Planning for Security planning.

Slides:



Advertisements
Similar presentations
Security and Personnel
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Planning and Strategic Management
Management of Information Security Chapter 2: Planning for Security
TEL2813/IS2820 Security Management
IT Governance and Management
Elements of Planning and Decision-Making
IT Planning.
Introduction to Information Security
Database Administration
MANAGEMENT of INFORMATION SECURITY Second Edition.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT
TEL2813/IS2820 Security Management
Certified Business Process Professional (CBPP®)
Purpose of the Standards
Planning and Strategic Management
Lecture 3 Strategic Planning for IT Projects (Chapter 7)
Charting a course PROCESS.
Information Technology Audit
Internal Auditing and Outsourcing
Leaders Facilitate the Planning Process
SEC835 Database and Web application security Information Security Architecture.
Copyright Course Technology 1999
Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Planning and Strategic Management Chapter 04.
Do it pro bono. Strategic Scorecard Service Grant The Strategy Management Practice is presented by Wells Fargo. The design of the Strategic Scorecard Service.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Management of Information Security, 4th Edition
NIST Special Publication Revision 1
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
The Challenge of IT-Business Alignment
Certificate IV in Project Management Introduction to Project Management Course Number Qualification Code BSB41507.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Principles of Information Security, 3rd Edition2 Introduction  The SecSDLC implementation phase is accomplished through changing the configuration and.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Project Life Cycle – Project Initiation © Ed Green Penn State University All Rights Reserved.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 2 P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because.
McGraw-Hill/Irwin Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Identification and Selection of Development Projects.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
+ Chapter 9: Management of Business Intelligence © Sabherwal & Becerra-Fernandez.
Security Management. Course objective The course is aimed at imparting knowledge and skill sets required to assume the overall responsibilities of administration.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
1 EMS Fundamentals An Introduction to the EMS Process Roadmap AASHTO EMS Workshop.
SecSDLC Chapter 2.
Amity School of Business Amity School of Business Management Foundation Module-II By Neeti Saxena Assistant Professor, ASB 1.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 1 I NTRODUCTION TO THE M ANAGEMENT OF I NFORMATION S ECURITY If this is the information superhighway,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
MGT 498EDU The learning interface/mgt498edudotcom.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
MIS Project Management Instructor: Sihem Smida Project Man agent 3Future Managers1.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY Second Edition.
MGT 498 Education for Service-- snaptutorial.com.
MGT 498 TUTORIAL Lessons in Excellence -- mgt498tutorial.com.
MGT 498 Education for Service-- snaptutorial.com
MGT 498 TUTORIAL Education for Service--mgt498tutorial.com.
MGT 498 Teaching Effectively-- snaptutorial.com
MGT 498 EDU Education for Service-- mgt498edu.com.
Strategy and Strategic Planning:
Presentation transcript:

Planning for Security planning

Objectives Upon completion of this material, you should be able to: –Identify the roles in organizations that are active in the planning process –Explain the principal components of information security system implementation planning in the organizational planning scheme –Differentiate between strategic organizational InfoSec and specialized contingency planning

Objectives (cont’d.) Upon completion of this material, you should be able to: (cont’d.) –Describe the unique considerations and relationships between strategic and contingency plans

Figure 2-1 Information Security and Planning Source: Course Technology/Cengage Learning Introduction

The Role of Planning Successful organizations utilize planning Planning involves –Employees –Management –Stockholders –Other outside stakeholders –The physical and technological environment –The political and legal environment –The competitive environment

The Role of Planning (cont’d.) Strategic planning includes: –Vision statement –Mission statement –Strategy –Coordinated plans for sub units Knowing how the general organizational planning process works helps in the information security planning process

The Role of Planning (cont’d.) Planning is creating action steps toward goals, and then controlling them Planning provides direction for the organization’s future In the top-down method, an organization’s leaders choose the direction –Planning begins with the general and ends with the specific

Values Statement Establishes organizational principles –Makes organization’s conduct standards clear RWW values commitment, honesty, integrity and social responsibility among its employees, and is committed to providing its services in harmony with its corporate, social, legal and natural environments The values, vision, and mission statements together provide the foundation for planning

