ Annual planning ◦ Processes for planning and developing individual countermeasures ◦ … 9 Copyright Pearson Prentice Hall 2013

 A Continuous Process ◦ Fail if let up  Compliance Regulations ◦ Add to the need to adopt disciplined security management processes ◦ “Security is a societal pressure in that it induces cooperation … it [security] obviates the need for intimate trust. … it is how we ultimately induce compliance …” (Liars and Outliers: Enabling Trust that Society Needs to Thrive, Bruce Schnier) 10 Copyright Pearson Prentice Hall 2013

11 Dominates security management thinking Copyright Pearson Prentice Hall 2013

12 The systems life cycle goes beyond the SDLC, to include operational use. SLC thinking is critical in security. Copyright Pearson Prentice Hall 2013

 Security as an Enabler ◦ Security is often thought of as a preventer ◦ But security is also an enabler ◦ If you have good security, you can do things otherwise impossible  Engage in interorganizational systems with other firms  Can use SNMP SET commands to manage their systems remotely ◦ Must get in early on projects to reduce inconvenience (see SDLC and SLC …)see SDLC and SLC … 13 Copyright Pearson Prentice Hall 2013

 Positive Vision of Users ◦ Must not view users as malicious or stupid ◦ Stupid means poorly trained, and that is security’s fault ◦ Must have zero tolerance for negative views of users  Think Behaviorally ◦ Do you need help to cross the street? Why?  …“the most successful security behaviors were exhibited in schools where students were taught appropriate behaviors and then trusted to behave responsibly.” (Pfleeger and Caputo, 2012 citing Ofsted 2012 study) 14 Copyright Pearson Prentice Hall 2013

 Should Not View Security as Police or Military Force ◦ Creates a negative view of users ◦ Police merely punish; do not prevent crime; security must prevent attacks ◦ Military can use fatal force; security cannot even punish (HR does that) 15 Copyright Pearson Prentice Hall 2013

 Identify Current IT Security Gaps  Identify Driving Forces ◦ The threat environment (Chapter 1) ◦ Compliance laws and regulations ◦ Corporate structure changes, such as mergers  Identify Corporate Resources Needing Protection ◦ Enumerate all resources ◦ Rate each by sensitivity 16 Copyright Pearson Prentice Hall 2013

 Develop Remediation Plans ◦ Develop a remediation plan for all security gaps ◦ Develop a remediation plan for every resource unless it is well protected  Develop an Investment Portfolio ◦ You cannot close all gaps immediately ◦ Choose projects that will provide the largest returns ◦ Implement these 17 Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 18

 Technical Security Architectures ◦ Definition  All of the company’s technical countermeasures  And how these countermeasures are organized  Into a complete system of protection ◦ Architectural decisions  Based on the big picture  Must be well planned to provide strong security with few weaknesses 19 Copyright Pearson Prentice Hall 2013

 Technical Security Architectures ◦ Dealing with legacy technologies  Legacy technologies are technologies put in place previously  Too expensive to upgrade all legacy technologies immediately  Must upgrade if seriously impairs security  Upgrades must justify their costs 20 Copyright Pearson Prentice Hall 2013

 Principles ◦ Defense in depth  Resource is guarded by several countermeasures in series  Attacker must breach them all, in series, to succeed  If one countermeasure fails, the resource remains safe 21 Copyright Pearson Prentice Hall 2013

 Principles ◦ Defense in depth versus weakest links  Defense in depth: multiple independent countermeasures that must be defeated in series  Weakest link: a single countermeasure with multiple interdependent components that must all succeed for the countermeasure to succeed 22 Copyright Pearson Prentice Hall 2013

 Principles ◦ Avoiding single points of vulnerability  Failure at a single point can have drastic consequences  DNS servers, central security management servers, etc. 23 Copyright Pearson Prentice Hall 2013

 Principles ◦ Minimizing security burdens ◦ Realistic goals  Cannot change a company’s protection level overnight  Mature as quickly as possible 24 Copyright Pearson Prentice Hall 2013

