MANAGEMENT of INFORMATION SECURITY, Fifth Edition.

Slides:



Advertisements
Similar presentations
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Advertisements

Software Quality Assurance Plan
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
1 Continuity Planning for transportation agencies.
Business Crisis and Continuity Management (BCCM) Class Session
Database Administration
Planning for Contingencies
Planning for Contingencies
Computer Security: Principles and Practice
Introduction to Network Defense
1 Business Continuity. 2 Continuity strategy Business impact Incident response Disaster recovery Business continuity.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
ITC358 ICT Management and Information Security
Planning for Contingencies
INFORMATION SECURITY PLANNING & IMPLEMENTATION Today’s Reference: Whitman & Mattord, Management of Information Security, 2 nd edition, 2008 Chapter 3.
Planning for Contingencies
ISA 562 Internet Security Theory & Practice
David N. Wozei Systems Administrator, IT Auditor.
Business Continuity & Disaster recovery
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1. 2 Cost to Recover Time to Recover Last Backup Work Backlog Created Lost Data Recovery Operations Time Cost Disaster Recovery Time Frame Reconstruct.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Presenter’s Name June 17, Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Contingency Planning.
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
SecSDLC Chapter 2.
Risk Identification and Risk Assessment
Lecture5 : Contingency planning Lecturer: Kawther Abas 25/12/ CS – Management of Programming Projects.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Business Continuity Disaster Planning
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Contingency Planning. Objectives Upon completion of this material, you should be able to: –Recognize the need for contingency planning –Describe the major.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Business Continuity Planning 101
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Headquarters U.S. Air Force
THINK DIFFERENT. THINK SUCCESS.
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Disaster and Emergency Planning
Alabede, Collura, Walden, Zimmerman
Berry College Disaster Recovery Soft Exit
Fundamentals of a Business Impact Analysis
Audit Planning Presentation - Disaster Recovery Plan
Personal Introduction
Continuity Guidance Circular Webinar
Project Management Process Groups
Business Impact Analysis
Business Continuity Program Overview
Cyber Security in a Risk Management Framework
Unit 14 Emergency Planning IS 235
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Central New York HEALTH EMERGENCY PREPAREDNESS COALITION
Conducting a Business Impact Analysis (BIA)
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

INTRODUCTION TO CONTINGENCY PLANNING 2 Management of Information Security, 5th Edition, © Cengage Learning

Introduction This chapter focuses on planning for unexpected adverse events, when the use of technology is disrupted and business operations come close to a standstill An organization’s ability to weather losses caused by an unexpected event depends on proper planning and execution, without which an unexpected event can cause severe damage to an organization’s information resources and assets from which it may never recover According to the Hartford insurance company, over 40% of businesses that don't have a disaster plan go out of business after a major loss 3 Management of Information Security, 5th Edition, © Cengage Learning

Fundamentals of Contingency Planning The overall planning for unexpected adverse events is called contingency planning (CP) It is how communities of interest position their organizational units to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets The main goal of CP is to restore normal modes of operation with minimum cost and disruption to normal business activities after an unexpected adverse event 4 Management of Information Security, 5th Edition, © Cengage Learning

Fundamentals of Contingency Planning CP consists of four major components: – Business impact analysis (BIA) – Incident response plan (IR plan) – Disaster recovery plan (DR plan) – Business continuity plan (BC plan) Depending on the organization’s size and business philosophy, IT and InfoSec managers can either – create and develop these four CP components as one unified plan or – create the four separately in conjunction with a set of interlocking procedures that enable continuity 5 Management of Information Security, 5th Edition, © Cengage Learning

NIST CP Methodology Once formed, the contingency planning management team (CPMT) begins developing a CP document, for which NIST recommends using the following steps: 1.Develop the CP policy statement - A formal policy provides the authority and guidance necessary to develop an effective contingency plan 2.Conduct the BIA - The BIA helps identify and prioritize information systems and components critical to supporting the organization’s mission/business processes. A template for developing the BIA is provided to assist the user 3.Identify preventive controls - Measures taken to reduce the effects of system disruptions can increase system availability and reduce contingency life cycle costs 6 Management of Information Security, 5th Edition, © Cengage Learning

NIST CP Methodology (cont). 4.Create contingency strategies - Thorough recovery strategies ensure that the system may be recovered quickly and effectively following a disruption 5.Develop a contingency plan - The contingency plan should contain detailed guidance and procedures for restoring damaged organizational facilities unique to the each business unit’s impact level and recovery requirements 6.Ensure plan testing, training, and exercises - Testing validates recovery capabilities, whereas training prepares recovery personnel for plan activation and exercising the plan identifies planning gaps; combined, the activities improve plan effectiveness and overall organization preparedness 7.Ensure plan maintenance - The plan should be a living document that is updated regularly to remain current with system enhancements and organizational changes 7 Management of Information Security, 5th Edition, © Cengage Learning

Contingency Planning Policy Components An introductory statement of philosophical perspective by senior management A statement of the scope and purpose of the CP operations A call for periodic risk assessment and BIA by the CPMT A description of the major components of the CP A call for, and guidance in, the selection of recovery options and business continuity strategies 8 Management of Information Security, 5th Edition, © Cengage Learning

Contingency Planning Policy (cont.) A requirement to test the various plans on a regular basis Identification of key regulations and standards that impact CP planning and a brief overview of their relevancy Identification of key individuals responsible for CP operations An appeal for support to the individual members of the organizations Additional administrative information 9 Management of Information Security, 5th Edition, © Cengage Learning

