Information Security at KFUPM

Slides:



Advertisements
Similar presentations
EMS Checklist (ISO model)
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
[Organisation’s Title] Environmental Management System
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
Environmental Management System (EMS)
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
COBIT - II.
Security Controls – What Works
Information Security Policies and Standards
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Managing the Information Technology Resource Jerry N. Luftman
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
IS Audit Function Knowledge
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
ISO InfoSec: Can you dig it?.
First Practice - Information Security Management System Implementation and ISO Certification.
The Information Systems Audit Process
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Purpose of the Standards
Chapter 3: Information Security Framework
Session 3 – Information Security Policies
Information Systems Controls for System Reliability -Information Security-
Fraud Prevention and Risk Management
Control environment and control activities. Day II Session III and IV.
Information Technology Audit
Consultancy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Basics of OHSAS Occupational Health & Safety Management System
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
COBIT Information Security An Introduction Tanvir Orakzai,PhD
ISO 14001:2004, Environmental Management System
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Chapter Three IT Risks and Controls.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Presented By Tay Un Soo Senior VP, Bank of Commerce President of ISACA - Malaysia Chapter 1999 National Accountants Conference THRIVING IN THE DIGITAL.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Hazards Identification and Risk Assessment
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
SMS Planning.  Safety management addresses all of the operational activities of the entire organization.  The four (4) components of an SMS are: 1)
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
OHSAS Occupational health and safety management system.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Alignment of COBIT to Botswana IT Audit Methodology
Presentation transcript:

Information Security at KFUPM Mian Zainulabadin Khurrum Certified Information Systems Security Professional (CISSP) Certified Information Systems Auditor (CISA) Manager Network Services

Why Information Security Should be looked at as a Business Enabler Essentially a risk mitigation process Management needs to accept that security is a process, not a project Security is an architecture unto itself, however it is also an infrastructure that spans the enterprise

Business Requirements IT Resources IT Processes The resources made available to—and built up by—IT How IT is organised to respond to the requirements What the stakeholders expect from IT Business Requirements IT Resources IT Processes Data Application systems Technology Facilities People Plan and Organise Aquire and Implement Deliver and Support Monitor and Evaluate Effectiveness Efficiency Confidentiality Integrity Availability Compliance Information reliability

THE CIA triad Confidentiality Integrity Availability For e.g. Data Classification Integrity For e.g. Auditing Availability For e.g. Disaster Recovery

Network Security Architectures Fortress Model Anyone outside the gate is suspect Anyone inside is trusted Static, undifferentiated Difficult to change Location-specific Reliant on strong walls and a secure gate

Network Security Architectures Airport Model Multiple security zones, based on roles Flexible and situational Multiple over-lapping technologies for identification, authentication and access control Series of fortresses within the master fortress

Enterprise Network Internet Connection Wireless Users Third Parties Stateful Inspection Firewall Intrusion Detection and Prevention Logging, Auditing Access Control Encryption Stateful Inspection Firewall Intrusion Detection and Prevention Logging, Auditing Access Control Application Specific Firewalls Extended Enterprise (ADSL, Student Dorms) Enterprise Network Internet Connection Wireless Users Third Parties Stateful Inspection Firewall Worm Attack Mitigation Selective Logging, Auditing Access Control Provide secure access to internal hosts Stateful Inspection Firewall Intrusion Detection and Prevention Logging, Auditing Authentication and Authorization

Network Security Architecture Point-to-Point dynamic trust No absolute trust for anyone Dynamic authentication and authorizations Suitable for E-Commerce and Virtual enterprises

There is more to Information Security Security Policy Organizational Security Asset classification and control Personnel Security Physical and Environmental Security Communications and Operations Management Access Control System Development and Maintenance Business Continuity Management Compliance

How to achieve a secure IT environment acting as a business enabler ? Adopt a Control Framework Based on International Standards

Two important International Standards COBIT (Control Objectives for Information Technology) ISO-17799 (Information Security Standard)

Why does IT need a control framework? Increasing dependence on information and the systems that deliver this information Increasing vulnerabilities and a wide spectrum of threats, such as cyberthreats and information warfare Scale and cost of the current and future investments in information and information systems The need to comply with regulations. Not relevant for SA The potential for technologies to dramatically change organisations and business practices, create new opportunities and reduce costs Recognition by many organisations of the potential benefits that technology can yield Examples of regulations: Committee for Sponsoring Organisations (COSO) To discharge management’s responsibilities as well as to achieve its objectives, they must establish an adequate system of internal control. This control system or framework must be in place to support business requirements for effectiveness and efficiency of operations, reliability of information and compliance with laws and regulations. Privacy legislation US Sarbanes-Oxley Act Successful organisations understand and manage the risks associated with implementing new technologies.

