This document discusses security risk management and outlines some key concepts. It introduces goals of security like confidentiality, integrity, availability and non-repudiation. It also summarizes types of controls like administrative, technical and physical controls and the importance of a computer incident response team. Finally, it mentions security strategies, frameworks and a top-down management approach to security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0%(1)0% found this document useful (1 vote)
595 views118 pages
CISSP - Domain 1 - Security Risk Management
This document discusses security risk management and outlines some key concepts. It introduces goals of security like confidentiality, integrity, availability and non-repudiation. It also summarizes types of controls like administrative, technical and physical controls and the importance of a computer incident response team. Finally, it mentions security strategies, frameworks and a top-down management approach to security.
1 Sankaran Note • This presentation has been prepared by Subramaniam Sankaran, for his CISSP program delivery. • Please do share this material as required. • You can reach him on [email protected]
3 Sankaran Confidentiality • Supports principles of least privileges • ‘Identity theft’ is the act of assuming one’s identity through knowledge of confidential information obtained from various sources. • Data Classification ensures confidentiality • Identification, authentication, authorization and encryption ensures confidentiality
CISSP – Domain1 - SRM - Subramaniam
4 Sankaran Integrity • Integrity is the principle that information should be protected from intentional, unauthorized, or accidental changes.
CISSP – Domain1 - SRM - Subramaniam
5 Sankaran Availability • Availability is the principle that ensures that information is available and accessible to users when needed. • Attacks of Availability – Denial of Service – Lack of Service due to disaster
CISSP – Domain1 - SRM - Subramaniam
6 Sankaran Governance
CISSP – Domain1 - SRM - Subramaniam
7 Sankaran Definition • “the responsibility of the board of directors and executive management. It is an integral part of enterprise governance and consists of the leadership and organizational structures and processes that ensure that the organization’s IT sustains and extends the organization’s strategies and objectives.”
CISSP – Domain1 - SRM - Subramaniam
8 Sankaran Categories control • Administrative • Physical • Technical
CISSP – Domain1 - SRM - Subramaniam
9 Sankaran Administrative Controls • Best defense for social engineering. • Standards, Policy, Procedure and Guidelines. • Employee Screening before on boarding. • Change control procedures • Risk Analysis • Security training – The most important.
CISSP – Domain1 - SRM - Subramaniam
10 Sankaran Technical controls • Devices, process, protocols and other measures to protect C.I.A . • They govern Authentication, Authorization, Auditing and non repudiation technically. • Examples are Antivirus, Firewall, IDPS devices etc.
CISSP – Domain1 - SRM - Subramaniam
11 Sankaran Physical Control • Ensures no individual has unauthorized access into protected chambers, department, ODC’s or office. • Electrified Fencing, High walls, deterrent hedges etc. • Access control mechanisms using proximity card, Security personals etc.
CISSP – Domain1 - SRM - Subramaniam
12 Sankaran Computer Incident Response Team CIRT • CIRTs are groups of individuals with the necessary skills, including management, technical staff, infrastructure, and communications staff, for evaluating the incident, evaluating the damage caused by an incident, and providing the correct response to repair the system and collect evidence for potential prosecution or sanctions.
CISSP – Domain1 - SRM - Subramaniam
13 Sankaran Information Security Strategies • Strategic – Strategic plans are aligned with the strategic business and information technology goals. – These plans have a longer-term horizon (three to five years or more) to guide the long term view of the security activities. • Tactical – Tactical plans provide the broad initiatives to support and achieve the goals specified in the strategic plan. • Operational – Specific plans with milestones, dates, and accountabilities provide the communication and direction to ensure that the individual projects are completed. CISSP – Domain1 - SRM - Subramaniam 14 Sankaran Oversight Committee • Representation from multiple OU • Representatives from Middle Management
CISSP – Domain1 - SRM - Subramaniam
15 Sankaran Security Council Vision Statement • A clear security vision statement should exist that is in alignment with, and supports, the organizational vision. • Derived from CIA • Non Technical • High Level • Reviewed Annually
CISSP – Domain1 - SRM - Subramaniam
16 Sankaran Mission Statement • Mission statements are objectives that support the overall vision. • These become the road map to achieving the vision and help the council clearly view the purpose for its involvement. • Reviewed Annually
CISSP – Domain1 - SRM - Subramaniam
17 Sankaran Security Program Oversight • Decide on project Initiatives • Prioritise Information Security Efforts • Review and Recommend Security Policies • Review and Audit Information Security Program • Champion Organizational Security efforts • Recommend Areas requiring investment.
