Information Security Assurance Informati
Information Security Assurance Informati
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – Why is it an issue?
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – Why is it an issue?
Because…..although the threats inIncyber space
a physical world one
remain by and large the same as in the out
success physical world
of 10000 attempts
Internet
would allows action
be ineffective. at a as
Where
(ex. fraud, theft and terrorism), they arecomputing
distance.
today’s different
Every point
power due
on the
and
Internet allows easier and
net is adjacent
bandwidth enablestothe
every other
same
to 3 important developments more rapid technique
point. Attacks are now
attack with stunning success
propagation, in a matter of
¾ automation has made attacks more profitable possible on distant hosts
hours or days. This means, it
anywhere in the world
is now more difficult to
¾ action at a distance is now possible
develop effective counter
measures in a timely fashion.
¾ attack technique propagation is now more rapid and
Hence we need to be secure
easier and proactive
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – Why is the reluctance?
¾ May be, the stakeholders including customers have
not yet started insisting on an assurance
¾ Many organisations would not want to implement
strong security measures thinking that they do not
have anything that others would want – probably
what they do not realize is that they could become
launch pads for attacks on others (Need to be good
neighbors)
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – Why is the reluctance?
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – General trends
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – General trends
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – General trends
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security – General trends
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Result ?????
Uncertainty over issues such as
¾Availability
9 Is information accessible wherever and whenever
required
¾Integrity
9 Is information sufficiently right for the purpose at the
time of use
¾Confidentiality
9 Is information available only to those who are
authorised to access it
CERT-In
September 3, 2004
Department of Information Technology
We Assure
What is the problem?
CERT-In
September 3, 2004
Department of Information Technology
We Assure
What is needed?
There are three important questions that organisations must
answer when addressing security considerations of their
information and information systems:
¾ Selection of security controls (is it adequate?)
¾ Implementation of security controls (is it effective?) and
¾ Assurance of security controls (does it work?)
“The answers to these questions cannot be given in isolation.
They must be given in the context of an Information Security
program for the organisation that identifies, controls and
mitigates risks to its information and information systems.”
CERT-In
September 3, 2004
Department of Information Technology
We Assure
What is needed?
Management concerns
Market reputation
Security measures
Business continuity
Technical
Disaster recovery
Procedural
Business loss Information Security Physical
Program
Loss of confidential
Logical
data
Personnel
Loss of customer
confidence Management
Legal liability
Cost of security
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security Program or Management
It represents a
Structure blend of enablers &
deterrents
Achievement of
Resources organisation’s policies and Procedures
objectives
Processes
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Management Systems
S tra teg y
M a n a g e m e n t S y ste m s
S tr u c tu r e
Human Resource
Environment
Financial
P o lic y /p r o c e d u r e
Quality
P ro c e ss
R eso u rces
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Management Systems
Provide Assurance
S tr a te g y through discipline of
compliance
M a n a g e m e n t S y s te m s
S tr u c tu r e
Human Resource
Environment
Financial
P o lic y /p r o c e d u r e
Quality P ro cess
R eso u rces
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Managing Risks
Management of risks is central to business
and comfort levels.
Risks are managed through
¾prudent business practices
¾careful contracting
¾use of appropriate control mechanisms and
¾insurance
We need to progressively increase the comfort
levels
CERT-In
September 3, 2004
Department of Information Technology
We Assure
How do we increase the comfort level?
Information
Security Assurance
Comfort level
Security
Management Penetration testing &
Red team exercises
system vulnerability analysis
assessment
• High level overview of security • Builds on the management • This is the most resource
posture with base level system assessment intensive service, but provides
comfort factor • Although more resource the most realistic analysis of
• Since no hands-on testing is intensive, provides a higher security posture
involved, requires minimum level of assurance • Involves estimation of
use of time and assessor • Needs cooperation of system adversary capabilities and no-
resources administrators notice attack on the system
• Provides an idea of the • Includes use of tools • Can be performed at various
potential vulnerabilities • The output enables higher intensities as per pre-
• Provides a basis for testing degree of protection and determined ‘Rules of
and Red team exercises comfort factor Engagement’
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Object of Information Security Assurance
Such as
•Fireof
Security assurance aims at
In terms ensuring
•Denial of service
•Deterrence
In terms of •Malicious code
System’s ability •Protection
•Confidentiality
•Malicious destruction of
•Detection
•Integrity data and
•Response andfacilities
to provide •Availability •Masquerade
•Recovery capabilities
•Accountability
•Theft and fraud
Assurance on asset characteristics
•Authenticity and
•Web-site intrusion
•Reliability •Failure of communication
from services
•Loss of key personnel
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Which includes
Information Security Assurance - Perspectives
•Security policy and
review
In•Information
Interms
termsofof
security
infrastructure
•PDCA
In terms of approach
•BCP management
•Security of third and
party
¾Management perspective •Risk
•Compliance assessment
process
access
management
with
applicable legislation
•Business impact
•Asset
and copyclassification
•IPR•Documentation right and
¾Protection perspective analysis
and control
records
protection
•BCP plans and
•Personnel
•Reviews,
•Safeguarding security
audits
records and
implementation
¾Continuity perspective •Physical
continual
•Privacy and
improvement
and data
•Testing and re-
environmental security
protection
assessment of BCP
¾Legal perspective •Networks
•Prevention and
plans of misuse of IT
Communications
•Regulation of
management
cryptographic controls
•Legal•Access control
admissibility of
•Software development
evidence
CERT-In and maintenance
September 3, 2004
Department of Information Technology
We Assure
What is good Security Assurance?