Why does IT need a control framework? To ensure that IT provides value Cost, time and functionality are as expected IT does not provide surprises Risks are mitigated IT pushes the envelope New opportunities and innovations for process, product and services management needs to get IT under control

Who needs a control framework? Board and Executive To ensure management follows and implements the strategic direction for IT Management To make IT investment decisions To balance risk and control investment To benchmark existing and future IT environment Users To obtain assurance on security and control of products and services they acquire internally or externally Auditors To substantiate opinions to management on internal controls To advise on what minimum controls are necessary

COBIT as a response to the needs Why and how is COBIT used? COBIT as a response to the needs Incorporates major international standards Has become the de facto standard for overall control over IT Starts from business requirements Is process-oriented COBIT CobiT COBIT CobiT best practices best practices Standards and regulations covered in COBIT: Technical standards from International Organisation for Standardisation (ISO), United Nations Directories for Electronic Data Interchange for Administration, Commerce and Transport (EDIFACT), etc. Codes of Conduct issued by Council of Europe, Organization for Economic Co-operation and Development (OECD), ISACA, etc. Qualification criteria for IT systems and processes: Information Technology Security Evaluation Criteria (ITSEC), Trusted Computer System Evaluation Criteria (TCSEC), ISO9000, Software Process Improvement and Capability Determination (SPICE), Guide to Software Quality Management System Construction and Certification (TickIT), Common Criteria, etc. Professional standards in internal control and auditing: Committee of Sponsoring Organisations of the Treadway Commission (COSO) report, Canadian Institute of Chartered Accountants (CICA), International Federation of Accountants (IFAC) Institute of Internal Auditors (IIA), American Institute of Certified Public Accountants (AICPA), Government Accountability Office (GAO), President's Council on Integrity and Efficiency (PCIE), ISACA standards, etc. Industry practices and requirements from industry forums, such the European Security Forum (ESF), I4 and government-sponsored platforms, such as the Infosec Business Advisory Group (IBAG), National Institute of Standards and Technology (NIST), Department of Trade and Industry (DTI), British Standard (BS) 7799, etc. Emerging industry specific requirements, for example, from banking, electronic commerce, health and pharmaceutical and IT manufacturing COBIT: Focuses on generally applicable and accepted international standard for good practice for IT controls Application to enterprisewide information systems, regardless of technology Starts from business requirements for information Is management and business process owner-oriented Based on ITGI's COBIT Control Objectives Aligned with the de jure and de facto standards and regulations Based on critical review of tasks and activities or process focus Includes existing standards and regulations: ISO, EDIFACT and others Codes of Conduct issued by the Council of Europe Professional standards in auditing: COSO, IFAC, IIA, ISACA, AICPA, etc. Was first published in April 1996, with 2nd edition issued in 1998 and 3rd edition in July 2000 Has become the de facto standard for control over IT Is fundamental in achieving IT governance repository for repository for IT Processes IT Processes IT Processes IT Processes IT Management Processes IT Management Processes IT Management Processes IT Management Processes IT Governance Processes IT Governance Processes IT Governance Processes IT Governance Processes

COBIT: Of what does it consist? Starts from the premise that IT needs to deliver the information that the enterprise needs to achieve its objectives Promotes process focus and process ownership Divides IT into 34 processes belonging to four domains and provides a high-level control objective for each Considers fiduciary, quality and security needs of enterprises, providing seven information criteria that can be used to generically define what the business requires from IT Is supported by a set of over 300 detailed control objectives Plan and Organise Acquire and Implement Deliver and Support Monitor and Evaluate Effectiveness Efficiency Availability Integrity Confidentiality Reliability Compliance

ISO I7799: 10 Areas Security policy: Security organization: Adopting a security process that outlines an organization's expectations for security, which can then demonstrate management's support and commitment to security. Security organization: Having a management structure for security, including appointing security coordinators, delegating security management responsibilities and establishing a security incident response process. Asset classification and control: Conducting a detailed assessment and inventory of an organization's information infrastructure and information assets to determine an appropriate level of security. Personnel security: Making security a key component of the human resources and business operations. This includes writing security expectations in job responsibilities (IT admins and end users), screening new personnel for criminal histories, using confidentiality agreements when dealing with sensitive information and having a reporting process for security incidents. Physical and environmental security: Establishing a policy that protects the IT infrastructure, physical plant and employees. This includes controlling building access, having backup power supplies, performing routine equipment maintenance and securing off-site equipment.

