Lecture - IsPDM
Lecture - IsPDM
CHAPTER 3
INFORMATION SECURITY PROGRAM DEVELOPMENT
AND MANAGEMENT
3
3.4 INFORMATION SECURITY PROGRAM MANAGEMENT OVERVIEW
4
3.4 INFORMATION SECURITY PROGRAM MANAGEMENT OVERVIEW
5
3.4 INFORMATION SECURITY PROGRAM MANAGEMENT OVERVIEW
6
3.4 INFORMATION SECURITY PROGRAM MANAGEMENT OVERVIEW
7
3.6.2 TECHNOLOGY RESOURCES
• Firewalls
• Backup and archiving approaches such as redundant array of inexpensive disks
(RAID)
• Antivirus Systems
• Security features inherent in networking devices (e.g., routers, switches)
• Intrusion detections systems (IDSs), including host-based intrusion detection
systems (HIDSs), network intrusion detection systems (NIDSs)
• Intrusion-prevention systems (IPSs)
8
3.6.2 TECHNOLOGY RESOURCES
9
3.6.2 TECHNOLOGY RESOURCES
10
3.6.2 TECHNOLOGY RESOURCES
11
3.7 SCOPE AND CHARTER OF AN INFORMATION SECURITY PROGRAM
3.8 THE INFORMATION SECURITY MANAGEMENT FRAEWORK
• The program adds tactical and strategic value to the organization
• The programed is being operated efficiently and with concern to cost issues
• Management has a clear understanding of information security achievers,
activist, benefits and needs
• Information security knowledge and capabilities are growing as result of the
program
• The program fosters cooperation and goodwill between organizational units
• There is facilitation of information security stakeholders understanding their
roles, responsibilities and expectations
• The program includes provisions for the organization’s continuity of business
12
3.8 THE INFORMATION SECURITY MANAGEMENT FRAEWORK
13
3.8.2 ISO/IEC 27001:2013
14
3.8.2 ISO/IEC 27001:2013
15
The ISO 27xxx set of published standards and practices now cover
virtually all aspects of security. They include:
. ISO/IES 27000 Overview and vocabulary
. ISO/IES 27001 Formal ISMS specification
. ISO/IES 27002 InfoSec controls
. ISO/IES 27003 ISMS implementation guide
. ISO/IES 27004 Infosec metrics
. ISO/IES 27005 Infosec risk management
. ISO/IES 27006 ISMS certification guide
. ISO/IES 27007 management system auditing
. ISO/IES 27008 Technical auditing
16
The ISO 27xxx set of published standards and practices now cover
virtually all aspects of security. They include:
. ISO/IES 27010 for interorganizational communication
. ISO/IES 27011 for telecommunication industry
. ISO/IES 27013 for ISMS + Service management
. ISO/IES 27014 infosec governance
. ISO/IES TR 27015 for financial services
. ISO/IES TR 27016 infosec economics
. ISO/IES TR 27019 Process Control
17
The ISO 27xxx set of published standards and practices now cover
virtually all aspects of security. They include:
. ISO/IES TR 27031 ICT business continuity
. ISO/IES TR 27032 Cybersecurity
. ISO/IES TR 27033 -1 to -5 network security
. ISO/IES TR 27034 application security
. ISO/IES TR 27035 incident management
. ISO/IES TR 27036 -3 ICT supply chain
. ISO/IES TR 27037 digital evidence
. ISO 27799 ISO27k for healthcare industry
18
3.9 INFORMATION SECURITY FRAMEWORK COMPONENTS
19
3.11 INFORMATION SECURITY INFRASTRUCTURE AND ARCHITECTURE
20
21
3.11 INFORMATION SECURITY INFRASTRUCTURE AND ARCHITECTURE
22
3.11 INFORMATION SECURITY INFRASTRUCTURE AND ARCHITECTURE
23
3.11.2 OBJECTIVES OF INFORMATION SECURITY ARCHIECTURES
24
3.12 ARCHITECTURE IMPLEMENTATION
25
3.13 SECURITY PROGRAM MANAGEMENT AND ADMINISTRATIVE
ACTIVITIES
• Checklist for a comprehensive, well-managed security program:
• A security strategy intrinsically linked with business objectives that has senior
management acceptance and support.
