(Ebooks PDF) Download Information Assurance For The Enterprise A Roadmap To Information Security 1st Edition Corey Schou Full Chapters
(Ebooks PDF) Download Information Assurance For The Enterprise A Roadmap To Information Security 1st Edition Corey Schou Full Chapters
com
https://ebookname.com/product/information-assurance-for-the-
enterprise-a-roadmap-to-information-security-1st-edition-
corey-schou/
OR CLICK BUTTON
DOWLOAD NOW
https://ebookname.com/product/handbook-of-research-on-
information-security-and-assurance-jatinder-n-d-gupta/
https://ebookname.com/product/a-practical-guide-to-managing-
information-security-steve-purser/
https://ebookname.com/product/information-security-policies-
procedures-and-standards-guidelines-for-effective-information-
security-management-1st-edition-thomas-r-peltier/
https://ebookname.com/product/economics-of-information-security-
advances-in-information-security-1st-edition-l-jean-camp/
Maximizing The Enterprise Information Assets 1st
Edition Timothy Wells
https://ebookname.com/product/maximizing-the-enterprise-
information-assets-1st-edition-timothy-wells/
https://ebookname.com/product/information-security-
illuminated-1st-edition-michael-g-solomon/
https://ebookname.com/product/handbook-of-information-
security-1st-edition-hossein-bidgoli/
https://ebookname.com/product/national-security-
volume-2-handbooks-in-information-systems-handbooks-in-
information-systems-handbooks-in-information-systems-1st-edition-
A ns plap to ae
oi; Schou
am DYlaps)alel=iaatel.<oi 0
| Information Assurance for
the Enterprise: A Roadmap
to Information Security
Information Assurance for
| the Enterprise: A Roadmap
to Information Security
Corey Schou
Idaho State University
Dan Shoemaker
University of Detroit Mercy
McGraw-Hill
Irwin
Boston Burr Ridge, IL Dubuque, !A Madison, WI New York San Francisco St. Louis
Bangkok Bogoté Caracas KualaLumpur Lisbon London Madrid Mexico City
Milan Montreal New Delhi Santiago Seoul Singapore Sydney Taipei Toronto
McGraw-Hill
Irwin
INFORMATION ASSURANCE FOR THE ENTERPRISE:
A ROADMAP TO INFORMATION SECURITY
Published by McGraw-Hill/Irwin, a business unit of The McGraw-Hill Companies, Inc., 1221
Avenue of the Americas, New York, NY, 10020. Copyright © 2007 by The McGraw-Hill Companies,
Inc. All rights reserved. No part of this publication may be reproduced or distributed in any
form or by any means, or stored in a database or retrieval system, without the prior written
consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network
or other electronic storage or transmission, or broadcast for distance learning.
Some ancillaries, including electronic and print components, may not be available to customers
outside the United States.
This book is printed on acid-free paper.
123456789
0 DOC/DOCE 098 76
ISBN: 978-0-07-225524-9
MHID: 0-07-225524-2
Twenty years ago, he developed the eDACUM process that has been used to develop
the major information assurance standards used by both industry and the United
States government, including NIST, CNSS, and NSA. Throughout his career, he has
been an active consultant to major organizations such as the United States Senate,
Federal Express, Apple, General Motors, United Airlines, Microsoft, Boeing, Depart-
ment of Energy, and the Department of State.
Dan Shoemaker, Ph.D., is the Director of the Centre for Assurance Studies, a National
Security Agency (NSA) Center of Academic Excellence in Information Assurance
Education at the University of Detroit Mercy, where he is a professor and the Chair of
the Computer and Information Systems Program since 1985. His Ph.D. is from the
University of Michigan in Ann Arbor, and he has held various professional IS roles at
that institution, as well as at Michigan State University. His two books, “Engineering a
Better Software Organization” and “GOT-ITFine Tuning Your Software Organization” sold
extensively to the U.S. military as well as overseas.
Serving as an expert panelist on three national working groups within the Department
of Homeland Security's Cybersecunty Division, Dr. Shoemaker is an author and one of
three domain editors for the Software Assurance Common Body of Knowledge. He also
serves on the Assurance Business Case Working Group and the Workforce Education
and Training Working Group.
Dr. Shoemaker has been a formal U.S. partner of the British Standards Institution (BSI)
since 1994 and he has worked with the recently released ISO/IEC 27000 International
Standard Series for Information Security since its inception in 1995. In addition,
Dr. Shoemaker is a member of the advisory panel for Automation Alley, a designated
academic advocate for the Information Systems Audit and Control Association (ISACA),
and he teaches a COBIT based Sarbanes-Oxley audit to managers up and down the Big
Three’s automotive supply chain in Detroit.
Dr. Shoemaker loves to travel with his wife, his little white dog, and any of his four
grown children who might be willing to come along. He has a particular fondness for
England, where he attended school in his youth and he always spends some of his sum-
mers in London.
Prelace gmersteen seysretees ot gin ewe tee ae ag rt Care hdSUPE 2 ena Se
Chapter | IKNOWINZ.VV MAL LOISOCUIG ®ab.ccrutits ctu ste as alk ea )nSoartoe alin st
Chapter 2 Assessing Risks .......... och DOR aie ee Taare a Aree
Chapter 3 DECUDIYAPONCV MEE ater aeenci es cellos: eit. 4 oo.yaheiati. 6478 we ele
Chapter 4 Building and Documenting an
Information Assurance Framework ...............2eeee8-
Vii
nik biz : hes
ae.” ss» ett
: alaaliand & a ae
(a i ,<
a ke ee rene
j _ wr 7 7
iw alee eer a
: >4
ef cae iE | =|?
’
ns en 7
’ = : 1 nae pee As 80 2 eGee ae
kOe se oad
: a af en 7 cet
em uy oe - pearem.f gst 9 |
cis as ee) neasaad
(eee
a hs ial be
te « Nptiges : . & bine
Bibi. -
er A ms “a - ae et ® > a
<n é CO a
coer Pate ateith OS ie ‘ere?
