Information Security Management Goes Global

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

A Joint Code of Practice Objectives and Summary Presentation
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
ISMS standards and control processes ISO27001 & ISO27002
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
ISO Information Security Management
Security Controls – What Works
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
23 January 2003© All rights Reserved, 2002 Understanding Facilitated Risk Analysis Process (FRAP) and Security Policies for Organizations Infocomm Security.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Session 3 – Information Security Policies
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
BS Information Security Management  & 4 August 2000 Brasilia Peter Restell Business Programme Manager Responsible for: BS & 2 c-cure.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
Overview of Systems Audit
Information Security Issues at Casinos and eGaming
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Appendix C: Designing an Operations Framework to Manage Security.
Engineering Essential Characteristics Security Engineering Process Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
ISO/IEC 27001:2013 Annex A.8 Asset management
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Principles Identified - UK DfT -
Information Systems Security
CS457 Introduction to Information Security Systems
Risk management.
Security measures deployed by e-communication providers
Cybersecurity - What’s Next? June 2017
Design for Security Pepper.
Magister Sistem Informasi UNIKOM
Information Security Awareness
Cybersecurity Policies & Procedures ICA
Introduction to the Federal Defense Acquisition Regulation
Information Security: Risk Management or Business Enablement?
INFORMATION SYSTEMS SECURITY and CONTROL
IS4680 Security Auditing for Compliance
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Anatomy of a Common Cyber Attack
Presentation transcript:

Information Security Management Goes Global Business continuity Corporate governance Compliance with legislation Information assets Policy & procedures Management of risk Incident handling Best practice Protecting on-line business Managing 3rd party access Information Security Management Goes Global Ted Humphreys XiSEC

Information Security Management Global Business Objectives Ensuring business continuity Minimise business damage Maximise return on investments These global objectives of information security management are also stated in ISO/IEC 17799

Information Security Management Achieving the objectives by managing the risk

Assessing the Risk Risk is the potential that a threat will exploit a vulnerability and cause damage or loss to an asset The assessment includes: the value of the asset the level of corresponding vulnerabilities the likelihood of the relevant threats existing and planned controls which protect the asset

Managing the Risks Expenditure on information security needs to be balanced against and appropriate to The business value of the information and other business assets at risk, and The business harm/impact likely to result from security failures

Managing the Risk Risk acceptance Ignoring the risks Risk avoidance Risk transfer Risk reduction

Managing the Risks with Controls Reduce the vulnerabilities Reduce/eliminate the weaknesses Reduce the likelihood of occurrence Reduce/eliminate the cause Minimise the probability by preventative measures Reduce the consequences of impact Ensuring effective monitoring Taking steps to prevent, minimise or contain impact.

Information Security Management Targets Access control, user identification & authentication, encryption, digital signatures,message authentication, backups, capacity planning, regular maintenance, virus protection software, information handing procedures, physical security etc Means of achieving targets Preserving the Confidentiality, Integrity/ authenticity & Availability of information

What is ISO/IEC 17799? NOT IT Security Its about Information Security A risk based approach for defining policy & procedures & selection of appropriate controls to manage risk Its a standard on best practice for information security management

Who looks after ISO/IEC 17799? 17799 is managed and maintain by ISO/IEC JTC 1/ SC 27 WG1 WG1 Convenor Ted Humphreys Editors Angelika Plate and Oliver Weissmann

WG1 managing 1st revision due 200x Some ISO/IEC 17799 History WG1 managing 1st revision due 200x ISO/IEC 17799: 2000 BS 7799 Part 1: 1999 BS 7799 Part 1: 1995

What’s in ISO/IEC 17799? The Chapters Security policy Security organisation Asset classification & control Business continuity Personnel security Physical & environmental security Access control Compliance Communications & operations management Systems development & maintenance Security policy Security organisation Asset classification & control Physical & environmental security Communications & operations management Systems development & maintenance Personnel security Access control Business continuity Compliance