• Security Policy and supporting standards that are complete and consistent with
strategy.
• Complete and accurate security procedures for all important operations.
• Clear assignments of roles and responsibilities.
26
3.13 SECURITY PROGRAM MANAGEMENT AND ADMINISTRATIVE
ACTIVITIES
• Established method to ensure continued alignment with business goals and
objectives such as a security steering committee.
• Information assets that have been identified and classified by criticality and
sensitivity.
• Security architecture that is complete and consistent with strategy, and in line
with business objectives.
• Effective controls that have been well-designed, implemented and maintained.
• Effective monitoring processes in place.
• Tested and functional incident and emergency response capabilities.
27
3.13 SECURITY PROGRAM MANAGEMENT AND ADMINISTRATIVE
ACTIVITIES
• Tested business continuity/disaster recovery plans.
• Appropriate information security involvement in change management, SDLC
and project management processes.
• Established processes to ensure that risk is properly identified, evaluated,
communicated and managed.
• Established security awareness training for all users.
• Established activities that create and sustain a corporate culture that values
information security.
• Established process to maintain awareness of current and emerging regulatory
and legal issues.
28
3.13 SECURITY PROGRAM MANAGEMENT AND ADMINISTRATIVE
ACTIVITIES
• Effective integration with procurement and third-party management processes.
• Resolution of noncompliance issues and other variances in a timely manner.
• Processes to ensure ongoing interaction with business process owners.
• Business supported processes for risk and business impact assessments,
development of risk mitigation strategies, and enforcement of policy and
regulatory compliance.
• Established operational, tactical and strategic metrics that monitor utilization
and effectiveness of security resources.
• Effective communication and integration with other organizational assurance
providers.
29
Program Administration
30
Program Administration
31
Program Administration
32
3.13.1 PERSONNEL, ROLES, SKILLS AND CULTURE
3.13.2 SECURITY AWARENESS, TRAINING AND EDUCATION
• Who is the intended audience (senior management, business managers, IT staff,
end users)?
• What is the intended message (Policies, procedures, recent events)?
• What is intended results (improved policy compliance, behavioral change,
better practices)?
• What communication method will be used (computer-based training [CBT], all-
hands meeting, intranet, newsletters, etc.)?
• What is the organizational structure and culture?
33
3.13.1 PERSONNEL, ROLES, SKILLS AND CULTURE
3.13.2 SECURITY AWARENESS, TRAINING AND EDUCATION
A number of different mechanisms available for raising information security awareness includes:
• Computer-based security awareness and training programs
• E-mail reminders and security tips
• Written security policies and procedures (and update)
• Nondisclosure statements signed by the employee
• Use of different media in promulgating security
• Visible enforcement of security rules
• Simulated security incidents for improving security
• Rewarding employees who report suspicious events
• Job descriptions
• Performance reviews
34
3.13.3 DOCUMENTATION
35
3.13.3 DOCUMENTATION
36
3.13.3 DOCUMENTATION
• Program Objectives
• Road Maps
• Business Cases
• Resources required
• Controls
• Budgets
• Systems designs/architectures
• Policies, standards, procedures, guidelines
37
3.13.3 DOCUMENTATION
38
3.13.5 RISK MANAGEMENT
39
3.13.6 BUSINESS CASE DEVELOPMENT
40
3.13.6 BUSINESS CASE DEVELOPMENT
41
3.13.6 BUSINESS CASE DEVELOPMENT
42
3.13.6 BUSINESS CASE DEVELOPMENT
43
3.13.7 PROGRAM BUDGETING
44
3.13.7 PROGRAM BUDGETING
45
3.13.11 PROGRAM MANAGEMENT EVALUATION
Program Objectives
• Where program goals aligned with governance objectives?
• Are objectives measurable, realistic and associated with specific time line?
• Do Program objectives align with organizational goals, initiatives, compliance
needs and operational environment?
• Is there consensus on program objectives? Were Objectives developed
collaboratively?
• Have metrics been implemented to measure program objective success and
shortfalls?
• Are there regular management reviews of objectives and accomplishments?