a Se vp. aod onciatiggns ave.) TT
ra : : . : aged
=@ ‘
~~
Wy 7
_— a
DECLARE cioiyey cdots a hechiu eee teins«TE PE ETOCS, cs ce okies xix
Chapter | KnOWINEIV
DAC CORSECUNC me fs. Meee eee og Snes ora ants ec Geis Le |
Ensuring ConuinuousKnowledgee (22a. Wty. ad tcpaht Manes ove os oe 2
PLOcess timp emmenitatiOR Macc she sie eh anv2 fo Cn Bee ee eS ues 2
PASSCL CTE C ALLO THO eee ee okt oie, fh ace aee Sot 8 os Ae 4
COMUOLOL Clianiven = acne ne sae ner ad ae ce apie | oN) ees ae 7
SLATUIS ACCOUTIEMO Rene enn ohn: UL EEEE Co tena exes: saree 8
ZPASCRUIE Vala tLO lies aieare ts ts Sea eee ERS Cereaeg. need nc ae ge 8
WEtSIOM MAN ACCIRCIE ooh ascsc'on.w\ Wiis Puree senna Awa, 9
Maintaining lite gitty ar igs at can choice ohn gaye eMicn me oh. chs kis eee aa 9
EStA DUS UNE (NECKPOLNE cence y. cu. airs oy oc kes tke oho eee 9
Documenting the Decision= =-7.06<12.....0de ss ee eon. me 10
ASSIZMINS AMCMOTILY mare.) een <ahiaes -aiteanh iacmrseteria Nak «x s0es oe es 10
lmplementimetne Change s\l-cenesaraqced-cacetiaties OS eae aook 11
Accounting forintormnation, \iiecssed as-ade Mee Nin wagh oes ees 12
Other Considerationsyynt, wo iensce searesett + scenes: ce eee ee 12
Establishing dhewssurance FUNCTION: sat, Hehe aeiGoreh «cere eee eeennas 13
Basing the, Response onthe RISKS jysashecd acnraieiiee «eee ce set see nees 13
MiMi SRE quireM CMtSR wean aa ees eeroeeyd. Sere Asa sine oa ow ee. 14
Corrective Actlom Requirements’ Mmeneerae ieee eee reece e eeae 14
PinanGlal actors ve aqasdemec.-renearssiiere-Moe ese cs oeceda ree ne 15
LKB OOCI grevereterk 74). 553 easicnss rte Sst RPE ack evs oe een ale ons 15
Documenting the Assurance: Solutions: h. ae. erarmninaesth «2s. 20. .0s cerees 16
SEQUENGeanG LiMiING Ger creareiys AnortoeP scion as eee eee iy?
Monitoring) <.cpserr95 A. costincciane sth oad eet ae sew eed ce Semele 5 17
ACCOUREADN TGCS 4prorat apo Haeicererist tae Bertie tee coe eos cee weclex s 18
Documentationand Reporting yciul cosestaseeedt ook ce wens oases 18
PrODIeMT RESOMMION an... «. ke PURTeE Ie TORT SD < isle ewe ne code ee 18
KEEPING Te SVStCIEY ALIDMEU ccm deceit iie.2sj50 SORROE gah cnierdelsy cis)to.aieis.015% 18
Chapter Summary= eects cescw ne ete bee ees sess oe mle ces iS)
ACSA Wehaga nae estinetion osu dae ob (ct gold b.o317oh GEO OB Se UH EIN ocr 21
IMeailKamnnXOlUbA Pay ner ecacta oa AGS eaae or Gaerne Meee are nereer 21
Mialtiple CHOMCE CII 2 icc opnste vrs GE PAM RRL Iw viwacgas 0.0 ain es 22
JER ALONUIVA” cout tnt ices aaa OOS ag SUN he OR OEE Oe ane EE aoe 23
(SASCEXCLGIS CHEE CEO RY Cone eae ccs Ste mete wee nielaios a/te or 23
Information Assurance for the Enterprise
X
Chapter 2 Assessing Risks eee eee ere rere see eee eee eee eeseeeeeeeeeeeseees
RISKS ATO VERVIEW; Fos aisnvias brs on tevonce nine wav nce eolaiedhe ee ee
Knowing Where You Stand © 05.0. 005s 0c pe oe com on erm anon
Making Threats Visible: Risk Classification ................
Strategy Formulation: Deciding About the Response .......
The Security Solution: Deploying Countermeasures .......
Operational Risk; Assessment, cc-tcenium snows cyl so eens eo che
Establishment: Planning for Operational Risk Assessment.
ALICE oho eetetee eis eile ae Ae eee ene teea eae eee Cet ees
Managing the:Audit Process” “7.2 0..saeeonwst sss psicemomen en
Details of Execution: Performing the Audit .................
C&A: The Federal Government's Use of Audit ...............
Chapter: Summiaty? eaccc enn cn comers anata soles eteviewer © ace vere
Keys VerriiSi seynyeer teeta ccc seettetet nore atesa etote arate res)oi-otaseater rate
Key Berni Quizie ei iin nn ane tiie creiste clare ste eleerate een ina
Multiple Choice Ouiz 9 een cet ns cee mare ne nome
Essay Quiz? Saha aun waka ee renee otis see Maes araie elas Asie yes
CaseEXercise |Myce we es hee en rn ne renter tersAe
Chapter 3 Security Policy eee ee eee reer eee eee ees e eee eee ese ee ee ese reeees
XI
Infrastructure and the Five Pillars of Assurance ........ eeeeeecece eeeees 90
Instituting a Sustainable Security Operation ...............eeeeeeeeeees 92
The Role of Policy in Creating an Infrastructure .................. 92
Ensuring a Disciplined Process: Establishing the Culture ........ 93
Developing An Information Assurance Infrastructure ............ 94
Ensuring Common Understanding: Metrics and Security ........ 95
Accommodating Human Factors in the Infrastructure ............ 97
Documentation: Conveying the Form of the Infrastructure ....... 97
Tailoring a Concrete Information Assurance System ............. 100
‘Types‘of Controlshaa. 2a Fete MMA ESTAS REET o.5.08 dente acdsee 104
Chapter Summarys (i, 4.4700 te Sone eee I as pee ns wed ieee os 107
Key lens yi 8 Cee tik th pod RRL OPS aero aneeeaeiens 108
Key, Ferri QUIZ ain teem oor:2 MY SORT RN ot oe ne aneCE oe ae 109
Maltiple'Ghoice Owiz,. x: ope wingih deSHEN «ce a2s ce vermenate 109
Essay. Quiz Aa een Bie RAY, ssp 5 MANO PRAM oP dew see oxen deds 111
CasGEXelCiSes gM wy ots eid A Re ee ads Ls emesis: 12
Crapter 6 Ensuring ONEONCG ACCESS os aceite ea in a giclee ws. ow s's2 e's oe 139
Principles oinccese COrirOlay vehtigers td birps yeh «oie erind ooeevee 139
Identification and Authentication: Establishing Identity ......... 140
Combining Approaches: Multifactor Authentication ............. 144
Approaches for Establishing Identity in Cyberspace .............. 145
xi
Information Assurance for the Enterprise
XIl
Authorization: Controlling Access) 5.1. 0) 9)0% F202 R TN. 2. 2 kes sos 147
Types of Permission: Methods for Granting Access ...........-+-. 148
Real-World Access Control: Automating the Process ............. 153
Setting Up the System: Account Management ................++:. 156
Intrusion Detection: Backstopping Access Control ............... 157
Security Assessments: Penetration Testing .........--..-+see eens 161
