Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.

Slides:



Advertisements
Similar presentations
Redundant Array of Independent Disks (RAID) Striping of data across multiple media for expansion, performance and reliability.
Advertisements

 RAID stands for Redundant Array of Independent Disks  A system of arranging multiple disks for redundancy (or performance)  Term first coined in 1987.
Database Administration and Security Transparencies 1.
RAID- Redundant Array of Inexpensive Drives. Purpose Provide faster data access and larger storage Provide data redundancy.
2P13 Week 11. A+ Guide to Managing and Maintaining your PC, 6e2 RAID Controllers Redundant Array of Independent (or Inexpensive) Disks Level 0 -- Striped.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
9 - 1 Computer-Based Information Systems Control.
Security Controls – What Works
Chapter 19: Network Management Business Data Communications, 4e.
Information systems Integrity Protection. Facts on fraud  UK computer fraud 400 Million £  on companies  avg case £  France.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Security: Principles and Practice
Concepts of Database Management Seventh Edition
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
November 2009 Network Disaster Recovery October 2014.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Security Technological Security Implementation and Privacy Protection.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
II.I Selected Database Issues: 1 - SecuritySlide 1/24 II. Selected Database Issues Part 1: Security Lecture 1 Lecturer: Chris Clack 3C13/D6.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
HIPAA COMPLIANCE WITH DELL
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security.
CSI-09 COMMUNICATION TECHNOLOGY FAULT TOLERANCE AUTHOR: V.V. SUBRAHMANYAM.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operational Control for Information Security.
Information Systems Security Operations Security Domain #9.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Redundant Array of Independent Disks.  Many systems today need to store many terabytes of data.  Don’t want to use single, large disk  too expensive.
Module 6: Designing Security for Network Hosts
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Chapter 2 Securing Network Server and User Workstations.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
The concept of RAID in Databases By Junaid Ali Siddiqui.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
ISA 400 Management of Information Security Philip Robbins – October 31, 2015 Application and Operations Security Information Security & Assurance Program.
Information Systems Security
Blackboard Security System
Securing Network Servers
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Processing Integrity and Availability Controls
UNIT IV RAID.
Database Security &Threats
IS4680 Security Auditing for Compliance
Presentation transcript:

Security Operations

2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged Entity Control Categories of Controls

3 Operations Security Focus Areas Remote Storage Backups Tape Library Hardware Software Media Peopleware Auditors Support Staff Vendors Security Programmers Operators Engineers Administrators

4 Information Security TRIAD Availability Confidentiality Integrity Information Security

5 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control

6 Facility Support Systems As discussed within the Physical Security domain, the support systems in a centralized or decentralized Operations center must be protected.

7 Facility Support Systems Fire Protection HVAC Electric Power

8 Facility Support Systems Water Communications

9 Risk of Physical Access to Equipment Reduce risk or impact of threats resulting from unauthorized physical access

10 Media Management Another objective of Operations Security is to protect storage media

11 Object Reuse The reassignment of a storage medium that previously contained one or more objects To be securely reassigned, no residual data can be available to the new subject through standard system mechanisms Disclosure Contamination

12 Clearing of Magnetic Media Overwriting Degausser Physical Destruction

13 Destroying Media Management Practices Declassifying Storing Handling Labeling Marking Sensitive Media Controls

14 Misuse Prevention ThreatsCountermeasures Personal Use Theft of Media Fraud Sniffers Acceptable use policy, workstation controls, content filtering, filtering Appropriate media controls Balancing of input/output reports, separation of duties, verification of information Encryption

15 Records Management Records Management Program Development Guidelines Records Retention

16 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control

17 Software & Data Backup Operation controls must ensure adequate backups of: Data Operating Systems Applications Transactions Configurations Reports

18 RAID - Redundant Array of Independent Disks Backup of Data stored on Disk Drives Hardware-based Software-based Use of a Hot Spare

19 Stripes data evenly across two or more disks with no parity information for redundancy to increase system performance RAID Level 0 A7 A2A1 A3 A5A6 A4 A8 RAID 0

20 RAID Level 1 Creates an exact copy (or mirror) of a set of data on two or more disks

21 RAID Level 2 Stripes data at the bit level using a Hamming Code for error correction Requires 39 disks!

22 RAID Level 3 Uses byte-level striping with a dedicated parity disk Parity Drive Stripe 4A Stripe 1BStripe 1A Stripe 2A Stripe 3AStripe 3B Stripe 2B Stripe 4B RAID 3 P(1A, 1B) P(3A, 3B) P(2A, 2B) P(4A, 4B) Disk A Disk B

