A proposed Security Incident Management Process for WMO Member States

Slides:



Advertisements
Similar presentations
SEA & ETC Strategic Environmental Assessment and European Territorial Cooperation programmes Annual meeting with the Managing Authorities of the ETC programmes.
Advertisements

Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Standardization Activities on Cloud Computing Kishik Park, Kangchan Lee, Seungyun Lee TTA.
Recent Changes to HDR Policy and Procedures Felicity Roddick Associate Dean Research and Innovation.
Frequently Asked Questions (FAQ) prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9.
BS EN ISO 14001:2004 Madlen King BSc MSc MIEMA EMS Lead Assessor Lloyd’s Register Quality Assurance Ltd BS EN ISO 14001:2004.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Developing a result-oriented Operational Plan Training
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Environmental Management System Definitions
CGMS-42 EUM-WP-32.ppt, v1A, 19 May 2014 Coordination Group for Meteorological Satellites - CGMS Presented to CGMS-42 Working Group IV, agenda item WGIV/9.1.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
ENF/ERO ENUM Convergence Workshop Tony Holmes Chairman ETSI SPAN11 NAR BTexact Technologies Numbering Addressing & Routeing 9-10 January 2002 Standards.
WMO Satellite Data Dissemination Strategy CGMS-43-WMO-WP-09 Jérôme Lafeuille, Stephan Bojinski and Mikael Rattenborg World Meteorological Organization.
ITU-T SG17 Q.3 Telecommunication information security management An overview Miho Naganuma Q.3/17 Rapporteur 17 March 2016.
Update on the WIS Monitoring project
How to keep WIS performance healthy
IAEA C2G Working Group 1 (Import / Export Controls, Repatriation, and National inventories / Registries) Outcome / Recommendation Summary Paul Gray & Dariusz.
Requirement for Full Global Operation on WIS Survey on the WIS Doc
GRDC Metadata Profile – the way forward
AR report to ADC 14 May 2007 Presented by Hiroyuki Ichijo (JMA)
Outcome of the ET-CTS Meeting (Toulouse, May 2008)
5th Session of the Task Team on WIGOS Metadata
MANAGEMENT INFORMATION SYSTEMS
Software Documentation
Agenda 5.11 General Regulations
WMO Integrated Global Observing System (WIGOS) 16-RA VI Side Event Helsinki, Finland, 11 September 2013 Dr Miroslav Ondráš, Dr Wenjian Zhang (WMO) Dr.
WIS overview Submitted by: Secretariat (Doc 02b)
WIGOS Pre-operational Phase
Roadmap to Enhanced Technical Regulations of WMO
Agenda item 2.3 Report of OPAG ISS Matteo dell’Acqua
Decisions on developments in Service Delivery including PWS
WMO IT Security Incident Process
5. STATUS OF THE PRIORITY AREAS IMPLEMENTATION OF THE PLAN FOR THE WIGOS PRE-OPERATIONAL PHASE (PWPP) 5.2 WIGOS Regulatory Material complemented with necessary.
Reporting personal data breaches to the ICO
Cyber-security and IEC International Standards
ET-CTS - Cache in and through the cloud Background information
WIS Strategy – Life Cycle Data Management
Doc (1) Vision for WIGOS in 2040
Communication and Consultation with Interested Parties by the RB
National Arrangements for Response to Transport Emergencies.
IP and NGN Projects in ITU-T Jean-Yves Cochennec France Telecom SG13 Vice Chair Workshop on Satellites in IP and Multimedia - Geneva, 9-11 December 2002.
Decisions and Recommendations for the
Organisation Météorologique Mondiale Pour une collaboration active dans le domaine du temps, du climat et de l’eau OMM Operating principles of the WMO.
BETTER AND PROPER ACCESS TO PACIFIC MICRODATA
ITU-T SG17 Q.3 Telecommunication information security management
Status and Plan of Regional WIGOS Center (West Asia) in
WORKING GROUP ON FOREST FIRES IN THE MEDITERRANEAN REGION
ET-CAC Report Kevin ALDER Agenda item 6-3 (1)
Decisions and Recommendations for the
JCOMM Submitted by: TT-MOWIS (Doc 03b)
ICTT-WIS 1st Session CAS perspective on WIS
Audit Criteria Mark Francis ET-WISC/TT-DC Agenda item 10
Development of common training materials
ET-WISC structure and work plan
Working with Regional Associations
District 5240 Grant Management Seminar
Introduction to CBS-16
- Measurement of traffic volume -
Topic 2 – Reform Documents 4(4) and 4(5)(Cg-18)
FUTURE INFRASTRUCTURES
Item V.11 – Discussion Managing WIS
Malcolm Johnson, Director, Telecommunication Standardization Bureau
The status and Plan in 2019 for the WIGOS centers in RA II
WIS Project Office WMO Managing WIS WIS Project Office WMO
Recent Standardization Activities on Cloud Computing
Decisions on developments in Service Delivery including PWS
Unit 14 Emergency Planning IS 235
Presentation transcript:

