Session 3 – Information Security Policies

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Module N° 4 – ICAO SSP framework
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
EMS Checklist (ISO model)
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
ISMS standards and control processes ISO27001 & ISO27002
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Auditing Computer Systems
Contractor Management and ISO 14001:2004
ISO Information Security Management
Security Controls – What Works
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
IS Audit Function Knowledge
Information Systems Security Officer
23 January 2003© All rights Reserved, 2002 Understanding Facilitated Risk Analysis Process (FRAP) and Security Policies for Organizations Infocomm Security.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Information Systems Security Policies & ISO 17799
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Computer Security: Principles and Practice
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
SEC835 Database and Web application security Information Security Architecture.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Human Resource Security ISO/IEC 27001:2013
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Security Management Goes Global
Providing Access to Your Data: Handling sensitive data
Magister Sistem Informasi UNIKOM
Cybersecurity Policies & Procedures ICA
IS4680 Security Auditing for Compliance
Introduction to the Federal Defense Acquisition Regulation
LAND RECORDS INFORMATION SYSTEMS DIVISION
INFORMATION SYSTEMS SECURITY and CONTROL
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Session 3 – Information Security Policies

How to establish security requirements General - background How to establish security requirements Risk assessments Legal, statutory requirements Business requirements for Information processing Select controls from a standard Controls to be considered to be common practice Information security policy Allocation of responsibilities Awareness and training Technical vulnerability management Incident reporting

Critical Success factors for addressing InfoSec in organisations Info sec policy, objectives Architectural approach Management commitment / support Understand info sec requirements Budget for info sec Awareness and training Effective incident reporting system Measurement system

12 Key control areas Risk assessment and treatment Information Security policy Organization / management of Info Sec Assets classification and control (management) Human resources security Physical and environmental security Communications and operations management Access control Information Systems acquisition, development and maintenance Information Security Incident Management Business Continuity Management Compliance

5. Security policy INFORMATION SECURITY POLICY Objective: To provide management direction and support for information security. Information Security Policy Document Control …should state mngt commitment Implementation guidance….definition Other information: ….distribution Review of the Information Security Policy

Security policy Information security policy d) a brief explanation of the security policies, principles, standards and compliance requirements of particular importance to the organization, for example: 1) compliance with legislative and contractual requirements; 2) security education requirements; 3) prevention and detection of viruses and other malicious software; 4) business continuity management; 5) consequences of security policy violations; e) a definition of general and specific responsibilities for information security management, including reporting security incidents;

Security policy Information security policy f) references to documentation which may support the policy, e.g. more detailed security policies and procedures for specific information systems or security rules users should comply with. This policy should be communicated throughout the organization to users in a form that is relevant, accessible and understandable to the intended reader.

Organization Information Security INTERNAL ORGANIZATION Objective: To manage information security within the organization establish management framework management with leadership to approve the information security policy, assign security roles co-ordinate implementation of security Establish a source of specialist information security advice if needed need multi-disciplinary approach to information security

Organization Information Security INTERNAL ORGANIZATION Management commitment to information security Information security co-ordination. Allocation of information security responsibilities Authorization process for information processing facilities Confidentiality agreements Contact with authorities Contact with special interest groups Independent review of information security...... EXTERNAL PARTIES Identification of risks related to external parties Addressing security when dealing with customers Addressing security in third party agreements

Asset Management RESPONSIBILITY FOR ASSETS Inventory of assets Objective: To achieve and maintain appropriate protection of organizational assets.-> be accounted for, have owner assign responsibility for maintenance of appropriate controls may delegate responsibility for implementing controls Owners should be identified for all assets and the responsibility for the maintenance of appropriate controls should be assigned. Inventory of assets Ownership of assets Acceptable use of assets

Asset Management INFORMATION CLASSIFICATION Classification guidelines Objective: To ensure that information receives an appropriate level of protection. Classify information to indicate need, priorities degree of protection varying degrees of sensitivity, criticality define appropriate set of protection levels, communicate need for special handing measures. Classification guidelines Information labelling and handling

Human Resources Security PRIOR TO EMPLOYMENT Objective: To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities. Address security responsibilities at the requirement stage, include in contracts, monitored during employment screen potential recruits adequately (sensitive jobs) All to sign confidentiality agreement. Roles and responsibilities Screening Terms and conditions of employment

Human Resources Security DURING EMPLOYMENT Objective: To ensure that employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error. An adequate level of awareness, education, and training in security procedures and the correct use of information processing facilities should be provided… Management responsibilities Information security awareness, education, and training Disciplinary process

