SecSDLC Chapter 2.

Slides:



Advertisements
Similar presentations
PhoenixPro Procurement. technology. contracts. projects.
Advertisements

Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Management of Information Security Chapter 2: Planning for Security
TEL2813/IS2820 Security Management
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Introduction to Information Security
Information Systems Security Officer
MANAGEMENT of INFORMATION SECURITY Second Edition.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT
Planning for Contingencies
Principles of Information Security, 2nd Edition1 Risk Management.
Computer Security: Principles and Practice
First Practice - Information Security Management System Implementation and ISO Certification.
TEL2813/IS2820 Security Management
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Vs Risk avoidance William Gillette.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Internal Auditing and Outsourcing
SEC835 Database and Web application security Information Security Architecture.
Information Systems Security Computer System Life Cycle Security.
Management of Information Security, 4th Edition
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Computer Security: Principles and Practice
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Management of Information Security Chapter 1: Introduction to the Management of Information Security If this is the information superhighway, it’s going.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 2 P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Security Management. Course objective The course is aimed at imparting knowledge and skill sets required to assume the overall responsibilities of administration.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Working with HIT Systems
Alaa Mubaied Risk Management Alaa Mubaied
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Information Security: Model, Process and Outputs Presentation to PRIA WG November 10, 2006.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Risk Identification and Risk Assessment
Lecture5 : Contingency planning Lecturer: Kawther Abas 25/12/ CS – Management of Programming Projects.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Planning for Security planning.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Systems Security
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY Second Edition.
Final HIPAA Security Rule
Chapter 1 Key Security Terms.
Presentation transcript:

SecSDLC Chapter 2

Phases of the SecSDLC

INVESTIGATION Directive from management Creation of security policy Teams: Analyse problem Define Scope Specify Goals Identify Constraints Feasibility Analysis Determine: Resources Commitment

ANALYSIS Analysis of: Existing security policies Known threats Current controls Legal issues –privacy laws on personal info

ANALYSIS – continued … Risk Management Identify, assess & evaluate risks levels (Especially threats to information) Threat: represents a constant danger to assets Attack: harm, damage – exploit vulnerabilities to compromise controlled system Threat agent: the cause of danger – object, person or entity Exploit: techniques used to misuse, take advantage of Vulnerability: weakness, exposure, helplessness, defenceless

Threats to Information Security

ANALYSIS – continued … Prioritise risk Manage risk By each category of threat and its related method of attack Manage risk Identify & assess value of information assets Risk assessment - Assigns comparative risk rating or score to each information asset

DESIGN LOGICAL DESIGN PHYSICAL DESIGN Team members: Create & develop blue print for security Examine & implement key policies Team members: Evaluate technology to support security blue print Generate alternative solutions Agree on final design Also includes developing criteria for determining the definition of successful solution.

DESIGN – continued … Security Models NIST & ISO/IEC 27002 Used to guide design process Provide framework to ensure all areas of security are addressed Framework adapted/adopted to meet InfoSec needs

DESIGN – continued … INFORMATION SECURITY PROGRAM – critical design elements (Purpose of InfoSec Program – p. 61) Policies provides rules for protection of information assets Gen/Security program policy Issue specific security policy System specific security policy SETA Security education – building in-depth education Security training – develop skills & knowledge Security awareness – improving awareness Design of controls Managerial – deals with security planning process & security program management – RM & Sec Control review Operational – lower level planning; DR &IR Technical – address tactical/technical implementation of security; technological issues

DESIGN – continued … Contingency Planning (CP) prepare, react & recover from circumstances threatening organisation Incident Response Planning (IRP) Disaster Recovery Planning (DRP) Business Continuity Planning (BCP) Design, implementation & maintenance of controls for physical resources People Hardware Information system elements

IMPLEMENTATION Security solutions acquired, implemented and tested Personnel issues evaluated Training Education programs Management of project plan Planning project Supervise tasks & action steps Wrapping up project

IMPLEMENTATION – continued … Project team Staffing InfoSec function Position & name security function Plan for proper staffing Understand impact of InfoSec across IT Integrate InfoSec concepts into personnel management practices Information Security Professionals CIO, CISO, Security Manager, Data Owner, Data Custodian, Data users Professional Certification

MAINTENANCE After implementation InfoSec program must be: Operated Properly managed Kept up to date using established procedures

MAINTENANCE – continued … Maintenance Model Focus org effort on systems maintenance External monitoring – new & emerging threats Internal monitoring – org netw & info systems Planning & risk assessment Vulnerability assessment & remediation – penetration testing Readiness & review - functionality

Maintenance Model

MAINTENANCE – continued … ISO Management Model Fault Management – id and address faults Configuration & Change Management – change components & change administration Accounting Management & Auditing – system monitoring Performance Management Security Management