Security measures deployed by e-communication providers

Slides:



Advertisements
Similar presentations
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Security Controls – What Works
Information Security Policies and Standards
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Computer Security: Principles and Practice
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Network security policy: best practices
Incident Response Updated 03/20/2015
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Information Systems Security Operations Security Domain #9.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Chapter 2 Securing Network Server and User Workstations.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Tax Administration Diagnostic Assessment Tool
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
The NIST Special Publications for Security Management By: Waylon Coulter.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
IAEA International Atomic Energy Agency Functional and Security Domains Presented by:
A LOOK AT AMENDMENTS TO ISO/IEC (1999) Presented at NCSLI Conference Washington DC August 11, 2005 by Roxanne Robinson.
Security and resilience for Smart Hospitals Key findings
Information Security Management Goes Global
Information Systems Security
Review of IT General Controls
Cloud Security for eHealth – Study Validation
Risk management.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Leverage What’s Out There
I have many checklists: how do I get started with cyber security?
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
IS4680 Security Auditing for Compliance
Alignment of COBIT to Botswana IT Audit Methodology
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
IS4680 Security Auditing for Compliance
Cybersecurity ATD technical
AMI Security Roadmap April 13, 2007.
Presentation transcript:

Security measures deployed by e-communication providers 21st Article13a EG meeting | Lisbon | 8 March 2017

Objectives Identify the implemented security measures and approaches of e-communication providers to mitigate the main types of incidents; Align the findings with earlier ENISA work in this area; Issue recommendations and good practices.

Methodology Online survey Interviews concise in form 48 providers (mostly EU Member States) participated Interviews several interviews to elaborate on the survey results Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)

Structure of the report Aligned with earlier ENISA work in this area Technical Guideline on Security Measures Security domain Security objectives (measures) Governance and risk management Information security policy Governance and risk management Security roles and responsibilities Security of third party access Security of systems and facilities Physical and environmental security Security of supplies Access control to network and information systems Integrity of network and information systems Operation management Operational procedures Change management Asset management Incident management Incident management procedures Incident detection capability Incident reporting and communication Business continuity management Service continuity strategy and plans Disaster recovery capabilities Monitoring, auditing and testing Monitoring and logging policies Exercise contingency plans Network and information systems testing Security assessments Compliance monitoring Security domain Human resources security was left out of the survey. Measures against DDoS attacks, for SS7 protocol were included as well as security standards used.

Main findings and conclusions 60% of providers report a very good level of compliance with ENISA security recommendations. Almost all providers have deployed a good level of basic security controls. Security of systems and facilities is an example of a security domain with a relatively high maturity of measures adopted. For other domains there is an ample room for improvement, in particular operational documentation is lower than desired. The achievement of higher maturity level is impeded by lack of sustainability mechanisms, i.e. repeatable processes and the regularly maintained documentation.

Governance and risk management Satisfactory maturity level High level information security policy in 63% of cases

Governance and risk management Only 56% providers employ risk management methodology. 60% have security requirements included in contracts with third parties. Also 60% differentiate between incidents caused internally and by third parties.

Security of systems and facilities High level of implementation of soft- and hardware based tokens for multi-factor authentication

Security of systems and facilities Offset by only a basic set of integrity controls (firewall level)

Security of systems and facilities 81% providers have measures (door locks, alarms, fire extinguishers etc.) in place to prevent unauthorized access. A solid 63% carry out a regular review of the physical security policies. The basic level of access control is implemented by vast majority of providers (in 92% cases users have unique IDs). Cross checks on access control mechanisms is performed by 48% providers.

Operations management 81% of providers follow predefined procedures for change management and 90% have the responsibilities assigned. Much lower number of providers have documented policies for these areas.

Incident management Well developed detection capabilities followed by incidents being assigned to appropriate personnel for resolution. Review and update of procedures lag behind.

Incident management On the positive side 27% use automated response based on detected deviation from normal behavior and 35% have user behavior monitoring. 52 % run in-house SOC, only 56% having SIEM systems deployed. Process-based incident detection is reported by only 23% of providers.

Business continuity management High maturity domain with 40% providers having state-of-art disaster recovery capabilities. A significant number (85%) indicate availability of remote backups and geographically dispersed fail over sites.

Monitoring, auditing and testing Another high maturity domain with a majority (90%) monitoring and testing critical system and networks. 60% have policies in place for both monitoring and testing. Main room for improvement is security scan that lags behind pre-deployment tests while it should be an integral part of testing procedure.

Security standards, frameworks and guidelines

Measures against DDoS attacks Almost 50% of providers use configurations as well as close monitoring. 38% use specialized hardware (e.g. Arbor Networks) and 4% rely on upstream providers for DDoS mitigation. ENISA Annual Incident Report for 2015: The incidents caused by malicious actions (e.g. DDoS), although there were not many of them, had most impact in terms of duration, which lasted on average almost two days per incident.

Measures for SS7 protocol High diversity of security measures implemented. About 35% deployed SS7 firewalls, less than 8 % rely on access controls to prevent unauthorized access to SS7 network. The other approaches range from monitoring, SS7 intrusion and fraud detection systems to administrative/procedural controls.

Domain evaluation SECURITY DOMAIN MATURITY LEVEL Governance and risk management Satisfactory Security of systems and facilities High Operation management Incident management Business continuity management

Recommendations (I) Security domain Specific recommendations Governance and risk management Improve governance by utilizing policy templates provided as references to develop necessary company-wide topics for all aspects of security. The starting point for proper risk management could be ISO 27005 standard to turn risk management from ad-hoc human- driven activity into the properly managed business process. Select and adopt ISO or any other risk management framework that allows to build the processes to regularly and systematically address risks registered in the lists of risks. Security of systems and facilities Improve integrity controls by a wider adoption of file and file system-level integrity controls. Pay a particular attention to automated restore of desired configuration for critical systems and to integrity control of binary and configuration files deployed on them.

Recommendations (II) Security domain Specific recommendations Operations management Adopt Service Management framework (e.g. ITIL) in particular where it describes change management. Keep in mind that change management process is tightly connected to both problem and incident management. Document de-facto processes, nominate process owners with assigned responsibility for periodic review and update of operation management documentation. Incident management Adopt Service Management framework (e.g. ITIL) in particular where incident response procedure is connected to root-cause analysis activities and subsequent incident management process. Analyze de-facto as well as documented processes for the possibility of introducing high-level incident detection controls, define incident response trigger points at process level. Assign process-based incident detection controls review to the process owner.

Recommendations (III) Security domain Specific recommendations Business continuity management Introduce regular testing and update of policies and procedures as part of semi-annual business continuity testing. Monitoring, auditing and testing Make security testing part of a pre-deployment testing procedure. Connect pre-deployment security testing with integrity controls, introduce integrity monitoring of the systems and networks. Reduce manual log analysis efforts by employing automated log review capabilities and integrate this capability with SIEM systems. Pay a particular attention to the effectiveness of automated capabilities (scanning and log review) to ensure the capability is aligned with current business requirements as it is capable to address the ever changing threat landscape.

Thank you