Common Access 'Gontrol/Modelsim =. pasmreeetrittcel oe ercloes eee 162
Classification-Based Security Models: Bell-LaPadula_ ............. 163
Integrity-Based Security Models: Biba... ... 10... eee e eee eee eee 165
Transaction-Based Security Models: Clark-Wilson .............-. 166
Chapter Summary =~ tip. Pea eeie Md ens a 2 als ime syncane ee 167
Key. Terms» srosranrostoutsn/anto a cishcreWierwn ae Hn cee wind Sora.dsa eam A 169
Key Tenn Quiz, owen cerns srs « Seas SRM eae MORA VipndsaSine) a ah aa 170
Multiple;Choice Quiz... citys taiete aerate sna A damaeed asa 170
ESSAY CUBEZ) «wennideatafiyate avs ophaNery avelige ateteee «MOORING "si or wrayer ate a IP
(CAS CVEXOLCIS CP saceenece 8 rov-pevarorene charerve) <1MR NA OTN Ne se oop Srorne ceerstset oe IS
Xiil
INGyalergaA@)Uz 1s, 36. Leave ACRE BUI ce cay os 200
Multi lerGHoiceiO wiz Basen IMAI A ois ico ows es we 201
Essay CUZ user Nise ee,donee PP MORE Aisin cena oeveeeune 202
Case RNeTCiseh SATA Age. tate I SE Aes «gin.sean st eceaceve 203
Chapter 8 etSY
ARTS USSTSINY
#5 Psa el ts Pee A a a Se oa a ese 205
The Problems of Dispersion and. Divetsityamr werk co.06+. 000 eso2 206
Nie Joyo tSeCure Space al vrngscoGce ca ce SAMUI Gc ech hes aire 206
Factor One: Ensimne.the Location gijst pret aot. =o. coc. ance cen: 207
Factor Two: Ensuring Controlled. Access) sia jiiint. 2s... .cae0sc8.e: 207
Factor three: Ensuring Control of Secure Spaces... ............ 207
he Physical Security, Process:and'Plaria pseu @ekOk 00 as as o-sac0 sc: 208
The hy sical SeGurifysPrOeess Ais sieges. aoa eau es hase ia ee esa eee 208
Pinysital Seclininype al mer meter crt stMerrie terns eete lc ttece sinter ae ote 208
Physical,Security Targets:and Threats! essai Die WUMAUO.R ..65... < 210
Adeats tO ve BACIICY 7p a.7. . ee MEU IND, 6 oro.ohs se aca 210
Safeguarding E Guipmentyipsse.) &. 0) SARI «6 olycoe ees won 213.
Controlling AccessibyiPeople rad. RN EE. we 215
Mitigating the Effects of Natural Disasters and Fires ............. 221
Chapter SUMANATYis pveeee secs ee MEME er a5 sn pcteele acsgk 224
Kevalenmnishk Aieritinc it One eee eet ee ee lish a Sot aaa « 225
Keyeleriy QUizi cs eee eee) Cy PPI, oe ook vie cn cee: 226
MiltiplenehOicel@ iz re. Seaetieet Gls BART ocak occ dees cas 226
ESSayA@ WIZ Teehe eee etre oe ere Ie Oe coe aaenseaesnnes 228
CasciExercise dense: MeL eS OEE c.cauwenceane sees 229
Chapter I 1 Laws, Regulations,and Crime —.... 1... cece eee eee ee eee eee ee eee
Protecting Intellectual Property
Enforcing Protection Rights:
The DigitaliMillennium, Copyright Act Sec... os. css ccasecss
International Prevention and the Business Software Alliance
Software Piracy
Consequences of Piracy
Regulating PiraiGye, «cnc aiee dee RRO 6. chun ohe dene ss
Laws Affecting Coraputen leet wit eeide tim BHO UL. en en cosce eve
Governmental Regulations
Privacy: Re grailath C0 8gbasics: 3: RN aS A Crore oon ree ws
Laws to Protect, Privarcyaieantt ole Rian cee. «cies cana a eee
The Freedom of Information Act
Contents
XV
Chapter 13 Cryptology iene ect ne sen tace cme nt sents opawe cs eewseeavons 339
Cry PIOPTADVAUD CIDICS Bes ca. tine) Meath ws se sa ee a sieoa wien s 339
Integrity and Authentication: |i) sich D.oletelieh
«2. sense veins saan 340
BYTES SVP Ee |So ee oer ne een abe (0.05 Sao ea a 340
Information Assurance for the Enterprise
XVI
XVII
Chapter 15 Human Factors: Ensuring Secure Performance .........-02eee0e-
Assuring Reliable Performance y.... « «acter een ear are sere eee
SveBOd OU KIOWlCUGE IL IAT 5 cient reais ence tert rn cr ciic cosmos
PatamaMOodel( LIS7) Ban tates ae ne eee eo
InsBSyMeso Ot Greela| GOL SO ola alainotf Nes. glbpinshen aa ane ope Eo
Me@umben Model (199141 993 \ar meen ee tere ee ree ee tee
The Intermediate Models: eEDACUM and NIST 800-16 ...........
Recent standards Developments ovtae steerer atte ee er eee ee
Extending the McCumber Model—The MSR Model ..............
Delivering the Body of Knowledge’ o.oo... cc ec cceecc cece ete ee eeeneee ees
AWATCHIESS ECOBLALNS te See heats oh Oa te Sek. tee cert Pee ae ae
ARALLITIS PIOSTAMS seme fae oh ata ae eeaaa eke eee re enh ee Ce ee a oe
PUUCAMON PLOCtaTNS Meee he Rete erLeet. een Rae oa eetaare
Increasing Organizational Capability Through AT&E ...................
Information Assulance Recopmilion tte feeder cqut, <<on ace
informal Realization-tine ver oe ee tenets eee eee 2 eee
Information Assurance Understanding "7.2 0)... cco eccea aceon
Deliberate COnuGl Seren pee trey Siete oe Ree tet era nas Te ae wise
ContinuoussAdaptationm@er mse coe eee ee ee eee
Building Enective ALQE, PlOstalnset acm santa ste eee torso eet Mom aoe
Steps to Achieve the Basic Recognition Level... cscs. ecssnceees
Steps to Achieve the Informal
Procedtral and Realization, Level (0 tye. «coe; aieact ae oe
Steps to Achieve the Planned Procedural
and Information Assurance Understanding Level .............
Steps toy Achieve the Gontrolled Level soci seman staal:
Steps fouacmieve (he ACApUye Level. ia atten ates:
Gia ier SUTRA Many sy nee she aie ren sa cine Cae aa csr ge
inv Raaaikh © ecbosmomge o an canine Soh Dac oR ROeTeE AnNee Gontomaars manta sic
Kevalerym OUIZa tal, cl to Shaauactue ptaieieiwalgsrs accents gudaalac a aint
PVT EG) CR CNCON OLS ccs, ares ERE a he os ee ee
PSCAVECQITIZ, ©ceaetasteastin “porate atssatesixceyelsySBetacaiars wa inlacoxomnioin ubone arate RraSGeTea
(Wa SCEXETCISC] art heacc pista acis accrue yeaah sieSLs xencpray suc oeraes agar
BibuGgraphly 2. sacha sk secre ss ote. Peeves cn cence Sora cenaea tame 453
This text is based on two assumptions. First, written, spoken, and electronic informa-
tion is valuable—it is an asset; the information assurance function should be able to
protect any information asset the organization owns. Second, information assurance
has to be complete and continuous. All sae Scag must be in place and operating
correctly at all times.
