Information Technology Security: Fitting Into the Big Picture Brandon Hoffman, KPMG LLP Fitting Into the Big Picture Brandon Hoffman, KPMG LLP.

Slides:



Advertisements
Similar presentations
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
IUT– Network Security Course 1 Network Security Firewalls.
NMAP Scanning Options. EC-Council NMAP  Nmap is the most popular scanning tool used on the Internet.  Cretead by Fyodar ( it.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
IP Network Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
System Security Scanning and Discovery Chapter 14.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Technology Security: Fitting Into the Big Picture Brandon Hoffman, KPMG LLP Fitting Into the Big Picture Brandon Hoffman, KPMG LLP.
Description “Nmap stands for "Network Mapper". Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing.
Security Policy. Topics for Discussion IT Security in the Business – Risk, Audit Support, Compliance Policies, Standards, and Procedures – IT Security’s.
Network Security Testing Techniques Presented By:- Sachin Vador.
Computer Security and Penetration Testing
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Penetration Testing.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Nmap pamN Kurt GrutzmacherGarrett Gee © 2006 – Artistic LicenseBayLISA – 02/18/06.
SCSC 455 Computer Security Intrusion Detection. Index Network scanning and packet-sniffing utilities IDS -- Intrusion detection systems Automated security.
1 Version 3.1 Module 4 Learning About Other Devices.
Ana Chanaba Robert Huylo
Intranet, Extranet, Firewall. Intranet and Extranet.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Northwestern University Network Security
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
Honeypot and Intrusion Detection System
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CIS 450 – Network Security Chapter 3 – Information Gathering.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Information Technology Security: Fitting Into the Big Picture.
MIS Week 4 Site:
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Chapter 5: Implementing Intrusion Prevention
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Security fundamentals Topic 10 Securing the network perimeter.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
IS3220 Information Technology Infrastructure Security
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Protection (tools).
Penetration Testing Scanning
Enumeration The First Step.
Port Scanning James Tate II
Information Technology Security:
* Essential Network Security Book Slides.
Intrusion Detection system
Presentation transcript:

Information Technology Security: Fitting Into the Big Picture Brandon Hoffman, KPMG LLP Fitting Into the Big Picture Brandon Hoffman, KPMG LLP

Topics for Discussion Typical IT Security Technical Work Intrusion Detection/Prevention Ethical Hacking/Penetration Testing IT Security in the Business Risk, Audit Support, Compliance Policies, Standards, and Procedures IT Security’s Role in Creation and Enforcement Typical IT Security Technical Work Intrusion Detection/Prevention Ethical Hacking/Penetration Testing IT Security in the Business Risk, Audit Support, Compliance Policies, Standards, and Procedures IT Security’s Role in Creation and Enforcement

Intrusion Detection Intrusion Detection Systems are just what they seem to be. Detect and Alert Host Based and Network Based How they work? Statistical Modeling Heuristics Trending End result? Similar to home security system Intrusion Detection Systems are just what they seem to be. Detect and Alert Host Based and Network Based How they work? Statistical Modeling Heuristics Trending End result? Similar to home security system

Intrusion Detection cont’d Source:

Intrusion Prevention Systems Actively participates in defense of security violations Host based IPS: Resident to the host machine. Monitors system calls and inbound traffic. Creates a baseline and can prevent internal “bad” behavior through system controls. Typically works in conjunction with Anti-virus Sandboxing – Creates isolated “scratch” disk space to run untrusted platforms or applications from untrusted third parties Actively participates in defense of security violations Host based IPS: Resident to the host machine. Monitors system calls and inbound traffic. Creates a baseline and can prevent internal “bad” behavior through system controls. Typically works in conjunction with Anti-virus Sandboxing – Creates isolated “scratch” disk space to run untrusted platforms or applications from untrusted third parties

Intrusion Prevention cont’d Network based IPS has several operating modes or implementations: Inline IPS is directly inline with the data stream similar to a firewall Gateway Interaction performs packet analysis interactively with the router/firewall Network based IPS has several operating modes or implementations: Inline IPS is directly inline with the data stream similar to a firewall Gateway Interaction performs packet analysis interactively with the router/firewall

