Secure Systems Research Group - FAU Process Standards (and Process Improvement)

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

Module 1 Evaluation Overview © Crown Copyright (2000)
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Cloud computing security related works in ITU-T SG17
ISMS standards and control processes ISO27001 & ISO27002
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Overview of IS Controls, Auditing, and Security Fall 2005.
Auditing Computer-Based Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
ISO Information Security Management
Security Controls – What Works
Information Security Policies and Standards
Spreadsheet Management. Field Interviews with Senior Managers by Caulkins et. al. (2007) report that Spreadsheet errors are common and have been observed.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
SOX & ISO Protect your data and be ready to be audited!!!
Session 3 – Information Security Policies
Fraud Prevention and Risk Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Spreadsheet Management. Sarbanes-Oxley Act (SOX, 2002) Requires “an effective system of internal control” for financial reporting in publicly- held companies.
Fundamentals of ISO.
SEC835 Database and Web application security Information Security Architecture.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Storage Security and Management: Security Framework
Overview of Systems Audit
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Information Systems Security Computer System Life Cycle Security.
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
1 User Policy (slides from Michael Ee and Julia Gideon)
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Information Security What is Information Security?
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
ISO/IEC 27001:2013 Annex A.8 Asset management
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
The common structure and ISO 9001:2015 additions
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Information Security tools for records managers Frank Rankin.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Information Security Management Goes Global
Risk management.
Fundamentals of Information Systems, Sixth Edition
Information Security Awareness
Introduction to the Federal Defense Acquisition Regulation
INFORMATION SYSTEMS SECURITY and CONTROL
TEL382 Greene Chapter 5.
How to conduct Effective Stage-1 Audit
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Secure Systems Research Group - FAU Process Standards (and Process Improvement)

Secure Systems Research Group - FAU Wireless Security Survey Update Standard Format for all Protocols Identity Authentication Session key Message/data encryption DoS, Location detection Discussion of strengths & vulnerabilities Discussion of planned enhancements

Secure Systems Research Group - FAU Example for GSM Identity: –Fixed identity (IMSI) used when first turned on –Temporary identity (TMSI) given when turned on and other times –128bit authentication key (Ki) – {IMSI, Ki} in removable SIM card and known to provider Authentication: –128bit challenge/32bit response, A3 algorithm using Ki A3 unspecified, providers typically use Comp-128 for A3 Session key: –64bit cypher key (Kc) Kc computed in client with A8 algorithm using challenge and Ki Kc given to base station by provider A8 unspecified, common for last 10 or more bits to be zero Message/Data Encryption: –A5 114bit stream cypher using Kc and 22bit frame number A5/1 for use in Europe A5/2 for export A5/3 based on Kasumi now available Decryption at level ?? of protocol stack in base station Location detection –Possible by triangulation, but identity changes

Secure Systems Research Group - FAU Additions New Protocols –WiMax and Mobile WiMax –EV-DO –New military wireless protocols New domains –Vehicle system wireless (as a variant of shopfloor) Map of spectrum usage Updates (i.e., wrt. advances in cryptography)

Secure Systems Research Group - FAU ISO/IEC 17799:2005(E) Information technology — Security techniques — Code of practice for information security management Second edition

Secure Systems Research Group - FAU Intent of the Standard “This International Standard establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization.” “The control objectives and controls of this International Standard are intended to be implemented to meet the requirements identified by a risk assessment. This International Standard may serve as a practical guideline for developing organizational security standards and effective security management practices and to help build confidence in inter-organizational activities.”