 Elements of a Technical Security Architecture ◦ Border management ◦ Internal site management ◦ Management of remote connections ◦ Interorganizational systems with other firms ◦ Centralized security management  Increases the speed of actions  Reduces the cost of actions 25 Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 26

 Compliance Laws and Regulations ◦ Compliance laws and regulations create requirements for corporate security  Documentation requirements are strong  Identity management requirements tend to be strong ◦ Compliance can be expensive ◦ There are many compliance laws and regulations, and the number is increasing rapidly 27 Copyright Pearson Prentice Hall 2013

 Sarbanes–Oxley Act of 2002 ◦ Massive corporate financial frauds in 2002 ◦ Act requires firm to report material deficiencies in financial reporting processes ◦ Material deficiency a significant deficiency, or combination of significant deficiencies, which results in more than a remote likelihood that a material misstatement of the annual or interim financial statements will not be prevented or detected 28 Copyright Pearson Prentice Hall 2013

 Sarbanes–Oxley Act of 2002 ◦ Note that it does not matter whether a material misstatement actually occurs—merely that there is more than a remote likelihood that it could occur and not be detected ◦ A material deviation is a mere 5% deviation ◦ Companies that report material deficiencies typically find that their stock loses value, and the chief financial officer may lose his or her job 29 Copyright Pearson Prentice Hall 2013

 Privacy Protection Laws ◦ The European Union (EU) Data Protection Directive of 2002 ◦ The U.S. Gramm–Leach–Bliley Act (GLBA) ◦ The U.S. Health Insurance Portability and Accountability Act (HIPAA) for private data in health care organizations 30 Copyright Pearson Prentice Hall 2013

 Data Breach Notification Laws ◦ California’s SB 1386 ◦ Requires notification of any California citizen whose private information is exposed ◦ Companies cannot hide data breaches anymore  Federal Trade Commission (FTC) ◦ Can punish companies that fail to protect private information ◦ Fines and required external auditing for several years 31 Copyright Pearson Prentice Hall 2013

 Industry Accreditation ◦ For hospitals, etc. ◦ Often have accredited security requirements  PCI-DSS ◦ Payment Card Industry–Data Security Standards ◦ Applies to all firms that accept credit cards ◦ Has 12 general requirements, each with specific subrequirements 32 Copyright Pearson Prentice Hall 2013

 FISMA ◦ Federal Information Security Management Act of 2002 ◦ Processes for all information systems used or operated by U.S. government federal agencies ◦ Also by any contractor or other organization on behalf of a U.S. government agency ◦ Certification, followed by accreditation ◦ Continuous monitoring ◦ Criticized for focusing on documentation instead of protection 33 Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 34

 Chief Security Officer (CSO) ◦ Also called chief information security officer (CISO)  Where to Locate IT Security? ◦ Within IT  Compatible technical skills  CIO will be responsible for security ◦ Outside of IT  Gives independence  Hard to blow the whistle on IT and the CIO if within IT  This is the most commonly advised choice 35 Copyright Pearson Prentice Hall 2013

 Located outside of IT dept will require ◦ Relationships with Other Departments  Special relationships  Ethics, compliance, and privacy officers  Human resources (training, hiring, terminations, sanction violators)  Legal department 36 Copyright Pearson Prentice Hall 2013

 Relationships with Other Departments ◦ Special relationships  Auditing departments  1) IT auditing, 2) internal auditing, 3) financial auditing  Might place security auditing under one of these  This would give independence from the security function  Facilities (buildings) management  Uniformed security 37 Copyright Pearson Prentice Hall 2013

 Relationships with Other Departments ◦ All corporate departments  Cannot merely toss policies over the wall ◦ Business partners  Must link IT corporate systems together  Before doing so, must exercise due diligence in assessing their security 38 Copyright Pearson Prentice Hall 2013

 Top Management Support ◦ Budget ◦ Support in conflicts ◦ Setting personal examples 39 Copyright Pearson Prentice Hall 2013

 Outsourcing IT Security ◦ Only or webservice ◦ Managed Security Service Providers (MSSPs)  Outsource most IT security functions to the MSSP  But usually not policy 40 Copyright Pearson Prentice Hall 2013

