Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Information Technology Control Day IV Afternoon Sessions.
Database Administration and Security Transparencies 1.
9 - 1 Computer-Based Information Systems Control.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Chapter 19 Security.
Session 3 – Information Security Policies
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
SEC835 Database and Web application security Information Security Architecture.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
General Awareness Training
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
BUSINESS COMPUTER APPLICATION University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
COEN 252 Computer Forensics
CISSP Prep Guide Domain: Operations Security Javier Romero, GCIA CISSP January 2003.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Operations Security “Controls over the hardware in a computing facility, over the data media used, and over the operators using these resources.”
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Information Systems Security Operational Control for Information Security.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Information Systems Security Operations Security Domain #9.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Module 15 Managing Windows Server® 2008 Backup and Restore.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
CONTROLLING INFORMATION SYSTEMS
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Information Systems Security
CS457 Introduction to Information Security Systems
Securing Network Servers
INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 11 Designing Inputs, Outputs, and Controls.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Managing the IT Function
Systems Design Chapter 6.
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
6. Application Software Security
Presentation transcript:

Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7

Operations Security The CISSP candidate will be expected to know the resources that must be protected, the privileges that must be restricted, the control mechanisms that are available, the potential for access abuse, the appropriate controls, and the principles of good practice.

Controls and Protections The Operations Security domain is concerned with the controls that are used to protect hardware, software, and media resources from the following: –Threats in an operating environment –Internal or external intruders –Operators who are inappropriately accessing resources

Categories of Controls Preventative Controls – lower the amount & impact of unintentional errors Detective Controls – used to detect an error once it has occurred Corrective (or Recovery) Controls – help mitigate the impact of a loss event through data recovery procedures

Additional Control Categories Deterrent Controls (also called directive controls) Application Controls (built into software) Transaction Controls –Input Controls (properly input) –Processing Controls (valid trans & exceptions are reprocessed) –Output Controls (only prints to acct’ing printer) –Change Controls (configuration management) –Test Controls (prevent violations of confidentiality)

Covert Channel Analysis Information path not normally used for communication within a system – not protected – 2 types Covert storage channels - allow the direct or indirect writing of a storage location by one process and the direct or indirect reading of it by another Covert timing channels - allow one process to signal information to another process by modulating its own use of system resources in such a way that the change in response time observed by the second process would provide information

Separation of Duties Typical system administrator or enhanced operator functions: –Installing system software –Starting up (booting) and shutting down a system –Adding and removing system users –Performing backups and recovery –Handling printers and managing print queues Typical security administrator functions: –Setting user clearances, initial passwords, and other security characteristics for new users –Changing security profiles for existing users –Setting or changing file sensitivity labels –Setting the security characteristics of devices and communications channels –Reviewing audit data Two Man Control – check each other Rotation of Duties

Trusted Recovery Failure Preparation (backup) System Recovery –Rebooting the system into a single user mode—an operating system loaded without the security front end activated—so no other user access is enabled at this time –Recovering all file systems that were active at the time of the system failure –Restoring any missing or damaged files and databases from the most recent backups –Recovering the required security characteristics, such as file security labels –Checking security-critical files, such as the system password file

Configuration/Change Management Control The following are the primary functions of configuration or change control: –To ensure that the change is implemented in a orderly manner through formalized testing –To ensure that the user base is informed of the impending change –To analyze the effect of the change on the system after implementation –To reduce the negative impact the change may have had on the computing services and resources Five generally accepted procedures exist to implement and support the change control process: 1.Applying to introduce a change. 2.Cataloging the intended change. 3.Scheduling the change. 4.Implementing the change. 5.Reporting the change to the appropriate parties.

Administrative Controls Personnel Security –Employment Screening or Background Checks –Mandatory Taking of Vacation in One Week Increments –Job Action Warnings or Termination Separation of Duties and Responsibilities Least Privilege Need to Know Change/Configuration Management Controls Record Retention and Documentation

Least Privilege The three basic levels of privilege are defined as follows: –Read Only –Read/Write –Access Change

Due Care and Due Diligence The concepts of due care and due diligence require that an organization engage in good business practices relative to the organization's industry.

Resource Protection HARDWARE RESOURCES –Communications, which includes routers, firewalls, gateways, switches, modems, and access servers –Storage media, which includes floppies, removable drives, external hard drives, tapes, and cartridges –Processing systems, which includes file servers, mail servers, Internet servers, backup servers, and tape drives –Standalone computers, which includes workstations, modems, disks, and tapes –Printers and fax machines SOFTWARE RESOURCES –Program libraries and source code –Vendor software or proprietary packages –Operating system software and systems utilities DATA RESOURCES –Backup data –User data files –Password files –Operating Data Directories –System logs and audit trails

Hardware Controls Hardware Maintenance Maintenance Accounts Diagnostic Port Control Hardware Physical Control –Sensitive operator terminals and keyboards –Media storage cabinets or rooms –Server or communications equipment data centers –Modem pools or telecommunication circuit rooms

Software Controls Anti-Virus Management Software Testing Software Utilities Safe Software Storage Backup Controls

Privileged Entity Controls Special access to system commands Access to special parameters Access to the system control program

Media Security Controls Logging Access Control Proper Disposal

Media Viability Controls Marking Handling Storage

Physical Access Controls HARDWARE –Control of communications and the computing equipment –Control of the storage media –Control of the printed logs and reports SOFTWARE –Control of the backup files –Control of the system logs –Control of the production applications –Control of the sensitive/critical data

Monitoring Techniques Intrusion Detection Penetration Testing Violation processing using clipping levels

Security Auditing Backup controls System and transaction controls Data library procedures Systems development standards Data center security

Audit Trails The audit logs should record the following: –The transaction's date and time –Who processed the transaction –At which terminal the transaction was processed –Various security events relating to the transaction In addition, an auditor should also examine the audit logs for the following: –Amendments to production jobs –Production job reruns –Computer operator practices Other important security issues regarding the use of audit logs are as follows: –Retention and protection of the audit media and reports when their storage is off site –Protection against the alteration of audit or transaction logs –Protection against the unavailability of an audit media during an event

Problem Management Concepts The goal of problem management is threefold: 1.To reduce failures to a manageable level. 2.To prevent the occurrence or re- occurrence of a problem. 3.To mitigate the negative impact of problems on computing services and resources.

Threats and Vulnerabilities Accidental Loss –Operator input errors and omissions –Transaction processing errors Inappropriate Activities –Inappropriate Content –Waste of Corporate Resources –Sexual or Racial Harassment –Abuse of Privileges or Rights Illegal Computer Operations and Intentional Attacks –Eavesdropping –Fraud –Theft –Sabotage –External Attack

Vulnerabilities Traffic/Trend Analysis –Countermeasures Padding messages Sending noise Covert channel analysis Data Scavenging IPL Vulnerabilities Network Address Hijacking