CISSP – Domain1 - SRM - Subramaniam
18 Sankaran User Roles • End user • Executive Management • Information Systems Security Professional • Data/Information/Business Owner • Data/Information Custodian/Steward • Information Security Auditor • Business Continuity Planner • IT Professionals • Security Administrators • Network Administrator • Physical Security • Administrative Assistants • Service Desk Administrator
20 Sankaran Top Down approach • Initiative must come from Senior Management. • The program must be tracked and measured. • Must cover every one in organization from new joiner to top most person at management level. • The seriousness must come from the top.
CISSP – Domain1 - SRM - Subramaniam
21 Sankaran Security Definition • Vulnerability – Weakness in software, hardware or/and procedure that may provide an attacker an unauthorized access to computer or network to access the resources in the environment. • Threat and Threat Agent – Threat is a potential danger to Information system and Threat Agent is the attacker, could be individual, natural calamity or program/s. d • Risk – Likelihood of being targeted for a given attack.
CISSP – Domain1 - SRM - Subramaniam
22 Sankaran Security Definitions • Exposure – Instance of being exposed to loss from a threat agent. • Countermeasure – Compensating control in place to mitigate current risk.
CISSP – Domain1 - SRM - Subramaniam
23 Sankaran Other Principles • Non Repudiation • Principles of least privileges • Need to know
CISSP – Domain1 - SRM - Subramaniam
24 Sankaran Other controls • Mandatory Vacation • Job Separation or Segregation of duties. • Job Rotation • Dual Control • Split Knowledge • Defence in depth
26 Sankaran Aspects of Security Governance • Security Governance • Third Party Governance • Document Review
CISSP – Domain1 - SRM - Subramaniam
27 Sankaran Governance COBIT • Meeting the stakeholder needs • Covering the enterprise end to end • Applying single integrated framework • Enabling holistic approach • Separating governance from management
31 Sankaran IPR • Patent • Trademark • Copyright • Trade secret • Licensing – Freeware – Shareware – Commercial – Academics CISSP – Domain1 - SRM - Subramaniam 32 Sankaran Never under estimate your opponent! Security through Obscurity!
CISSP – Domain1 - SRM - Subramaniam
33 Sankaran Enterprise Security Architecture
CISSP – Domain1 - SRM - Subramaniam
34 Sankaran Notes • Subset of enterprise architecture • Must align itself for benefit of organization. • The comprehensive architecture to cover up every aspect of security in the organization • Must have – Operational Goals – Daily operations – Tactical Goals – Mid term – Strategic Goals – long term
CISSP – Domain1 - SRM - Subramaniam
35 Sankaran Roles and Responsibilities • CEO • CTO • COO • CISO (Chief Information Security Officer)
CISSP – Domain1 - SRM - Subramaniam
36 Sankaran CISO • Develop and provide security awareness program • Reporting to higher management and manage documentation (Policies, procedure, baseline and Standards). • Audit readiness. • Must report to highest level in org chart i.e CEO. CISSP – Domain1 - SRM - Subramaniam 37 Sankaran Why do we need to secure? • Information Protection • Regulations
CISSP – Domain1 - SRM - Subramaniam
38 Sankaran Security Controls • Directive - Administrative • Deterrent – Discourage, eg. walls • Preventive – Avoidance, eg: User ids • Corrective – Post math, eg. auditing • Recovery – Bring back to original state • Detective – Investigative • Compensating - Alternative
CISSP – Domain1 - SRM - Subramaniam
39 Sankaran Security is always supporting service!?!
CISSP – Domain1 - SRM - Subramaniam
40 Sankaran Information Risk Management
CISSP – Domain1 - SRM - Subramaniam
41 Sankaran Risk Assessment Process Flow
CISSP – Domain1 - SRM - Subramaniam
42 Sankaran Risk Management • Process of identifying the risk • Mitigating the risk to acceptable level. • Maintain the level by right mechanism.
