Mahindra Satyam Confidential

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
ISMS standards and control processes ISO27001 & ISO27002
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
CIOassist Technologies Your CIO on Demand… Business Continuity Planning Our Offering CIOassist Technologies (
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Security Controls – What Works
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Program Objective Security Basics
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Business Continuity Management For Project Managers.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
ISMS Information Security Management System
Information Security Management Goes Global
Fusion Center ITS security and Privacy Operations Joe Thomas
E&O Risk Management: Meeting the Challenge of Change
BUSINESS CONTINUITY BY HUI ZHENG.
Information Security Awareness
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
Premier Employee Program Version 4.0
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Mahindra Satyam Confidential Information Security And Business Continuity @ Mahindra Satyam Mahindra Satyam Confidential

What is Information Security Management Management System that helps to Establish, implement, and operate Monitor, review, maintain and Improve Information Security Information Security is preservation of Confidentiality Integrity and Availability of Information And other properties such as Authenticity Accountability Non-repudiation Reliability Confidentiality: the property that information is not made available or disclosed to unauthorized individuals, entities, or processes Integrity: the property of safeguarding the accuracy and completeness of assets Availability: the property of being accessible and usable upon demand by an authorized entity Authenticity: the property of being genuine and being able to be verified and trusted Accountability: the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity Non-repudiation: assurance that the sender of information is provided with proof of delivery and the recipient is provided with the proof of the sender’s identity, so neither can later deny having processed the information Source: ISO27001:2005 standard Mahindra Satyam Confidential

Information Security Management System (ISMS) @Mahindra Satyam Based on the International standard ISO27001:2005 Globally certified (all current locations) Additional reference (QUALIFY) http://esupport.satyam.com  Webqualify ISMS Policy Manual – Section on Locations Certifying body: BVQI – UK Compliance is verified annually through Audits As the policies and controls are consistently applied across the organization, Satyam is globally certified. Any new location is considered as a scope extension and is covered as part of the surveillance and / or recertification audits. The current locations under scope are listed in the ISMS Policy Manual Mahindra Satyam Confidential

Mahindra Satyam Confidential ISO 27001: 2005 Contains the following domains Security Policy Organizing Information Security Asset management Human resource security Physical and environmental security Communications and operations management Access control Information systems acquisition, development & maintenance Information security incident management Business continuity management Compliance Mahindra Satyam Confidential

Mahindra Satyam Confidential Security Policy “To ensure Confidentiality, Integrity and Availability of information that is acquired, developed and provided to all stakeholders” Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Information Security Policy Mahindra Satyam Confidential

Organizing Information Security Chief Information Security Officer Information Security Management Forum Core Group Managing Director Local Core Groups Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Information Security Management Forum / Roles & Responsibilities Local core groups are constituted at each city for effective implementation of information security and business continuity. These local core groups are represented by the relevant stakeholders Mahindra Satyam Confidential

Mahindra Satyam Confidential Asset Management Assets classified as Physical, Software and Information Each carries a potential risk related to security based on the possible threats, asset based risk assessment is carried out the identified risks are mitigated through the implementation of controls Each asset should have an asset owner Information classification Data creation, storage and disposal Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Asset classification and control Physical assets are capital items, computer hardware etc. Software assets are software licenses, applications; Information assets are financial, HR, and legal records etc. Based on the risks associated with each of the asset, controls are identified and implemented to ensure security to the information and data. Information that is created or obtained is classified based on the confidentiality. A project confidential information cannot be shared with any associate outside the project. Similarly information classified as Circle confidential cannot be shared beyond the circle. Any deviation from the confidentiality would amount to violation of information security policy. All information should be stored on Mahindra Satyam’s network or Mahindra Satyam’s equipment and should not be taken out of the premises without the prior approval of the AIC or RM as the case may be. Any hard copies after use should be destroyed. Mahindra Satyam Confidential

Human Resource Security Is the weakest link in maintaining information security Reference and background check Confidentiality (non-disclosure) and Intellectual Property Rights agreement Specific agreements based on business requirement Similar process for trainees, contract and temporary staff Awareness training to all associates Reporting Security Incidents through iSIMS Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Personal Security For any organization human resource is the weakest link in ensuring information security and constitute a potential threat. At the time of joining a thorough reference and background checks for all the associates is carried out. All the associates also sign up Non-disclosure and IP rights agreement as part of the terms and conditions of the employment. In certain ODC and business engagements, the customer insists on specific agreements. At any point in time the associates should be aware of these terms and conditions because these would have legal binding and can lead to disciplinary actions. Trainees, contract and temporary staff also follow the same process of signing up agreements. To have an understanding of the security policies, each associate should undergo training and and as and when the policies undergo change should make themselves aware of such changes. In cases where the associates observe potential security violations and / or incidents that have the potential to become security incidents should report through the iSIMS system available in eSupport. iSIMS is an automated security incident tracking system that has the workflow to assign incidents for resolution and also escalation to higher levels of the management Mahindra Satyam Confidential

