Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.

Slides:



Advertisements
Similar presentations
COMPANY MAINTENANCE MANUAL
Advertisements

Module N° 3 – ICAO SARPs related to safety management
Module 1 Evaluation Overview © Crown Copyright (2000)
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Auditing Computer Systems
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Information Systems Security Operations Security Domain #9.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Small Business Security Keith Slagle April 24, 2007.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Module 11: Designing Security for Network Perimeters.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Information Security tools for records managers Frank Rankin.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Effective Board Governance & role of the Audit Committee Presentation by Cluster Audit Committee – July / August 2012.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
CS457 Introduction to Information Security Systems
Management Information Systems
Information Security Policy
Cybersecurity - What’s Next? June 2017
Data and database administration
Security Standard: “reasonable security”
LM 8 Data Administration & Database Administration
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
ISO/IEC BRIEFING..
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium

Presentation Topics  NATO Headquarters activities  NATO Headquarters approach to security  Security principles & techniques

The Prime Directive - I NATO information… …shall be managed as a corporate resource to support NATO [business]… … throughout its life-cycle... … throughout its life-cycle... Extract from NATO Information Management Policy

The Prime Directive - II NATO information… …shall be protected… …to ensure its confidentiality, integrity and availability throughout its life-cycle... Extract from NATO Information Management Policy

What is NATO?  An alliance of 19 nations... ...and EAPC, PJC & NUC  The forum for consultation and decisions on security matters  A facility for co-operation in other matters

NATO HQ Activities HEADQUARTERS ADMINISTRATION PROGRAMME MANAGEMENT COORDINATION OF ACTIVITIES POLITICAL CONSULTATION

NATO HQ STAFF: CREATE, COLLATE, MANAGE MEETING ATTENDEES: CREATE, REVIEW, APPROVE AGENDAS DOCUMENTS NOTES DECISION SHEETS DOCUMENTS COMMENTS The Consultation Process CONSULTATIONrequiresINFORMATIONrequires INFORMATION MANAGEMENT requires INFORMATION SECURITY

Transformation of NATO since 1989  Political NATO > EAPC > OTHERS NATO > EAPC > OTHERS  Information Technology Mainframe > LAN > WAN [> Internet] Mainframe > LAN > WAN [> Internet]  Security Confidentiality > Integrity & Availability Confidentiality > Integrity & Availability

NATO HQ Organisation NAC EAPC MILITARY COMMITTEE INTERNATIONAL MILITARY STAFF INTERNATIONAL STAFF NATIONAL/ PARTNER DELEGATIONS MILITARY REPRESENTATIONS

Security Domains EAPC DOMAIN NATO DOMAIN EXTERNAL DOMAIN MILREPSDELEGATIONS PARTNER MISSIONS MILITARY COMMANDS NATO AGENCIES MEMBER NATIONS PARTNER NATIONS INTERNATIONAL ORGANISATIONS OTHER NATIONS MEDIA GENERAL PUBLIC ACADEMEINDUSTRY INTERNATIONAL STAFFS NATO HQ

NATO HQ Approach to Security  Separate regime for each domain  Same process: Adherence to NATO Policy Adherence to NATO Policy Structure Structure Objectives Objectives Principles Principles Countermeasures Countermeasures

Structure  Formality: separation of functions separation of functions documentation documentation  Security as system functionality: design design development development testing testing  Managed throughout life-cycle configuration management configuration management

Separation of Roles Operating Authority system development system installation system operation system maintenance Security Authority risk analysis security SOPs equipment approval audits Security Accreditation Authority accreditationinspections

Documentation  Security requirements statement  Security operating procedures  Interconnection agreements

Objectives  Protecting NATO information against loss of: Confidentiality Confidentiality Integrity Integrity Availability Availability  By either accidental or deliberate act

Definitions  Confidentiality disclosure of information to unauthorised parties disclosure of information to unauthorised parties  Integrity modification of information modification of information  Availability destruction of data destruction of data denial of service (access to data) denial of service (access to data)

Principles - I  Risk management  Minimality  Least privilege  Self-protecting nodes  Defence-in-depth  Implementation verification

Risk Management  Use of approved methodology  Analysis of: Threats Threats Vulnerabilities Vulnerabilities  Risk Assessment  Countermeasures  Residual Risk

Countermeasures Residual Risk Risk Management Risk assessment RequirementsCost Risk Analysis Threats & Vulnerabilities

Residual Risk RISK IDENTIFIED BY RISK ASSESSMENT RISK COVERED BY COUNTER MEASURES Residual Risk: Risk accepted due to cost/difficulty of countermeasures

Principles - I  Risk management  Minimality  Least privilege  Self-protecting nodes  Defence-in-depth  Implementation verification

Principles - II  Minimality only enable those services required only enable those services required  Least privilege users only given functions & authorizations they need users only given functions & authorizations they need  COTS software must be managed

Principles - III  Self-protecting nodes each network node protects itself each network node protects itself regards other nodes as untrusted regards other nodes as untrusted  Defence-in-depth no reliance on one single measure no reliance on one single measure  Implementation verification regular review of security posture regular review of security posture change/configuration management change/configuration management

Countermeasures PHYSICAL PERSONNEL TECHNICAL PROCEDURAL

Countermeasures - I  Physical separation of domains separation of domains restrict access to information stores restrict access to information stores data redundancy data redundancy  Personnel careful selection of staff careful selection of staff education education beware the “insider” threat beware the “insider” threat

Countermeasures - II  Procedural standard operating procedures standard operating procedures need-to-know separation need-to-know separation inspections & reviews inspections & reviews configuration management configuration management  Technical certified products certified products access controls & audit tools access controls & audit tools firewalls & filters firewalls & filters anti-virus software anti-virus software

Conclusions  Information systems are critical to operations  Security: is an integral part of the overall system is an integral part of the overall system must be managed throughout entire life-cycle must be managed throughout entire life-cycle requires structure & method requires structure & method requires a balanced mix of a wide variety of techniques requires a balanced mix of a wide variety of techniques

Maximum Line Capacity Incoming Traffic ( ) Outgoing Traffic (Web) Denial of Service Attack (flooding line)