CISSP – Domain1 - SRM - Subramaniam
43 Sankaran Layers of Risk • People • Software/Application/data • Physical/Hardware
CISSP – Domain1 - SRM - Subramaniam
44 Sankaran IRM Policy • Must be inline with organizational risk policy. • Must be supported by top management, with well documented policies, and dedicated IRM team.
CISSP – Domain1 - SRM - Subramaniam
45 Sankaran Information Risk assessment • It is the veritable, first and fundamental tool to identify Risks, Threats and impact due to them. • The output of the risk assessment is analyzed (risk analysis) and will lead to risk prioritization and mitigation plans. • Risk Analysis will ensure, which risks to address first, in a manner relevant, quick and cost effective.
CISSP – Domain1 - SRM - Subramaniam
46 Sankaran Approach • First step is to define the scope of the devices, threats and vulnerabilities. • Senior management to approve this list before assessment. • Must be in line with business strategy and objectives. • Risk analysis team must be a mix of departments. • Value the information and assets. – To buy – To maintain – To replace – Loss due to unavailability – Value of asset to owner, user and adversaries. – Organizational impact in absence of asset.
CISSP – Domain1 - SRM - Subramaniam
47 Sankaran Possible vulnerabilities • Intricacies of software development. • Improper authentications • Unmonitored and uncontrolled network traffic. • Software without proper updates. • Etc
CISSP – Domain1 - SRM - Subramaniam
48 Sankaran Identification of vulnerabilities • Brain storming sessions • Interviews • Experience • External consultant • Industry specific • etc
CISSP – Domain1 - SRM - Subramaniam
49 Sankaran Loss factors to be considered • Loss potential is immediate loss due to non availability of a asset. • Delayed loss, is more an impact that is carried over because of asset taken offline.
CISSP – Domain1 - SRM - Subramaniam
50 Sankaran Risk Analysis • Identify assets and their value to organization. • Identify vulnerabilities and threats. • Measure the impact and probability • Arrive at value of counter measure to mitigate the risk.
CISSP – Domain1 - SRM - Subramaniam
51 Sankaran Risk Assessment Methodologies • NIST SP 800-30 - Risk management guide for Information Technology Systems. – Deals with IT – Does not consider, non IT threats. • FRAP – Facilitated Risk Analysis Process. – Team formation with IT and non IT folks. – Brain Storming – Limited Budget methodologies – Works on parts of the whole process at a time – Dependant on experience of FRAP team members. CISSP – Domain1 - SRM - Subramaniam 52 Sankaran Cntd (organization wide) • OCTAVE – Operationally Critical Threat, Asset, and Vulnerability Evaluation. – SEI – Individuals make decision on how to secure – Individuals are made to undergo rounds of training to make decisions. – Wider scope compared to FRAP. • IEC 27005 – Covers security related documentation as well. CISSP – Domain1 - SRM - Subramaniam 53 Sankaran Failure mode effect analysis (FMEA) • Steps – Identify functions. – Identify functional failures – Asses the cause of functional failure – Effect of the failure through the structures process. • Identify single point of failures disrupting the network as a whole. • Initially developed by reliability engineers in early 50’s and well used for IT Risk Analysis. • Sometimes called FMECA to include criticality. CISSP – Domain1 - SRM - Subramaniam 54 Sankaran FMEA types • System FMEA: Used to analyze complete systems and/or sub-systems during the concept of design stage. • Design FMEA: Used the analyze a product design before it is released to manufacturing. • Process FMEA: Used to analyze manufacturing and/or assembly process.
CISSP – Domain1 - SRM - Subramaniam
55 Sankaran Steps for creating FMEA 1. List the key process steps in the first column. 2. List the potential failure mode for each process step. 3. List the effects of this failure mode. 4. Rate how severe this effect is with 1 being not severe at all and 10 being extremely severe. 5. Identify the causes of the failure mode/effect 6. Identify the controls in place to detect the issue and rank 7. Multiply the severity, occurrence, and detection numbers and store this value 8. Sort by value and identify most critical issues. 9. Assign specific actions with responsible persons 10.Once actions have been completed, re-score the occurrence and detection.