Most organizations do not even know heh information they have much less what
threatens it. They cannot even evaluate risks they are accepting because they do not
know the
e Scope—companies just cannot get their arms around their own assets
e Value—shifting understanding of the value of information that a company
DOES hold
e Risks—knowing all of the ways that information can be threatened
e Assigned Accountability—putting the right people in charge of the process
To ensure the right level of security the organization has to create a complete, clearly
understandable, and economically feasible protection system. The system must ensure
the security of all information of value; it must account for all likely risks and address
them with appropriate countermeasures.
This text describes the elements and procedures involved in protecting information.
It explains how the elements inter-relate and how they can be used to build an infor-
mation assurance strategy that is continuously effective and reliable over time. That
strategy details how to design, implement, and maintain a comprehensive and coor-
dinated information assurance solution. That solution must address a broad spectrum
of security requirements, not just those that are convenient. It must be systematic and
maintainable as a long-term operational process and it must directly support the busi-
ness case requirements.
The information assurance solution merges all required procedures and controls into
a single coordinated process. The reliability of that process must be objectively measur-
able. The process must evolve continuously to meet the changing environment. The
process must provide a trustworthy long-term assurance capability, which addresses all
probable threats and responds to all incidents appropriately. Consequently, the infor-
mation assurance process should be holistic. That is, a proper information assurance
solution must incorporate all of the factors necessary to satisfy all the security needs for
a given situation. That condition is termed “total protection.”
The book covers the essential material for the DHS Centers of Academic Excellence
in Computer Security Education as well as (ISC)2 Common Body of Knowledge and
the Draft ACM Computing Curriculum (2005). It also addresses the principles of
ISO-17799.
xix
Information Assurance for the Enterprise
XX
XXI
The weakness of the security-of-operations concept lies in the fact that it does not
specifically include measures for securing electronic transmissions and storage. Further-
more, because of its orientation toward physical protection, it is often administered
separately from the information assurance function.
Consolidating Approaches: IA
COMPUSEC, COMSEC, INFOSEC, and security of operations are all valuable aspects
of-overall security. However, the problem with each of them individually is that they
address part, but not all, of the problem creating the potential for exploitation of un-
secured areas. This has led to the recognition that every avenue of attack must be safe-
guarded in order for the assurance to be correct.
The means for accomplishing that is characterized by a relatively new term, “informa-
tion assurance,” or IA. IA takes a comprehensive view of the assurance responsibility.
Essentially, it involves the creation of a persistent, organization-wide assurance system,
which contains the policies, procedures, and technical and managerial functions needed
to guarantee security in every area of threat throughout the information life cycle. It
is necessary to establish information assurance through a strategic planning process
because of its all-inclusive process focus.
Information assurance is the broadest and most intuitively attractive of the assur-
ance disciplines because it incorporates the strengths of the other methods into a
holistic approach focused on ensuring total security. Nonetheless, beyond establishing
a top-level architecture, the IA concept does little more than integrate the conventional
assurance activities of COMSEC, NETSEC, INFOSEC, and security of operations into
a single system.
e Management Countermeasures
e Chapter 7: Personnel Security
e Chapter 8: Physical Security
e Chapter 9: Assuring Against Software Vulnerabilities
e Chapter 10: Continuity Planning and Implementation
e Chapter 11: Laws, Regulations, and Computer Crime
Preface
XXIII
e Technical Countermeasures
e Chapter 12: Network Security
e Chapter 13: Cryptology
e Chapter 14: Ensuring the Secure Use of Software
Intended Audience
Our assumption in writing this book is that information assurance is not limited to
securing information assets in electronic form. It must secure all information of any
value, in whatever form. Thus, electronic protection approaches by themselves are in-
sufficient. In addition, genuine assurance implies that all elements necessary to ensure
reliable protection have been established. Consequently, in addition to technical con-
trols, the security solution must also incorporate all relevant organizational and human
factors into a total system of protection.
This book provides a comprehensive, in-depth survey of the field of information
assurance. The audience includes everybody from students interested in understanding
what information assurance is, to instructors who want to teach information assurance
from a holistic perspective.
In many cases, we have taken liberties with the technical details to ensure that the
principle is clear to a broader audience. Because of its breadth and application focus,
the audience for this book extends from business and technical managers who want to
learn how to ensure security within their particular areas to top-level executives who
want to provide leadership for an effort in this field.
hs me yet heal hae a RES,
ltteersfa pin een eeeser
sitittd
] na fl Sab "4 ennan Agr aa
- > die? ‘ = .
Lowe
sme
a” or
a
eee aelacda ae rd
a aa mininele aoreoenirm ganas atwigAiey > “
—
Ah
i onvier nanan’ won eee
baalhadith # eens peel aa x S ; mie if t A he 7.)
Sl oy
el Coe 1S ie # ee i ‘a .
- i in a were avec Sait Spetal <idpBaines *th » rie
0)16
Wi
oyster
36Seattl
PUD 3! ROD! sino av eee racers
e etsy Wiriiriy ay mys Heise Ant? eran U a
, HRMinaypereroR sires MHrurigtinon absent his eal |
shes basset! ‘Vie Shi Gri fens) Crh rhe oes aed oa
MAPALas ete riotNe aus on int ele sti ~colse eho Si ABE
1 Ts ilove lo1 meme heed deininal)
TM Iarren
hen 10 Sol oth be Yaenute rinobe md eTorenebsronncey ey ee mE 8
grieve! eau utreaey yaslanreg vapid “ners dine): oe haw att wt
Therefore, the first step in the assurance process is to identify and label every useful
bit of information that the organization owns. This is a simple inventory process. Every
item of information is catalogued and a value is assigned. The recording process is
called baselining and the catalogue that it produces is called a baseline. The baseline
is the starting point for the security response.
A baseline is the precise specification of the content and interrelationship of all of the
organization’s information items. By definition, the baseline contains only items that the
organization considers valuable. The baseline documents the information resource base of
the organization.
Because the actual contents of the baseline are intangible, this documentation is the
proxy for the asset itself. Since the baseline constitutes the only tangible record of the
asset base, that documentation has to be maintained as a living entity throughout
the information assurance process. The protection scheme is geared to protecting the
contents of the baseline. Therefore, the goal of the baselining process is to assure a con-
tinuously accurate picture of the components and status of the information base.
The information base is dynamic because the information contained is constantly
changing. Most information of value is directly related to the business case. Therefore,
asset bases evolve with the business case over time.
It is important to maintain alignment between the baseline and the business case,
because the baseline contains the information that supports the organization’s mission
and purpose. As such, a formally documented and highly disciplined process should be
employed to evaluate and control any changes to the baseline.