A proposed Security Incident Management Process for WMO Member States Rémy Giraud cbs-16@wmo.int

ET on Communication Techniques and Systems As part of our Terms of Reference: (a) Maintain and develop recommended practices and technical guidance material for data communication techniques and procedures for use in the WIS, with a view to ensuring efficient and safe operations of information systems, and inform members of recent developments in standards bodies, in particular W3C, IETF, ITU and ISO; (e) Provide guidance on the technical, operational, security, administrative and contractual aspects of data communications services for WIS implementation at national, regional and global levels, including among others satellite telecommunications, managed data communications network services, cloud services and the Internet and coordinating cooperation with other organizations where appropriate to obtain operational benefits; (l) Raise awareness of Members on the opportunities and risks associated with new infrastructure technologies;

The trigger In 2015, a Security Incident affecting one of the GISCs was reported in the press The Security Incident wasn’t, at the time, neither denied nor confirmed by the GISC As a consequence of this incident, another GISC decided the “unplug the wire” with the (potentially) affected GISC Considering how the WIS is operating this could have tremendous consequences in the successful operation of the WIS 3

The lack of coordination So far, in our set of regulations, we have no agreed way to manage such an event Even if this event was one of the first one to be reported at a global level, it is very likely to happen again In an integrated World Information System that we have now, we should have a proper Security Incident management methodology 4

The response ICT-ISS had an emergency meeting to discuss the matter. It must be noted that at the time, no one within ICT-ISS knew whether the incident was real or not and what could have been the impact ICT-ISS tasked ET-CTS to draft a proposal for a coordinate response in case of security related event ET-CTS presented the proposal mid-2016 and this is know part of the decision papers presented at CBS the way the metadata records are structured is having an impact on the usability of WIS 5

The WIS architecture

Background information The WIS, up to a point, can be seen as one large IT environment, where each member appears as one site of a larger organization Eg: The 24 hour Global Cache is a replicated database between all the GISC A compromise database is one location could compromise all instances WIS is much more integrated compare to the GTS. The GTS is a “loosely coupled” system. The store and forward of bulletin poses less risks 7

Is there an applicable model? (1) The ISO 27xxx is a set of standard practices related to IT Security, we can mention: ISO/IEC 27000 — Information security management systems — Overview and vocabulary[6] ISO/IEC 27001 — Information technology - Security Techniques - Information security management systems — Requirements. The older ISO/IEC 27001:2005standard relied on the Plan-Do-Check-Act cycle; the newer ISO/IEC 27001:2013 does not, but has been updated in other ways to reflect changes in technologies and in how organizations manage information. ISO/IEC 27002 — Code of practice for information security management ISO/IEC 27003 — Information security management system implementation guidance 8

Is there an applicable model? (2) In the standard: “Security incidents should be reported through appropriate management channels as quickly as possible. A formal reporting procedure should be established, together with an incident response procedure, setting out the action to be taken on receipt of an incident report.” This is (almost) exactly what we need! We have however some difficulties in applying straight away this model cbs-16@wmo.int 9 9

Can we apply the model? (1) The domain of applicability of the ISO 27xxx standard is within an organization Typically, in our case, that would be within the NC and (probably) the reporting process will involve the national government What we are trying to achieve here is at a much larger scale and should cover multiple organizations (the GISCs, DCPCs and NCs ) spread over the world cbs-16@wmo.int 10 10

Can we apply the model? (2) When preparing the proposal within ET-CTS, we had exchange whether the model was applicable or not. We rather quickly hit the issue of disclosure If and when an NC is facing a Security Incident what can and can’t do? There was a consensus that is many cases the national laws would forbid the NC to communicate on the occurrence of the Incident, not to mention the nature of the incident cbs-16@wmo.int 11 11

The proposal The proposal that is presented at CBS-16 is inspired by the ISO standards while at the same time recognizing that WMO and its Members is not a single organization and therefore each Member will be able to decide on a case by case basis what can and can’t be shared We are proposing a method to handle such cases Even if the ISO 27xxx standards are very interesting documents, they are a bit tough to read (!). So we have “translated” the requirements into simple flowcharts cbs-16@wmo.int 12 12

The cases covered What process should I follow if I think I have an IT Security incident? What process should I follow if I hear that another WMO member has had a possible IT Security incident? What process should I follow if am contacted by my GISC? What process should the WMO IT Security Contact Point follow? What process should the GISC follow? cbs-16@wmo.int 13 13

What process should I follow if I think I have an IT Security incident? cbs-16@wmo.int 14 14

The document and some background information The topic is introduced in CBS-16/Doc. 5.5(2) The full text is available at ICTT-WIS review of Draft Security Incidents - http://wis.wmo.int/file=3007 The story that triggered this effort as we know it late 2016: http://www.abc.net.au/news/2016-10-12/bureau-of-meteorology-bom-cyber-hacked-by-foreign-spies/7923770 cbs-16@wmo.int 15 15

Thank you Merci cbs-16@wmo.int