Intrusion Prevention cont’d Network intrusion prevention action methods: Content based – Inspects packet contents for unique sequences or “signatures” to prevent known attacks Protocol analysis – Decodes known protocols to detect anomalous behavior Rate based – Used to prevent Denial of Service attacks Network intrusion prevention action methods: Content based – Inspects packet contents for unique sequences or “signatures” to prevent known attacks Protocol analysis – Decodes known protocols to detect anomalous behavior Rate based – Used to prevent Denial of Service attacks

Intrusion Prevention cont’d Core Design:

IPS Business Case 1 Company X requires a homogeneous solution due to compliance and governance restrictions. The facts: Cisco is the network hardware provider for all communications. All connections need to be monitored: VOIP Hosts Gateways VPN Routers and Switches Ingress/Egress traffic (Firewall) The aggregation point for analysis and statistics must be built on a windows server platform The solution must be licensed The solution should not be built on open source code Support from the vendor must be highly available regardless of cost Company X requires a homogeneous solution due to compliance and governance restrictions. The facts: Cisco is the network hardware provider for all communications. All connections need to be monitored: VOIP Hosts Gateways VPN Routers and Switches Ingress/Egress traffic (Firewall) The aggregation point for analysis and statistics must be built on a windows server platform The solution must be licensed The solution should not be built on open source code Support from the vendor must be highly available regardless of cost

IPS Business Case 1 cont’d How do you choose? Note: Taken from Jed Haile presentation at BlackHat02 © 2008 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

IPS Business Case 1 cont’d Cisco Solutions The good: Homogeneous solution Proprietary Code Base Supreme Support Current Vendor The bad: Management easy but not intuitive Fewer vulnerability signatures Cost Cisco Solutions The good: Homogeneous solution Proprietary Code Base Supreme Support Current Vendor The bad: Management easy but not intuitive Fewer vulnerability signatures Cost Sourcefire Solutions The good: Visionary Leader Homogeneous solution Controls SNORT signature engine Cost The bad: Potentially lacking support New vendor Technically complicated Open Source based Sourcefire Solutions The good: Visionary Leader Homogeneous solution Controls SNORT signature engine Cost The bad: Potentially lacking support New vendor Technically complicated Open Source based

IPS Business Case 1 cont’d Cisco wins based on the scorecard of requirements. © 2007 Cisco Systems, Inc. All rights reserved.

IPS Business Case 1 cont’d Protection At All Layers © 2007 Cisco Systems, Inc. All rights reserved.

Ethical Hacking Ethical hacking is a very common profession within the IT security industry. White hat, Grey hat, Black hat Sometimes synonymous with penetration testing – A method of assessing the security posture of a system or network by simulating an “attack” Ethical hacking is a very common profession within the IT security industry. White hat, Grey hat, Black hat Sometimes synonymous with penetration testing – A method of assessing the security posture of a system or network by simulating an “attack”

Ethical Hacking cont’d Most current computer protocols were designed in a time when security was not a consideration. Times have changed: Source: CERT

Ethical Hacking cont’d Why perform an ethical hack? Determine flaws and vulnerabilities Provide a quantitative metric for evaluating systems and networks Measure against pre-established baselines Determine risk to the organization Design mitigating controls Why perform an ethical hack? Determine flaws and vulnerabilities Provide a quantitative metric for evaluating systems and networks Measure against pre-established baselines Determine risk to the organization Design mitigating controls

Ethical Hacking cont’d

METHODOLOGY

Ethical Hacking cont’d

We will now explore some free tools and simple techniques to break into a machine. KPMG DOES NOT ENDORSE HACKING OR PERFORMING THESE METHODS ON ANY DEVICE YOU DO NOT HAVE PERMISSION TO ACCESS IN THIS FASHION. NOR DOES KPMG ENDORSE ANY SPECIFIC PRODUCT. We will now explore some free tools and simple techniques to break into a machine. KPMG DOES NOT ENDORSE HACKING OR PERFORMING THESE METHODS ON ANY DEVICE YOU DO NOT HAVE PERMISSION TO ACCESS IN THIS FASHION. NOR DOES KPMG ENDORSE ANY SPECIFIC PRODUCT.

Wanna Break In? The first step in any ethical hack is to obtain information in the most stealth fashion. USE NMAP!!

