Information security planning By: Ungana-Afrika Copyright: Creative Commons Attribution-NonCommercial-ShareAlike ItrainOnline MMTK Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Session overview Provide basic understanding of the process for information security planning Furnish the participants with enough knowledge for them to be able to facilitate the planning process for an organisation Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Contents Group Exercise Overview Process Preparation Phase Introduction Phase Assessment Phase Break Process (cont.) Planning Phase Evaluation Phase Update Phase Group Exercise Closing Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Setting the scene Group Exercise 1 Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Information security planning Process, not a product End products Information security plan Policy documents Most of the organisations can combine information security planning into strategic technology planning Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Inputs for technology planning Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Inputs for information security planning Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Process Core phases Introduction Assessment Planning High-level process same for both technology and information security planning Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Preparation phase Basic requirements before starting the process Knowledge of ICT Security, NGO Sector, etc Understanding of the process, basic tools and templates Exercise Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Introduction phase Buy-in from the organisation Agenda for a visit Introduction of information security and planning Objectives of the process Roles and requirements during the process Planned timeline Composition of an information security team Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Introduction phase (2) Information security team Team with broad knowledge of organisations programs and security processes Committed to implement Collect valuable information Strategic and Operational plans, policies, ICT infrastructure description, etc. Exercise Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Assessment phase Before planning you should know the direction as well as current position Information Security Needs Current state of the information security from an objective perspective Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Assessment phase Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Identify and assess assets Assets are anything of value to your organization: computer hardware and software, information… Once assets have been identified, rank their importance as low, medium and high Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Identify threats A threat is “anyone or anything that can exploit a vulnerability to obtain, alter, or deny access to an asset” (Vishal Visintine, 2003) Threats can be natural or human, intentional or unintentional: floods, user error, cracking… Rate seriousness of threats as low, medium, high Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Identify vulnerabilities A vulnerability is “anything that could be exploited to gain or deny access to an asset or otherwise compromise an asset” (Vishal Visintine, 2003) E.g. not running anti-virus software and lack of staff awareness are vulnerabilities Network vulnerability scanning tools Survey staff skills to see where lack of knowledge creates vulnerabilities Rank vulnerabilities as low, medium, high Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Identify safeguards/barriers Identify what is currently being done to protect your assets – for example physical barriers to computer theft, policies, firewalls etc. Exercise Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Assessment - conclusion After the assessment process the information security team should have an understanding where the organisation stands now (what works, what doesn't work, etc.) Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Break Training will continue after <x> minutes Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Risk assessment Risk is “a combination of the asset value, the vulnerabilities with respect to the asset, and the threats that can exploit the vulnerabilities. If all are high, then the risk is high” (Vishal Visintine, 2003). Relative Risk = Asset Value x Vulnerability x Threat Focus on the most critical assets and the most likely threats. Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Planning phase Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Determine safeguards and barriers required After prioritizing risks, decide what steps are needed to reduce the risks, e.g. software, hardware, physical measures, policies, training… Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Costs, timelines and responsibilities Estimate how long each step will take and what it will cost Decide who will be responsible for meeting each objective Think about Hardware Software Setup charges (wiring, furniture, facility modifications) Ongoing service fees Service contracts and maintenance Insurance Operating expenses Personnel costs (in-house support staff, consultants) Staff development and training Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Final implementation plan Cost was not taken into account when prioritizing threats and risks Now, weigh up costs – for each objective decide whether it’s worth the time, money and effort Document plan Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Evaluation phase Ongoing evaluation is important Implementation team should meet regularly and assess progress and effectiveness Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Update phase Risks change over time Regular assessment of the existing security barriers, policies, and skills needed Especially important for high-risk organisations Possible triggers New program areas New technologies Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
Information security planning: ongoing process Group Exercise 2 Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org
ItrainOnline MMTK www.itrainonline.org Closing Final comments, questions and thoughts Sunday, 14 April 2019Sunday, 14 April 2019 ItrainOnline MMTK www.itrainonline.org