41 Copyright Pearson Prentice Hall 2013

42 Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 43

44 Copyright Pearson Prentice Hall 2013 What How Constraints

 Policies ◦ Statements of what is to be done ◦ Not how to do it 45 Copyright Pearson Prentice Hall 2013

 Tiers of Security Policies ◦ Brief corporate security policy to drive everything ◦ Major policies   Hiring and firing  Personally identifiable information  Acceptable Use 46 Copyright Pearson Prentice Hall 2013

 Writing Policies ◦ For important policies, IT security cannot act alone ◦ There should be policy-writing teams for each policy ◦ For broad policies, teams must include IT security, management in affected departments, the legal department, and so forth ◦ The team approach gives authority to policies ◦ It also prevents mistakes because of IT security’s limited viewpoint 47 Copyright Pearson Prentice Hall 2013

 Limits the discretion of implementers, in order to simplify implementation decisions and to avoid bad choices in interpreting policies  Types of Guidance ◦ None  Implementer is only guided by the policy itself ◦ Standards versus Guidelines  Standards are mandatory directives  Guidelines are not mandatory but must be considered 48 Copyright Pearson Prentice Hall 2013

 Types of Implementation Guidance ◦ Procedures: detailed descriptions of what should be done ◦ Processes: less detailed specifications of what actions should be taken  Necessary in managerial and professional business function ◦ Baselines: checklists of what should be done but not the process or procedures for doing them 49 Copyright Pearson Prentice Hall 2013

 Types of Implementation Guidance ◦ Best practices: most appropriate actions in other companies ◦ Recommended practices: normative guidance ◦ Accountability  Owner of resource is accountable  Implementing the policy can be delegated to a trustee, but accountability cannot be delegated ◦ Codes of ethics 50 Copyright Pearson Prentice Hall 2013

 Ethics ◦ A person’s system of values ◦ Needed in complex situations ◦ Different people may make different decisions in the same situation ◦ Companies create codes of ethics to give guidance in ethical decisions 51 Copyright Pearson Prentice Hall 2013

 Code of Ethics: Typical Contents (Partial List) ◦ Importance of good ethics to have a good workplace and to avoid damaging a firm’s reputation ◦ The code of ethics applies to everybody  Senior managers usually have additional requirements ◦ Improper ethics can result in sanctions, up to termination ◦ An employee must report observed ethical behavior 52 Copyright Pearson Prentice Hall 2013

 Code of Ethics: Typical Contents (Partial List) ◦ An employee must involve conflicts of interest  Never exploit one’s position for personal gain  No preferential treatment of relatives  No investing in competitors  No competing with the company while still employed by the firm 53 Copyright Pearson Prentice Hall 2013

 Code of Ethics: Typical Contents (Partial List) ◦ No bribes or kickbacks  Bribes are given by outside parties to get preferential treatment  Kickbacks are given by sellers when they place an order to secure this or future orders ◦ Employees must use business assets for business uses only, not personal use 54 Copyright Pearson Prentice Hall 2013

 Code of Ethics: Typical Contents (Partial List) ◦ An employee may never divulge  Confidential information  Private information  Trade secrets 55 Copyright Pearson Prentice Hall 2013

 Exceptions Are Always Required ◦ But they must be managed  Limiting Exceptions ◦ Only some people should be allowed to request exceptions ◦ Fewer people should be allowed to authorize exceptions ◦ The person who requests an exception must never be authorizer 56 Copyright Pearson Prentice Hall 2013

 Exception Must Be Carefully Documented ◦ Specifically what was done and who did each action  Special Attention Should Be Given to Exceptions in Periodic Auditing  Exceptions Above a Particular Danger Level ◦ Should be brought to the attention of the IT security department and the authorizer’s direct manager 57 Copyright Pearson Prentice Hall 2013

 Oversight ◦ Oversight is a term for a group of tools for policy enforcement ◦ Policy drives oversight, just as it drives implementation  Promulgation ◦ Communicate vision ◦ Training ◦ Stinging employees? 58 Copyright Pearson Prentice Hall 2013