ISO I7799: 10 Areas Communications and operations management: Preventing security incidents by implementing preventive measures, such as using antivirus protection, maintaining and monitoring logs, securing remote connections and having incident response procedures. Access control: Protecting against internal abuses and external intrusions by controlling access to network and application resources through such measures as password management, authentication and event logging. Systems development and maintenance: Ensuring that security is an integral part of any network deployment or expansion, and that existing systems are properly maintained. Business continuity management: Planning for disasters--natural and man-made--and recovering from them. Compliance: No clear for Saudi Arabia. However Auditing Framework should be established to comply with adopted standards.

How to approach security Establishing Security Requirements Three main sources Risk Assessment Cdentified, evaluated and estimated Legal, Statutory, Regulatory Contractual requirements the organization must fill. Perhaps not relevant for Saudi Arabia. Do we have a contract with students ? Principle and Objectives Requirements to support operations

Assessing Risks Risk Assessment Considered on a systematic basis Business impact to CIA Likelihood of impact – threat vs controls Guides and determines actions and priorities Process of selecting controls is iterative per business unit and system Reviews based on Changing business requirements New threats and vulnerabilities Confirmation that current controls are effective Assessments performed at a high level and then more specifically for detailed risk.

Selecting Controls Should be selected based on a cost benefit analysis. Reputation should also be a factor in that decision.

InfoSec Guiding Principles InfoSec Best Practices Information security policy document Allocation of information security responsibilities Information security education and training Reporting security incidents Business continuity management

Information Security Policy To provide management direction and support for information security. A policy document should be approved by management, published and communicated, as appropriate, to all employees. It should state management commitment and set out the organization’s approach to managing information security. Policy owner should periodically review the policy; on effectiveness, efficiency and controls.

Information Security Policy Essential Requirements: Definition of InfoSec, objectives and scope. Management statement of support. Definition of responsibilities of management in InfoSec. Brief explanation of policies, principles standards and compliance. References to documents that support the policy with details for specific systems.

Information Security Management System (ISMS) Manage and maintain secure information system environment A framework to facilitate a relationship between processes and products. Implementation and maintenance or process and procedures; and must address the following, ID InfoSec needs Strategy to meet those needs Measurement of results Improving strategies over time Approach must be Hollistic Human Technology Process

ISMS Process ISMS – security policy forms the basis of the process Two phase approach Planning Implementation – the controls or guidelines as provided by ISO17799. Assess whether the guidelines apply Third party audit First step: pick a process Implement process ex. New employee screening Then check to see if all new employees are screened Second step: check for compliance Plan-Do-Check-Act Iterative process that requires feedback Must be tailored to fit

ISO17799 A Blue Print KFUPM decides to implement Senior Management must visually commit to adopting the standard Decide InfoSec Policy InfoSec policy once adopted must be furnished to all trained employees Senior Mngmt then decides which business units will be offered up for certification The orgs scope for this project produces an SMS Scope Doc The Risk Assessment (RA) is carried out for the Scope Doc(ID asset , threat , vuln.).= RA doc KFUPM decides risk approach and determines acceptable degree of risk KFUPM must decide to how to manage the identified risk so that residual deg. of risk is within acceptable limits. Once action, accountability and ownership are established, it is documented Controls to required to reduce risk to acceptable levels are identified. Controls selected from ISO17799 and documented Selected controls must be traceable to the risk they address. This is documented in the Statement of Acceptibality (SoA)

Achieving ISO Compliance

Sans Auditing Template 10 Areas of Audit Security Policy Organizational Security Asset Classification and Control Personnel Security Physical and Environmental Security Communications and Operations Management Access Control System Development and Maintenance Business Continuity Planning Compliance 36 Control Objectives 127 Controls

Sans Auditing Template

Critical Success Factors Security policy, objectives and activities that reflect business objectives An approach to implementing security that is consistent with the organizational culture* Visible support and commitment from management* A good understanding of the security requirements, risk assessment and risk management Effective marketing of security to all managers and employees Distribution of guidance on information security policy and standards to all employees and contractors Providing appropriate training and education* A comprehensive and balanced system of measurement which is used to evaluate performance in information security management and feedback suggestions for improvement.

Projects have not been mentioned deliberately Firewall will make us secure PKI will make us secure IDS will make us secure DRP plan will make us secure ERP is a magic, will change KFUPM

Questions