Download presentation
Presentation is loading. Please wait.
Published bySilas Cooper Modified over 9 years ago
1
Security Operations
2
2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged Entity Control Categories of Controls
3
3 Operations Security Focus Areas Remote Storage Backups Tape Library Hardware Software Media Peopleware Auditors Support Staff Vendors Security Programmers Operators Engineers Administrators
4
4 Information Security TRIAD Availability Confidentiality Integrity Information Security
5
5 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control
6
6 Facility Support Systems As discussed within the Physical Security domain, the support systems in a centralized or decentralized Operations center must be protected.
7
7 Facility Support Systems Fire Protection HVAC Electric Power
8
8 Facility Support Systems Water Communications
9
9 Risk of Physical Access to Equipment Reduce risk or impact of threats resulting from unauthorized physical access
10
10 Media Management Another objective of Operations Security is to protect storage media
11
11 Object Reuse The reassignment of a storage medium that previously contained one or more objects To be securely reassigned, no residual data can be available to the new subject through standard system mechanisms Disclosure Contamination
12
12 Clearing of Magnetic Media Overwriting Degausser Physical Destruction
13
13 Destroying Media Management Practices Declassifying Storing Handling Labeling Marking Sensitive Media Controls
14
14 Misuse Prevention ThreatsCountermeasures Personal Use Theft of Media Fraud Sniffers Acceptable use policy, workstation controls, content filtering, email filtering Appropriate media controls Balancing of input/output reports, separation of duties, verification of information Encryption
15
15 Records Management Records Management Program Development Guidelines Records Retention
16
16 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control
17
17 Software & Data Backup Operation controls must ensure adequate backups of: Data Operating Systems Applications Transactions Configurations Reports
18
18 RAID - Redundant Array of Independent Disks Backup of Data stored on Disk Drives Hardware-based Software-based Use of a Hot Spare
19
19 Stripes data evenly across two or more disks with no parity information for redundancy to increase system performance RAID Level 0 A7 A2A1 A3 A5A6 A4 A8 RAID 0
20
20 RAID Level 1 Creates an exact copy (or mirror) of a set of data on two or more disks
21
21 RAID Level 2 Stripes data at the bit level using a Hamming Code for error correction Requires 39 disks!
22
22 RAID Level 3 Uses byte-level striping with a dedicated parity disk Parity Drive Stripe 4A Stripe 1BStripe 1A Stripe 2A Stripe 3AStripe 3B Stripe 2B Stripe 4B RAID 3 P(1A, 1B) P(3A, 3B) P(2A, 2B) P(4A, 4B) Disk A Disk B
23
23 RAID Level 4 Uses block-level striping with a dedicated parity disk Similar to RAID 3 except that it stripes at the block, rather than the byte level
24
24 RAID Level 5 Uses block-level striping with parity data distributed across all member disks Stripe 4A Stripe 1BStripe 1A P(2B, 2C) Stripe 3AP(3A, 3C) Stripe 2B Stripe 4B RAID 5 P(1A, 1B) Stripe 3C Stripe 2C P(4A, 4B) Disk A Disk B Disk C
25
25 RAID Level 6 RAID 6 extends RAID 5 by adding an additional parity block, thus it uses block-level striping with two parity blocks distributed across all member disks Like RAID 5, the parity is distributed in stripes with the parity blocks in a different place in each stripe
26
26 RAID Level 0+1 Used for both mirroring and striping data among disks A hard drive failure in one array can be recovered from the other array A7 A2A1 A3 A5A6 A4 A8 RAID 0 A7 A2A1 A3 A5A6 A4 A8 RAID 0 RAID 0+1 RAID 1
27
27 A8 A2 A4 A6 A4 A8 RAID 1 A7 A1 A3 A5 A3 A7 RAID 1 RAID 10 RAID 0 RAID Level 10 Also known as RAID 1+0 Very high reliability combined with performance
28
28 Redundant Array of Independent Tapes (RAIT) Level 1 RAIT Using tapes rather than disk Real-time mirroring
29
29 Hot Spares An unused backup array disk that is part of the array group Hot spares remain in standby mode Types of Hot Spares Global Hot Spare Dedicated Hot Spare
30
30 Other Backup Types File Image Data Mirroring Electronic Vaulting Remote Journaling Database Shadowing Redundant Servers/Standby Services
31
31 Fault Tolerance Usually refers to Hardware failure The system recognizes a failure has occurred Automatically takes corrective action
32
32 System Recovery - Trusted Recovery Correct implementation Ensure that failures and discontinuities of operation don't compromise a system's secure operation
33
33 Types of Trusted Recovery System Reboot System Reboot Emergency System Restart Emergency System Restart System Cold Start
34
34 Fail Secure To fail in a way that will cause no harm, or a minimal amount of harm, to other devices or danger to personnel, but doesn’t cause the system to be insecure.
35
35 Operational Incident Handling First line of Defense Logging, Tracking and Analysis of Incidents Escalation and Notification
36
36 Incident Response Team Benefits Learning to respond efficiently to an incident Priorities
37
37 System Failure Power Failure - UPS Denial of Service Contingency Plans Intrusion Tampering Business Continuity Plans Detailed Recovery Procedures
38
38 Specific Operational Contingency Preparations System Failure Denial of Service Tampering or Intrusions Production Delays I/O Errors
39
39 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control
40
40 Change Control Management Integrated with Business and IT Initiatives Sets out change control process and ownership of changes Ensures that all changes are reviewed for potential security impact
41
41 Change Control Committee Objectives Ensure all changes are Properly tested Authorized Scheduled Communicated Documented
42
42 Change Control Procedures Impact Assessment ApprovalBuild/ Test Implement Monitor Request
43
43 Configuration Management The control of changes made to: Hardware Software Firmware Documentation Test fixtures and test documentation conducted throughout the system lifecycle
44
44 Hardware Inventory and Configuration Hardware Inventory - An overview of the hardware installed on any automated system Hardware Configuration Chart - Details the configuration of the system
45
45 Protection of Operational Files Library Maintenance Backups Source Code Object Code Configuration files Librarian
46
46 Documentation Requirements Format Copies
47
47 Patch Management Identification of Patches Patch Testing Rollout Deployment challenges
48
48 Domain Agenda Resource Protection Continuity of Operations Change Control Management Privileged Entity Control
49
49 Operator Privileges Operates and monitors mainframe and mid-range computers and peripheral equipment, such as printers, tape and disk drives
50
50 Administrator Privileges Responsible for running technically advanced information systems which includes the setup and maintenance of computers and networks Systems Administrators Network Administrators
51
51 Security Administrator Privileges Security administration including: Policy Development Implementation Maintenance and compliance Vulnerability Assessments Incident Response
52
52 Control Over Privileged Entities Review of access rights Supervision Monitoring
53
53 Domain Summary Operations Security dealt with Resource protection Continuity of Operations Change Control Management Privileged Entity Control
54
“Security TranscendsTechnology”
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.