ISO/IEC 17799 Chapter Structure Control Objective Control satisfies the requirements of the objective Control Advice and help on implementation of the control Implementation Guidance Other supporting help and information Other Information

Control Example External facilities management The risks of using external facilities management services should be identified in advance, and appropriate controls agreed with the contractor, and incorporated into the contract. Implementation Guidance Particular issues that should be addressed include:   a)  Identifying sensitive or critical applications better retained in-house, b)   Obtaining the approval of business application owners, c)   Implications for business continuity plans, d)  Security standards to be specified, and the process for measuring compliance, e)  Allocation of specific responsibilities and procedures to effectively monitor all relevant security activities,responsibilities and procedures for reporting and handling security incidents Other Information The use of an external contractor to manage information processing facilities may introduce potential security exposures, such as the possibility of compromise, damage, or loss of data at the contractor’s site. See also 4.2.2 and 4.3 for guidance on third party contracts involving access to organizational facilities and outsourcing contracts

ISO/IEC 17799 Policies & Procedures Information security policy Access control Use of e-mail, Internet services & network connections Use of mobile computing

ISO/IEC 17799 Policies & Procedures Security incident handling Business continuity Operational procedures Change control Housekeeping Information handling System acceptance

ISO/IEC 17799 Organisational Security To manage information security within the organisation Security Forum Allocation of roles and responsibilities Co-ordination Security of 3rd party access Outsourcing, managed services etc Security conditions in contracts

ISO/IEC 17799 Asset Control Accountability of assets To maintain an asset inventory Information classification Information handling procedures Maintain appropriate protection of assets Asset ownership and security responsibilities Delegation & accountability Outsourcing, managed services etc

ISO/IEC 17799 Operations Management Procedures to ensure correct and secure operation Minimise the risk of system failures Safeguard the integrity of company information and software Maintain the integrity and availability of company services

ISO/IEC 17799 Operations Management Ensure the protection of supporting system and networking infrastructures Prevent damage to computer media Incident management procedures System and capacity planning and acceptance Malicious software Backups

ISO/IEC 17799 – Security Incidents Responding to incidents To minimise the damage from security incidents, system malfunctions, software weaknesses, virus attacks, denial of service attacks, breaches of law, data theft etc Monitoring, detecting, reporting, responding to and learning from security incidents

ISO/IEC 17799 Controlling Access To control access to the company’s information based on agreed access control policy and procedures User access management User registration User responsibilities, rights and privileges, review

ISO/IEC 17799 Controlling Access Access policy, procedures and technical controls Network services (internal and external), Web sites etc Computer systems Applications On-site and off-site (remote) access Monitoring system access and use

ISO/IEC 17799 Systems Dev/Maintenance Building security into the company’s systems and processes Application systems Input/output data validation Internal processing validation Cryptographic mechanisms Non-cryptographic mechanisms

ISO/IEC 17799 Systems Dev/Maintenance Building security into the company’s systems and processes System files Control of software and protection of test data Development and support environments Change control procedures Review of operating system changes Restrictions on software changes

ISO/IEC 17799 Business Continuity To protect critical company processes and assets and to counteract interruptions to business activities from the effects of system failures, serious breaches of security, disasters etc

ISO/IEC 17799 Business Continuity A managed planning process should be in place Procedures (for handling customers/suppliers, relocation, emergency control, fallback, resumption and recovery etc) should be developed and regularly tested Plans and procedures should be regularly reviewed and updated as necessary

ISO/IEC 17799 Compliance Compliance with legislation and contractual requirements To avoid breaches of any statutory, criminal or civil obligations and related security requirements

In Summary - Why use ISO/IEC 17799? Ensure business continuity Minimise business damage & protect business assets Maximise return on investments & business opportunities Good corporate governance “fit to manage risk”

Q&A Gestão da Segurança da Informação Riktlinjer för ledning av informationssäkerhet Leitfaden zum Management von Informationssicherheit Managementsystem voor informatiebeveiliging Q&A La sécurité informatique Gestão da Segurança da Informação