Information Security Policy

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

CIP Cyber Security – Security Management Controls
Information Security Policy
Campus Improvement Plans
information Security Blueprint
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Join the conference call by dialing the conference number in your Invitation or Reminder s. Please put your phone on mute. Please stand by! The webinar.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Information Security Policies and Standards
Each problem that I solved became a rule which
Course Technology Chapter 3: Project Integration Management.
Chapter 3: The Project Management Process Groups
Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT
Computer Security: Principles and Practice
Security Policies Group 1 - Week 8 policy for use of technology.
Network security policy: best practices
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Information Security Policy
CSE 4482: Computer Security Management: Assessment and Forensics
Internal Auditing and Outsourcing
18/21/20151 Instructor: Suprakash Datta (datta[at]cse.yorku.ca) ext Lectures: Tues (CB 122), 7–10 PM Office hours: Wed 3-5 pm (CSEB 3043), or by.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Guide to Firewalls and VPNs, 3rd Edition
Copyright Course Technology 1999
ITC358 ICT Management and Information Security
TEL2813/IS2820 Security Management
Concepts of Database Management Sixth Edition
FORESEC Academy FORESEC Academy Security Essentials (II)
Managerial Control Chapter 16 Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Developing an Effective Ethics Program
Chapter 5 Internal Control over Financial Reporting
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
MANAGEMENT of INFORMATION SECURITY Second Edition.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Auditing Information Systems (AIS)
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 4 I NFORMATION S ECURITY P OLICY Each problem that I solved became a rule which served afterwards.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Developing Plans and Procedures
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Environmental Management System Definitions
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Database Administration
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 4 I NFORMATION S ECURITY P OLICY Each problem that I solved became a rule which served afterwards.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
SecSDLC Chapter 2.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 4 Security Policy, Standard, and Practices.
Information Security Policy
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 1 I NTRODUCTION TO THE M ANAGEMENT OF I NFORMATION S ECURITY If this is the information superhighway,
Slide 1 INFORMATION SECURITY POLICY  ” Avoiding danger is no safer in the long run than exposure”. Helen Keller  “Anyone who has never made a mistake,
Information Security Policy Development for Management By Peter McCarthy.
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Governance, risk and ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
INFORMATION SECURITY MANAGEMENT L ECTURE 5: D EVELOPING THE S ECURITY P ROGRAM You got to be careful if you don’t know where you’re going, because you.
Information Security Policy
MANAGEMENT of INFORMATION SECURITY Second Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
IS4680 Security Auditing for Compliance
Security Policy and Standards
Presentation transcript:

Information Security Policy INFORMATION SECURITY MANAGEMENT Lecture 4: Information Security Policy You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Principles of Information Security Management Include the following characteristics that will be the focus of the current course (six P’s): Planning Policy Programs Protection People Project Management Chapters 2 & 3 Chapter 4 These differ from general IT and management communities Extend basic characteristics for general leadership and management and this is the focus of the current course. http://csrc.nist.gov/publications/PubsTC.html

Introduction “The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems” Policy is the essential foundation of an effective information security program Policy objectives Reduced risk Compliance with laws and regulations Assurance of operational continuity, information integrity, and confidentiality

Policy Explains the will of the organization’s management in controlling the behavior of employees Policies are the least expensive means of control and often the most difficult to implement Basic rules for shaping a policy Policy should never conflict with law Policy must be able to stand up in court if challenged Policy must be properly supported and administered

Bulls-eye Model Policies: first layer of defense Networks: threats first meet the organization’s network Systems: computers and manufacturing systems Applications: all applications systems

Policy, Standards, and Practices Policy & Types Enterprise Issue-specific Systems-specific Standards Practices Policy For policies to be effective they must be properly disseminated, read, understood, agreed-to, and uniformly enforced Policies require constant modification and maintenance Standards A more detailed statement of what must be done to comply with policy Practices Procedures and guidelines explain how employees will comply with policy

Enterprise Information Security Policy (EISP) Sets strategic direction, scope, and tone for organization’s security efforts Assigns responsibilities for various areas of information security Guides development, implementation, and management requirements of information security program

EISP Elements Overview of the corporate philosophy on security Information about information security organization and information security roles Responsibilities for security that are shared by all members of the organization Responsibilities for security that are unique to each role within the organization