Secure Systems Research Group - FAU 39 Categories in 11 Clauses 5.Security Policy (1) 6.Organizing Information Security (2) 7.Asset Management (2) 8.Human Resources Security (3) 9.Physical and Environmental Security (2) 10.Communications and Operations Management (10) 11.Access Control (7) 12.Information Systems Acquisition, Development and Maintenance (6) 13.Information Security Incident Management (2) 14.Business Continuity Management (1) 15.Compliance (3)

Secure Systems Research Group - FAU Structure of a Category a control objective stating what is to be achieved; one or more controls that can be applied to achieve the control objective. Control descriptions are structured as follows: a.Control: Defines the specific control statement to satisfy the control objective. b.Implementation guidance: Provides more detailed information to support the implementation of the control and meeting the control objective. c.Other information: Provides further information that may need to be considered, for example legal considerations and references to other standards.

Secure Systems Research Group - FAU Applicable to development? (Section #: topic covered) 5: Security policy 8: Human resources security 10: Communications and operations management 11: Access control (i.e., to source code) 13.2: Management of information security incidents and improvements

Secure Systems Research Group - FAU 12. Information systems acquisition, development and maintenance 12.1 Security requirements of information systems 12.2 Correct processing in applications 12.3 Cryptographic controls 12.4 Security of system files 12.5 Security in development and support processes 12.6 Technical Vulnerability Management

Secure Systems Research Group - FAU 12.2 Correct processing in applications Objective: To prevent errors, loss, unauthorized modification or misuse of information in applications. Controls should include the validation of input data, internal processing and output data The design and implementation of applications should ensure that the risks of processing failures leading to a loss of integrity are minimized. Specific areas to consider include:

Secure Systems Research Group - FAU 12.5 Security in development and support processes Objective: To maintain the security of application system software and information Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Information leakage Outsourced software development

Secure Systems Research Group - FAU Change control procedures The implementation of changes should be controlled by the use of formal change control procedures. Introduction of new systems and major changes to existing systems should follow a formal process of documentation, specification, testing, quality control, and managed implementation.

Secure Systems Research Group - FAU Change control procedures c) reviewing controls and integrity procedures to ensure that they will not be compromised by the changes; d) identifying all software, information, database entities, and hardware that require amendment; e) obtaining formal approval for detailed proposals before work commences;

Secure Systems Research Group - FAU Technical review of applications after operating system changes When operating systems are changed, business critical applications should be reviewed and tested to ensure there is no adverse impact on organizational operations or security.

Secure Systems Research Group - FAU Restrictions on changes to software packages Modifications to software packages should be discouraged, limited to necessary changes, and all changes should be strictly controlled. As far as possible, and practicable, vendor- supplied software packages should be used without modification.

Secure Systems Research Group - FAU Information leakage Opportunities for information leakage should be prevented. (includes preventing trojan code) a) scanning of outbound media and communications for hidden information; b) masking and modulating system and communications behaviour to reduce the likelihood of a third party being able to deduce information from such behaviour; c) making use of systems and software that are considered to be of high integrity, e.g. using evaluated products (see ISO/IEC 15408);

Secure Systems Research Group - FAU Outsourced software development Outsourced software development should be supervised and monitored by the organization. a) licensing arrangements, code ownership, and intellectual property rights (see ); b) certification of the quality and accuracy of the work carried out; c) escrow arrangements in the event of failure of the third party; d) rights of access for audit of the quality and accuracy of work done; e) contractual requirements for quality and security functionality of code; f) testing before installation to detect malicious and Trojan code.

Secure Systems Research Group - FAU 12.6 Technical Vulnerability Management Objective: To reduce risks resulting from exploitation of published technical vulnerabilities. These considerations should include operating systems, and any other applications in use. Timely information about technical vulnerabilities of information systems being used should be obtained, the organization's exposure to such vulnerabilities evaluated, and appropriate measures taken to address the associated risk. A current and complete inventory of assets … Appropriate, timely action should be taken …

Secure Systems Research Group - FAU Observations and Analysis Some wireless stuff Focus is on in-house IS/IT support group Does not address development activities (some items can apply to development team) Has category for OS evolution. Less attention to impact of emerging networking options Addresses only 2 nd of Leveson’s 4 levels

Secure Systems Research Group - FAU Leveson’s Types of Causes Technical Human Organizational Regulatory