Vision Statement The vision statement expresses what the organization wants to become Vision statements should be ambitious –Random Widget Works will be the preferred manufacturer of choice for every business’s widget equipment needs, with an RWW widget in every machine they use

Mission Statement Mission statement –Declares the business of the organization and its intended areas of operations –Explains what the organization does and for whom –Random Widget Works, Inc. designs and manufactures quality widgets and associated equipment and supplies for use in modern business environments

Figure 2-2 Microsoft’s Mission and Values Statement Source: Course Technology/Cengage Learning

Strategic Planning Strategy is the basis for long- term direction Strategic planning guides organizational efforts –Focuses resources on clearly defined goals –“… strategic planning is a disciplined effort to produce fundamental decisions and actions that shape and guide what an organization is, what it does, and why it does it, with a focus on the future.”

Creating a Strategic Plan Figure 2-3 Top-down Strategic Planning Source: Course Technology/Cengage Learning

Creating a Strategic Plan (cont’d.) An organization develops a general strategy –Then creates specific strategic plans for major divisions –Each level or division translates those objectives into more specific objectives for the level below In order to execute this broad strategy executives must define individual managerial responsibilities

Planning Levels Strategic goals are translated into tasks Objectives should be specific, measurable, achievable, reasonably high and time-bound (SMART) Strategic planning then begins a transformation from general to specific objectives

Planning Levels (cont’d.) Figure 2-4 Planning Levels Source: Course Technology/Cengage Learning

Planning Levels (cont’d.) Tactical Planning –Has a shorter focus than strategic planning –Usually one to three years –Breaks applicable strategic goals into a series of incremental objectives

Planning Levels (cont’d.) Operational Planning –Used by managers and employees to organize the ongoing, day-to-day performance of tasks –Includes clearly identified coordination activities across department boundaries such as: Communications requirements Weekly meetings Summaries Progress reports

Planning and the CISO Elements of a strategic plan –Executive summary –Mission statement and vision statement –Organizational profile and history –Strategic issues and core values –Program goals and objectives –Management/operations goals and objectives –Appendices (optional)

Planning and the CISO (cont’d.) Tips for creating a strategic plan –Create a compelling vision statement that frames the evolving plan, and acts as a magnet for people who want to make a difference –Embrace the use of the balanced scorecard approach –Deploy a draft high level plan early, and ask for input from stakeholders in the organization

Planning and the CISO (cont’d.) Tips for creating a strategic plan (cont’d.) –Make the evolving plan visible –Make the process invigorating for everyone –Be persistent –Make the process continuous –Provide meaning –Be yourself –Lighten up and have some fun

Information Security Governance Governance of information security is a strategic planning responsibility –Importance has grown in recent years Information security objectives must be addressed at the highest levels of an organization's management team –To be effective and offer a sustainable approach

Information Security Governance (cont.) Information security governance includes –Providing strategic direction –Establishing objectives –Measuring progress toward those objectives –Verifying that risk management practices are appropriate –Validating that the organization’s assets are used properly

Information Security Governance (cont’d.) Actions of the Board of Directors –Inculcating a culture that recognizes the importance of information security –Aligning management’s investment in information security with organizational strategies and risk environment –Assuring comprehensive development and implementation of an information security program

Information Security Governance (cont’d.) Actions of the Board of Directors (cont’d.) –Demanding reports from the various layers of management on the information security program’s effectiveness and adequacy

Desired Outcomes Outcomes of information security governance –Strategic alignment of information security with business strategy to support organizational objectives –Risk management to reduce potential impacts on information resources –Resource management with efficient use of information security knowledge and infrastructure

Desired Outcomes (cont’d.) Outcomes of information security governance (cont’d.) –Performance measurement to ensure that organizational objectives are achieved –Value delivery by optimizing information security investments in support of organizational objectives