Example: UNCW Security Policy CISO EISP: Enterprise Information Security Policy Additional Examples: http://uncw.edu/policies/it.html http://doit.maryland.gov/support/pages/securitypolicies.aspx

Example ESIP Components Statement of purpose Information technology security elements Need for information technology security Information technology security responsibilities and roles Reference to other information technology standards and guidelines What the policy is for Defines information security Justifies importance of information security in the organization Defines organizational structure

Issue-Specific Security Policy (ISSP) Provides detailed, targeted guidance Protects organization from inefficiency and ambiguity Protects organization from inefficiency and ambiguity (cont’d.) Indemnifies the organization against liability for an employee’s inappropriate or illegal system use Provides detailed, targeted guidance Instructs the organization in secure use of a technology systems Begins with introduction to fundamental technological philosophy of the organization Protects organization from inefficiency and ambiguity Documents how the technology-based system is controlled Identifies the processes and authorities that provide this control

Issue-Specific Security Policy (cont’d.) Every organization’s ISSP should: Address specific technology-based systems Require frequent updates Contain an issue statement on the organization’s position on an issue

ISSP - Topics Email and internet use Minimum system configurations Prohibitions against hacking Home use of company-owned computer equipment Use of personal equipment on company networks Use of telecommunications technologies Use of photocopy equipment

CISO ISSP: Acceptable Use of Systems Policy Example of ISSP CISO ISSP: Acceptable Use of Systems Policy Statement of Purpose Scope and applicability Definition of technology addressed Responsibilities Authorized Access and Usage of Equipment User access Fair and responsible use Protection of privacy Prohibited Usage of Equipment Disruptive use or misuse Criminal use Offensive or harassing materials Copyrighted, licensed or other intellectual property Other restrictions Systems management Management of stored materials Employer monitoring Virus protection Physical security Encryption Violations of policy Procedures for reporting violations Penalties for violations Policy review and modification Scheduled review of policy and procedures for modification Limitations of liability Statements of liability or disclaimers

Components of the ISSP Statement of Purpose Authorized Access and Usage of Equipment Prohibited Usage of Equipment Systems management Violations of policy Policy review and modification Limitations of liability Statement of Purpose Scope and applicability Definition of technology addressed Responsibilities Authorized Access and Usage of Equipment User access Fair and responsible use Protection of privacy Prohibited Usage of Equipment Disruptive use or misuse Criminal use Offensive or harassing materials Copyrighted, licensed or other intellectual property Other restrictions Systems management Management of stored materials Employer monitoring Virus protection Physical security Encryption Violations of policy Procedures for reporting violations Penalties for violations Policy review and modification Scheduled review of policy and procedures for modification Limitations of liability Statements of liability or disclaimers

Implementing the ISSP Common approaches Several independent documents A single comprehensive document A modular document that unifies policy creation and administration The recommended approach is the modular policy Provides a balance between issue orientation and policy management

System-Specific Security Policy System-specific security policies (SysSPs) frequently do not look like other types of policy SysSPs can be separated into: Management guidance Technical specifications Or combined They may function as standards or procedures to be used when configuring or maintaining systems

Managerial Guidance SysSPs Created by management to guide the implementation and configuration of technology Applies to any technology that affects the confidentiality, integrity or availability of information Informs technologists of management intent

Technical Specifications SysSPs System administrators’ directions on implementing managerial policy General methods of implementing technical controls Access control lists Configuration rules Each type of equipment has its own type of policies

Technical Specifications SysSPs (cont’d.) Access control lists Include the user access lists, matrices, and capability tables that govern the rights and privileges Enable administrations to restrict access according to user, computer, time, duration, or even a particular file A similar method that specifies which subjects and objects users or groups can access is called a capability table These specifications are frequently complex matrices, rather than simple lists or tables

Technical Specifications SysSPs (cont’d.) Access control lists regulate who, what, when, where and how Restricting what users can access, e.g. printers, files, communications, and applications Administrators set user privileges Read, write, create, modify, delete, compare, copy Who can use the system What authorized users can access When authorized users can access the system Where authorized users can access the system from How authorized users can access the system Restricting what users can access, e.g. printers, files, communications, and applications Type in “Computer Management” in search to pull up device management

