Network security policy: best practices

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Policies and Standards
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
Network Security Testing Techniques Presented By:- Sachin Vador.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Requirement to Report Changes in Contact Information; Emergency Preparedness Requirements Leslie Shurtleff PWS Security Specialist Drinking Water Program.
Computer Security: Principles and Practice
Concepts of Database Management Seventh Edition
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 Dotting Your I’s and Crossing Your T’s: Preparing for an IT Audit David.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
The Quality Management System
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Incident Response Updated 03/20/2015
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Unit Introduction and Overview
Security management w.lilakiatsakun.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
HIPAA PRIVACY AND SECURITY AWARENESS.
Concepts of Database Management Sixth Edition
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Information Systems Security Operational Control for Information Security.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Information Assurance Policy Tim Shimeall
Developing Plans and Procedures
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Chapter 2 Securing Network Server and User Workstations.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Division of Risk Management State of Florida Loss Prevention Program.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Chapter 8 Auditing in an E-commerce Environment
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Business Continuity Planning 101
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Information Security Policy
Working at a Small-to-Medium Business or ISP – Chapter 8
Joe, Larry, Josh, Susan, Mary, & Ken
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Red Flags Rule An Introduction County College of Morris
County HIPAA Review All Rights Reserved 2002.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

Network security policy: best practices Ref: document ID 13601 www.cisco.com

Process Preparation Prevention Response Create usage policy statement Conduct a risk analysis Establish a security team structure Prevention Approving security changes Monitoring security of your network Response Security violation Restoration Review

Preparation: Create usage policy statement (1) Outline user’s roles and responsibilities with regard to security General policy : cover all network system and data within your company, by providing : Understanding of the security policy, its purpose Guidelines for improving their security practices Definitions of their security responsibilities Identify specific action that could result in punitive

Preparation: Create usage policy statement (2) Partner acceptable use statement : it provides Partner with an understanding of the information that is available to them The expected disposition of that information The conduct of the employee of your company Clearly explain any specific acts that have been identified as security attacks and the punitive action

Preparation: Create usage policy statement (3) Administrator acceptable use statement: to explain The procedures for user account administration Policy enforcement Privilege review It should be clearly presented specific policies concerning user passwords and handling data Check the policy with the partner acceptable use and user acceptable use statement to ensure uniformity Make sure that admin requirement listed in policy are reflected in training plan and performance evaluation

Preparation: Conduct a risk analysis (1) A risk analysis should identify the risk to Network , resources and data To identify portion of your network, assign a threat rating to each portion and apply appropriate level of security Each network resources can be assigned as 3 risk level Low risk: system or data that if compromised would not disrupt the business or cause legal or financial ramification, not provide further access to other system The targeted system or data can be easily restored Medium risk system or data that if compromised would cause a moderate disruption in the business or minor legal or financial ramification, provide further access to other system The targeted system or data requires a moderate effort to restore The restoration process is disruptive to the system

Preparation: Conduct a risk analysis (2) High risk system or data that if compromised would cause an extreme disruption in the business or major legal or financial ramification, Threaten the health and safety of a person provide further access to other system The targeted system or data requires a significant effort to restore The restoration process is disruptive to the business or the other systems

Preparation: Conduct a risk analysis (3) Identify the type of users as 5 most common types: Administrators : internal users responsible for network resources Privileged: internal users with a need for greater access Users: internal users with a general access Partners: external users with a need to access some resources Others: external users or customer

Preparation: Establish team structure Create a cross functional security led by a Security Manager with participants from each of your company’s operational area The security team has 3 areas of responsibilities Policy development : establishing and reviewing security policies for the company Practice: conduct the risk analysis, the approval of security change requests, review security alerts from both vendor and the CERT (Community Emergency Response Team) and turn the policy to implementations Response: to do the troubleshooting and fixing of such a violation, each team member should know in detail the security features provided by the equipment

Prevention: Approving security changes (1) Recommendation on reviewing the following types of changes: Any changes to the firewall configuration Any change to access control list (ACL) Any change to Simple Network Management Protocol (SNMP) configuration Any change or update in software that differs from the approved software revision level list

Prevention: Approving security changes (2) Recommended guidelines Change passwords to network devices on a routine basis Restrict access to network devices to an approved list of personnel Ensure that the current software revision levels of network equipment and server environments are in compliance with the security configuration requirement

Prevention: Monitoring security of your network (1) Similar to network monitoring except it focuses on detecting changes in the network that indicating a security violation In the Risk analysis matrix the firewall is considered as high risk network device – monitor it in real time From the Approving security changes Any changes to the firewall should be monitored It means SNMP agent should monitor such things as failed login attempts, unusual traffic, changes to the firewall, access granted to the firewall and connection set up through the firewall

Prevention: Monitoring security of your network (2) Following this example, create a monitoring policy for each area identified in your risk analysis Low-risk equipment : monitoring weekly Medium-risk equipment : monitoring daily High-risk equipment : monitoring hourly Lastly, security policy should address how to notify the security team of security violations such as email, SMS

Response: Security violation (1) First action after detection of an intrusion is the notification of the security team Define a procedure in security policy that is available 24 hours a day, 7 days a week Next define the level of the authority given to the security team to make changes, possible corrective actions are Implementing changes to prevent further access to the violation Isolating the violated systems Contacting the carrier or ISP in an attempt to trace the attack

Response: Security violation (2) Using recording devices to gather evidence Disconnecting violated systems or the source of the violation Contacting the police or other government agencies Shutting down violated system Restoring system according to a prioritized list Notify internal managerial and legal personnel

Response: Security violation (3) Lastly, collecting and maintaining information during security attack To determine the extent to which systems have been compromised To prosecute external violations To determine the extent of the violation Record the event by obtaining sniffer traces of the network, copies of log files, active user accounts and network connections Limit further compromise by disabling account, disconnecting the network equipment from the network and disconnecting from the internet

Response: Security violation (4) Back up the compromised system to aid in a detailed analysis of the damage and method of attack Look for other signs of compromise. Often when system is compromised there are other systems or accounts involved Maintain and review security device log files and network monitoring log files and the often provide clues to the method of attack

Response: Restoration Define in the security policy how to conduct secure and make available normal backup As each system has its own means and procedures for backing up the security policy should act as a meta-policy detailing for each system security condition that require restoration from backup If approval is required before restoration can be done include the process for obtaining approval as well

Response: Review (1) It is the final effort in creating and maintaining a security policy 3 things to be reviewed Policy / Posture / Practice Security policy should be a living document Reviewing against known best practices Check the CERT website for useful tips, practices security improvement and alert

Response: Review (2) Review network posture in comparison with the desired security posture Outside firm that specializes in security can attempt to penetrate the network and test not only the posture of the network but the security response of organization as well For high-availability networks, recommend conducting such a test annually Finally, practice is defined as a test of the support staff to insure that they have clear understanding of what to do during a security violation Often the test is unannounced and done conjunction with the network posture test It show the gaps in procedure and training of personnel so that corrective action can be taken