1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

For Security Professionals
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.
ODAA Workshop December 2012 Charles Duchesne, DSS Tiffany Snyder, DSS
What’s the path to a SSP? Information System Profile Contractor: Lockheed Martin, Missiles and Fire Control Address: 1701 W. Marshall Dr. Grand Prairie,
ISFO – ODAA Defense Security Service Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) Nov Nov 2013.
Effective Design of Trusted Information Systems Luděk Novák,
Auditing Computer Systems
MSIA Introduction to Information Systems Security Training and Policy Week 1 Live Session Presentation.
Security Controls – What Works
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Systems Security Officer
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
C &A CS Unit 2: C&A Process Overview using DITSCAP Jocelyne Farah Clinton Campbell.
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
Hosted by How to Conduct an Information Security (INFOSEC) Assessment The NSA INFOSEC Assessment Methodology (IAM) Stephen Mencik, CISSP ACS Defense, Inc.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Security Architecture
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Working with HIT Systems
Today’s Lecture Covers
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
ISO/IEC 27001:2013 Annex A.8 Asset management
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Trusted Operating Systems
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Understanding Security Policies Lesson 3. Objectives.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TCSEC: The Orange Book.
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Operating System Security
HIPAA Security Standards Final Rule
Presentation transcript:

1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY

Objectives  Discuss the principles of Computer Security  Identify required IS security documentation  Identify the purpose of a System Security Plan (SSP)  Discuss the principles of Computer Security  Identify required IS security documentation  Identify the purpose of a System Security Plan (SSP)

Foundations of Computer Security  Confidentiality  Integrity  Availability C I A

4 CONFIDENTIALITY PROTECTION OF DATA IN OR PROCESSED BY THE COMPUTER SYSTEM FROM DISCLOSURE

5 INTEGRITY PROTECTION OF ALL COMPONENTS OF HARDWARE AND SOFTWARE USED DURING CLASSIFIED PROCESSING FROM:  MANIPULATION  DELETION PROTECTION OF ALL COMPONENTS OF HARDWARE AND SOFTWARE USED DURING CLASSIFIED PROCESSING FROM:  MANIPULATION  DELETION

AVAILABILITY Protecting the computer from malicious logic or natural disasters Protecting the computer from malicious logic or natural disasters

Protection Levels NISPOM PL-1 Dedicated PL-2 System High PL-4 Multilevel PL-3 Compartmented

Protection Level (PL) 1 Dedicated Security Mode  Clearance, N-T-K and, if applicable, all formal access approvals for all information TS

Protection Level (PL) 2 System High Security Mode  Clearance and access approvals for all information but with different N-T-K TS a b

Protection Level (PL) 3 Compartmented Security Mode  Clearance for most restrictive information, but different formal access approvals TOP SECRET TS- NATO SAP CRYPTO NATO CNWDI

Protection Level (PL) 4 Multilevel Security Mode  All users are cleared, but may not have a clearance for all levels of classified information on the IS TS S S S

Security Documentation NISPOM ISSM SSPSecurityPolicy CM Plan

13 Confidentiality Matrix

14 Required Security Documentation  Information System Security Policy  Configuration Management Plan  System Security Plan (SSP)  Certification and Accreditation Documentation  Information System Security Policy  Configuration Management Plan  System Security Plan (SSP)  Certification and Accreditation Documentation 8-610

Basis for Accreditation  Documentation (SSP)  Analysis and evaluation of security risks  Safeguards associated with operation of the AIS  Documentation (SSP)  Analysis and evaluation of security risks  Safeguards associated with operation of the AIS

What is the purpose of an SSP?  Implements security policy  User’s How-To guide  “Inspection” guide  Implements security policy  User’s How-To guide  “Inspection” guide 8-610a(1) SSP

17 SSP INCLUDES  System Identification  Security personnel  System description  Mission or purpose  System architecture  block diagram  security support structure  System Identification  Security personnel  System description  Mission or purpose  System architecture  block diagram  security support structure 8-610a.(1)(a)

18 SSP Includes, cont  System Requirements  Classification Level (C-S-TS)  Personnel Clearance Level of Users  Need to Know of Users  Formal Access Approvals involved  Protection Level (PL1, 2, 3, or 4)  System Requirements  Classification Level (C-S-TS)  Personnel Clearance Level of Users  Need to Know of Users  Formal Access Approvals involved  Protection Level (PL1, 2, 3, or 4)

19 SSP-Protection Measures  Audit Capabilities  Access Controls  Resource Controls  System Recovery  Security Testing  Audit Capabilities  Access Controls  Resource Controls  System Recovery  Security Testing  Data Transmission  I & A  Session Controls  System Assurance  Physical Security

20 SSP-Protection Measures  Trusted Downloading  Software controls  Media controls  Maintenance  Clearing and sanitization  Self Inspections  Trusted Downloading  Software controls  Media controls  Maintenance  Clearing and sanitization  Self Inspections SSP B 4 U Can, Put It In The Plan!

