Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 2: Personnel Security and Risk Management Concepts

Similar presentations


Presentation on theme: "Chapter 2: Personnel Security and Risk Management Concepts"— Presentation transcript:

1 Chapter 2: Personnel Security and Risk Management Concepts

2 Contribute to Personnel Security Policies
Personnel management Employment candidate screening Employment agreements and policies Employment termination processes Vendor, consultant, and contractor controls Compliance Privacy

3 Personnel Management Job descriptions Separation of duties
Job responsibilities Job rotation Cross-training Collusion

4 Employment Candidate Screening
Based on job description Background checks Reference checks Education verification Security clearance validation Online background checks

5 Employment Agreements and Policies
Nondisclosure agreement Noncompete agreement Audit job descriptions, work tasks, privileges, and responsibilities Mandatory vacations

6 Employment Termination Processes
Maintain control and minimize risks Exit interview Terminate access Return company property

7 Vendor, Consultant, and Contractor Controls
Define the levels of performance, expectation, compensation, and consequences Service-level agreement (SLA) Risk reduction and risk avoidance

8 Compliance Conforming to or adhering to rules, policies, regulations, standards, or requirements Maintaining high levels of quality, consistency, efficiency, and cost savings

9 Privacy Active prevention of unauthorized access to information that is personally identifiable Freedom from unauthorized access to information deemed personal or confidential Freedom from being observed, monitored, or examined without consent or knowledge Legislative and regulatory compliance issues

10 Security Governance Maintain business processes while striving toward growth and resiliency Third-party governance Auditing Compliance Documentation review

11 Manage Personnel Security

12 Pre-Hiring Process Management of personnel is critical
People are the weakest link! Background checks Background, credit & reference checks Education verification Social Media Job Description

13 Hiring On boarding process On the job Non disclosure agreement (NDA)
Non compete agreement (NCA) HR & Security Policy Agreement Account Provisioning On the job Training Management structure – job rotation Service Level Agreement (SLA) vendors or contractors

14 Termination Procedures
Final payroll & HR paperwork Exit interview Accounts Suspended or terminated Turn over company property Equipment (laptop, cell phone, token) Access badge, keys Escorted out of premises Vacate premises immediately under supervision

15 Security Awareness Mandatory or Voluntary? On site or on line?
Standard or Customized Target Audiences: Management Staff Technical employees Evaluating the Program CISSP-Domain #1

16 Security Awareness-2 General, collective awareness of an organization’s personnel of the importance of security & security controls Reduce unauthorized attempts by personnel (insider threat); WEAKEST LINK! Increase effectiveness of protection controls Avoid fraud, waste, & abuse of computing resources Establish employee accountability for their actions & impact to overall security posture Improve employee attitude & behavior towards security

17 Security Awareness - Program
Training Education Level Information Knowledge Insight Learning Objective Recognition & Retention Skill Impact Timeframe Short-term Intermediate Long-term CISSP-Domain #1

18 Understand and Apply Risk Management Concepts
Risk terminology Identify threats and vulnerabilities Risk assessment/analysis Risk assignment/acceptance Countermeasure selection and assessment Implementation Types of controls Monitoring and measurement Asset valuation Continuous improvement Risk frameworks

19 Risk Terminology Asset Asset valuation Threats Vulnerability Exposure
Safeguard, countermeasure Attack, breach

20 Identify Threats and Vulnerabilities
Inventory all threats for each asset Threat agents Threat events Include non-IT sources

21 Risk Assessment/Analysis
Quantitative analysis Money based, measured by Formula Only has a monetary value attached it Qualitative analysis Based on scenarios, situations, and Results in Levels: High, Medium, Low

22 Quantitative Analysis
AV - Asset Value EF - Exposure Factor SLE - Single Loss Expectancy ARO - Annual Rate of Occurrence ALE - Annualized Loss Expectancy Cost-benefit equations ALE = SLE x ARO SLE = AV x EF

23 Using SLE, ARO, ALE Example Asset Threat SLE ARO ALE Building Flood
$750k 0.1 $75k Server Failed $14k 0.1 $1.4k Data Employee $5k 1.0 $5k Credit Cards# Theft $250k 3.0 $750k 52

24 Qualitative Analysis Brainstorming Delphi technique Storyboarding
Focus groups Surveys Questionnaires Checklists One-on-one meetings Interviews

25 Impact Analysis Levels
I (high) II IV (low) Loss of life Loss of political or military advantage Loss of operations / mission failure Legal repercussions No significant consequences Consequences Magnitude of Impact Embarrassment Cost of rework, repair, or replacement III

26 Risk Assignment/Acceptance
Reduce or mitigate Assign or transfer Accept Reject or ignore Total risk vs. residual risk

27  Countermeasures  Total Risk  Residual Risk Risk Analysis
(ALE before safeguard) - (ALE after safeguard) - (annual cost of safeguard) = value of safeguard to the company  Total Risk threats x vulnerability x asset value = total risk  Residual Risk total risk x controls gap = residual risk 55

28 Countermeasure Selection and Assessment
Costs and benefits Reduce attack benefit Solve a real problem Nondependent upon secrecy Testable Uniform protection No dependencies Tamperproof

29 Implementation Administrative Logical/technical Physical
Defense in depth

30 Types of Controls Deterrent Preventive Detective Compensating
Corrective Recovery Directive

31 Monitoring and Measurement
Quantified, evaluated, or compared Native/internal monitoring or external monitoring Measuring the effectiveness

32 Asset Valuation Used to justify protections Tangible value
Intangible value Used in cost-benefit analysis Helps select safeguards Defines level of risk

33 Continuous Improvement
Security is always changing. It needs to be integrated into deployed security solutions. Risk analysis is a “point-in-time” metric. As threats change, so must security.

34 Risk Frameworks Guideline or recipe for how risk is to be assessed, resolved, and monitored NIST Special Publication Risk Management Framework (RMF) Operationally Critical Threat, Asset, And Vulnerability Evaluation (OCTAVE) Factor Analysis Of Information Risk (FAIR) Threat Agent Risk Assessment (TARA)

35 Establish and Manage Information Security Education, Training, and Awareness
Security requires changes in user behavior. Seek policy compliance. Awareness. Training. Education.

36 Manage the Security Function
Security governance Risk assessment Craft security policy Cost-effective Measurable security Resource management


Download ppt "Chapter 2: Personnel Security and Risk Management Concepts"

Similar presentations


Ads by Google