46
Program Management
47
Program Management
48
Security Operations Management
49
Security Operations Management
50
Technical Security Management
51
Technical Security Management
52
53
54
• 3.13.13 LEGAL AND REGULATORY REQUIREMENTS
• 3.13.14 PHYSICAL AND ENVIREONMENTAL FACTORS
• 3.13.15 ETHICS
• 3.13.16 CULTURE AND REGIONAL VARIANCE
55
3.13.17 LOGISTIC
56
3.14.1 INFORMATION SECURITY LIAISON RESPONSIBILITIES
57
3.14.2 CROSS-ORGANIZATIONAL RESPONSIBILITIES
3.14.3 INCIDENT RESPONSE
3.14.4 SECURITY REVIEWS AND AUDITS
• An Objective . A scope
• Constraints . An approach
• A result
• Audits
• Auditors
3.14.5 MANAGEMENT OF SECURITY TECHNOLOGY
• Technology Competencies
58
3.14.6 DUE DILIGENCE
59
3.14.7 COMPLIANCE MONITORING AND ENFORCEMENT
• Policy Compliance
• Standards Compliance
• Resolution of Noncompliance Issues
• Normal Monitoring
• Audit Reports
• Security Reviews
• Vulnerability Scans
• Due Diligence Work
• Compliance Enforcement
60
3.14.8 ASSESSMENT OF RISK AND IMPACT
• Vulnerability Assessment
• Threat Assessment
• Risk and Business Impact Assessment
• Resource Dependency Assessment
61
3.14.9 OUTSOURCING AND SERVICE PROVIDERS
62
3.14.9 OUTSOURCING AND SERVICE PROVIDERS
63
Outsourcing Contracts
64
Outsourcing Contracts
65
Outsourcing Contracts
• Third-Party Access
• Criticality of information to which access rights are given
• Criticality of privileges given
• Period of contract
66
3.14.10 CLOUD COMPUTING
• On-demand self-service
• Board network access
• Resourcing pooling
• Elasticity
• Measured service
67
Security as a service (SecaaS) comes in two major forms:
68
ISACA CISM REVIEW MANUAL 69
ISACA CISM REVIEW MANUAL 70
ISACA CISM REVIEW MANUAL 71
• The cost for an in-house DR infrastructure is reduced significantly. Because DR
in often considered to be a necessity rather than core business, the return on
investment (ROI) in DR services can be significant.
• Offsite storage means that the DR environment is less likely to fail in the case of
a major disaster.
• Identity as service (IDaaS) is a relatively new cloud service and currently has
two interpretations:
• The management of identities in the cloud that is separated from the users and
applications that use the identities. This can be either managed identity
services, including provisioning, or management for both onsite or offsite
services. Delivering a single sign-on (SSO) solution can also be part of the cloud
service offering.
72
• The delivery of an identity and access management (IAM) solution.
IDaaS is often a hybrid solution where access and roles are
configured by the CSP and users are authorized by enterprise
internal solutions. This is known as a federated model.