Physical and Environmental Security Physical security Physical security perimeter Physical entry control Securing offices, rooms and facilities & Working in secure areas Equipment security Equipment siting and protection Security of equipment – off premises such as laptops Secure disposal or re-use of equipment Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Physical and Environmental Security As part of the Physical security perimeter, Mahindra Satyam has four levels of barriers namely, perimeter compound wall with entry / exit points manned by security personnel where applicable, eg. STC reception area manned by Mahindra Satyam employee / security entry to Mahindra Satyam office premises through proximity identity cards / biometric access specific access to secure areas of concern such as server rooms Physical entry control ensures that only authorized personnel are allowed access The facilities, work areas and offices are secured through proper physical access control; storage spaces within the work area that can be locked; physical frisking; restriction on photography (even mobile phone camera); no personal laptops etc Equipment siting and protection is ensured through the deployment of security personnel to prevent thefts; fire detection systems; sufficient power backup systems; restriction on eating, drinking and smoking at work place; suitable controls to handle the laptops; storage media formatting before re-use; physical destruction of the storage media before disposal Mahindra Satyam Confidential

Communications & operations management Email policy To ensure proper use of Email facility by Mahindra Satyam Associates and to prevent its misuse. Email is provided for associates to conduct business; Personal use is discouraged All Email messages created and stored are Mahindra Satyam’s Proprietory Information Mahindra Satyam retains the right to supervise, access, and review Associate’s electronic mails Authorized users must not allow anyone else to send or receive e-mail using their Email accounts Company Confidential Information shall not be shared except to the extent necessary Company-related information shall be sent only to those Associates concerned on a “need to know” basis No Associate are allowed to send objectionable material Auto forwarding an email from inside Mahindra Satyam to an outside network shall not be allowed A disciplinary process is in place to address any violation of the spirit of this guideline Sending emails to Public Internet Email accounts shall be restricted and controlled Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Communications and operations management As per email policy confidential information should not be shared with external parties except on a need to know basis; objectionable material should not be send; certain attachments are restricted and are dropped at the gateway; mails to public email accounts is restricted Mahindra Satyam Confidential

Mahindra Satyam Confidential Access control Access control policy User access management Privilege management User password management User responsibilities Password use Unattended user equipment Internet / intranet access policy Application access control Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Access Control Users in the network shall be authenticated by basic authentication mechanism i.e., through a unique user ID. User access management is driven through a documented procedure that enables privilege management and user password management User responsibilities are driven by selection of good security practices while formulating the password and ensure confidentiality; usage of password locks, system log off, screen saver to enforce information security while the system is not in use. Usage of internet resources is monitored by the N&S team and malicious sites are restricted; users are expected not to post objectionable material on the intranet sites of Mahindra Satyam and also not share the intranet site content with external parties Access to internal applications is restricted where applicable Mahindra Satyam Confidential

Mahindra Satyam Confidential iSIMS Information Security Incident Management System The iSIMS application is under the associate workbench that can be used for logging information security incidents. The necessary workflow to ensure tracking and closure of the incident is inbuilt Mahindra Satyam Confidential

“If you fail to plan, you plan to fail” What is Business Continuity Management ? “ Business Continuity Management is the process of anticipating incidents which will affect critical functions and preparing the organization to prevent and respond to disasters in a planned and rehearsed manner.” “If you fail to plan, you plan to fail” - Anonymous

Interruptions Impact of Disaster on our Business COSTS Productivity Loss Number of Employees impacted Lost Revenue Direct Loss Compensatory Payments Lost Future Revenues Investment Loss Interruptions Total Outage Costs COSTS Delayed Collections Billing Losses Missed Discounts Extra Expense Cost to Recover Overtime Expense Increased Fraud Risk Increased Error Rate Travel Expenses Temporary Employees Damaged Reputation Customer, Suppliers, Partners, Banks, Financial Markets Credit Ratings Penalties Contractual Regulatory Legal

Mahindra Satyam’s BCMS Model Cause Failure Mode Effect Fire • War • Power Outage • Explosion • Computer Virus • Strike • Hacking • Flood Telecommunication Failure Theft & Robbery Shortage of Critical Items Critical Server Breakdown Earthquake • Prolonged absence of Essential Public services Information Infrastructure Personnel Country Outage City Outage Site Outage

Contingency Plans Site Outage City Outage Country Outage Critical services from alternate site in the same city Critical services from alternate site in another city - Critical services from BC center @ Singapore Onsite/Offsite Mahindra Satyam leverages its multi-location presence across the world to provide alternate sites for the critical projects.