CISSP – Domain1 - SRM - Subramaniam
56 Sankaran Identifying root cause Fault Tree Analysis • Top level failure event is assumed and possible causes is derived. • Each cause is then discussed and steps to mitigate the risk with controls in place is arrived at. • Each inputs can be analyzed with many possible values, as in case of validations.
CISSP – Domain1 - SRM - Subramaniam
57 Sankaran Approaches to Risk Analysis • Qualitative – Interviews, opinion polls, scenario based discussions. RAG report. • Quantitative - Numerical figures a in value of loss.
CISSP – Domain1 - SRM - Subramaniam
58 Sankaran Quantitative Analysis • Single Loss expectancy – Expected Monetary loss every time the risk occurs. – SLE = Asset Value (AV) * Exposure Factor (EF) (%) – Portion or part of asset value likely to be destroyed by a risk, expressed as percentage. • Annual Loss expectancy – Monetary loss, that can be expected for an asset due to risk over one year period. – ALE = SLE * Annualized rate of occurrence (ARO) – Used in cost-benefit analysis. CISSP – Domain1 - SRM - Subramaniam 59 Sankaran Output of Quantitative analysis • Asset values • Possible and significant threats • Probability of occurrence • Loss potential annualized • Recommended controls
CISSP – Domain1 - SRM - Subramaniam
60 Sankaran Qualitative Analysis • Risk Analysis through, storyboarding, Brainstorming, interview, Surveys etc • Values are used rather relative then absolute. • This is a subjective approach hence error prone.
CISSP – Domain1 - SRM - Subramaniam
61 Sankaran Which one to choose? • In practice it is the combination of Qualitative and Quantitative techniques are used.
CISSP – Domain1 - SRM - Subramaniam
62 Sankaran Selection of controls • It is dependant on value of SafeGaurd to the company. • Value of SG = ALE without SG – ALE with SG – Annual cost of SG. • Cost of SG, is not only the product cost, but maintenance, training to use it, cost of support staff to maintain it, etc.
CISSP – Domain1 - SRM - Subramaniam
63 Sankaran Risk Types • Total Risk = Risk without SG Threat * Vulnerability * AssetValue = Total Risk • Residual Risk = Risk with SG (because of gaps in control) Total Risk * Control Gaps = Residual Risk
66 Sankaran STRIDE • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privileges
CISSP – Domain1 - SRM - Subramaniam
67 Sankaran Privacy • OECD – Consent of subject before data collection – Personal should be relevant for the purpose used to – Purpose of data collection must be specified not later than time of collection of data – Personal data must not be disclosed or used for other purpose without the consent of the subject or by law. – Data thus collected must be secured – Security P&P must be disclosed to subject
CISSP – Domain1 - SRM - Subramaniam
68 Sankaran Definitions • Incident – A security event that compromises the integrity, confidentiality, or availability of an information asset. • Breach – An incident that results in the disclosure or potential exposure of data. • Data Disclosure – A breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party.
CISSP – Domain1 - SRM - Subramaniam
69 Sankaran DR & BCP
CISSP – Domain1 - SRM - Subramaniam
70 Sankaran DR and BCP • Disaster Recovery planning • Business Continuity planning
CISSP – Domain1 - SRM - Subramaniam
71 Sankaran Steps • Project Scope and Planning • BIA • Continuity Planning • Approval and Implementation
CISSP – Domain1 - SRM - Subramaniam
72 Sankaran Business Continuity Management • Compilation of processes that indentifies and evaluates potential risks to an organization and develops resilience by ensuring critical objectives are met and resources are available for this purpose. • Business Continuity Management can best be described as dealing with a sequence of events that can be put into place when something goes wrong. • The procedures that are put into place are set against each risk and should be planned beforehand and if necessary practiced to see if they work. • The BCP should be reviewed annually to ensure that the organization is prepared for any new risks that have materialized, possibly due to Political, Economic, Sociological, Technological, Legal and Environmental (PESTLE) events. • Addresses Availability, Reliability and Recoverability.