 Electronic Monitoring ◦ Electronically-collected information on behavior ◦ Widely done in firms and used to terminate employees ◦ Warn subjects and explain the reasons for monitoring 59 Copyright Pearson Prentice Hall 2013

 Security Metrics ◦ Indicators of compliance that are measured periodically ◦ Percentage of passwords on a server that are crackable, etc. ◦ Periodic measurement indicates progress in implementing a policy 60 Copyright Pearson Prentice Hall 2013

 Auditing ◦ Samples information to develop an opinion about the adequacy of controls ◦ Database information in log files and prose documentation ◦ Extensive recording is required in most performance regimes ◦ Avoidance of compliance is a particularly important finding 61 Copyright Pearson Prentice Hall 2013

 Auditing ◦ Internal and external auditing may be done ◦ Periodic auditing gives trends ◦ Unscheduled audits trip up people who plan their actions around periodic audits 62 Copyright Pearson Prentice Hall 2013

 Anonymous Protected Hotline ◦ Often, employees are the first to detect a serious problem ◦ A hotline allows them to call it in ◦ Must be anonymous and guarantee protection against reprisals ◦ Offer incentives for heavily damaging activities such as fraud? 63 Copyright Pearson Prentice Hall 2013

 Behavioral Awareness ◦ Misbehavior often occurs before serious security breaches ◦ The fraud triangle indicates motive. 64

 Vulnerability Tests ◦ Attack your own systems to find vulnerabilities ◦ Free and commercial software ◦ Never test without a contract specifying the exact tests, signed by your superior ◦ The contract should hold you blameless in case of damage 65 Copyright Pearson Prentice Hall 2013

 Vulnerability Tests ◦ External vulnerability testing firms have expertise and experience ◦ They should have insurance against accidental harm and employee misbehavior ◦ They should not hire hackers or former hackers ◦ Should end with a list of recommended fixes ◦ Follow-up should be done on whether these fixed occurred 66 Copyright Pearson Prentice Hall 2013

 Sanctions ◦ If people are not punished when they are caught, nothing else matters 67 Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 68

 Realities ◦ Can never eliminate risk ◦ “Information assurance” is impossible  Risk Analysis ◦ Goal is reasonable risk ◦ Risk analysis weighs the probable cost of compromises against the costs of countermeasures ◦ Also, security has negative side effects that must be weighed 69 Copyright Pearson Prentice Hall 2013

Single Loss Expectancy (SLE) Annualized Loss Expectancy (ALE)  Asset Value (AV)  X Exposure Factor (EF) ◦ Percentage loss in asset value if a compromise occurs  = Single Loss Expectancy (SLE) ◦ Expected loss in case of a compromise  SLE  X Annualized Rate of Occurrence (ARO) ◦ Annual probability of a compromise  = Annualized Loss Expectancy (ALE) ◦ Expected loss per year from this type of compromise Copyright Pearson Prentice Hall

71 Base Case Countermeasure A Asset Value (AV)$100,000 Exposure Factor (EF)80%20% Single Loss Expectancy (SLE): = AV*EF$80,000$20,000 Annualized Rate of Occurrence (ARO)50% Annualized Loss Expectancy (ALE): = SLE*ARO$40,000$10,000 ALE Reduction for CountermeasureNA$30,000 Annualized Countermeasure CostNA$17,000 Annualized Net Countermeasure ValueNA$13,000 Counter- measure A should reduce the exposure factor by 75% Copyright Pearson Prentice Hall 2013

72 Base Case Countermeasure B Asset Value (AV)$100,000 Exposure Factor (EF)80% Single Loss Expectancy (SLE): = AV*EF$80,000 Annualized Rate of Occurrence (ARO)50%25% Annualized Loss Expectancy (ALE): = SLE*ARO$40,000$20,000 ALE Reduction for CountermeasureNA$20,000 Annualized Countermeasure CostNA$4,000 Annualized Net Countermeasure ValueNA$16,000 Counter- measure B should cut the frequency of compromises in half Copyright Pearson Prentice Hall 2013