Desired Outcomes (cont’d.) Recommended Board of Director practices –Place information security on the board’s agenda –Identify information security leaders, hold them accountable and ensure support for them –Ensure the effectiveness of the corporation’s information security policy through review and approval –Assign information security to a key committee and ensure adequate support for that committee

Implementing Information Security Governance Figure 2-6 General Governance Framework Source: IDEAL is a service mark of Carnegie Mellon University

Implementing Information Security Governance (cont’d.) Figure 2-7 The IDEAL model governance framework Source: IDEAL is a service mark of Carnegie Mellon University

Planning for Information Security Implementation Figure 2-8 Information security governance responsibilities Source: Information Security Governance: A Call to Action

Planning For Information Security Implementation (cont’d.) Roles of the CIO and CISO –Translating overall strategic plan into tactical and operational information security plans –The CISO plays a more active role in the development of the planning details than does the CIO

Planning For Information Security Implementation (cont’d.) CISO Job Description –Creates a strategic information security plan with a vision for the future of information security –Understands the fundamental business activities and suggests appropriate information security solutions to protect these activities –Develops action plans, schedules, budgets, and status reports

Planning For Information Security Implementation (cont’d.) Implementation can begin –After plan has been translated into IT and information security objectives and tactical and operational plans Methods of implementation – Bottom-up – Top-down

Planning For Information Security Implementation (cont’d.) Figure 2-9 Approaches to security implementation Source: Course Technology/Cengage learning

Introduction to the Security Systems Development Life Cycle An SDLC is a methodology for the design and implementation of an information system SDLC-based projects may be initiated by events or planned At the end of each phase, a review occurs to determine if the project should be continued, discontinued, outsourced, or postponed

Introduction to the Security Systems Development Life Cycle (cont’d.) SecSDLC methodology is similar to SDLC –Identification of specific threats and the risks they represent –Design and implementation of specific controls to counter those threats and manage risks posed to the organization

Introduction to the Security Systems Development Life Cycle (cont’d.)

Investigation in the SecSDLC –Phase begins with directive from management specifying the process, outcomes, and goals of the project and its budget –Frequently begins with the affirmation or creation of security policies –Teams assembled to analyze problems, define scope, specify goals and identify constraints Introduction to the Security Systems Development Life Cycle (cont’d.)

Investigation in the SecSDLC (cont’d.) –Feasibility analysis Determines whether the organization has the resources and commitment to conduct a successful security analysis and design Analysis in the SecSDLC –Prepare analysis of existing security policies and programs, along with known threats and current controls Introduction to the Security Systems Development Life Cycle (cont’d.)

Analysis in the SecSDLC (cont’d.) –Analyze relevant legal issues that could affect the design of the security solution –Risk management begins in this stage The process of identifying, assessing, and evaluating the levels of risk facing the organization, specifically the threats to the information stored and processed by the organization A threat is an object, person, or other entity that represents a constant danger to an asset Introduction to the Security Systems Development Life Cycle (cont’d.)

An attack –A deliberate act that exploits a vulnerability to achieve the compromise of a controlled system –Accomplished by a threat agent that damages or steals an organization’s information or physical assets An exploit –A technique or mechanism used to compromise a system Introduction to the Security Systems Development Life Cycle (cont’d.)

A vulnerability –An identified weakness of a controlled system in which necessary controls that are not present or are no longer effective Introduction to the Security Systems Development Life Cycle (cont’d.)

Table 2-1 Threats to Information Security Introduction to the Security Systems Development Life Cycle (cont’d.) Source: Course Technology/Cengage Learning (adapted from Whitman, 2003)

Some common attacks –Malicious code –Hoaxes –Back doors –Password crack –Brute force –Dictionary –Denial-of-service (DoS) and distributed denial-of-service (DDoS) Introduction to the Security Systems Development Life Cycle (cont’d.)

Some common attacks (cont’d.) –Spoofing –Man-in-the-middle –Spam –Mail bombing –Sniffer –Social engineering –Buffer overflow –Timing Introduction to the Security Systems Development Life Cycle (cont’d.)

Prioritize the risk posed by each category of threat Identify and assess the value of your information assets –Assign a comparative risk rating or score to each specific information asset Introduction to the Security Systems Development Life Cycle (cont’d.)