21 SSP-Variances and Vulnerabilities  Description of approved variances from protection measures  Attach documentation  Documentation of any unique threat or vulnerabilities to system  Document if none exists  Description of approved variances from protection measures  Attach documentation  Documentation of any unique threat or vulnerabilities to system  Document if none exists

22 SSP-Might Also Include  MOU for connections to separately accredited networks & systems  Special purpose type systems  embedded systems  Other contractual issues  MOU for connections to separately accredited networks & systems  Special purpose type systems  embedded systems  Other contractual issues

23 Audit Records  Who fills out what?  ISSOs & Users  What logs are required? - Manual  Maintenance  Hardware & Software  Upgrade/Downgrade  Sanitization  Weekly Audit Log  Custodian  Seal Log (If Applicable)  Receipt/Dispatch (If Applicable)  Who fills out what?  ISSOs & Users  What logs are required? - Manual  Maintenance  Hardware & Software  Upgrade/Downgrade  Sanitization  Weekly Audit Log  Custodian  Seal Log (If Applicable)  Receipt/Dispatch (If Applicable)

24  What logs are required - Automated  if technically capable  Successful and unsuccessful logons and logoffs  Unsuccessful accesses to security-relevant objects and directories, including:  creation  open  modification and deletion  Changes in user authenticators, i.e., passwords  Denial of system access resulting from an excessive number of unsuccessful logon attempts.  If not technically capable, the Authorized Users list will be retained as an audit record  What logs are required - Automated  if technically capable  Successful and unsuccessful logons and logoffs  Unsuccessful accesses to security-relevant objects and directories, including:  creation  open  modification and deletion  Changes in user authenticators, i.e., passwords  Denial of system access resulting from an excessive number of unsuccessful logon attempts.  If not technically capable, the Authorized Users list will be retained as an audit record Audit Records - cont’d

25 Re-Accreditation & Protection Measures  Re-Accreditation  Every Three Years  Major Changes  Protection Measures  unique Identifier  individual User Ids and Authentication  passwords  Re-Accreditation  Every Three Years  Major Changes  Protection Measures  unique Identifier  individual User Ids and Authentication  passwords

26 Passwords  Minimum 8 Characters  Classified to the highest level of the system  Changed at least every 180 days  Changed when compromised  Automated generation when possible  Minimum 8 Characters  Classified to the highest level of the system  Changed at least every 180 days  Changed when compromised  Automated generation when possible

27 DoD Warning Banner  Required  Positive User Action  Prominently displayed  Required  Positive User Action  Prominently displayed

28 Login Attempts  Maximum of 5 attempts  Lockout after X minutes  SSP specific - DSS recommends 30 minutes  System Administrator resets account or account disabled for X minutes  SSP specific - DSS recommends 30 minutes  Maximum of 5 attempts  Lockout after X minutes  SSP specific - DSS recommends 30 minutes  System Administrator resets account or account disabled for X minutes  SSP specific - DSS recommends 30 minutes

29 Clearing and Sanitization  Hard drives  May be overwritten or destroyed  CPUs  Remove power for one minute  Printers  Print one page (font test) then power down  Hard drives  May be overwritten or destroyed  CPUs  Remove power for one minute  Printers  Print one page (font test) then power down

Clearing Removal of data from an IS, its storage devices and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using normal system capabilities (i.e., keyboard strokes). DCID 6/3 Removal of data from an IS, its storage devices and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using normal system capabilities (i.e., keyboard strokes). DCID 6/3

Sanitization The process of removing information from media or equipment such that data recovery using any known technique or analysis is prevented, as well as the removal of all classified labels and markings. DCID 6/3

32 Configuration Management Plan  Formal change control procedures for security- relevant hardware and software  Management of all documentation  Implement, test and verify CM plan  Formal change control procedures for security- relevant hardware and software  Management of all documentation  Implement, test and verify CM plan

33 CM Plan Documents:  Procedures to identify and document type, model and brand of IS hardware  Procedures to identify and document product names and version or release numbers and location of security relevant software  System connectivity  Procedures to identify and document type, model and brand of IS hardware  Procedures to identify and document product names and version or release numbers and location of security relevant software  System connectivity ISL Q-45

34 Periods Processing  Separate Sessions  Different Classification Levels  Different Need-To-Know  Removable Media for each processing session  Separate Sessions  Different Classification Levels  Different Need-To-Know  Removable Media for each processing session

Summary  Principals of Computing Security  System Security Plan  Purpose  Contents  NISPOM = What  SSP = How  Principals of Computing Security  System Security Plan  Purpose  Contents  NISPOM = What  SSP = How SSP

36