Information Assurance for the Enterprise
2
A disciplined process is necessary because information is hard to keep track of and
the business case is complex. Strict discipline assures that all items of value to the orga-
nization are accounted for. :
For example, a change to the organizational business case, such as a new product
line, will produce new information. The new information may be extremely valuable
to the overall success of the product and the organization. Therefore, there has to be
certainty that any new information added will be identified properly and assured ade-
quately. Without a formal process to make certain that changes are reflected accurately,
it is likely that the organization's understanding of the contents of the asset base will be
lost. This creates the potential for valuable new items to be unprotected, or even for the
organization to lose track of its assets entirely.
. Process implementation
. Asset identification
. Control of change
. Status accounting
. Asset evaluation
—
HO
W
SP. Version management
Dna
Process Implementation
It takes a plan to establish a persistent organizational process. In the case of asset manage-
ment, this is called the asset management plan. That plan enumerates the activities that
make up the entire asset management process. This includes all of the necessary proce-
dures as well as all the points in the process where those functions will be performed. The
plan defines and assigns organizational roles, responsibilities, and personal interrelation-
ships while specifying the interactions between each activity.
The product is a complete, correct, and fully documented life-cycle strategy. That
strategy lays out the overall approach to accounting for and maintaining the status of
all information of value to the enterprise. The resulting plan should precisely specify
the process that will be used to identify and label information and maintain a correct
representation. Because the plan sets the strategic direction and dictates the procedures
Chapter I: Knowing What to Secure
3
for meeting organizational objectives, it must also be sensitive to changes in organiza-
tional context. Therefore, the organization must make a commitment to continuous
planning and updating throughout the life cycle.
The plan must make certain that the status of the information asset is known and
kept up-to-date. It must assure that valid baselines and versions exist. In conjunction
with the requirement to maintain baseline integrity, rules must be laid down to assure
that the repositories that contain the formally constituted baselines are properly main-
tained and archived. Finally, the plan should specify an up-to-date list of the decision
makers who are authorized to approve alterations to the form of the asset base. That
list should itemize the authority, scope, and responsibility of each decision maker.
One of the most important benefits of a well-managed asset baseline is that it under-
writes the way that risk is managed and disaster recovery is assured. The risk manage-
ment function is an essential feature of the information assurance process because it
maintains the organization's planned response to all identified threats. The risk man-
agement plan is based on an assessment of the threat to the information base that each
risk represents. Risk management is aided by well-defined baselines because a clear
picture of the form of the asset assures that only relevant threats will be dealt with.
Effective disaster recovery is another outcome of good baseline management. Disas-
ter recovery plans assure the ability to recover assets after a disaster. This is an important
element in ensuring organizational continuity. The contribution of the asset manage-
ment plan to the disaster recovery process is the assurance of precise knowledge about
the contents of the asset base (this precise knowledge enables the timely restoration of
normal functions) to a specified recovery point.
Periodically it is necessary to archive a well-defined baseline. Periodic archiving as-
sures that an up-to-date picture of the asset is available for recovery. The rules and
procedures for archiving each baseline have to be defined and documented in order
to do archiving properly. Thus, the asset management plan has to describe both the
timing and the execution steps required to back up and preserve each baseline. That
includes fundamental considerations such as establishing the priority for what is to
be protected, as well as itemizing the requirements for sequencing and scheduling the
recovery steps in the case of a disaster. At a minimum, the following concerns should
be addressed:
Cross Check
~
Asset Identification
The goal of the asset identification function is to establish an accurate record of the
precise form of the items in the information asset base. To assure proper representation,
all items that comprise the information asset base have to be identified and labeled
unambiguously. Once this is done, the documentation is continuously updated.
Asset identification is based on a formal identification scheme. The identification
scheme assures that everything worth protecting is identified and labeled properly As
a result, the asset identification scheme is the cornerstone of good asset management.
Identification and labeling of the asset is an essential requirement because the infor-
mation base is a theoretical construct, which might have many forms. Practical security
requirements demand that a complete and correct picture of the form of the informa-
tion asset is maintained at all times. This implies a process to assure that the relevant
characteristics of each item of information are known and properly recorded.
An asset identification scheme establishes the “day one” form of the asset and it is
kept current throughout the life cycle. With new organizational systems, this process is
carried out during the design phase. If the function is already part of an existing system,
then a retrospective analysis of existing systems is required.
Such after-the-fact analysis can be costly and difficult for a manager to justify
because it may require documenting the functions of hundreds of thousands of lines of
code that could be decades old. However, it is essential to the overall responsibility to
provide assurance, because legacy systems are usually insecure. That is, it would not be
sound practice for the organization to be able to say with certainty that 10’percent of its
systems—those that represent new code—were secure, but that the status of the other
90 percent was unknown.
Because of the necessity to secure only those items of value, the identification scheme
is always guided by the business case. There are two separate steps involved in docu-
menting the identification scheme. First, the decision criteria to be used to identify and
characterize the individual asset items must be explicitly agreed to. For instance, criteria
like ... “The information item must be directly traceable to and support a business process"
Chapter I: Knowing What to Secure
5
can be used to decide whether or not an asset is worth protecting. Then, once the right
decision criteria are established, it is important to assure that the people responsible for
conducting the actual identification and labeling process will correctly use them.
Each item of information that will go into the asset base is identified and appropri-
ately labeled. As we said earlier, this is a documentation process. The description of the
item, its area of application, and its general use is recorded and a label is created. This
documentation and labeling process actually requires two passes.
The first pass describes the components of the baseline at a high level of functioning.
The aim is to describe the large components of a particular_real-world operation, ,
for instance, Se (saeco Ca AGT clint anayaa Lua
encompassing, rather than detailed. It should focus on communicating the general
form of the asset base to managers and users. This is done to obtain feedback. The aim
is to assure a clear relationship between the documentation of the asset base and the
associated elements of the business process.
The actual asset base typically contains multiple representations. These are called
versions. For example, data from tax forms for different years would constitute different
versions of the same basic item, which is “tax form information.” Once that high-level
understanding is achieved, a second pass is required to detail each of the large compo-
nents. The outcome of this second pass is a detailed description of each of the infor-
mation items that_were identi in the first pass. Figure 1-1 illustrates this two-pass
approach to identifying and representing the information asset.
WGFeeUeMic-ushss Welelalre(er-y (aun) | Unique Items | Unique Items | Unique Items | Unique Items
Flpie <@rolstane)ie | lelel@elgiege)ky| and Controls | and Controls | and Controls | and Controls
Lowest Level
Figure |-2
A Single Baseline Control Set | of Control
Increasing levels is composed of
of control
Moderate
Individual Control Sets for Each Baseline Version
< Level of Control
are composed of
The asset base can be assured this way because the classification and tagging of the
elements provides a tangible representation of the items to be secured.