NMAP Powerful free linux tool – Syntax: nmap [...] [ ] { } TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, ; iL : Input from list of hosts/networks -iR : Choose random targets --exclude : Exclude hosts/networks --excludefile : Exclude list from file Powerful free linux tool – Syntax: nmap [...] [ ] { } TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, ; iL : Input from list of hosts/networks -iR : Choose random targets --exclude : Exclude hosts/networks --excludefile : Exclude list from file

NMAP cont’d HOST DISCOVERY: -sL: List Scan - simply list targets to scan -sP: Ping Scan - go no further than determining if host is online -PN: Treat all hosts as online -- skip host discovery -PS/PA/PU[portlist]: TCP SYN/ACK or UDP discovery to given ports -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes -PO[protocol list]: IP Protocol Ping -n/-R: Never do DNS resolution/Always resolve [default: sometimes] --dns-servers : Specify custom DNS servers --system-dns: Use OS's DNS resolver --traceroute: Trace hop path to each host SCAN TECHNIQUES: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans -sU: UDP Scan -sN/sF/sX: TCP Null, FIN, and Xmas scans --scanflags : Customize TCP scan flags -sI : Idle scan -sO: IP protocol scan -b : FTP bounce scan HOST DISCOVERY: -sL: List Scan - simply list targets to scan -sP: Ping Scan - go no further than determining if host is online -PN: Treat all hosts as online -- skip host discovery -PS/PA/PU[portlist]: TCP SYN/ACK or UDP discovery to given ports -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes -PO[protocol list]: IP Protocol Ping -n/-R: Never do DNS resolution/Always resolve [default: sometimes] --dns-servers : Specify custom DNS servers --system-dns: Use OS's DNS resolver --traceroute: Trace hop path to each host SCAN TECHNIQUES: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans -sU: UDP Scan -sN/sF/sX: TCP Null, FIN, and Xmas scans --scanflags : Customize TCP scan flags -sI : Idle scan -sO: IP protocol scan -b : FTP bounce scan

NMAP cont’d PORT SPECIFICATION AND SCAN ORDER: -p : Only scan specified ports Ex: -p22; -p ; -p U:53,111,137,T:21-25,80,139,8080 -F: Fast mode - Scan fewer ports than the default scan -r: Scan ports consecutively - don't randomize --top-ports : Scan most common ports --port-ratio : Scan ports more common than SERVICE/VERSION DETECTION: -sV: Probe open ports to determine service/version info --version-intensity : Set from 0 (light) to 9 (try all probes) --version-light: Limit to most likely probes (intensity 2) --version-all: Try every single probe (intensity 9) --version-trace: Show detailed version scan activity (for debugging) PORT SPECIFICATION AND SCAN ORDER: -p : Only scan specified ports Ex: -p22; -p ; -p U:53,111,137,T:21-25,80,139,8080 -F: Fast mode - Scan fewer ports than the default scan -r: Scan ports consecutively - don't randomize --top-ports : Scan most common ports --port-ratio : Scan ports more common than SERVICE/VERSION DETECTION: -sV: Probe open ports to determine service/version info --version-intensity : Set from 0 (light) to 9 (try all probes) --version-light: Limit to most likely probes (intensity 2) --version-all: Try every single probe (intensity 9) --version-trace: Show detailed version scan activity (for debugging)

NMAP cont’d OS DETECTION: -O: Enable OS detection --osscan-limit: Limit OS detection to promising targets --osscan-guess: Guess OS more aggressively TIMING AND PERFORMANCE: Options which take are in milliseconds, unless you append 's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m). -T : Set timing template (higher is faster) --min-hostgroup/max-hostgroup : Parallel host scan group sizes --min-parallelism/max-parallelism : Probe parallelization --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout : Specifies probe round trip time. --max-retries : Caps number of port scan probe retransmissions. --host-timeout : Give up on target after this long --scan-delay/--max-scan-delay : Adjust delay between probes --min-rate : Send packets no slower than per second --max-rate : Send packets no faster than per second OS DETECTION: -O: Enable OS detection --osscan-limit: Limit OS detection to promising targets --osscan-guess: Guess OS more aggressively TIMING AND PERFORMANCE: Options which take are in milliseconds, unless you append 's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m). -T : Set timing template (higher is faster) --min-hostgroup/max-hostgroup : Parallel host scan group sizes --min-parallelism/max-parallelism : Probe parallelization --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout : Specifies probe round trip time. --max-retries : Caps number of port scan probe retransmissions. --host-timeout : Give up on target after this long --scan-delay/--max-scan-delay : Adjust delay between probes --min-rate : Send packets no slower than per second --max-rate : Send packets no faster than per second

NMAP cont’d FIREWALL/IDS EVASION AND SPOOFING: -f; --mtu : fragment packets (optionally w/given MTU) -D : Cloak a scan with decoys -S : Spoof source address -e : Use specified interface -g/--source-port : Use given port number --data-length : Append random data to sent packets --ip-options : Send packets with specified ip options --ttl : Set IP time-to-live field --spoof-mac : Spoof your MAC address --badsum: Send packets with a bogus TCP/UDP checksum FIREWALL/IDS EVASION AND SPOOFING: -f; --mtu : fragment packets (optionally w/given MTU) -D : Cloak a scan with decoys -S : Spoof source address -e : Use specified interface -g/--source-port : Use given port number --data-length : Append random data to sent packets --ip-options : Send packets with specified ip options --ttl : Set IP time-to-live field --spoof-mac : Spoof your MAC address --badsum: Send packets with a bogus TCP/UDP checksum

NMAP cont’d OUTPUT: -oN/-oX/-oS/-oG : Output scan in normal, XML, s|<rIpt kIddi3, and Grepable format, respectively, to the given filename. -oA : Output in the three major formats at once -v: Increase verbosity level (use twice or more for greater effect) -d[level]: Set or increase debugging level (Up to 9 is meaningful) --reason: Display the reason a port is in a particular state --open: Only show open (or possibly open) ports --packet-trace: Show all packets sent and received --iflist: Print host interfaces and routes (for debugging) --log-errors: Log errors/warnings to the normal-format output file --append-output: Append to rather than clobber specified output files --resume : Resume an aborted scan --stylesheet : XSL stylesheet to transform XML output to HTML --webxml: Reference stylesheet from Nmap.Org for more portable XML --no-stylesheet: Prevent associating of XSL stylesheet w/XML output OUTPUT: -oN/-oX/-oS/-oG : Output scan in normal, XML, s|<rIpt kIddi3, and Grepable format, respectively, to the given filename. -oA : Output in the three major formats at once -v: Increase verbosity level (use twice or more for greater effect) -d[level]: Set or increase debugging level (Up to 9 is meaningful) --reason: Display the reason a port is in a particular state --open: Only show open (or possibly open) ports --packet-trace: Show all packets sent and received --iflist: Print host interfaces and routes (for debugging) --log-errors: Log errors/warnings to the normal-format output file --append-output: Append to rather than clobber specified output files --resume : Resume an aborted scan --stylesheet : XSL stylesheet to transform XML output to HTML --webxml: Reference stylesheet from Nmap.Org for more portable XML --no-stylesheet: Prevent associating of XSL stylesheet w/XML output

NMAP cont’d Analyze your results:

Vulnerabilities Find any hosts worthwhile? Your nest step should be scanning for exploitable vulnerabilities. USE NESSUS!!! © Copyright Tenable Network Security(R). All Rights Reserved.

Nessus Nessus scans based on an exhaustive list of vulnerabilities for all platforms of computing. Custom scripts are written by Nessus and their team to check for a vulnerable software component. Nessus scans based on an exhaustive list of vulnerabilities for all platforms of computing. Custom scripts are written by Nessus and their team to check for a vulnerable software component.

How Do We Exploit? Now that you have found a useful exploit, what do we use? USE METASPLOIT!!! Copyright © Metasploit LLC Metasploit ™ is a registered trademark Contact us at msfdev[at]metasploit.com

MetaSploit Metasploit was created in 2003 as a portable network game using the Perl scripting language. Later, the Metasploit Framework was then completely rewritten in the Ruby programming language. It is most notable for releasing some of the most technically sophisticated exploits to public security vulnerabilities. In addition it is a powerful tool for third party security researchers to investigate potential vulnerabilities.

MetaSploit cont’d Remember the machine with vulns?? Let’s use the metasploit framework….

MetaSploit cont’d What else can we do now that were in???

MetaSploit cont’d We can add shares as root!!

Ethical Hacking cont’d Administrative items: Authorization letter – “Get out of jail free card” Risk report Likelihood of risk Mitigation plans Trends (performed with recurring clients) Administrative items: Authorization letter – “Get out of jail free card” Risk report Likelihood of risk Mitigation plans Trends (performed with recurring clients)

Ethical Hacking cont’d

Q & A ANY QUESTIONS?

Risk IT Security performs a critical role in assessing risk in the organization. Vulnerability Scanning Penetration Testing Industry Trends IT Strategy Familiarity with Audit and Compliance measures IT Security performs a critical role in assessing risk in the organization. Vulnerability Scanning Penetration Testing Industry Trends IT Strategy Familiarity with Audit and Compliance measures

Audit Support In many cases, IT Security is heavily relied upon to perform in depth testing required by an audit organization. Security is enlisted by audit because: Technical expertise Familiarity with current issues from internal testing Familiarity with Policies, Standards, and Procedures In many cases, IT Security is heavily relied upon to perform in depth testing required by an audit organization. Security is enlisted by audit because: Technical expertise Familiarity with current issues from internal testing Familiarity with Policies, Standards, and Procedures

Compliance Compliance may relate to internal compliance or external compliance. Internal compliance: Policies and Standards Security and Configuration baselines Framework use – ISO, COBIT, ITIL, GAISP, NIST Best Practices Compliance may relate to internal compliance or external compliance. Internal compliance: Policies and Standards Security and Configuration baselines Framework use – ISO, COBIT, ITIL, GAISP, NIST Best Practices

Compliance cont’d External compliance: SOX (Sarbanes Oxley) COSO Framework HIPAA PCI Safe Harbor External compliance: SOX (Sarbanes Oxley) COSO Framework HIPAA PCI Safe Harbor

ISO Best Practices Source:

Compliance in Action Source:

Internal Policy IT Security is regularly tasked with creation and enforcement of IT policies, standards, and procedures. Creation and enforcement of these documents require: Understanding of audit roles and procedures Familiarity with all systems, networks, and applications Compliance considerations IT Security is regularly tasked with creation and enforcement of IT policies, standards, and procedures. Creation and enforcement of these documents require: Understanding of audit roles and procedures Familiarity with all systems, networks, and applications Compliance considerations

Internal Policy cont’d Definitions: A Policy is a set of directional statements and requirements aiming to protect corporate values, assets and intelligence. Policies serve as the foundation for related standards, procedures and guidelines. A Standard is a set of practices and benchmarks employed to comply with the requirements set forth in policies. A standard should always be a derivation of a policy, as it is the second step in the process of a company’s policy propagation. A Procedure is a set of step-by-step instructions for implementing policy requirements and executing standard practices. Definitions: A Policy is a set of directional statements and requirements aiming to protect corporate values, assets and intelligence. Policies serve as the foundation for related standards, procedures and guidelines. A Standard is a set of practices and benchmarks employed to comply with the requirements set forth in policies. A standard should always be a derivation of a policy, as it is the second step in the process of a company’s policy propagation. A Procedure is a set of step-by-step instructions for implementing policy requirements and executing standard practices.

Internal Policy cont’d

Policy creation and enforcement cycle

Policy Business Case A top 5 global food retailer has a massive IT/IS infrastructure and good governance….but no real policies! Policies are the foundation for enforcing IT compliance and governance. What policies were written for the client… A top 5 global food retailer has a massive IT/IS infrastructure and good governance….but no real policies! Policies are the foundation for enforcing IT compliance and governance. What policies were written for the client…

Policy Business Case cont’d Policies written for IT Security: Acceptable Use Policy Information Classification & Ownership Policy Risk Assessment & Mitigation Policy Access Control Policy Network Configuration and Communication Policy Remote Access Policy Business Continuity Policy Incident Response Policy Third Party Data Sharing Policy System Implementation & Maintenance Secure Application Development Cryptography & Key Management Mobile Computing Physical & Environmental Security Policies written for IT Security: Acceptable Use Policy Information Classification & Ownership Policy Risk Assessment & Mitigation Policy Access Control Policy Network Configuration and Communication Policy Remote Access Policy Business Continuity Policy Incident Response Policy Third Party Data Sharing Policy System Implementation & Maintenance Secure Application Development Cryptography & Key Management Mobile Computing Physical & Environmental Security

Policy Business Case cont’d Sample Policies

Q & A Any Questions? Contact Information Brandon Hoffman KPMG, LLP Any Questions? Contact Information Brandon Hoffman KPMG, LLP