Module1 - Security and Risk Management
Module1 - Security and Risk Management
Compliance
Professional ethics
3
Well known exploits
4
THE ROLE OF INFORMATION
SECURITY WITHIN AN
ORGANIZATION
First priority is to support the mission of the organization
Requires judgment based on risk tolerance of organization, cost and
benefit
Role of the security professional is that of a risk advisor, not a
decision maker.
5
Planning Horizon
Strategic Goals
Over-arching - supported by tactical
goals and operational
Tactical Goals
Mid-Term - lay the necessary
foundation to accomplish Strategic
Goals
Operational Goals
Day-to-day - focus on productivity and
task-oriented activities
6
SECURITY FUNDAMENTALS
C – I – A Triad
Confidentiality
Integrity
Availability
7
CONFIDENTIALITY
100$
f5942b3a8e3b9ff33938b0d6b5267129
10000$
504ad5f52155a17f4317640f6b1b61aa
9
AVAILABILITY
10
BEST PRACTICES (TO PROTECT C-I-A)
Job rotation
Least privilege
Need to know
Dual control
11
DEFENSE IN DEPTH
12
RISK
13
RISK DEFINITIONS
14
SOURCES OF RISK
No change management
Lack of redundancy
15
RISK MANAGEMENT
16
RISK MANAGEMENT
Risk Management
Risk Assessment
Identify and Valuate Assets
Identify Threats and Vulnerabilities
Risk Analysis
Qualitative
Quantitative
Risk Mitigation/Response
Reduce /Avoid
Transfer
Accept /Reject
Ongoing Risk Monitoring
17
RISK ASSESSMENT
18
RISK ANALYSIS
19
RISK ANALYSIS
20
QUALITATIVE ANALYSIS
Subjective in Nature
Uses words like “high”
“medium” “low” to
describe likelihood and
severity (or probability
and impact) of a threat
exposing a vulnerability
Delphi technique is often used
to solicit objective opinions
21
QUANTITATIVE ANALYSIS
Quantitative:
More experience required than with Qualitative
Involves calculations to determine a dollar value associated
with each risk event
Business Decisions are made on this type of analysis
Goal:
Calculating
the dollar value of a risk and use that amount to
determine what the best control is for a particular asset
Necessary for a cost/benefit analysis
22
QUANTITATIVE ANALYSIS
Factors
AV (Asset Value): $
EF (Exposure Factor): %
ARO (Annual Rate of Occurrence): %
SLE (Single Loss Expectancy): $
ALE (Annual Loss Expectancy): $
SLE = AV x EF
ALE = SLE x ARO
Cost of control should be the same or less than the potential for
loss
23
MITIGATING RISK
Accept
Secondary Risks
Residual Risks
24
SECURITY GOVERNANCE
25
SECURITY BLUEPRINTS
OCTAVE
ITIL
26
COBIT AND COSO
27
ITIL
**While the Publications of ITIL are not testable, it's purpose and
comprehensive approach are testable. It provides best practices for
organization and the means in which to implement those practices
28
OCTAVE
29
BS 7799, ISO 17799, 27000 SERIES
BS 7799-1, BS 7799-2
Absorbed by ISO 17799
30
ISO 27000 SERIES
31
The Plan Do Check Act (PDCA) Model
32
MANAGEMENT
33
SENIOR MANAGEMENT ROLE
Allocation of Resources
34
LIABILITIES
Legal liability is an important consideration for risk assessment and
analysis.
Addresses whether or not a company is responsible for specific actions or
inaction.
Who is responsible for the security within an organization?
Senior management
Are we liable in the instance of a loss?
Due care: Ensuring that “best practices” are implemented and followed.
Following up Due Diligence with action.
Due diligence: Continuously monitoring an organizations practices to ensure
they are meeting/exceeding the security requirements.
Prudent man rule: Acting responsibly and cautiously as a prudent man would
Best practices: Organizations are aligned with the favored practices within an
industry
35
ORGANIZATIONAL SECURITY POLICY
Assigns responsibility
36
ISSUE AND SYSTEM SPECIFIC POLICY
37
Security Policy Document Relationships
38
STANDARDS
Mandatory
Created to support policy, while providing more specifics.
