Topic 3-Information Security Framworks
Topic 3-Information Security Framworks
J/618/7447
10203300
1
Topic 3: INFORMATION SECURITY FRAMWORKS
Eman Alzyoud
School of Computing and Informatics
[email protected]
2
Learning Objectives:
• including privacy policy, acceptable use , separation of duties , least privilege and the role of a
company’s internal policies, including service level agreements (SLAs) with providers.
3
Introduction
• Information security program begins with policies, standards, and practices, which are the
foundation for information security architecture and blueprint.
4
Security Management Plan
5
Security Management Plan Types
SMP Type Description
Strategic Plan Long term plan
Defines the organization’s security posture Useful for at
least 5 years.
Reviewed annually
Helps understand security function and align it with business
Should include Risk Assessment
Tactical Plan Mid-term plan
developed to provide more detailed goal Usually for an year or two
More technology oriented
Eg: Project plans, acquisition plan, budget plan, hiring plan
6
Strategic, tactical, and operational plan timeline comparison
7
Security Roles and Responsibility
• Ultimately responsible for security
• Must signoff all policy issues
• All activities must be approved
Senior Management • Will be held responsible for overall security success/failure
• Responsible for due care and due diligence
• Responsible for tasks of implementing the prescribed protection defined by Data owner
Data Custodian • Responsibilities include, preforming/testing backups, validating data integrity, deploying
security solutions and managing data storage based on classification
8
Due Care and Due Diligence
Showing due diligence and due care is the only way to disprove negligence in an occurrence of loss.
Senior management must show due care and due diligence to reduce their culpability and liability when a
loss occurs.
Due Care
• Is practicing the individual activities that maintain the due diligence effort
• Is doing the right action at the right time.
• Taking reasonable care in protecting the organization
Due Diligence
For example, due diligence is developing a formalized security structure containing a security policy,
standards, baselines, guidelines, and procedures. Due care is the continued application of this security
structure onto the IT infrastructure of an organization.
9
Information Security Policy, Standards,
and Practices
• Management from communities of interest must make policies the basis for all information
security planning, design, and deployment.
• Policies should never contradict law, must be able to stand up in court, and must be properly
administered.
• Security policies are the least expensive controls to execute but most difficult to implement
properly.
10
Security Policy
Types
- Defines the main security objectives
and outlines the security framework Issue-specific policy –
- Identifies major functional areas of focuses on specific service, department, function that
data processing is distinct from the organization as a whole
- Broadly outlines the security goals and
practices that should be employed System-specific policy –
- Its is used to assign responsibilities, Focuses on individual systems
define roles, specify audit
requirements, outline enforcement
process, indicate compliance
requirements, and define acceptable
risk levels It’s a compulsory document
11
Security Categories
12
Standard/Baseline/Guideline/Procedure
13
Acceptable Use Policy
An acceptable use policy (AUP) is a commonly produced document that exists as part of the
overall security documentation infrastructure . This policy defines a level of acceptable
performance and expectation of behavior and activity. Failure to comply with the policy may
result in job action warnings, penalties, or termination.
14
The Information Security Framework
• Basis for design, selection, and implementation of all security policies, education and
training programs, and technological controls.
• Should also serve as a scalable, upgradeable, and comprehensive plan for the current
and future information security needs
15
Definitions
Framework
Provide guidance on how to build Individual architectures that will be useful to a diverse set of individuals
Architecture
Security Program
• It is a framework made of many entities working together to provide a protection level for an environment
• A security program should work in layers
• Security via obscurity is not a healthy protective mechanism
16
Enterprise Architecture
Ø Developing Views
• How the information that is most important to different stakeholders will be illustrated
in the most useful manner
• Architecture allows not only to understand the business from different views, but also
understand how a change takes place at one level will affect items at all other levels
17
Zachman Architecture Framework
18
The Open Group Architecture (TOGAF)
• Has its origins from US DoD
• Business Architecture
• Data Architecture
• Applications Architecture
• Technology Architecture
19
Enterprise Security Architecture
• It ensures that security efforts align with business practices in a standardized and
cost-effective manner
21
ISO27000 Security Program
23
COBIT 2019
• It prescribes goals and requirements for security controls and encourages the mapping of
IT security ideals to business objectives.
• COBIT is based on six key principles for governance and management of enterprise IT:
o Provide Stakeholder Value
o Holistic Approach
o Dynamic Governance System
o Governance Distinct from Management
o Tailored to Enterprise Needs
o End-to-End Governance System
24
NIST
• NIST 800-53 Rev. 5, “Security and Privacy Controls for Information Systems and
Organizations”
contains U.S. government–sourced general recommendations for organizational
security.
25
ITIL
• Information Technology Infrastructure Library (ITIL),initially crafted by the British
government, is a set of recommended best practices for optimization of IT services to
support business growth, transformation, and change.
• ITIL focuses on understanding how IT and security need to be integrated with and
aligned to the objectives of an organization.
• Customizable framework.
• It provides the goals, the general activities necessary to achieve the goals, and the
input/output values for each process required to meet the goals.
• It focuses more towards internal SLA between the IT department and the customer it
serves (predominantly Internal functions)
26
Reference
• Alexander, D., Finch, A., Sutton, D. and Taylor, A. (2020) Information Security
Management Principles BCS. 3rd edn. BCS The Chartered Institute for IT.
• Chapple, Mike - CISSP Official Study Guide (2021, Sybex). 9th edn.
27