Technical Specifications SysSPs (cont’d.) Configuration rules Specific configuration codes entered into security systems Rule policies are more specific to system operation than ACLs May or may not deal with users directly Configuration RulesGuide the execution of the system when information is passing through it

Technical Specifications SysSPs (cont’d.) Many security systems require specific configuration scripts telling the systems what actions to perform on each set of information they process

Technical Specifications SysSPs (cont’d.) Often organizations create a single document combining elements of both management guidance and technical specifications SysSPs This can be confusing, but practical Care should be taken to articulate the required actions carefully as the procedures are presented

Technical Specifications SysSPs: Case Study Disaster at a University: A Case Study in Information Security Overview Issue People Involved Approach and Resolution Outcomes Conclusion

Guidelines for Effective Policy For policies to be effective, they must be properly: Developed Distributed or disseminated Reviewed or read Understood Formally agreed to Uniformly applied and enforced Developed using industry-accepted practices Distributed or disseminated using all appropriate methods Reviewed or read by all employees Understood by all employees Formally agreed to by act or assertion Uniformly applied and enforced

Developing Information Security Policy It is often useful to view policy development as a two-part project Design and develop the policy (or redesign and rewrite an outdated policy) Establish management processes to perpetuate the policy within the organization The former is an exercise in project management, while the latter requires adherence to good business practices

Developing Information Security Policy (cont’d.) Policy development projects should be Well planned Properly funded Aggressively managed to ensure that it is completed on time and within budget The policy development project can be guided by the SecSDLC process

SecSDLC Process of Policy Development Investigation phase Obtain support from senior management Clearly articulate the goals of the policy project Acquire a capable project manager Develop a detailed outline of and sound estimates for project cost and scheduling Gain participation of correct individuals affected by the recommended policies Involve legal, human resources and end-users Assign a project champion with sufficient stature and prestige

Developing Information Security Policy (cont’d.) Analysis phase should produce New or recent risk assessment or IT audit documenting the current information security needs of the organization Key reference materials Including any existing policies

Developing Information Security Policy (cont’d.) Design phase includes How the policies will be distributed How verification of the distribution will be accomplished Revisions to feasibility analysis reports based on improved costs and benefits as the design is clarified

Developing Information Security Policy (cont’d.) Implementation phase includes Writing the policies Policy distribution Maintenance Phase Maintain and modify the policy as needed Built-in reporting mechanism Periodic review Writing the policies Making certain the policies are enforceable as written Policy distribution is not always straightforward Effective policy is written at a reasonable reading level, and attempts to minimize technical jargon and management terminology Maintenance Phase The policy should have a built-in mechanism via which users can report problems with the policy, preferably anonymously Periodic review should be built in to the process

Automated Tools Figure 4-10 The VigilEnt policy center http://www.informationshield.com/vpcmain.html Source: Course Technology/Cengage Learning

Alternative Approaches: The Information Securities Policy Made Easy Approach Gathering key reference materials Defining a framework for policies Preparing a coverage matrix Making critical systems design decisions Structuring review, approval, and enforcement processes

Policies are living documents Alternative Approaches: Guide for Developing Security Plans for Federal Information Systems NIST Special Publication 800-18, Rev. 1 reinforces a business process-centered approach to policy management Policies are living documents Good management practices for policy development and maintenance make for a more resilient organization These documents must be properly disseminated (distributed, read, understood and agreed to), and managed

Alternative Approaches: Guide for Developing Security Plans for Federal Information Systems Policy requirements An individual responsible for reviews A schedule of reviews A method for making recommendations for reviews An indication of policy and revision date Management of Information Security, 3rd ed.

A Final Note on Policy Lest you believe that the only reason to have policies is to avoid litigation, it is important to emphasize the preventative nature of policy. Policies exist, first and foremost, to inform employees of what is and is not acceptable behavior in the organization Policy seeks to improve employee productivity, and prevent potentially embarrassing situations

Next Class Read Chapter 5 – Security Programs Case Studies In lieu of discussion, we will be covering the cases during lecture. Be prepared to discuss your assigned case and read the other cases Assessment 1 Topic Paper Presentation – Howard/Vince