73 Base Case Countermeasure AB Asset Value (AV)$100,000 Exposure Factor (EF)80%20%80% Single Loss Expectancy (SLE): = AV*EF$80,000$20,000$80,000 Annualized Rate of Occurrence (ARO)50% 25% Annualized Loss Expectancy (ALE): = SLE*ARO$40,000$10,000$20,000 ALE Reduction for CountermeasureNA$30,000$20,000 Annualized Countermeasure CostNA$17,000$4,000 Annualized Net Countermeasure ValueNA$13,000$16,000 Although Countermeasure A reduces the ALE more, Countermeasure B is much less expensive. The annualized net countermeasure value for B is larger. The company should select countermeasure B. Although Countermeasure A reduces the ALE more, Countermeasure B is much less expensive. The annualized net countermeasure value for B is larger. The company should select countermeasure B. Copyright Pearson Prentice Hall 2013

 Uneven Multiyear Cash Flows ◦ For both attack costs and defense costs ◦ Must compute the return on investment (ROI) using discounted cash flows ◦ Net present value (NPV) or internal rate of return (ROI) 74 Copyright Pearson Prentice Hall 2013

 Total Cost of Incident (TCI) ◦ Exposure factor in classic risk analysis assumes that a percentage of the asset is lost ◦ In most cases, damage does not come from asset loss ◦ For instance, if personally identifiable information is stolen, the cost is enormous but the asset remains ◦ Must compute the total cost of incident (TCI) ◦ Include the cost of repairs, lawsuits, and many other factors 75 Copyright Pearson Prentice Hall 2013

 Many-to-Many Relationships between Countermeasures and Resources ◦ Classic risk analysis assumes that one countermeasure protects one resource ◦ Single countermeasures, such as a firewall, often protect many resources ◦ Single resources, such as data on a server, are often protected by multiple countermeasures ◦ Extending classic risk analysis is difficult 76 Copyright Pearson Prentice Hall 2013

 Impossibility of Knowing the Annualized Rate of Occurrence ◦ There simply is no way to estimate this ◦ This is the worst problem with classic risk analysis ◦ As a consequence, firms often merely rate their resources by risk level 77 Copyright Pearson Prentice Hall 2013

 Problems with “Hard-Headed Thinking” ◦ Security benefits are difficult to quantify ◦ If only support “hard numbers” may underinvest in security 78 Copyright Pearson Prentice Hall 2013

 Perspective ◦ Impossible to do perfectly ◦ Must be done as well as possible ◦ Identifies key considerations ◦ Works if countermeasure value is very large or very negative ◦ But never take classic risk analysis seriously 79 Copyright Pearson Prentice Hall 2013

OCTAVE Allegro

 Operationally  Critical  Threat,  Asset,  Vulnerability  Evaluation

 The combination of a threat (a condition) and the resulting impact of the threat if acted upon (a consequence).

 Methodology for identifying and evaluating security risks ◦ develop qualitative risk evaluation criteria that describe the organization’s operational risk tolerances ◦ identify assets that are important to the mission of the organization ◦ identify vulnerabilities and threats to those assets ◦ determine and evaluate the potential consequences to the organization if threats are realized

 OCTAVE  OCTAVE-S  OCTAVE-Allegro

 For large Organizations >300 employees  have a multi-layered hierarchy  maintain their own computing infrastructure  have the ability to run vulnerability evaluation tools  have the ability to interpret the results of vulnerability evaluations  performed in a series of workshops conducted and facilitated by an interdisciplinary analysis team drawn from business units throughout the organization (e.g. senior management, operational area managers, and staff) and members of the IT department [Alberts 2002].  Phase I ◦ Organizational View  Identify important information assets  Phase II ◦ Technological View  Supplement Threat Analysis  Phase III ◦ Strategy and Plan  Risk Identification  Risk Mitigation

 For Small Manufacturing Companies  performed by an analysis team that has extensive knowledge of the organization  designed to include a limited examination of infrastructure risks ◦ No vulnerability testing (or limited)

 Broad Assessment of Operational Risk Environment  Focus on Information Assets ◦ How they are used ◦ Where they are used ◦ Where they are stored, transported, & processed ◦ How are they exposed to  Threats, Vulnerabilities & Disruptions