The structure is maintained top-down, ranging from a view of the information asset
as a single entity all the way down to a designation of the explicit items that constitute it.
The baseline representation that emerges at the lowest level in this decomposition
process is a detailed and concréte architecture. That coricrete architecture represents
the only tangible depiction of the asset. Sane see
Chapter |: Knowing What to Secure
1
The general approach to this design process is outlined in Figure 1-3. Please remem-
ber, this is provided as an illustration only. The approach is the same in all cases, but the
form of each particular implementation will vary with the individual business model
of the organization.
Overall
Information Asset
Baseline
is composedof
Specific Asset |
| Baselines at Lower |
|Levels of Definition |
SS
DB Records
Figure 1-3 is a general representation of the mechanism that identifies and arrays the
distinct items of information that comprise the asset base. The decomposition process
illustrated demonstrates how the goal of establishing successive levels of understand-
ing is achieved. At the lowest level of decomposition, the baseline scheme that emerges
represents the detailed architecture of the asset base of the organization.
Because the array of items and their position in the hierarchy is subjective, that deci-
sion should be based on consensus. It should be made using the input of many stake-
holders, ranging from the technical staff to the business case owners of a given item of
information. However, independent of who makes the decision, once it is established,
the formal asset baseline is kept in some sort of formally designated repository, which
is maintained accurately throughout the life cycle.
Control of Change
Change control is a continuous process. It assures that the documentation
of the items
that exist_within the baseline is accurate and that their precise status is known_at all
times. Its aim is to manage the natural evolution of an entity in such a way that it
preserves its overall integrity. An effective process for the control of change offers two
advantages. First, it assures the integrity and correctness of a baseline. Second, it allows
for the maintenance of continuous knowledge about status.
Information Assurance for the Enterprise
8
Change control is a sensing, analysis, and authorizing function. It is necessary be-
cause information evolves. Items are continuously added to baselines and the form
and content of individual baselines changes as the business model evolves. Moreover,
the Unter Raaares 1eGuIDESIS Geeate cachHen aSaT changing jin accordance
with alterations in policy, as well as to the form of the asset itself. Thus, there has to be
a process to manage the natural evolution. Otherwise, the understanding needed to as-
sure the asset base would degrade quickly. For that reason alone, effective information
assurance depends on rigorous change control.
The functional parts of asset management are interrelated, in that the capability
to conduct effective change management depends on the prior process (asset identi-
fication). The information assets of the organization are intangible. If change were not
controlled, the rest of the assurance process would become pointless. That is because
the organization would not know what it was protecting. Therefore, change manage-
ment is a critical requirement.
Any change to the baseline can have serious implications because any modification
to the form of the information asset may change the protecti wirements. Conse-
quently, the appropriate manager must authorize all proposed changes. That decision-
making process must be supported by an analysis of the implications of the change.
That analysis should consider such things as how the changed item will be reinte-
grated into and interface with the other items in the assurance scheme. As a require-
ment, there should be an estimate of the affects and resource commitments required to
modify the form of the protection. Change control is such an important process that its
detailed implementation will be discussed in detail in the next section.
Status Accounting
Identification and change control establish and maintain a correct and continuously
evolving image of the content of the information base. This image is documented by
the status accounting function. Status accounting maintains running documentation
of all asset baselines and performs the routine reporting activities necessary to transmit
that knowledge to the appropriate managers:
This record is typically maintained in an electronic repository or “ledger.” This ledger is
the concrete documentation of the asset base. The ledger is referenced by change control
to perform the impact alalyeis, prior tothe authorization of a change. It is updated in a
timely fashion once a change has been approved and implemented. In many organiza-
tions, the person responsible for doing the status accounting is the information resource
manager. Because this manager essentially maintains the baselines, this individual is
sometimes referred to as a baseline manager.
Asset Evaluation
The point of asset evaluation is to assure the operational integrity of the asset base
itself. That assessment is an important continuous review process. It involves a formal
‘inspection of a designated baséline. Inspection targets will normally depend on the
requirements of the situation. Evaluations are done on a routine, scheduled basis.
Chapter I: Knowing What to Secure
9
The schedule is typically developed as part of the initial planning. It is important
to maintain a disciplined inspection process, because the basic principle of integrity
is involved.
The evaluation assesses the degree of correctness of the baseline. It tests the accu-
racy of the description, the placement of the item in the hierarchy, and labeling of
each information resources within the baseline. In conjunction with these steps, it also
evaluates the appropriateness and effectiveness of the specific safeguards that have been
established for each element.
The result of each evaluation is communicated to appropriate designated execu-
tives. By rule, any findings of nonoccurrence or identified anomalies must be resolved
through action by the manager responsible for the affected item. Immediate executive
action is required because these anomalies are, by definition, latent vulnerabilities. The
reporting process itself, as well as the explicit criteria for judging whether the problem
has been resolved, is outlined in the asset management plan.
Version Management
Version management is necessary because there are usually simultaneous representg-
tions sset baseline and is really a library administration function. It keeps
each authorized version of the asset baselines secure, each in its own repository. Since
those representations are maintained electronically, the repositories are usually just
another organizationally sanctioned database. These databases are individually main-
tained, and are labeled uniquely.
In addition to maintaining a record of all current versions, all superseded versions
are archived se y. This archive is similar to the repositories that hold the current
versions, in the sense that it is a secure electronic storage location. The archives of
old versions are useful to security because they provide a rollback capability in the
case of disaster, as well as serve as a source of time-series data fo
Many useful things can be learned about the long-term behavior and evolution of the
resource by studying these data.
Maintaining Integrity
In this part of the chapter, you will learn about the components that are necessary for
maintaining integrity in the organization.
The generic term for this process is “change management.” Change management es
continuous integrity by controlling all changes to all formally established. baselines.
Change management analyzes requests for changes to the form of the asset base. The
aim is to determine all of the potential implications and impacts on the affected base-
line. Once these are all understood, the next step is to obtain the authorizations.
Assigning Authority
Decisions about the form of the asset base have to be made by a responsible party. This
assures accountability. Therefore, as part of the process the person who should appro-
priately make the decision has to be identified and decision-making authority has to
be assigned formally.
Chapter I: Knowing What to Secure
The first step is to identify and designate the proper decision maker. The authority
for authorizing change is typically assigned based on operational responsibilities. That
is, the person who should be held accountable for approving changes to an informa-
tion asset should also be the one responsible for managing its generation and use.
The process of identifying and designating that decision-making authority requires
that the organization understands the operational implications for the information
itself. Policies should be made about questions such as whether low-level technical
activities, for instance routine maintenance changes, should be approved by any person
higher in the organization than technical workers.
Structural change to a baseline takes place when new items are created or added.
The decision to change a baseline can be approved only by the authorized decision
maker. From the standpoint of maintaining a disciplined approach, the decision maker
empowered to approve changes must also be the one with the authority to enforce the
decisions that they make. That is, the decision maker should be in a position to allocate
the resources and oversee the activities to assure the integrity of the change.