• Data storage and data analysis as a service, or big data
• Information as a service (InfoaaS)
• Integration platform as a service (IPaaS)
• Forensics as a service (FRaaS)
73
• Advantages
• Optimized resource utilization
• Cost savings
• Better responsiveness
• Faster cycle of innovation
• Reduced time for implementation
• Resilience
74
• Security Consideration
• Evaluation of Cloud Service Provider
• Existing widely accepted frameworks customizable for the cloud
(i.e., COBIT, ISO 2700x)
• Frameworks built for the cloud (i.e., CSA Cloud Control Matrix,
Jericho Forum Self-Assessment Scheme)
75
3.14.11 INTEGRATION WITH IT PROCESSES
• Integration
• System Life Cycle Processes
• Initiation
• Development or acquisition
• Implementation
• Operational and maintenance
• End of life/disposition
• Establishing requirements
76
3.14.11 INTEGRATION WITH IT PROCESSES
• Feasibility
• Architecture and design
• Proof of concept
• Full Development
• Integration testing
• Quality and Acceptance testing
• Deployment
77
3.14.11 INTEGRATION WITH IT PROCESSES
• Maintenance
• System end of life
• Change Management
• Configuration Management
• Release Management
• 3.15 CONTROLS AND COUNTERMEASURES
• 3.15.1 CONTROL CATEGORIES
–Preventive . Detective . Corrective
–Compensatory . Deterrent
78
3.15.2 CONTROL DESIGN CONSIDERATIONS
79
80
• 3.15.3 CONTROL STRENGTH
• 3.15.4 CONTROL METHODS
• 3.15.4 CONTROL RECOMMENDATIONS
–Effectiveness of recommended options
–Compatibility with other impacted systems, processes and controls
–Relevant legislation and regulation
–Organizational policy and standards
–Organizational Structure and culture
–Operational impact
–Safety and reliability
81
• 3.15.6 COUNTERMEASURES
• 3.15.7 PHYSICAL AND ENVIRONMENTAL CONTROLS
• 3.15.8 CONTROL TECHNOLOGY CATEGORIES
–Native Control Technologies
–Supplemental Control Technologies
–Management Support Technologies
–Security information management (SIM) tools
–Security information and event management (SIEM) systems
82
• 3.15.6 COUNTERMEASURES
• 3.15.7 PHYSICAL AND ENVIRONMENTAL CONTROLS
• 3.15.8 CONTROL TECHNOLOGY CATEGORIES
–Compliance monitoring and management tools
–Access management workflow systems
–Vulnerability Scanning tools
–Security configuration monitoring tools
–Policy management and distribution Systems
83
3.15.9 TECHNICAL CONTROL COMPONENTS AND ARCHITECTURE
• Analysis of Controls
• Control Placement
• Control Effectiveness
• Control Efficiency
• Control Policy
• Control Implementation
84
• 3.15.10 CONTROL TESTING AND MODIFICATION
• 3.15.11 BASELINE CONTROLS
• 3.16 SECYRITY PROGRAM METRICS AND MONITORING
• 3.16.1 METRICS DEVELOPMENT
–Strategic
–Management
–Operational
85
3.16.1 METRICS DEVELOPMENT
86
3.16.1 METRICS DEVELOPMENT
87
3.16.2 Monitoring APPROACHES
88
3.16.3 MEASURING INFORMATION SECURITY MANAGEMENT PERFORMANCE
89
3.16.4 MEASURING INFORMATION SECURITY RISK AND LOSS
90
3.16.5 MEASURING SUPPORT ORGANIZATIONAL OBJECTIVES
91
• 3.16.6 MEASURING COMPLIANCE
• 3.16.7 MEASURING OPERATIONAL PRODUCTIVITY
• 3.16.8 MEASURING SECURITY COST-EFFECTIVENESS
• Costs of vulnerability assessment per application
• Costs for workstation security controls per user
• Costs for e-mail spam and virus protection per mailbox
92
3.16.10 MEASURING EFFECTIVENESS OF TECHNICAL SECURITY ARCHITECTURE
93
3.16.10 MEASURING EFFECTIVENESS OF TECHNICAL SECURITY ARCHITECTURE
94
3.16.11 MEASURING EFFECTIVENESS OF MANAGEMENT FRAMEWORK AND
RSOURCES
• Tracking the frequency of issue recurrence
• Monitoring the level of operational knowledge capture and dissemination
• The degree to which process implementations are standardized
• Clarity and completeness of documented information security roles and
responsibilities
• Information security requirements incorporated into every project plan
• Efforts and results in making the program more productive and cost-effective
• Overall security resource utilization and trends
• Ongoing alignment with, and support of, organizational objectives
95
3.16.12 MEASURING OPERATIONAL PERFORMANCE
96
3.16.13 MONITORING AND COMMUNICATION
97
3.17 COMMON INFORMATION SECURITY PRORAM CHALLENGES
98
Management Support
• Funding
• Management not recognizing the value of security investments
• Security being viewed as low-value cost center
• Management not understanding where existing money is going
• The organizational need for a security investment not being
understood
99
Management Support
• Staffing
• Poor understanding of what activities new resources will do
• Questioning the need or benefit of new resource activities
• Lack of awareness of existing staff utilization levels or activities
• Belief that existing staff are underutilized
• Desire to examine outsourcing alternatives
101
Management Support
102
Management Support
103
104
Q&A
105