Step1: Establish Risk Measurement Criteria Step2: Develop Information Asset Profile Step 3: Identify Information Asset Containers Step 4: Identify Areas of Concern Step 5: Identify Threat Scenarios Step 6: Identify Risks Step 7: Analyze Risks Step 8: Select Mitigation Approach Establish DriversProfile AssetsIdentify ThreatsIdentify/Mitigate Risks The outputs of each step are recorded in a worksheet and become inputs for the next step

 Risk Measurement Criteria Determined: ◦ Qualitative Measure  Used to evaluate effect of Risk ◦ Forms information asset risk assessment  Rank Significance of Impact Area ◦ E.g. Customers vs. Compliance

92

93

94

The most important category should receive the highest score and the least important the lowest.

 Information Asset ◦ information or data that is of value to the organization ◦ Can exist in physical form (on paper, CDs, or other media) or ◦ Electronically (stored in databases, in files, on personal computers).  Describe Assets: ◦ unique features, qualities, characteristics, and value ◦ unambiguous definition of the assets boundaries ◦ security requirements for the asset are adequately defined  Confidentiality, Integrity, Availability

 Focus on “critical few”  Which would have the largest impact on your organization, based on the Risk Measurement if: ◦ The asset or assets were disclosed to unauthorized people. ◦ The asset or assets were modified without authorization. ◦ The asset or assets were lost or destroyed. ◦ Access to the asset or assets was interrupted.

99

 Places where Information Assets are: ◦ Stored ◦ Processed ◦ Transported  Three Types of Containers ◦ Technical:  hardware, software, application systems, servers, and networks or ◦ Physical:  file folders (where information is stored in written form) ◦ People (who may carry around important information such as intellectual property).  Containers are both Internal to the Organization and External  an organization must identify all of the locations where its information assets are stored, transported, or processed, whether or not they are within the organization’s direct control.  Containers Risks are inherited by Information Assets within them

 Controls are at the Container level  Security depends on how well the control reflects security requirements of container  Any vulnerabilities or threats to a Container is inherited by the Information Asset inside

 Identify Conditions that can threaten information assets  Not intended to be an exhaustive list of all Threats  Rather a list of threats that are immediately thought of

 Areas of Concern are expanded into  Threat Scenarios ◦ Actor Involved ◦ Means ◦ Motive ◦ Outcome ◦ Security Requirements  From Threat Scenario Questionnaires ◦ Probability of Occurrence  High, Medium, Low

For Any Yes from the questionnaire Create an Information Asset Risk Worksheet

 Determine Consequences if Threat Occurs  More than one consequence is possible ◦ Reputation Consequence ◦ Financial Consequence  Threat (condition) + Impact (consequence) = Risk  [Steps 4 and 5] + [Step 6] = Risk

 Compute Quantitative Measure of Risk ◦ Using Consequence and Relative Importance of Impact Area  High = 3, Medium = 2 or Low = 1 ◦ Probability (if used)

The scores generated in this activity are only meant to be used as a prioritization tool. Differences between risk scores are not considered to be relevant. In other words, a score of 48 means that the risk is relatively more important to the organization than a score of 25, but there is no importance to the difference of 13 points.

118

119

Copyright Pearson Prentice-Hall RiskScore Modification – Unauthorized Access 30 Disclosure – Unauthorized 18 Interruption _ DOS attack31 Disclosure – Unauthorized 20 Disclosure – Paper Copies of Bills 18 Destruction – Back-up Tapes Destroyed 31 Disclosure – Bills sent to wrong address 15 Modification – Improper Billing Codes 37 Summary of All Identified Risks

 First, Prioritize Risks based on Risk Score (7)  Mitigation strategies are developed that consider the value of the asset  The Assets security requirements  The containers in which it lives  The organization’s unique operating environment.

