Information Systems Security Officer

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
Auditing Computer Systems
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
The Islamic University of Gaza
OMB Circular A-123 – Management’s Responsibility for Internal Control Policy Applicability Sources of Information Assessment, Documentation and Reporting.
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
Information Security Policies and Standards
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Session 3 – Information Security Policies
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Auditing Information Systems (AIS)
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Copyright Course Technology 1999
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
SMS Planning.  Safety management addresses all of the operational activities of the entire organization.  The four (4) components of an SMS are: 1)
Chapter 9: Introduction to Internal Control Systems
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Indiana Regional Sewer District Association October 26, 2015.
Presented to Managers. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an organization.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
Environmental Officer Course Introduction Fort Wainwright, Alaska Environmental Officer Course 2011 Name//office/phone/ address UNCLASSIFIED 12/24/2015.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security tools for records managers Frank Rankin.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Business Continuity Planning 101
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Introduction to the Federal Defense Acquisition Regulation
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Information Systems Security Officer CS 996: Information Security Management Pavel Margolin 4/20/05

Overview Who is an ISSO? Duties and Responsibilities Planning Establishing the CIAPP InfoSec Functions InfoSec in the Government

Who is an ISSO? ISSO – Information Systems Security Officer Reports to the Chief Information Officer (CIO), who reports to the CEO. Leader of the Information Security (InfoSec) organization. Qualifications Manage and organize people Communicate to upper management without much technical details Have enough technical expertise to understand systems and make decisions

Duties and Responsibilities Establishing and enforcing Corporate Information Assets Protection Program (CIAPP) Managing people Managing the business of CIAPP Managing CIAPP processes Hiring InfoSec staff Report to upper management

Planning Strategic Plan (ISSSP) Tactical Plan (ITP) Annual Plan (IAP) Compatible with Strategic Business Plan Long-term direction, goals, and objectives Tactical Plan (ITP) Short-range plan Supports CIAPP and InfoSec functional goals and objectives Annual Plan (IAP) Identify and implement projects to accomplish the goals and objectives in the ISSSP and ITP Plan of projects for the year

Establishing the CIAPP Reasons for the CIAPP Corporate vision, mission, and quality statements Corporate strategic, tactical, and annual business plans InfoSec vision, mission and quality statements InfoSec strategic, tactical and annual business plans Information and systems legal, ethical, and best business practices Overall information assets protection plans, policies, and procedures Current CIAPP-related and InfoSec policies Current CIAPP-related and InfoSec procedures Other topics as deemed appropriate by the ISSO

CIAPP Process CIAPP Costs Profits Sales Public Relations Stockholders’ value Business Decisions Laws Regulations Business Practices Ethics InfoSec Policies InfoSec Procedures InfoSec Processes Risk Assessments Vulnerability assessments Threat Assessments Limited Risk assessments Risk analyses Best InfoSec Practices CIAPP

Example CIAPP Requirements and Policy Directive Introduction Section Purpose Section Scope Section Responsibilities Requirements Section Identifying the value of the information Access to information systems Access to specific applications and files Audit trails and their review Reporting and response in the event of a violation Minimum protection requirements for the hardware, firmware and software Requirements for InfoSec procedures at other departments and lower levels of the corporation Physical Security Optional if Physical Security is handled by the Director of Security

InfoSec Functions Processes Valuing Information Awareness Access Control Evaluation of all hardware, firmware and software Risk Management Security Tests and evaluations program Noncompliance Inquiries Contingency and emergency planning and disaster recovery program (CEP-DR)

Function Drivers Requirements-Drivers Customers Contracts InfoSec Custodians Users Management Audits Tests & Evaluations Other employees Laws Regulations Non-compliance Inquiries Investigations Trade articles Technical Bulletings Business Plans ISSO’s plans Best business practices Best InfoSec practices ISSO Organizational Functions Identification of InfoSec requirements Access control Non-compliance Inquiries (NCI) Disaster Recovery/Emergency Planning Tests and Evaluations Intranet Security Internet and Web Site Security Security Applications Protection Security Software Development Software Interface InfoSec Evaluations Access Control Violations Analysis Systems’ Approvals CIAPP Awareness and Training Contractual Compliance Inspections InfoSec Risk Management CIAPP ISSO’s CIAPP organizational requirements Responsibilities Charter

InfoSec in the Government National Security Classified Information Confidential – loss of this information can cause damage to national security Secret – loss of this information can cause serious damage to national security Top Secret – loss of this information can cause grave damage to national security Black/Compartmented – Granted on a need to know (NTK) basis. Ex: Sensitive Compartmented Information (SCI). Unclassified For Official Use Only Unclassified but Sensitive Information

InfoSec Requirements in the Government InfoSec policy – laws, rules, practices that regulate how organizations handle national security data. Accountability – assigning responsibility and accountability to individuals or groups who deal with national security information Assurance – guarantees that the InfoSec policy is implemented correctly and the InfoSec elements accurately mediate and enforce the policy Documentation – records how a system is structured, its functions and how the system was designed

InfoSec Objectives in the Government Protect and defend all information used by an AIS (automated information system) Prevent unauthorized access, modification, damage, destruction, or DoS Provide assurances of: Compliance with government and contractual obligations and agreements Confidentiality of all classified information Integrity of information and related processes Availability of information Usage by authorized personnel only of the information and AIS Identification and elimination of fraud, waste, and abuse Information lost could be reconstructed Worst-case is when a compromise occurs and no one knows it.

ISSO at Gov’t Agencies Maintain a plan site security improvement Ensure IS systems are operated, used, maintained and disposed of properly Ensure IS systems are certified and accredited Ensure users and personnel have required security clearances, authorization, NTK, and are familiar with internal security practices Enforce security policies and safeguards on personnel having access to an IS Ensure audit trails are reviewed periodically Initiate protective and corrective measures Report security incidents in accordance with agency specific policy Report the security status of the IS Evaluate know vulnerabilities to determine if additional security is needed

Levels of Performance Entry Level Intermediate Level Advanced Level Identify vulnerabilities and recommend security solutions required to return the system to an operational level of assurance. Intermediate Level For a new system architecture, investigate and document system security technology, policies and training requirements to assure system operation at a specified level of assurance Advanced Level For an accreditation action, analyze and evaluate system security technology, policy and training requirements in support of upper management. The analysis will include a description of the management/technology team required to successfully complete the accreditation process

Duties of Gov’t ISSO Develop Certification and Accreditation Posture Plan for Certification and Accreditation Create CIA Policy Control Systems Policy Culture and Ethics Incidence Response Implement Site Security Policy Provide CIA Ensure Facility is approved Manage Operations of Information Systems Regulate General Principles Access Control, Training, Awareness, Legal aspects, CC, etc Security Management Access Controls Human Access Key Management Incident Response

Duties (continued) Enforce and verify system security policy CIA and Accountability Security Management Access Controls Automated Security Tools Handling Media Incident Response Report on site security Status Security Continuity Reporting Report Security Incidents Law Report Security Status of IS as required by upper management Report to Inspector General (IG)

Duties (continued) Support Certification and Accreditation Certification Functions Accreditation Functions Respond to upper management requests

References Kovacich, Dr. Gerald L., “The Information Systems Security Officer’s Guide: Establishing and Managing an Information Protection Program” “Information Assurance Training Standard for Information Systems Security Officers” http://www.cnss.gov/instructions.html