Design in the SecSDLC –Create and develop a blueprint for security –Examine and implement key policies –Evaluate the technology needed to support the security blueprint –Generate alternative solutions –Agree upon a final design Introduction to the Security Systems Development Life Cycle (cont’d.)

Security models may be used to guide the design process –Models provide frameworks for ensuring that all areas of security are addressed –Organizations can adapt or adopt a framework to meet their own information security needs Introduction to the Security Systems Development Life Cycle (cont’d.)

A critical design element of the information security program is the information security policy Management must define three types of security policy –Enterprise information security policies –Issue-specific security policies –Systems-specific security policies Introduction to the Security Systems Development Life Cycle (cont’d.)

SETA program consists of three elements –Security education, security training, and security awareness The purpose of SETA is to enhance security by –Improving awareness –Developing skills and knowledge –Building in-depth knowledge Introduction to the Security Systems Development Life Cycle (cont’d.)

Design controls and safeguards –Used to protect information from attacks by threats –Three categories of controls: managerial, operational and technical Managerial controls –Address the design and implementation of the security planning process, security program management, risk management, and security control reviews Introduction to the Security Systems Development Life Cycle (cont’d.)

Operational controls cover management functions and lower level planning –Disaster recovery –Incident response planning –Personnel security –Physical security –Protection of production inputs and outputs Introduction to the Security Systems Development Life Cycle (cont’d.)

Technical controls –Address tactical and technical issues related to designing and implementing security in the organization –Technologies necessary to protect information are examined and selected Introduction to the Security Systems Development Life Cycle (cont’d.)

Contingency planning –Prepare, react and recover from circumstances that threaten the organization Types of contingency planning –Incident response planning (IRP) –Disaster recovery planning (DRP) –Business continuity planning (BCP) Introduction to the Security Systems Development Life Cycle (cont’d.)

Physical security –Design, implementation, and maintenance of countermeasures that protect the physical resources of an organization Physical resources include –People –Hardware –Supporting information system elements Introduction to the Security Systems Development Life Cycle (cont’d.)

Implementation in the SecSDLC –Security solutions are acquired, tested, implemented, and tested again –Personnel issues are evaluated and specific training and education programs conducted Management of the project plan –Planning the project –Supervising the tasks and action steps within the project –Wrapping up the project Introduction to the Security Systems Development Life Cycle (cont’d.)

Members of the development team –Champion –Team leader –Security policy developers –Risk assessment specialists –Security professionals –Systems administrators –End users Introduction to the Security Systems Development Life Cycle (cont’d.)

Staffing the information security function –Decide how to position and name the security function –Plan for the proper staffing of the information security function –Understand the impact of information security across every role in IT –Integrate solid information security concepts into the personnel management practices of the organization Introduction to the Security Systems Development Life Cycle (cont’d.)

Information security professionals –Chief information officer (CIO) –Chief information security officer (CISO) –Security managers –Security technicians –Data owners –Data custodians –Data users Introduction to the Security Systems Development Life Cycle (cont’d.)

Professional certifications –CISSP –SSCP –GIAC –Security + –CISM Introduction to the Security Systems Development Life Cycle (cont’d.)

Maintenance and change in the SecSDLC –Once the information security program is implemented, it must be operated, properly managed, and kept up to date by means of established procedures –If the program is not adjusting adequately to the changes in the internal or external environment, it may be necessary to begin the cycle again Introduction to the Security Systems Development Life Cycle (cont’d.)

Aspects of a maintenance model –External monitoring –Internal monitoring –Planning and risk assessment –Vulnerability assessment and remediation –Readiness and review –Vulnerability assessment Introduction to the Security Systems Development Life Cycle (cont’d.)

Figure 2-11 Maintenance model Source: Course Technology/Cengage learning

Security program management –A formal management standard can provide some insight into the processes and procedures needed –Examples include the BS7799 / ISO17799 / ISO27xxx model or the NIST models described earlier Introduction to the Security Systems Development Life Cycle (cont’d.)