Individuals and Teams involved in CP The CPMT including: – Champion – Project Manager – Team Members Business managers Information technology managers Information security managers IR Team DR Team BC Team 10 Management of Information Security, 5th Edition, © Cengage Learning

Components of CP The business impact analysis (BIA) is the first phase of the CP process One of the fundamental differences between a BIA and risk management is that risk management focuses on identifying the threats, vulnerabilities, and attacks to determine which controls can protect the information The BIA assumes that these controls have been bypassed, have failed, or have otherwise proved ineffective, that the attack succeeded, and that the adversity that was being defended against has come to fruition 11 Management of Information Security, 5th Edition, © Cengage Learning

Components of Contingency Planning 12 Management of Information Security, 5th Edition, © Cengage Learning

Major Tasks in Contingency Planning 13 Management of Information Security, 5th Edition, © Cengage Learning

Business Impact Analysis (BIA) The BIA begins with the prioritized list of threats and vulnerabilities identified in the risk management process and enhances the list by adding the information needed to respond to the adversity When undertaking the BIA, the organization should consider: – Scope – Plan – Balance – Know the objective – Follow-up 14 Management of Information Security, 5th Edition, © Cengage Learning

Business Impact Analysis (BIA) According to NIST SP , Rev. 1, the CPMT conducts the BIA in three stages: 1.Determine mission/business processes and recovery criticality 2.Identify resource requirements 3.Identify recovery priorities for system resources 15 Management of Information Security, 5th Edition, © Cengage Learning

1.Determine mission/business processes and recovery criticality. The first major BIA task is the analysis and prioritization of business processes within the organization, based on their relationship to the organization’s mission Each business department, unit, or division must be independently evaluated to determine how important its functions are to the organization as a whole A weighted analysis table (a.k.a. weighted factor analysis) can be useful in resolving the issue of what business function is the most critical One useful tool in identifying and collecting information about business functions for the analysis is the BIA questionnaire 16 Management of Information Security, 5th Edition, © Cengage Learning

Business Process and Recovery Criticality Recovery time objective (RTO) - the maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources, supported mission/business processes, and the MTD Recovery point objective (RPO) - “the point in time, prior to a disruption or system outage, to which mission/business process data can be recovered (given the most recent backup copy of the data) after an outage” 17 Management of Information Security, 5th Edition, © Cengage Learning

Business Process and Recovery Criticality Maximum Tolerable Downtime (MTD) - “the total amount of time the system owner/authorizing official is willing to accept for a mission/business process outage or disruption and includes all impact considerations” Work Recovery Time (WRT) - the amount of effort (expressed as elapsed time) that is necessary to get the business function operational AFTER the technology element is recovered (as identified with RTO). WRT typically involves the addition of nontechnical tasks required for the organization to make the particular information asset usable for its intended business function again 18 Management of Information Security, 5th Edition, © Cengage Learning

RTO vs RPO 19 Management of Information Security, 5th Edition, © Cengage Learning

RTO, RPO, MTD and WRT 20 Management of Information Security, 5th Edition, © Cengage Learning

Cost Balancing 21 Management of Information Security, 5th Edition, © Cengage Learning

Information Asset Prioritization As the CPMT conducts the BIA, it will be assessing priorities and relative values on mission/business processes To do so, it needs to understand the information assets used by those processes as the presence of high-value information assets may influence the valuation of a particular business process Normally, this task would be performed as part of the risk- assessment function within the risk management process The organization should identify, classify, and prioritize its information assets, placing classification labels on each collection or repository of information in order to better understand its value and to prioritize its protection 22 Management of Information Security, 5th Edition, © Cengage Learning

2. Identify recovery requirements. Once the organization has created a prioritized list of its mission/business processes, it needs to determine what resources would be required in order to recover those processes and the assets associated with them For each process (and information asset) identified in the previous BIA stage, the organization should identify and describe the relevant resources needed to provide or support that process A simplified method for organizing this information is to put it into a resource/component table 23 Management of Information Security, 5th Edition, © Cengage Learning

Resource/Component Table 24 Management of Information Security, 5th Edition, © Cengage Learning

3. Identify recovery priorities for system resources. The last stage of the BIA is prioritizing the resources associated with the mission/business processes, which provides a better understanding of what must be recovered first, even within the most critical processes With the information from previous steps in hand, the organization can create additional weighted tables of the resources needed to support the individual processes In addition to the weighted tables described earlier, a simple valuation and classification scale, such as Primary/Secondary/Tertiary, or Critical/Very Important/Important/Routine can be used to provide a quicker method of valuating the supporting resources 25 Management of Information Security, 5th Edition, © Cengage Learning

Contingency Planning Policies Prior to the development of each of the types of CP documents outlined in this chapter, the CP team should work to develop the policy environment that will enable the BIA process and should provide specific policy guidance toward authorizing the creation of each of the planning components (IR, DR, and BC) These policies provide guidance on the structure of the subordinate teams and the philosophy of the organization, and they assist in the structuring of the plan Just as the enterprise InfoSec policy defines the InfoSec roles and responsibilities for the entire enterprise, each of the CP documents is based on a specific policy that defines the related roles and responsibilities for that element of the overall CP environment within the organization 26 Management of Information Security, 5th Edition, © Cengage Learning