CISSP – Domain1 - SRM - Subramaniam
73 Sankaran Business Continuity planning • Benefits – Provide an immediate and appropriate response to emergency situations – Protect lives and ensure safety – Reduce business impact – Resume critical business functions – Work with outside vendors and partners during the recovery period – Reduce confusion during a crisis – Ensure survivability of the business – Get “up and running” quickly after a disaster CISSP – Domain1 - SRM - Subramaniam 74 Sankaran Steps to roll out BCP • Develop business continuity planning policy statement. • Conduct BIA • Identify preventive controls • Develop recovery strategy • Develop contingency plan • Test the plan and conduct training and exercise. • Maintain the plan CISSP – Domain1 - SRM - Subramaniam 75 Sankaran Prerequisite • Understand the organization, business and the risk. • Use the methods like Zachman business enterprise frame work to arrive at critical functions and then arrive at how to rebuild them or supplement them in case of failures. • BCP program must be always kept live by regular reviews and change management policies • Must be endorsed by top management. CISSP – Domain1 - SRM - Subramaniam 76 Sankaran BCP Project • Initiation – BCP Coordinator needs to be identified. Will have authority to define RnR for committee members. – BCP committee must be formed with members with technical, functional, business, legal and senior management. – Decide on budget – Kick off by senior management – Creating awareness among employees – Establishing skills training for BCP support – Data collection – Milestone indication CISSP – Domain1 - SRM - Subramaniam 77 Sankaran BCP Project • Scope – Understand focus and direction. – Facilities to be considered. – Brain storming session – Scope could be fragmented to have a clarified and realistic picture. – In larger organizations, having BCP for organizational unit is more helpful.
CISSP – Domain1 - SRM - Subramaniam
78 Sankaran BCP Project • Policy – Framework and governance for BCP efforts. – It must refer to any existing old policy or best industry practice
CISSP – Domain1 - SRM - Subramaniam
79 Sankaran BCP Project • Roll out of policy – Document components of the policy – Analyze the impact of policy to organizational policies, legislation, regulatory and standards. – Refer to good practices. – Perform GAP analysis and way forward – Draft policy and submit for review to different departments. – Revise the policy to include feedback. – Submit to top management for approval – Publish the approved policy document. – The policy document must be version controlled. – Review at regular intervals and modify the policy in line with business requirements. CISSP – Domain1 - SRM - Subramaniam 80 Sankaran BCP Project • Project management team – A team must be formed to execute the BCP – Team might not be dedicated and hence it must be well understood at the outset. – SWOT Analysis must be made before the start. – WBS must be put in place to identify resources, their responsibilities, start and end dates for tasks, sequence of tasks, milestones and complete project completion.
CISSP – Domain1 - SRM - Subramaniam
81 Sankaran Business Impact Analysis • Functional Analysis • Data collection through interviews and documentary sources • Documents business functions, activities and transaction • Develop hierarchy of business functions. • Arrive at criticality level for every function.
CISSP – Domain1 - SRM - Subramaniam
82 Sankaran BIA - Risk Assessment • Must consider organizational tolerance to continuity risk. • Must identify – vulnerabilities of organizational time sensitive resources and activities. – Threats and hazards – Measure the potential loss due to disruption of any of these time sensitive resources and activities. – Single point of failures – Continuity risks CISSP – Domain1 - SRM - Subramaniam 83 Sankaran BIA Risk Assessment evaluation • Identifying and documenting single point of failure (as we already saw) • Prioritize the risk already identified based on their impact. • Develop strategy, action and plan for addressing the risk. • Document accepted and avoided risks.
CISSP – Domain1 - SRM - Subramaniam
84 Sankaran Recovery Phase • RTO – Recovery time objective. This is with in MTD • The recovery time objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity. • It can include the time for trying to fix the problem without a recovery, the recovery itself, testing, and the communication to the users. • WRT (Work recovery time) – remainder of overall MTD. RTO gets the system back to running and WRT is required to restore data, testing and making it live. • RPO (Recovery Point Objective) - It is the maximum tolerable period in which data might be lost from an IT service due to a major incident. It is it 3 hours, there must be funds incoming to put measures in place to ensure RPO is 3 hours. • RTO is the amount of time it takes to recover from a disaster event, and an RPO is the amount of data, measured in time, that you can lose from that same event. CISSP – Domain1 - SRM - Subramaniam 85 Sankaran Recovery Types
CISSP – Domain1 - SRM - Subramaniam
86 Sankaran Business Process Recovery • Understand the business. • Breakdown business process into tasks • Evaluate each task for business continuity. • Understand, required roles and resources, understand input and output mechanism, workflow, time for completion of tasks, and interfaces.
