NIST framework vs TENACE Protect Function (Sestriere, 21-23 Gennaio 2015)

Slides:



Advertisements
Similar presentations
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Advertisements

Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
ITIL: Service Transition
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Audit Considerations of Data Center Consolidation Jon Ingram Audit Manager Information Technology Audits Florida Auditor General 1.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Environmental Management Systems Refresher
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Copyright 2005 Welcome to The Great Lakes TL 9000 SIG TL 9000 Requirements Release 3.0 to Release 4.0 Differences Bob Clancy Vice President, BIZPHYX,
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Information ITIL Technology Infrastructure Library ITIL.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Georgia Institute of Technology CS 4320 Fall 2003.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Working with HIT Systems
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Exercising, Maintaining and Reviewing BCM Arrangements ERMAN TASKIN
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Business Continuity Planning 101
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Working Group 6: Secure Hardware and Software – Security by Design Deliverable 2 Status Update June 22, 2016 Joel Molinoff, Co-Chair (CBS) Brian Scarpelli,
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
ITIL: Service Transition
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Mapping NIST CSF and GDPR Frameworks to Microsoft Technologies
Cybersecurity Policies & Procedures ICA
NIST Cybersecurity Framework
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
Cybersecurity ATD technical
Business Continuity Program Overview
Neopay Practical Guides #2 PSD2 (Should I be worried?)
IT Management Services Infrastructure Services
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)

Protect Function «Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services» part of the Framework Core one of the 5 Functions (Identify, Detect, Respond, Recover) set of activities to limit/contain the impact of a potential cybersecurity event how to map these activities in TENACE?

Categories Protect Function is composed by categories: – Access Control (PR.AC) – Awareness and Training (PR.AT) – Data Security (PR.DS) – Information Protection Processes and Procedures (PR.IP) – Maintenance (PR.MA) – Protective Technology (PR.PT)

NIST vs TENACE at a glance Where is the Protect function?

Review of the TENACE framework the current TENACE framework mostly highlights the Detect and Respond functions other functions are certainly present but don’t appear (e.g., Protect) actions – make the other functions to emerge – look through deliverables to determine coverage identify – gaps – future actions / directions

Access Control «Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions» Sub-categoryTENACE Identities and credentials are managed for authorized devices and users Yes (as a requirement) Physical access to assets is managed and protectedYes (uniparthenope) Remote access is managedYes (as a requirement) Access permissions are managed, incorporating the principles of least privilege and separation of duties Yes (as a requirement) Network integrity is protected, incorporating network segregation where appropriate ? (as a requirement)

Awareness & Training «The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements» Sub-categoryTENACE All users are informed and trainedNot addressed Privileged users understand roles & responsibilitiesNot addressed Third-party stakeholders (e.g., suppliers, customers, partners) understand roles & responsibilities Not addressed Senior executives understand roles & responsibilitiesNot addressed Physical and information security personnel understand roles & responsibilities Not addressed

Data Security «Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information» Sub-categoryTENACE Data-at-rest is protectedYes Data-in-transit is protectedYes Assets are formally managed throughout removal, transfers, and disposition Not addressed Adequate capacity to ensure availability is maintainedYes (D2a, ?) Protections against data leaks are implementedyes (partially) Integrity checking mechanisms are used to verify software, firmware, and information integrity Yes (D2a, ?) The development and testing environment(s) are separate from the production environment Yes (as a requirement)

Information Protection Processes and Procedures «Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets» Sub-categoryTENACE A baseline configuration of information technology/industrial control systems is created and maintained ? A System Development Life Cycle to manage systems is implemented ? Configuration change control processes are in placeYes Backups of information are conducted, maintained, and tested periodically Not addressed Policy and regulations regarding the physical operating environment for organizational assets are met Not addressed

Information Protection Processes and Procedures (2) Sub-categoryTENACE Data is destroyed according to policyNo Protection processes are continuously improvedYes Effectiveness of protection technologies is shared with appropriate parties No (check) Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed ? Response and recovery plans are tested? Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) ? A vulnerability management plan is developed and implemented Yes (check)

Protective Technology «Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements» Sub-categoryTENACE Audit/log records are determined, documented, implemented, and reviewed in accordance with policy Yes Removable media is protected and its use restricted according to policy No Access to systems and assets is controlled, incorporating the principle of least functionality Yes (as a requirement) Communications and control networks are protectedYes (as a requirement)

Maintenance «Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures» Sub-categoryTENACE Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools ? Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access ?