Other Considerations
Escalation policies must always be considered because changes to the business case
can modify the security requirements of a particular information item. For instance,
an information item generated by a software system under development will always
have different sensitivity requirements than the information that flows through the
same application when it begins supporting the core operation. Once that system and
its data are moved up to operational status, it takes a different level of autharitxto
approve changes to the representation of the information it processes. This approval
requires some sort of procedure to assure that it actually happens. To assure that the
asset baselines integrity is maintained as they evolve, it is a good idea to keep track of
the individuals who requested the change. This allows security managers to-validate
sensitivity and use for example.
Finally, in complex and outsourced situations typical of modern information system
work, it is an absolute requirement that asset baselines evolve through a single integrated
nd coordinated function. An organization’s information resources frequently include
contributions from external participants—customers and subcontractors, for instance.
Chapter I: Knowing What to Secure
I3
There should be a formal mechanism that assures that contributions do not inadver-
tently (or intentionally) damage the integrity of the organization’s understanding of its
own assets. Otherwise, if third parties had the capability to change baselines without
authority, there would be the extreme danger that the integrity of the entire asset could
be destroyed without anyone in the organization knowing it.
There is no greater threat to the integrity of information than uncontrolled change. If
the evolution of the baselines that represent the information asset is not controlled prop-
erly, critical information may be threatened because the necessary countermeasures were
not in place. This is not a trivial hazard and so it is essential that unauthorized changes
to the form of the asset base will not occur. Nevertheless, before we proceed to the next
section, which focuses on the actual steps to be taken to implement a reliable process for
controlling change, here are some questions to test your understanding of the process.
Cross Check
1. What is an information asset baseline and why is it critical to create one before
embarking on an information assurance process?
2. Why are asset baselines formulated hierarchically? What is the advantage of
approaching information identification that way?
3. Why are information asset baselines constantly changing? Is this a particular
problem in IT organizations?
4. Why is it important to control carefully changes that take place in the informa-
tion asset baseline?
1. Timing requirements
2. Corrective action requirements
3. Financial factors
4. Likelihood
Timing Requirements
Deciding the timing of the countermeasure is applied is important because the value
of the corrective action depends on the ability to deliver it in sufficient time. The old
axiom about “closing the barn door after the horse has escaped” is an example of how
timing is a security issue.
Nonetheless, every threat has different timing requirements. Therefore, the feasi-
bility of the countermeasure should be evaluated based on the question of whether it
can react quickly enough to overcome the threat. For instance, an electronic penetra-
tion must be detected and responded to almost instantly or it will never be countered.
That is because the appearance of the threat is moving at the speed of the computer
itself. By comparison, an attempt by a thief to break into the computer room allows
a little more time to respond. Thus, timing has to be factored into any consideration
of feasibility.
Financial Factors
The most important element and the one that is most easily understood and accepted
by the people in the organization, is financial factors. Financial factors typically
describe the return on investment (ROI) for a given countermeasure. If the cost of
implementing a countermeasure is greater than the conceivable loss, it is pointless to
consider‘it. This may seem unlikely, but in the case of low-value assets, there is always
the possibility that the expense of maintaining a given level of security outweighs the
financial loss resulting from compromise. Therefore, a decision might be justified to let
the item sit unprotected.
Likelihood
Likelihood is composed of two factors. The first is the frequency of occurrence (of the
threat) and the second is the extent of the harm that might result. The extent of harm
should never be confused with frequency of occurrence. For instance, fires might
happen infrequently. Yet if they do, the likelihood is very high that significant harm
will occur. Therefore, a countermeasure to protect your house against fires would
be highly justified, even if they were unlikely to happen. Conversely, if there is little
harm from one incident of a threat but a high rate of occurrence, then some sort of
countermeasure might be justified because the aggregate impact of the resulting harm
over time may be significant. Frequency and probability have to be balanced in that
respect to establish a countermeasure set.
Figure |-5 Relationship between the asset baseline and the control baseline
Therefore, the countermeasures that have been selected for each item in the asset base-
line must be recorded as well. The final version of the representation of the asset base has
both the information item and the associated countermeasures tightly bound to each
other. Changes to either type of baseline component are maintained in that way—in
essence, the information and the associated countermeasures have to correspond. It is
acceptable to have controls that do not specifically reference an information item or
ee ee et a
There is a logical sequence for how these are deployed. For instance, it is impossible
to quantify an incident before it has been reported, and some of these items might take
place at the same time or interchangeably. However, it is not good practice to assume
that everybody knows the sequence. As a case in point, it is a matter of organizational
choice whether employees sign a confidentiality agreement before or after their creden-
‘tials are verified. While there are potential security risks associated with not verifying a
person’s credentials, there is little threat to confidentiality since the employee has not
been hired. As such, it is important that the personnel manager understand what task
to do first, and that knowledge cannot be assumed. This is a minor item, but it serves
to illustrate the point that sequence nee onsidered in the design process
for countermeasures.
2a)
Monitoring
Monitoring has two purposes: First, it assures attherelarons upbetween theinior-
and its
countermeasures
mation will be supervised: second, it allows the organization _.
to evolve continuously t termeasures as threats arise. A focused monitoring pro-
cess assures both of these functions. This function is established by developing work
practices that specify the participants, schedule, and responsibilities for each monitor-
ing activity, as well as the reporting requirements.
Information Assurance for the Enterprise
8
Accountabilities
Explici ntability for oversight and problem resolution should be assigned as part
of the description of the countermeasures. Otherwise, their application will not be
supervised properly. This requires that individual supervisory roles and responsibilities be
defined for each countermeasure, including the change management authority discusse
earlier in this chapter. Then, performance of these duties needs to be overseen using the
monitoring process just discussed. To assure evenhanded administration of discipline,
the consequences of a failure to meet assigned obligations must be spelled out.
Problem Resolution SQ
Finally, a statement has to be made about how problems will be resolved. This set of
work Seticecis wally aloe TBIODIEM TeSOITOGR trocar defines how
typical problems with operations will be handled as they are identified, who is respon-
sible for their resolution, and the criteria that will be used to determine if the problem
has been resolved properly. This function closes the loop in ensuring consistent appli-
cation of the process, because it guarantees that problems that arise during operation
will be dealt with systematically.
)
As the final point, remember the importance of keeping the baseline properly aligned
with the evolution of the operating infrastructure of the organization. This is an itera-
tive process in the sense that it is inappropriate given the complex demands of even
the simplest organizational situation to develop a static representation and to fail to
maintain it. Therefore, effectiveness implies a commitment to continuous monitoring,
adjustment, and updating of the baseline.
This process should entail solicitation of continual and regular feedback from the
operational environment. The feedback is important because, in addition to providing
guidance, a well-executed feedback system generates a high degree of organizational
buy-in. This final benefit—universal acceptance—justifies fully the work required to
obtain that feedback because it assures disciplined performance of the security work.