CISSP – Domain1 - SRM - Subramaniam
87 Sankaran Facility recovery • The disruption to facility can be – Non disaster – Disaster – Catastrophe • Alternatives for recovery – Dedicated site to operate itself – Lease a commercial facility – Agreement with another facility
CISSP – Domain1 - SRM - Subramaniam
88 Sankaran Facilities recovery • Offsite facility types – Hot Site: Replica of the primary – Warm site: Hot Site - Data – Cold Site: No system, no data, no power, no users only room – Tertiary Site : Back up to a backup – Reciprocal arrangements. – Redundant site – Rolling hot site (Truck) CISSP – Domain1 - SRM - Subramaniam 89 Sankaran Supply and Technology recovery • Networks, network plan must be reviewed regularly • Computers – hardware and software backups, using images for installation, lead-time for delivery of a equipment after disaster (SLA), Software Escrow, and proper documentation. • Human resources, the most valuable entity in the scenario, plan for mishaps, retirements etc. • Data – Backup, storage area and cabinets, electronic vaulting, remote journaling, Disk mirroring, tape vaulting, Synchronous and Asynchronous replication. • HVAC • Transportation • Supplies (paper, water, forms , cabling etc)
CISSP – Domain1 - SRM - Subramaniam
90 Sankaran High Availability • Redundancy must be in place to switch to other site in case of disaster. • Fault tolerance - database (roll back & commit ), TCP (ack) and RAID (parity) • Failover – Based on heart beat
CISSP – Domain1 - SRM - Subramaniam
91 Sankaran Insurance • Business interruption insurance. • Cyber insurance • Must plan if the insurance must be bought for a particular threat or what the coverage is after discussion with management.
CISSP – Domain1 - SRM - Subramaniam
92 Sankaran Recovery and restoration • Multiple teams are responsible for recovery and restoration. • Restoration team is for BCP and Salvage team is for DR • Damage Assessment must be performed immediately after disaster • Damage assessment is followed by decision on activation of disaster recovery plan. • The organization enters into a recovery phase. • Once salvage team get the original site ready and fit to be made operational again, reconstitution phase begin. CISSP – Domain1 - SRM - Subramaniam 93 Sankaran Implementing strategies • Plan must be available at more than one location, means at primary and secondary. • Call tree must be published at personal badges and must be kept in valet.
CISSP – Domain1 - SRM - Subramaniam
94 Sankaran Testing and revising • None of implementation of roll out is complete or perfect or near to perfect without testing. Same is in security. • The disaster recovery drills must be performed at least once a year to ensure things are what we think they are. • Lessons learnt from these drill must be incorporated into DR plan to revise the existing plan. • Exercise can be made up in sections if complete testing is not possible due to dependant outage. CISSP – Domain1 - SRM - Subramaniam 95 Sankaran Types of testing • Checklist test • Structured Walk through • Simulation test • Parallel test (Onsite and Offsite) • Full interruption test
CISSP – Domain1 - SRM - Subramaniam
96 Sankaran Emergency Response • People must be trained to act during emergencies. • They must know safe assembly area and fire exits to use during emergency • Designated person from the group must guide the people to safety • Police, Fire department, emergency rescue etc, must be notified by designated personal. • Designated personnel must take care of press before rumors spread out. • The company after a disaster must be taken care physically as they are normally targeted for vandalism. CISSP – Domain1 - SRM - Subramaniam 97 Sankaran Maintaining the plan • Plan must be integrated with change management process. • Any infrastructure changes must ensure the plan is updated accordingly • Reorganization , business operations changes must reflect in the plan.
