Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.

Slides:



Advertisements
Similar presentations
Module N° 7 – SSP training programme
Advertisements

TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Software Quality Assurance Plan
ITIL: Service Transition
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Information Security Risk.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 General Policy and Law Issues.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline General Policy.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Office of Inspector General (OIG) Internal Audit
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Session 3 – Information Security Policies
WHS Management Plans.
Complying With The Federal Information Security Act (FISMA)
Internal Auditing and Outsourcing
SEC835 Database and Web application security Information Security Architecture.
General Awareness Training
Introduction to Software Quality Assurance (SQA)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
OHT 25.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The quality assurance organizational framework Top management’s quality.

Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
FCS - AAO - DM COMPE/SE/ISE 492 Senior Project 2 System/Software Test Documentation (STD) System/Software Test Documentation (STD)
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Engineering Essential Characteristics Security Engineering Process Overview.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Chapter 3-Auditing Computer-based Information Systems.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
TCSEC: The Orange Book.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information Security Policy Module 1: Purpose  Module 2: Life Cycle Module 3: Terminology Module 4: Structure Module 5: Summary

Module 2 Life Cycle

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 3 Students should be able to: –Conceptualize the life cycle of a security policy –Realize that security policies should incorporate both business and security needs –Understand how risk analysis feeds into security policy development –Realize that policy development is not simply creation, but dissemination, enforcement, monitoring, and maintenance. Life Cycle Learning Objectives

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 4 Life Cycle Broad View After the results of a business processes and risk analysis, security policies can be developed or improved to counteract threats to vulnerable assets. The policy is approved by management and institution of employee awareness programs and administratively-imposed software or hardware changes in accordance to the policy takes place. The success of the policy is largely dependent on how well it is enforced. To determine how well the policy is being upheld, verification of compliance or auditing should be performed. Due to the presence of new threats, vulnerabilities, or assets discovered through risk assessment, policies may be improved or additional policies created. Adapted from: Guel, M.D. (2001). A Short Primer for Developing Security Policies. SANS Institute. POLICY DEVELOPMENT IMPLEMENTATION ENFORCEMENT MONITORING/ MAINTENANCE BUSINESS PROCESS AND RISK ANALYSIS

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 5 Life Cycle Detailed View Policy definition and specification Policy analysis and translation Policy distribution and enforcement System management requirements analysis Policy review and query Policy monitoring and maintenance General management criteria and principles Other related information Event log and policy history Organizational structure and business processes model Low-level policies High-level policies Organization structure and business process analysis Organization structure redesign and business process reengineering Process Data Reverse Adapted from: Zhang, Y., Liu, X., & Wang W. (2005). Policy Lifecycle Model for Systems Management. IT Pro,

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 6 Security policy should be determined by general organizational as well as security needs and should maximize security at minimized cost to other institutional goals (i.e. productivity) Security and organizational recommendations are determined through business process and security needs analysis. (Risk Analysis) Life Cycle “Nothing Exists in a Vacuum” System management requirements analysis General management criteria and principles Organizational structure and business processes model Organization structure and business process analysis

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 7 Life Cycle Risk Analysis Risk analysis can help identify: –Relevant areas –Operations –Organizational issues

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 8 Recommendations from an information security risk analysis should assist in developing policy definitions. Example: –Recommendation: An employee’s personal account should be secure –High-level Policy Definition: There should be no unauthorized access into accounts The policy should be analyzed/approved by the necessary personnel and should include feedback from all levels. If necessary, the policy should be re-defined. Life Cycle Policy Development Policy definition and specification Policy analysis and translation System management requirements analysis High-level policies

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 9 Often, high-level policies are very general in order to last with time and to be easily understood and approved by higher management personnel. Lower level policies are the specific instructions on how to implement and enforce these policies (procedures). These are disseminated and enforced and through feedback, these policies may be changed. Life Cycle Implementation Policy analysis and translation Policy distribution and enforcement Low-level policies

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 10 Implementation may include the following components: –Documentation – –Marketing –Distance Learning –Specialized Courses –Technological Controls Life Cycle Implementation

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 11 High-Level Policy –There should be no unauthorized access to accounts. Low-Level Policy –Users should change their passwords every 30 days and have a mixture of alphanumeric as well as special characters exceeding 8 characters. The user should not be able to use their last 5 passwords. Life Cycle Implementation: Example

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 12 Implementation of Low-Level Policy –Pamphlet with new policy enacted –Training session on information security –Incorporating a system rule that does not allow the user to create a password that does not contain a mixture of alphanumeric and special characters less than 8 characters. The system can also notify the user every 30 days to change their password and will not accept a password that has been used for the last 2 times. Life Cycle Implementation: Example, cont’d.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 13 There should be monitoring and maintenance of policies for compliance (e.g. auditing). Through problems or issues discovered, specific parts of the policy can be reviewed and changed and proper action can be taken. All policy changes or related incidents should be documented. Life Cycle Monitoring and Maintenance Policy analysis and translation Policy distribution and enforcement Policy review and query Policy monitoring and maintenance Other related information Event log and policy history

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 14 Monitoring Analysis: –An audit is performed and it is discovered that users tend to forget passwords and end up calling the help desk causing loss in productivity and help desk time. Change to Low-Level Policy: –Special training sessions specific to people who call the help desk regularly Life Cycle Monitoring and Maintenance: Example

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 15 While intermittent monitoring is good, it is also beneficial to take in all changes and determine policy effects as a whole. Effects on processes and policy as well as environmental changes may lead to a change in business process and risk analysis. These changes should result in a revision of the policy. Life Cycle Policy Analysis System management requirements analysis General management criteria and principles Event log and policy history Organization structure and business process analysis Organization structure redesign and business process reengineering Policy definition and specification

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 16 Security policies have a life cycle which includes risk analysis, creation, dissemination, enforcement, monitoring, and then evaluation. Security policies optimize effects of business processes perceived information security risks. Policies are high-level (change rarely) and low-level (change more frequently). Policies should evolve over time as the environment changes and effects of policy are evaluated to have effective results. Life Cycle Summary