We are now going to move on to the specific elements of information assurance, but
before we do so, we would like you to review a final set of key questions to check your
understanding of the ideas in this chapter.
Chapter |: Knowing What to Secure
19
Cross Check
1. In terms of focus, what is the difference between the selection of the controls for
information assurance and the deployment of the actual response? Why should
these be considered different aspects?
. What is the role of the change control process and why might it be the single
most important success factor?
. Why is it necessary to conduct operational risk assessment on an ongoing basis?
How are the outcomes of this process used?
. What are the organizational and business case issues and constraints involved in
control selection? Why are these critical determinants of the ongoing effectiveness
of the information assurance system and how can they be affected by change?
. Why is it necessary to maintain a classic change management process for the in-
formation asset baseline? What is the role of the information baseline account-
ing ledger in this process and why is it important?
. Why is it necessary to value controls to implement information assurance?
What does the organization lose by not doing this (for example, what would
be the situation if this were not done)?
. What is-the role of threat assessment in the overall control formulation process?
Why is threat assessment a primary success factor for operational implementation?
. Why is it necessary to follow the steps in the process? What is the likely conse-
quence of jumping ahead a few steps to conclude things?
Chapter | Review
Chapter Summary
The asset management process is composed of six interdependent organizational
activities. These are process implementation, asset identification, change control,
status accounting, asset evaluation, and version management.
The baseline identification is important because the deployment of assurance
controls is directly referenced to the structure and content of the asset being
managed.
Change control is necessary because information assets are constantly evolving
and there should be an organizational process to manage that natural evolution.
Without change control, the ability to account for the information base with
certainty would quickly disappear.
Status accounting maintains a running account of all asset baselines and performs
the routine reporting activities required to convey that information to the appro-
priate people when needed.
Information Assurance for the Enterprise
20
Asset evaluation constitutes a formal inspection of the target baseline. It should
be performed on a scheduled basis.
The asset management process is formally defined and A deeRcalh implemented
by means of an asset management plan.
One of the primary benefits of well-managed asset baselines is that they fully
underwrite the risk management and disaster recovery process.
The identification and baselining process is the essential element in the estab-
lishment of an effective asset management program and, as a result, the corner-
stone of asset management is the asset identification scheme.
In practice, that aggregated set of related information assets is termed a “baseline.”
Items defined at each level are provided with unique and appropriate labels.
Generally, these labels are associated with the structure itself.
At the lowest level of decomposition, the baseline scheme that emerges will
represent the concrete architecture of the target information asset.
A change management process is necessary to establish and maintain explicit
control over the information asset baselines and associated controls.
Change management starts with having a defined mechanism for processing
change requests. This is a documentation activity.
Changes at each level in the structure of the information asset baseline are
maintained at all relevant levels in that ledger. They must reflect correctly and
accurately the changed status of the actual information item.
Operationally, a control set is assigned once the target asset is unambiguously
understood.
The actual process of designing the control set necessitates a step-by-step analysis
of the precise protection requirements of each individual element comprising the
information resource.
The purpose of assessment is to assure the effectiveness as well as confirm the
coverage of the assurance scheme.
The assessment operation is carried out much like other conventional testing
activity. The practical outcome of this process is a formal analysis of effectiveness.
The final form of the system is composed of two independently formulated, but
interrelated, baselines.
These are the information asset baseline, which describes the form of the resource,
and the control baseline, which provides the actual assurance.
The application of the required controls for each information item must be
spelled out in the form of itemized work practices.
Effectiveness implies a commitment to continuous monitoring and adjustment.
This process should be centered on constantly seeking feedback from the opera-
tional environment.
Chapter I: Knowing What to Secure
2I
Key Terms
asset base (5)
asset identification (4)
asset management (2)
asset management plan (2)
authorized decision makers (11)
baseline (1)
baselining (1)
change control (7)
change management (8)
concrete architecture (6)
controlled repository (11)
corrective action (14)
countermeasure (13)
decision maker (3)
disaster recovery (3)
family tree (5)
financial factors (15)
risk management (3)
status accounting (8)
timing (3)
uncertainty (15)
version management (9)
work practices (16)
2. Baselines:
A. are abstract
B. are intangible
C. are hierarchical
D. must be programmed
4. To do its work properly, the status accounting function relies on the use of:
A. code reviews
B. repositories
C. controls
D. verifications
Essay Quiz
In your own words, briefly answer the following:
Case Exercise
Complete the following case exercise as directed by your instructor:
Refer to the Heavy Metal Technology Case in Appendix A. You have been assigned
the baseline management responsibility for the project to upgrade the target
acquisition and display (TADS) for the AH64-D Apache Longbow attack helicopter.
To start the process, you know you must first identify and array acomplete and coherent
baseline of high-level documentation items. Using the project materials outlined in
Information Assurance for the Enterprise
24
the case (and others you want to add because you feel they are appropriate), perform
the following tasks: \
rechtsaf. 405. Ruim 1 K.M. verder links den straatweg op, dien
Aan het einde van het dorp Wolvega rechts- en dan linksaf. In
den dijk bij Schoterzijl rechtsaf 1367 en achter langs den dijk
naar Lemmer.
Aan het einde van het dorp Wolvega rechts- en dan linksaf. Te
Men volgt de tramrails, langs het station en kort daarna linksaf over
den spoorweg. Vóór Joure bij het „Huis ter Huivre” linksaf 405
en dan rechtuit over de Scharsterbrug en langs het Huis ter Heide.
heen 1679. (I n d e k e r k t e W ij c k e l
bezienswaardig praalgraf van Menno van
C o e h o o r n , t e b e z i c h t i g e n à 1 0 ct. d e p e r s o o n ), en
rechtsaf naar Balk. Van den spoorwegovergang bij Heerenveen tot
Balk volgt men steeds de telegraafpalen. In B. over een ophaalbrug
De weg is tot Mirns vrij goed berijdbaar, verder is [137]de weg minder
goed, soms zelfs slecht. Bij het Huis ter Heide boschrijk. Bij
Kippenburg voert de weg, en ook de zijweg naar Oudemirdum, door
een boschrijke streek (Gaasterland).
rechts 174.
Men volgt de tramrails, langs het station en kort daarop linksaf over
den spoorweg. Vóór Joure bij het „Huis ter Huivre” linksaf 405
en dan rechtuit over de Scharsterbrug en langs het „Huis ter Heide”.
Men volgt de tramrails, langs het station en kort daarna linksaf over
den spoorweg. Vóór Joure bij het „Huis ter Huivre” linksaf 405
en dan rechtuit over de Scharsterbrug en langs het „Huis ter Heide”.
rechtsaf 1271.
brug en dan rechtuit naar den zeedijk, hier linksaf 1762 naar
Stavoren; vóór Stavoren links langs het emplacement van den
spoorweg, dan rechts den spoorweg over en langs de andere zijde
van het emplacement naar Stavoren.
8.3 54.6 — ,,
STEENWIJK