CISSP – Domain1 - SRM - Subramaniam
98 Sankaran Security Documentation
CISSP – Domain1 - SRM - Subramaniam
99 Sankaran CISSP – Domain1 - SRM - Subramaniam 100 Sankaran Security Policy • Document describes the organizational commitment towards security and how the assets are protected. • In line with business and legal requirements. • Is a Configurable Item (CI). • Must be easily understandable. • Could be Organizational (master) or issue specific policy (child) or System specific policy (child). • Can be regulatory, advisory or informative. • Organization security policies are also called as Enterprise Information Security Policy (EISP). CISSP – Domain1 - SRM - Subramaniam 101 Sankaran Example-password policy
• All system-level passwords (e.g., root, enable, NT admin, application
administration accounts, etc.) must be changed on at least a quarterly basis. • All production system-level passwords must be part of the InfoSec administered global password management database. • All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least every six months. The recommended change interval is every four months. • User accounts that have system-level privileges granted through group memberships or programs such as "sudo" must have a unique password from all other accounts held by that user. • Passwords must not be inserted into email messages or other forms of electronic communication. • Where SNMP is used, the community strings must be defined as something other than the standard defaults of "public," "private" and "system" and must be different from the passwords used to log in interactively. A keyed hash must be used where available (e.g., SNMPv2). CISSP – Domain1 - SRM - Subramaniam 102 • All user-level and system-level passwords Sankaran must conform to the guidelines Standards • It is a thorough statement to mandate what employees need to do to adhere to security policy. • Could be procedural specific or system specific. • This is a next level to policy. If Policy says must be protected, standard states what it must be protected with. • Examples, ISO27001, PCI DSS etc.
CISSP – Domain1 - SRM - Subramaniam
103 Sankaran Example-Password protection standard • Don’t reveal a password over the phone to ANYONE • Don’t reveal a password in an email message • Don’t reveal a password to the boss • Don’t talk about a password in front of others • Don’t hint at the format of a password (e.g., "my family name") • Don’t reveal a password on questionnaires or security forms • Don’t share a password with family members • Don’t reveal a password to co-workers while on vacation CISSP – Domain1 - SRM - Subramaniam 104 Sankaran Baseline • Minimum protection and standard security measure for IT System. • Reference to the state of system at some point of time.
CISSP – Domain1 - SRM - Subramaniam
105 Sankaran Guidelines • Address part of security where in the Standards cannot cover. • It is a recommends action.
CISSP – Domain1 - SRM - Subramaniam
106 Sankaran Example - Passwords • Password must be minimum 8 characters in length • Must contain a digit • Must contain a special characters • Cannot be one of last 16 passwords • Cannot have two same characters next to each other • Cannot begin with a numeric CISSP – Domain1 - SRM - Subramaniam 107 Sankaran Procedures • Lowest level in chain. • Step by step instruction to achieve goal towards securing the assets.
CISSP – Domain1 - SRM - Subramaniam
108 Sankaran Information Classification • This is required to ensure we secure correct information correctly and appropriate. • This is subjective to industry and company. • Ensures cost effectiveness.
CISSP – Domain1 - SRM - Subramaniam
109 Sankaran Information Classification Types • Public – Disclosure not affect company • Sensitive – Needs to be protected • Private – Unauthorized disclosure will impact personal or company adversely. • Confidential – Unauthorized disclosure would seriously impact company
CISSP – Domain1 - SRM - Subramaniam
110 Sankaran Positional responsibility • CEO and CFO – former leads the organization and later manages the financial program. Are responsible for any deviation from compliance and appropriations. • CIO – responsible for security program. • CPO – Protection of information to comply with legal, private and regulatory norms. • CSO – Responsible for risk identification and mitigation could be from business point of view. • CISO – CSO + Technical. Reports to CEO.
CISSP – Domain1 - SRM - Subramaniam
111 Sankaran Measurable • Finally everything needs to be measured and quantified. • This helps in improvement plans and to evaluate current controls.
CISSP – Domain1 - SRM - Subramaniam
112 Sankaran How to measure security effectiveness
• Lesser call volumes to helpdesk on a security
problem. • Audit results • Less number of incidents on a particular category • Lower total number of hours lost in fire fighting a aftermath. • User feedback. CISSP – Domain1 - SRM - Subramaniam 113 Sankaran VA&PT • External Testing • Internal Testing • Blind Testing • Double Blind testing • Targeted Testing • Zero Knowledge • Partial Knowledge • Full Knowledge CISSP – Domain1 - SRM - Subramaniam 114 Sankaran Other Testing’s • Application Security • Denial of Service • War dialling • Wireless Network testing • Social Engineering • PBX and IP Telephony testing