Best Practices Tutorial

Slides:



Advertisements
Similar presentations
K. F. Rauscher November 2004 C Q R Welcome IEEE COMMUNICATIONS SOCIETY Emergency Power Conference Monday, November 22, 2004 Bell Labs Network Reliability.
Advertisements

Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Best Practices Tutorial
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Contractor Code of Business Ethics and Conduct Laura K. Kennedy Senior Vice President, Ethics and Compliance SAIC.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
The Islamic University of Gaza
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Best Practices Tutorial The primary objective of Best Practices is to provide guidance, based on assembled industry expertise and experience, to improve.
Review of Power Blackout on Telecom P. J
Introduction to Information System Development.
Part of a Broader Strategy
Copyright 2005 Welcome to The Great Lakes TL 9000 SIG TL 9000 Requirements Release 3.0 to Release 4.0 Differences Bob Clancy Vice President, BIZPHYX,
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Information ITIL Technology Infrastructure Library ITIL.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
ESF #2 Communications.
Web-centric BusinessNRIC V – February 27, 2001 NRIC V Council Meeting - February 27, 2001 Focus Group 2.B1 Network Reliability - Data Reporting & Analysis.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
December 6, 2002 M. Roden / D. Dautel FOCUS GROUP 1C Public Safety Report to NRIC VI Council December 6, 2002 Co-Chairs Mike Roden - Cingular Wireless.
Working Group 8 – E9-1-1 Best Practices March 6, 2013 Robin Howard Chair WG 8 – E9-1-1 Best Practices.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
North American Network Operations Group (NANOG) October 23, 2000 Washington, DC PJ Aduskevicz AT&T.
Presentation to ISSD Task Force INFORMATION SYSTEMS SECURITY DIVISION Reorganization Study Prepared: May 6, 1991 Revised: May 7, 1991.
Working Group 8 – E9-1-1 Best Practices June 6, 2012 Robin Howard Chair WG 8 – E9-1-1 Best Practices.
Working Group 8 – E9-1-1 Best Practices September 23, 2011 Robin Howard Chair WG 8 – E911 Best Practices.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
2 Gordon Barber March 14, 2003 Focus Group Committee Chairs F Cable: John Thrower (Cox Communications) F CLECs: Robert Smith (McLeod USA) F Equipment.
Working Group 8 – E9-1-1 Best Practices December 16, 2011 Robin Howard Chair WG 8 – E911 Best Practices.
2 Gordon Barber March 14, 2003 Focus Group Committee Chairs F Cable: John Thrower (Cox Communications) F CLECs: Robert Smith (McLeod USA) F Equipment.
Business Continuity Disaster Planning
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
SHE Requirements Clarification Meeting Date:17 November 2014 Compiled: Nompumelelo Kaule.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information ITIL Technology Infrastructure Library ITIL.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Strategy for Complex Networking, IT, & Telecommunication Decisions
Information Technology (IT) Department
ATIS Emergency Services Interconnection Forum (ESIF)
CIS 349 Competitive Success/snaptutorial.com
CIS 349 Education for Service/snaptutorial.com
CIS 349 Teaching Effectively-- snaptutorial.com
2017 Health care Preparedness and Response Draft Capabilities
Focus Group Committee Chairs
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Oman Experience on Telecommunications Emergency Plan
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Cybersecurity ATD technical
DATA CENTERS C21 Engineering Consultancy Services for Telecom Industry
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Lecture 10: FCC Organization, Power and Structure
Emergency Telecommunications Cluster
Best Practices Tutorial
Presentation transcript:

Best Practices Tutorial The primary objective of Best Practices is to provide guidance, based on assembled industry expertise and experience, for network reliability and resiliency June 2019

Best Practices Guidelines Proven through actual implementation – more than “just a good idea” Address classes of problems (rather than one time issues) A single concept should be captured in each practice (one thought, one practice) Should not endorse specific commercial documents, products or services Developed through rigorous deliberation and expert consensus Confirmed by a broad set of stakeholders Should not be assumed to be applicable in all situations or to all industry types Does not imply mandatory implementation

Best Practice Format All Best Practices should follow the format of: 1st blank “Who”: consists of the implementer (i.e., Network Operators, Service Providers, Equipment Suppliers, Property Managers, Public Safety, Government) 2nd blank “What”: consists of the Best Practice. The Best Practice may include the use of a modifier after the word “should” (e.g., Network Operators should consider, etc.)

Best Practice Example Modifier Second Blank- WHAT First Blank- WHO Network Operators, Service Providers and Equipment Suppliers should ensure that all network infrastructure equipment meets the minimum requirements of ANSI T1.319 (fire resistance). In order to prevent fire. GR63 NEBS Requirements: Physical Protection, Telcordia at http://telecom-info.telcordia.com/site-cgi/ido/docs2.pl?ID=170086171&page=home; ATIS-0600319.2008 Equipment Assemblies--Fire Propagation Risk Assessment Criteria at http://www.atis.org/docstore Supporting information, found in Reference section. Should be located in reference section. Does not belong in actual BP.