Business Continuity Planning in Projects BC Plan Development Maintenance Identify Critical Projects Best Practice / Lessons learnt Risk Assessment Recovery SLAs & Options Implementation & Testing Project Acquisition Project Initiation Project Execution Project Planning Project Closure Assess BCP requirements Vs cost

Business Continuity Management Identification of Applications or Support services critical for continuity as required by the customer. Mitigation plans to minimize impact Customer approved Business continuity plans to manage disaster Continuity of services from alternate sites Multi-site and multi-city presence to manage site, city and country outage scenario BC options based on recovery window (RTO) Completion of scheduled BC tests and retrospective meetings Support required from other stakeholders such as CS, N&S to be notified and to be documented in the Location specific BCP. Updated call tree details to be sent on a monthly basis Logistics to address contingency and resumption activities (movement to alternate site, seating arrangement, connectivity requirements, and accommodation and food if required) including for critical associates Refer: QUALIFY QMS Documentation  Policy Manuals  BCMS  BCMS – Policy Manual Mahindra Satyam Confidential

Mahindra Satyam Confidential BC Plan Options BC Plan I Recovery of Critical projects Site Outage and City Outage scenarios 24hr –72 hr recovery windows Shared infrastructure Project specific infrastructure at cost Site capacity up to 5% of primary site 15% capacity over 3 shifts, in a common operating environment Plan III <4 hours Project Plan II <12 hours Customer Cost Plan I <72 hours Mahindra Satyam Service Level The Business Unit plans are of three types, Plan I, II and III. Plan I is the Mahindra Satyam Basic plan which is already in place and measures of risk mitigation etc have already been taken. (Click on ‘Mahindra Satyam’ to elaborate the Plans) Plan II and Plan III are Client specific and Project specific plans respectively and dependant on the nature of the engagement and the type of project. BC Plan I - provides min.acceptable service levels for customers. BC Plan II, III - provides enhanced service levels at additional cost Mahindra Satyam Confidential

Mahindra Satyam Confidential Compliance Compliance with Legal requirement Data Privacy protection Third party software usage Safeguarding organizational records Prevention of misuse of information processing facilities Refer: QUALIFY QMS Documentation  Policy Manuals  ISMS  ISMS – Policy Manual Section: Compliance Mahindra Satyam Confidential

Why Information Security Is a Statutory requirement Avoid legal liability in case of security breach Customers need assurance Information is key to business and any breach can have long lasting impact on the organization success & growth Competitive advantage To ensure Confidentiality, Integrity and Availability To ensure continuity of services Mahindra Satyam Confidential

Mahindra Satyam Confidential Do’s and Don’ts Do’s Follow Mahindra Satyam specific password guidelines Change password if there is an indication of compromise Change default passwords on computers and devises Use MS Office Communicator for instant messaging Follow clear screen and clear desk policy Don’ts Share passwords – you could be liable for a breach Use another associate’s email account Forward business mails to public email accounts Open suspicious attachments Distribute email addresses to third parties Mahindra Satyam Confidential

Mahindra Satyam Confidential Do’s and Don’ts Do’s Follow information classification guidelines Periodically check for the anti-virus signature Safeguard portable devices against theft Report lost or stolen equipment immediately Use iSIMS to report Information security incidents Don’ts Send sensitive data through wireless devises Use external storage devises Turnoff or disable anti-virus Download software, audio/video files from internet Publish Mahindra Satyam IP on internet sites Mahindra Satyam Confidential

Mahindra Satyam Confidential Do’s and Don’ts Do’s Lock workstation when it is not being used Zip the attachments to optimize bandwidth Safeguard portable devices against theft Report lost or stolen equipment immediately Use iSIMS to report Information security incidents Don’ts Share customer reference and / or related information Install unauthorized software Send offensive or disruptive material through email Visit malicious sites on the internet Misuse resources and privileges Mahindra Satyam Confidential

Mahindra Satyam Confidential Do’s and Don’ts Do’s Be aware of the NDA Go through the Information Security Policy Manual Use proximity access card for access to the facility Ensure boot password for laptops Secure laptops when left unattended Don’ts Use photographic equipment within Mahindra Satyam premises Leave laptops unattended (shopping malls, parking etc) Discuss company confidential information in public Ignore security requirements while developing Software Disclose project related data to unintended parties Mahindra Satyam Confidential

Mahindra Satyam Confidential Do’s and Don’ts Do’s Maintain Confidentiality on Customer Name, Project & Documents Maintain project records as per record retention guidelines / contract Identify Mahindra Satyam’s and Customer’s IP while delivering services to claim proprietary rights on Mahindra Satyam IP when required Adhere to Personal Data Privacy obligations as per contract Be sensitive to Information Security policy and procedures Don’ts Commence performance of work Contract is signed Subcontract work without Customer’s written consent Use Open Source unless authorized by Customer in writing Refer to Customer / Customer Trademarks / Logos in presentations unless the customer is REFERENCE-ABLE Be ignorant to the security policy and procedures Mahindra Satyam Confidential

Mahindra Satyam Confidential Thank You Mahindra Satyam Confidential