Prevention Threat
Reduction
Detection
Incident
Repression
Damage
Correction
Recovery
Evaluation
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Security Assurance actions - Emphasis
‘It is all about the ability to expect the expected before we are
ready to expect the unexpected’
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security Assurance Program
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Security Policies – Why use them ?
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Who and what to trust?
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Possible Trust Models
¾ Trust everyone all the time
– easiest to enforce, but impractical
– one bad apple can ruin the whole barrel
¾ Trust no one at no time
– most restrictive, but also impractical
– impossible to find employees to work under such
conditions
¾ Trust some people some of the time
– exercise caution in amount of trust placed in employees
– access is given out as needed
– technical controls are needed to ensure trust is not
violated
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Why the political turmoil?
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Who should be concerned?
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
The Policy Design Process
CERT-In
September 3, 2004
Department of Information Technology
We Assure
The Policy Design Process
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Basic Requirements
¾ Policies must:
– be implementable and enforceable
– be concise and easy to understand
– balance protection with productivity
– be updated regularly to reflect the evolution of the
organization
¾ Policies should:
– state reasons why policy is needed
– describe what is covered by the policies - whom, what,
and where
– define contacts and responsibilities to outside agencies
– discuss how violations will be handled
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Determining Level of Control
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Choosing A Policy Structure
¾ Dependent on company size and goals.
¾ One large document or several small ones?
– smaller documents are easier to maintain and update
¾ Some policies appropriate for every site,
others are specific to certain environments.
¾ Some key policies:
– Acceptable Use
– User Account
– Remote Access
– Information Protection etc.
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
The Acceptable Use Policy
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Element of Acceptable Use Policy
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Elements of a User Account Policy
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Elements of user Account Policy
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Remote Access Policy
¾ Outlines and defines acceptable methods of
remotely connecting to the internal network.
¾ Essential in large organization where networks
are geographically dispersed and even extend
into the homes.
¾ Should cover all methods chosen to remotely
access internal resources. Example:
– dial-in (SLIP, PPP)
– ISDN/Frame Relay
– telnet access from Internet
– Cable modem
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Element of Remote Access Policy
¾ Should define who is allowed to have remote
access capabilities.
¾ Should define what methods are allowed for
remote access.
¾ Should discuss if dial-out modems are allowed.
¾ Should discuss who is allowed to have high-
speed remote access such as ISDN, Frame
Relay or cable modem.
– what extra requirements are there?
– can other members of household use network? etc.
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Elements of Remote Access Policy
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Protection Policy
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Key Elements of Information Protection Policy
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Policies and Procedures
¾Trust Models
¾Security Policy Basics
¾Policy Design Process
¾Key Security Policies
¾Key Security Procedures
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Security Procedure
¾ Policies only define "what" is to be protected.
Procedures define "how" to protect resources and
"what" are the mechanisms to enforce policy.
¾ Procedures define detailed actions to take for
specific incidents.
¾ Procedures provide a quick reference in times of
crisis.
¾ Procedures help eliminate the problem of a single
point of failure (e.g., an employee suddenly
leaves or is unavailable in a time of crisis).
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Configuration Management Procedure
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Incident Handling Procedure
¾ Defines how to handle intruder attacks.
¾ Defines areas of responsibilities for members of
the response team.
¾ Defines what information to record and track.
¾ Defines who to notify and when.
¾ Defines who can release information and the
procedure for releasing the information.
¾ Defines how a follow-up analysis should be
performed and who will participate.
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Disaster Planning and Response
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Disaster Planning and Response
CERT-In
September 3, 2004
Department of Information Technology
We Assure
Information Security - Final Message
Thank you
CERT-In
September 3, 2004
Department of Information Technology
We Assure