23 RAID Level 4 Uses block-level striping with a dedicated parity disk Similar to RAID 3 except that it stripes at the block, rather than the byte level

24 RAID Level 5 Uses block-level striping with parity data distributed across all member disks Stripe 4A Stripe 1BStripe 1A P(2B, 2C) Stripe 3AP(3A, 3C) Stripe 2B Stripe 4B RAID 5 P(1A, 1B) Stripe 3C Stripe 2C P(4A, 4B) Disk A Disk B Disk C

25 RAID Level 6 RAID 6 extends RAID 5 by adding an additional parity block, thus it uses block-level striping with two parity blocks distributed across all member disks Like RAID 5, the parity is distributed in stripes with the parity blocks in a different place in each stripe

26 RAID Level 0+1 Used for both mirroring and striping data among disks A hard drive failure in one array can be recovered from the other array A7 A2A1 A3 A5A6 A4 A8 RAID 0 A7 A2A1 A3 A5A6 A4 A8 RAID 0 RAID 0+1 RAID 1

27 A8 A2 A4 A6 A4 A8 RAID 1 A7 A1 A3 A5 A3 A7 RAID 1 RAID 10 RAID 0 RAID Level 10 Also known as RAID 1+0 Very high reliability combined with performance

28 Redundant Array of Independent Tapes (RAIT) Level 1 RAIT Using tapes rather than disk Real-time mirroring

29 Hot Spares An unused backup array disk that is part of the array group Hot spares remain in standby mode Types of Hot Spares Global Hot Spare Dedicated Hot Spare

30 Other Backup Types File Image Data Mirroring Electronic Vaulting Remote Journaling Database Shadowing Redundant Servers/Standby Services

31 Fault Tolerance Usually refers to Hardware failure The system recognizes a failure has occurred Automatically takes corrective action

32 System Recovery - Trusted Recovery Correct implementation Ensure that failures and discontinuities of operation don't compromise a system's secure operation

33 Types of Trusted Recovery System Reboot System Reboot Emergency System Restart Emergency System Restart System Cold Start

34 Fail Secure To fail in a way that will cause no harm, or a minimal amount of harm, to other devices or danger to personnel, but doesn’t cause the system to be insecure.

35 Operational Incident Handling First line of Defense Logging, Tracking and Analysis of Incidents Escalation and Notification

36 Incident Response Team Benefits Learning to respond efficiently to an incident Priorities

37 System Failure Power Failure - UPS Denial of Service Contingency Plans Intrusion Tampering Business Continuity Plans Detailed Recovery Procedures

38 Specific Operational Contingency Preparations System Failure Denial of Service Tampering or Intrusions Production Delays I/O Errors

39 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control

40 Change Control Management Integrated with Business and IT Initiatives Sets out change control process and ownership of changes Ensures that all changes are reviewed for potential security impact

41 Change Control Committee Objectives Ensure all changes are Properly tested Authorized Scheduled Communicated Documented

42 Change Control Procedures Impact Assessment ApprovalBuild/ Test Implement Monitor Request

43 Configuration Management The control of changes made to: Hardware Software Firmware Documentation Test fixtures and test documentation conducted throughout the system lifecycle

44 Hardware Inventory and Configuration Hardware Inventory - An overview of the hardware installed on any automated system Hardware Configuration Chart - Details the configuration of the system

45 Protection of Operational Files Library Maintenance Backups Source Code Object Code Configuration files Librarian

46 Documentation Requirements Format Copies

47 Patch Management Identification of Patches Patch Testing Rollout Deployment challenges

48 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control

49 Operator Privileges Operates and monitors mainframe and mid-range computers and peripheral equipment, such as printers, tape and disk drives

50 Administrator Privileges Responsible for running technically advanced information systems which includes the setup and maintenance of computers and networks Systems Administrators Network Administrators

51 Security Administrator Privileges Security administration including: Policy Development Implementation Maintenance and compliance Vulnerability Assessments Incident Response

52 Control Over Privileged Entities Review of access rights Supervision Monitoring

53 Domain Summary Operations Security dealt with Resource protection Continuity of Operations Change Control Management Privileged Entity Control

“Security TranscendsTechnology”