Human Resources Security TERMINATION OR CHANGE OF EMPLOYMENT Objective: To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner. Change of responsibilities and employments within an organization should be managed . Termination responsibilities Return of assets Removal of access rights

Physical and environmental security SECURE AREAS Objective: To prevent unauthorized access, damage and interference to business premises and information. house critical/sensitive business information processing facilities in secure areas, physically protected from unauthorized access or damage or interference. The protection should be commensurate with the identified risks. clear desk and clear screen policy

Physical and environmental security EQUIPMENT SECURITY Objective: To prevent loss, damage or compromise of assets and interruption to business activities. Protect equipment physically from security threats and environmental hazards. to reduce risk of unauthorized access to data, to protect against loss or damage. also consider equipment siting and disposal Special controls to safeguard e.g. electrical supply

Communications and operations management OPERATIONAL PROCEDURES AND RESPONSIBILITIES Objective: To ensure the correct and secure operation of information processing facilities. Establish responsibilities and procedures for management and operation of all information processing facilities. development of operating instructions and incident response procedures Implement segregation of duties to reduce risk of negligent or deliberate system misuse

Communications and operations management Operational Procedures and Responsibilities Third Party Service Delivery Management System Planning and Acceptance Protection Against Malicious and Mobile Code Back-Up Network Security Management Media Handling Exchange of Information Electronic Commerce Services Monitoring

BUSINESS REQUIREMENTS FOR ACCESS CONTROL Objective: To control access to information. Control access to information, and business processes on basis of business and security requirements. take account of policies for information dissemination and authorization.

USER ACCESS MANAGEMENT Access control USER ACCESS MANAGEMENT Objective: To prevent unauthorized access to information systems. Need formal procedures to control allocation of access rights to information systems and services. initial registration of new users to final de-registration of users who no longer require access control allocation of privileged access rights

USER RESPONSIBILITIES Objective: To prevent unauthorized user access. Access control USER RESPONSIBILITIES Objective: To prevent unauthorized user access. co-operation of authorized users is essential for effective security. make users aware of responsibilities e.g. passwords use and security of user equipment.

NETWORK ACCESS CONTROL Objective: Protection of networked services. Control access to internal and external networked services to ensure that network users do not compromise the security of network services have: appropriate interfaces appropriate authentication mechanisms control of user access

OPERATING SYSTEM ACCESS CONTROL APPLICATION AND INFORMATION ACCESS CONTROL MOBILE COMPUTING AND TELEWORKING

INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND MAINTENANCE SECURITY REQUIREMENTS OF INFORMATION SYSTEMS Objective: To ensure that security is built into information systems. includes infrastructure, business applications and user-developed applications. Identify and justify all security requirements during requirements phase agree and document (before development)

INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND MAINTENANCE SECURITY IN DEVELOPMENT AND SUPPORT PROCESSES Objective: To maintain the security of application system software and information. strictly control project and support environments. Managers responsible for application systems also responsible for the security of the project or support environment. TECHNICAL VULNERABILITY MANAGEMENT

INFORMATION SECURITY INCIDENT MANAGEMENT REPORTING INFORMATION SECURITY EVENTS AND WEAKNESSES Reporting information security events Reporting security weaknesses MANAGEMENT OF INFORMATION SECURITY INCIDENTS AND IMPROVEMENTS Responsibilities and procedures Learning from information security incidents Collection of evidence

Business continuity management INFORMATION SECURITY ASPECTS OF BUSINESS CONTINUITY MANAGEMENT Objective: To counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters. Business continuity management: to reduce disruption from disasters/security failures to acceptable level Analyze consequences of disasters, security failures and loss of service. Develop and implement contingency plans Maintain and practice plans.

COMPLIANCE WITH LEGAL REQUIREMENTS Objective: To avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations and of any security requirements. may be statutory, regulatory and contractual security requirements for design, operation, use and management of information systems. Seek advice on specific legal requirements from the organization's legal advisers

Compliance COMPLIANCE WITH SECURITY POLICIES AND STANDARDS AND TECHNICAL COMPLIANCE Objective: To ensure compliance of systems with organizational security policies and standards. Review security of information systems regularly. Perform reviews against appropriate security policies and technical platforms audit information systems for compliance with security implementation standards.

INFORMATION SYSTEMS AUDIT CONSIDERATIONS Compliance INFORMATION SYSTEMS AUDIT CONSIDERATIONS Objective: To maximize the effectiveness of and to minimize interference to/from the system audit process. controls to safeguard operational systems and audit tools during system audits. Protect integrity and prevent misuse of audit tools.