CSG3309 Security Models
CSG3309 Security Models
What to Learn
If you decide to develop your own models, you need to also prove your
models are secure and your decisions reasonable. (How?)
Waahooo!
“...based on the experience of the Australian Cyber Security Centre (ACSC) and
the Australian Signals Directorate (ASD)”
major process
steps
Control Objectives for Information and related
Technology
Control Objectives for Information and related Technology (COBIT) also provides advice
about the implementation of sound controls and control objectives for InfoSec
COBIT was created by the Information Systems Audit and Control Association (ISACA)
and the IT Governance Institute (ITGI) in 1992
COBIT 5 provides five principles focused on the governance and management of IT in an
organization:
– Principle 1: Meeting Stakeholder Needs
– Principle 2: Covering the Enterprise End-to- End
– Principle 3: Applying a Single, Integrated Framework
– Principle 4: Enabling a Holistic Approach
– Principle 5: Separating Governance From Management
COBIT
Information Technology Infrastructure Library (ITIL)
The Information Technology Infrastructure Library (ITIL) is a collection
of methods and practices useful for managing the development and
operation of information technology infrastructures
The ITIL has been produced as a series of books, each of which covers
an IT management topic
When MACs are implemented, users and data owners have limited
control over access to information resources
• Data owner:
responsible for the security and use of a particular set of
information
• Data custodian: Data
responsible for storage, maintenance, and protection of Responsibilities
information
• Data users:
end users who work with information to perform their daily jobs
supporting the mission of the organisation
Data classification models
Data owners must classify the information assets for which they are responsible and
review the classifications periodically
Australian Government Attorney-General’s Department defines a multi purpose,
multi level classification scheme
‒ Divides information in to official and unofficial categories.
‒ Official information can be classified as sensitive, protected, secret or top-secret.
The U.S. military classification scheme four-level classification scheme as defined in
Executive Order 13526 (2009). Similar to Australian scheme.
Simple scheme for other organizations:
‒ Public
‒ For official (or internal) use only
‒ Confidential (or Sensitive)
A.8.2.3 Handling of Procedures for handling assets shall be developed and implemented
Assets in accordance with the information classification scheme adopted
by the organisation
Supporting Classification Systems
confidential Highly sensitive or valuable Passwords and PIN codes, credit / “CONFIDENTIAL” Access Paper documents: shred
information, both proprietary debit card numbers, personal control groups using an approved cross-cut
and personal. Must not be information (such as employee HR – dedicated shredder. Electronic data:
disclosed outside of the records, accounting data, other highly staff erase. Dead hard drives,
organization without the sensitive or valuable information, IPP Apply to bottom left laptops etc. to IT for disposal.
explicit permission of a corner of each page.
Director-level senior
manager.