 Accept ◦ Take no action, risk has low or zero impact  Mitigate ◦ Develop controls to counter risk  Defer ◦ Gather more information and re-analyze in the future

Take Relative Risk score and divide into 4 even Pools. Than use pools to determine Mitigation, Defer, or Accept decision. If probabilities are used than create Matrix (Probability of Occurrence x Risk score)

Improper Billing Codes DOS Attack

 Risk Reduction ◦ The approach most people consider ◦ Install countermeasures to reduce harm ◦ Makes sense only if risk analysis justifies the countermeasure  Risk Acceptance ◦ If protecting against a loss would be too expensive, accept losses when they occur ◦ Good for small, unlikely losses ◦ Good for large but rare losses 125 Copyright Pearson Prentice Hall 2013

 Risk Transference ◦ Buy insurance against security-related losses ◦ Especially good for rare but extremely damaging attacks ◦ Does not mean a company can avoid working on IT security ◦ If bad security, will not be insurable ◦ With better security, will pay lower premiums 126 Copyright Pearson Prentice Hall 2013

 Risk Avoidance ◦ Not to take a risky action ◦ Lose the benefits of the action ◦ May cause anger against IT security  Recap: Four Choices when You Face Risk ◦ Risk reduction ◦ Risk acceptance ◦ Risk transference ◦ Risk avoidance 127 Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology 2.2 Compliance Laws and Regulations 2.3 Organization 2.4 Risk Analysis 2.5 Technical Security Architecture 2.6 Policy-Driven Implementation 2.7 Governance Frameworks 128

129 Copyright Pearson Prentice-Hall 2013

 Origins ◦ Committee of Sponsoring Organizations of the Treadway Commission ( ◦ Ad hoc group to provide guidance on financial controls  Focus ◦ Corporate operations, financial controls, and compliance ◦ Effectively required for Sarbanes–Oxley compliance ◦ Goal is reasonable assurance that goals will be met 130 Copyright Pearson Prentice Hall 2013

 Components ◦ Control Environment  General security culture  Includes “tone at the top”  If strong, weak specific controls may be effective  If weak, strong controls may fail  Major insight of COSO 131 Copyright Pearson Prentice Hall 2013

 Components ◦ Risk assessment  Ongoing preoccupation ◦ Control activities  General policy plus specific procedures 132 Copyright Pearson Prentice Hall 2013

 Components ◦ Monitoring  Both human vigilance and technology ◦ Information and communication  Must ensure that the company has the right information for controls  Must ensure communication across all levels in the corporation 133 Copyright Pearson Prentice Hall 2013

 CobiT ◦ Control Objectives for Information and Related Technologies ◦ CIO-level guidance on IT governance ◦ Offers many documents that help organizations understand how to implement the framework 134 Copyright Pearson Prentice Hall 2013

 The CobiT Framework ◦ Four major domains ◦ 34 high-level control objectives  Planning and organization (10)  Acquisition and implementation (7)  Delivery and support (13)  Monitoring (4) ◦ More than 300 detailed control objectives 135 Copyright Pearson Prentice Hall 2013

 Dominance in the United States ◦ Created by the IT governance institute ◦ Which is part of the Information Systems Audit and Control Association (ISACA) ◦ ISACA is the main professional accrediting body of IT auditing ◦ Certified information systems auditor (CISA) certification 136 Copyright Pearson Prentice Hall 2013

 The CobiT Framework ◦ Four major domains (Figure 2-28) 137 Copyright Pearson Prentice Hall 2013

 ISO/IEC ◦ Family of IT security standards with several individual standards ◦ From the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)  ISO/IEC ◦ Originally called ISO/IEC ◦ Recommendations in 11 broad areas of security management 138 Copyright Pearson Prentice Hall 2013

 ISO/IEC 27002: Eleven Broad Areas 139 Security policyAccess control Organization of information security Information systems acquisition, development, and maintenance Asset managementInformation security incident management Human resources securityBusiness continuity management Physical and environmental security Compliance Communications and operations management Copyright Pearson Prentice Hall 2013

 ISO/IEC ◦ Created in 2005, long after ISO/IEC ◦ Specifies certification by a third party  COSO and CobiT permit only self-certification  Business partners prefer third-party certification  Other Standards ◦ Many more standards documents are under preparation 140 Copyright Pearson Prentice Hall 2013

141

Copyright © 2013 Pearson Education, Inc. Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall