© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Chapter 10 Accounting Information Systems and Internal Controls
The New TNI Laboratory Accreditation Standards Requirements for an Accreditation Body.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley The CPA Profession Chapter 2.
Dr. Mohamed A. Hamada Lecturer of Accounting Information Systems Advanced Auditing Lecture 1 Assurance and Attestation Services.
Security and Personnel
Welcome! Internal Auditing CHAPTER 1. Definition Internal auditing is an independent, objective, assurance and consulting activity designed to add value.
Global Information Systems
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
The CPA Profession Chapter 2.
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Software Process Improvement Initiative
Control environment and control activities. Day II Session III and IV.
Internal Auditing and Outsourcing
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
Information Security Framework & Standards
Introduction to ISO International Organization for Standardization (ISO) n Worldwide federation of national standards bodies from over 100 countries,
Evolving IT Framework Standards (Compliance and IT)
Continual Service Improvement Process
Basics of OHSAS Occupational Health & Safety Management System
The CPA Profession Chapter 2 By Arens et. al. Learning Objective 1 Describe the nature of CPA firms, what they do, and their structure.
ITIL & COBIT O6PLM Kevin Lisay – Rendy Winarta –
Conformity Assessment and Accreditation Mike Peet Chief Executive Officer South African National Accreditation System.
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
This Lecture Covers Review of Internal Control Definitions.
Chapter Three IT Risks and Controls.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Roles and Responsibilities
Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles ® Registered Trademark of ARMA International.
Chapter 4 of the Executive Guide manual
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Holistic Approach to Security
FOURTH EUROPEAN QUALITY ASSURANCE FORUM "CREATIVITY AND DIVERSITY: CHALLENGES FOR QUALITY ASSURANCE BEYOND 2010", COPENHAGEN, NOVEMBER IV FORUM-
Environmental Management System Definitions
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles ® Registered Trademark of ARMA International.
ITIL VS COBIT 06 PLM - Group 9
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
C OBI T Brooke Pollack & Ian Paul November 14, 2007.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
#327 – Legal and Regulatory Risk: Silent and Possibly Deadly Deborah Frazer, CPA CISA CISSP Senior Director, Internal Audit PalmSource, Inc.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Copyright © 2011 Pearson Canada Inc. Auditing: The Art and Science of Assurance Engagements Chapter 2: The Public Accounting Profession.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
The CPA Profession Chapter 2.
IS4680 Security Auditing for Compliance
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Training Course on Integrated Management System for Regulatory Body
A Framework for Control
IS4680 Security Auditing for Compliance
THE ACCOUNTABLE NET: INFORMATION SECURITY GOVERNANCE
American National Standards Institute
COBIT 5 and GRC Date.
Presentation transcript:

© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies

© 2006 IBM Corporation Objectives  Describe governance, compliance and legal requirements that the business community operates under today  Understand the need for information security guidelines  Understand what system certification and evaluation are and why they are necessary  Explain regulatory acts and their benefits to corporations  Identify the components of an information security program

© 2006 IBM Corporation Key Terms  Compliance  Governance Requirements  Policy  CIPP  CISO  GIAC, CISSP, and SSCP  Sarbanes-Oxley  COSO Framework  CoBIT

© 2006 IBM Corporation Introduction  Implementing security on a system requires a plan.  Creating a plan requires guidelines.  Governments and standards bodies develop laws and guidelines which direct security policies.  Standards and guidelines bring ‘best practices’ to the IT industry.  Standards and guidelines put all IT shops on an even playing field when it comes to auditing and evaluations.

© 2006 IBM Corporation Governance, compliance and legal requirements  Government and professional bodies impose strict control requirements through legislation or certification requirements  Organizations integrate these regulatory controls into their business practices.  It is easier to establish uniform standards and monitor their compliance rather than inspect each company to ensure that it is protecting customer identities and is of the utmost integrity, although governments may check.  Governments and standards boards impose standards or controls only to protect the viability of the corporate environment, consumer privacy and confidence.  The CEO and CISO have to be familiar with the legal requirements and ensure that their organization follows all the laws and implements the procedures necessary.

© 2006 IBM Corporation Regulatory acts  There are two major categories of US laws regulating an organization and its IT operation. The first group covers core business security regulations, such as: –Basel II, Solvency II, IAS/IFRS, and HIPAA.  The second group includes the regulation of specific business processes related to IT security, such as: –FISMA, CobIT, British Standard 7799 (ISO 17799), Sarbanes- Oxley Act (US), and Homeland Security Act.  Although most of these acts are originated in the U.S., they already have been or will be adopted in other countries, especially in the European Union.  They apply to all companies acting in the U.S. or being registered at stock exchanges.

© 2006 IBM Corporation Information security guidelines  Essential to managing our information business assets is the creation of the information security program.  Organizations create Critical Infrastructure Protection Programs (CIPP) to protect business-critical infrastructure.  Organizations, mostly in the public sector, have always had such security and control programs and processes with varying degrees of coherence and corresponding effectiveness.

© 2006 IBM Corporation Information security programs  The Executive Information Security Policy, a component of the ISP, defines the scope of the policy and describes the need to protect information infrastructure in general.  Management needs to draft a document defining the program for:  the protection of information infrastructure and assets  the compliance with regulatory requirements  the creation of service level agreements with security included with partners  the creation of Service Level Requirements (SLR) of business unit communications  the creation of the office of the Chief Information Security Officer (CISO) to oversee the program  the update and change of the Corporate Information Security Policy documentation, that includes assigning of specific responsibilities so everyone knows what they are supposed to do and what is expected of them.

© 2006 IBM Corporation System certification and evaluation  Certification involves assessment that all the prescribed measures and controls are in place and that qualified people have technical responsibility for maintaining them.  It is performed independently from the staff who maintain the system.  Certification can be divided into three main areas –Certification for technical personnel –Certification for systems –Certification for processes

© 2006 IBM Corporation Certification for technical personnel  Global Information Assurance Certification (GIAC) –SysAdmin, Audit, Network, Security (SANS) Institute founded GIAC (Global Information Assurance Certification) in 1999 to develop a technical certification standard for security professionals. See the organizational Web site at:  Certified Information Systems Security Professional (CISSP) –Tests competence in the 10 domains or subject areas and in relevant work experience in the security field. –CISSPs are most often CISOs or senior level information security managers with policy or senior management responsibilities. –See the Web site at:  Systems Security Certified Practitioner (SSCP) –targeted towards the information security technologists that are on the “front-lines”. SSCP are operational technologists who are working as Network Security Engineers, Security Systems Analysts or Administrators. –The SSCP certification requires proficiency in 7 subject areas. –See the Web site at:

© 2006 IBM Corporation Certification for systems Common Criteria  The Common Criteria enables corporate technologists a means of standardizing a common set of requirements for the security functions of IT products.  These standardized requirements are backed by the International Standards Organization (ISO/IEC15408:1999) and are known as the Common Evaluation Methodologies (CEM).  Using CEM we can evaluate between different application and appliances judging how best they address an organization’s security requirements.  In 1999, six countries (Canada, France, Germany, Netherlands, United Kingdom, United States) became signatory to Common Criteria 2.0 making it an international standard.  See the Web site at:

© 2006 IBM Corporation Certification for processes  One challenge companies will face in complying with the regulations is choosing an appropriate methodology and developing a sequence of steps from which to evaluate their internal controls.  Here are two frameworks that are suitable to this task: –COSO Framework This framework describes that internal controls should be comprised of five components and that all components must be in place in order for the internal control to be considered effective. –Control Environment, Risk Assessment, Control Activities, Information and Communication, Monitoring –CoBIT: Control Objectives for Information and Technology (CoBIT) The objective for creating COBIT was to interpret the COSO Framework specifically from an IT perspective, resulting in a framework that, according to the Information Systems Audit and Control Association (ISACA), is increasingly internationally accepted as good practice for control over information, IT and related risks.’ In examining COBIT specifically to Sarbanes-Oxley, ITGI has published IT Control Objectives for Sarbanes-Oxley,’ resulting in a framework containing detailed IT processes and control objectives specific to financial reporting. Like ISO the control objectives provide a common framework in what would otherwise require each organization to maintain individualized standards. –Being able to normalize IT governance standards allows organizations to adopt the best practices gleaned from experience.

© 2006 IBM Corporation Summary  Legislative and corporate governance and compliance requirements required that we create the means by which we manage information security and measure our compliance efforts.  Over the years methods have been developed by the industry and professional associations to ensure that a method existed by which standardized methods and best practices can be shared.  Common Criteria Certification allows consumers to evaluate different products using common guidelines  Personnel, systems, and processes can be certified as compliant with standards