Best Practice Numbering Format For existing NRIC/CSRIC Best Practices: Each Best Practice has a unique number that follows the numbering format: XX - YY - Z # # # XX = the current, or most recent, NRIC/CSRIC Council (e.g., 8 in 2009-2010) YY = the Council in which the Best Practice was last edited Z = 0 and 4 for Network Reliability and Interoperability 1 for Disaster Recovery and Mutual Aid 3 for Public Safety 5 for Physical Security 8 and 9 for Cyber Security # # # = any digits, where every Best Practice has a unique Z # # #   XX-YY-ZZZZ NRIC III 1 NRIC IV 2 NRIC V 3 NRIC VI 4 NRIC VII 5 NRIC VIII 6 CSRIC I 7 CSRIC II 8 CSRIC III 9 CSRIC IV 10 CSRIC V 11 CSRIC VI 12

Other Considerations For each new Best Practice (BP) identify: Recommended Category Recommended Category (for number assignment purposes) Public Safety & Disaster Standard Network Reliability and Interoperability Industry Role(s) Disaster Recovery and Mutual Aid Public Safety Network Type(s) Physical Security Applicable Keyword(s) Cyber Security Reference/Comments

Best Practice Network Types Cable An entity that provides communications through direct connectivity, predominantly by coaxial cable or optical fiber, between the serving central office and end user location(s). Internet/Data An entity that provides internet and/or data communications through direct connectivity, predominantly by wire, coaxial cable, or optical fiber, between facilities-based and non-facilities-based serving networks and end user location(s). Satellite An entity that provides communications through satellite connectivity. Wireless An entity that provides communications through radio spectrum allocation and/or CMRS networks between the mobile switching center(s) and end users. Wireline An entity that provides communications through direct connectivity, predominantly by wire or optical fiber, between the serving central office and end user location(s).

Best Practices Industry Roles Network Operators An entity responsible for the operation, administration, maintenance, and provisioning (OAM&P) of communications networks. Service Providers An entity responsible for providing communications services for consumer and business customers. Equipment Suppliers An organization whose business is to supply network operators and service providers with equipment or software required to render reliable network service. Property Managers An entity responsible for the operation of a physical location that houses communications equipment. Public Safety An entity that administers and/or operates a Public Safety Answering Point (PSAP) or the public safety network.   Government A federal, state, tribal, or local government agency.

Categories Public Safety & Disaster Standard Best Practices that are deemed vital for 911 mechanisms (e.g., keeps 911 up) and those that promote wide spread recovery following a disaster. Standard All other Best Practices.

Best Practices Recommended Keywords Access Control Cyber Security Limiting and/or documenting physical access to buildings, equipment and/or systems. The protection of information and systems against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. Buildings Disaster Recovery Physical structures that house communications equipment or employees. Steps taken after an emergency event has occurred to recover from the event. Business Continuity Documentation Corporate wide program that has been established for the purpose of internal planning for and responding to emergency situations impacting services, employees or assets. Information concerning the operation/location of communications equipment and networks. This DOES NOT necessarily include everything written but may include information in a draft format. Contractors & Vendors Non-employees working on behalf of the company or providing goods/services (not visitors). Emergency Preparedness Corporate Ethics Steps taken prior to an emergency event occurring that will facilitate the restoration from the event. Corporate values and integrity for organizations supporting public communications infrastructure. Encryption Steps taken to make data unusable to any other person(s) or system(s) other than for whom it is intended.

Best Practices Recommended Keywords (cont’d) Facilities-Transport Information Protection Interoffice facilities used to carry communications (e.g., copper, fiber, free space). Safeguarding the confidentiality and integrity of a company’s proprietary information. Fire Intrusion Detection Actions taken to alert users or administrators when an unauthorized entity has attempted or has succeeded in accessing a system or database. This denotes cyber intrusion and does not cover physical intrusion. Preventing, controlling, or extinguishing combustion of materials at or near telecommunications equipment. Guard Force People tasked for safeguarding facilities, physical assets, and personnel. Liaison Maintaining communications through a working relationship with other entities. Hardware Material Movement Equipment used to support communications networks. Physical movement of materials (i.e., logistics). Human Resources Network Design Processes and procedures relating to personnel within a company. Planning and configuration of communication networks. Network Element Industry Cooperation Unique equipment that is a component of a network. Collaboration between separate business entities.

Best Practices Recommended Keywords (cont’d) Network Interoperability Procedures Interaction of networks that must work together to provide communications. Instructions for specific tasks. Public Safety Network Operations Related to emergencies and 9-1-1 services used by individuals or corporations. Tasks required to operate a network. Network Provisioning Security Systems Steps taken to activate equipment/services in a network. Hardware/Software devices specifically used to monitor and control security. Pandemic Related to the preparation or reaction to wide-spread epidemic or epidemic in a specific area. Software Code specific to running communications equipment. Physical Security Management Supervision Anything having to do with safeguarding the physical assets of the corporation. Direct management of tasks workers. Technical Support Policy Providing assistance in installing, maintaining, or restoring equipment. High level management statements of a desired condition (not detailed procedures). Training & Awareness Power Company provided instruction or other means of education on specific topics. Electrical systems (AC/DC) used to operate communications equipment. Visitors Individuals who are not employees/contractors/vendors.

FCC Best Practices Website Direct link: https://opendata.fcc.gov/Public-Safety/CSRIC-Best-Practices/qb45-rw2t/data (url last validated 6/3/19) Also linked on NORS webpage: https://www.fcc.gov/network-outage-reporting-system-nors

ATIS Best Practices Website

NRSC Membership To learn more about NRSC initiatives and the advantages of participating through ATIS, please contact: Jackie Wohlgemuth, ATIS Senior Manager - Global Standards Development (jwohlgemuth@atis.org) - or - Rich Moran, Director of Membership (rmoran@atis.org) NRSC Website: http://www.atis.org/nrsc