39
PROCEDURES
Mandatory
Step by step directives on how to accomplish an end-result.
40
GUIDELINES
Not Mandatory
Suggestive in Nature
“Best Practices”
41
BASELINES
Mandatory
Minimum acceptable security configuration for a system or process
42
PERSONNEL SECURITY POLICIES
(EXAMPLES)
Hiring Practices and Procedures
Background Checks/Screening
NDA's
Employee Handbooks
Accountability
Termination
43
ROLES AND RESPONSIBILITIES
Senior/Executive Management
CEO: Chief Decision-Maker
CFO: Responsible for budgeting and finances
CIO: Ensures technology supports company's objectives
ISO: (CISO) Risk Analysis and Mitigation
Steering Committee: Define risks, objectives and approaches
Auditors: Evaluates business processes
Data Owner: Classifies Data
Data Custodian: Day to day maintenance of data
Network Administrator: Ensures availability of network resources
Security Administrator: Responsible for all security-related tasks, focusing
on Confidentiality and Integrity
44
RESPONSIBILITIES OF THE ISO
45
LIABILITIES – WHO IS AT FAULT?
Downstream Liabilities
Integrated technology with other companies can extend one’s
responsibility outside the normal bounds
46
LEGAL LIABILITY
47
SECURITY AND RISK MANAGEMENT
CISSP coverage:
Criminal Law
Civil Law
Regulatory
Intellectual Property
49
CRIMINAL LAW
50
CIVIL (TORT) LAW
Preponderance of evidence
Damages
Compensatory: Paid for the actual damage which was suffered by a
victim, including attorney fees, loss of profits, medical costs, investigative
costs, etc...
Punitive: Designed as a punishment for the offender
Statutory: an amount stipulated within the law rather than calculated
based on the degree of harm to the plaintiff. Often, statutory damages
are awarded for acts in which it is difficult to determine the value of the
harm to the victim.
Liability, Due Care, Due Diligence, Prudent Person Rule are all
pertinent to civil law , as well as administrative law
51
ADMINISTRATIVE (REGULATORY)
LAW
Defines standards of performance and regulates conduct for specific
industries
Banking (Basel II)
Energy (EPAct) of 2005
52
INTELLECTUAL PROPERTY
53
INTELLECTUAL PROPERTY PROTECTION
Trade Secret
Resource must provide competitive
value
Must be reasonably protected from
unauthorized use or disclosure
Proprietary to a company and important
for survival
Must be genuine and not obvious
54
INTELLECTUAL PROPERTY PROTECTION
Copyright
A form of intellectual property law, protects original works of authorship
including literary, dramatic, musical, and artistic works, such as poetry, novels,
movies, songs, computer software, and architecture.
Some characteristics
Copyright protections lasts for the lifetime of the author plus 70 years or 75
years for corporations
Work does not need to be registered or published to be protected.
Protects expression of ideas rather than the ideas themselves
Author to control how work is distributed, reproduced, used
Protects the expression of the resource instead of the resource itself
Two Limitations on Copyright:
First sale
Fair Use
https://www.copyright.gov/help/faq/ 55
INTELLECTUAL PROPERTY PROTECTION
Trademark
Protect word, name, symbol, sound, shape, color or combination used to
identify product to distinguish from others
Protect from someone stealing another company’s “look and feel”
56
INTELLECTUAL PROPERTY PROTECTION
Patent
Originally valid for 17 years, but are now valid for 20 years
Protection for those who have legal ownership of an invention
Invention must be novel and non-obvious
Owner has exclusive control of invention for 20 years
Cryptographic algorithm
The strongest form of protection
Published to stimulate other inventions
PCT (Patent Cooperation Treaty) has been adopted by over 130
countries to provide the international protection of patents
No organization enforces patents. It is up to the owner to purse the
patent rights through the legal system
57
ATTACKS ON INTELLECTUAL PROPERTY
Piracy
Copyright infringement
Counterfeiting
Cybersquatting
Typosquatting
58
EXPORT/IMPORT RESTRICTIONS
Export restriction
WASSENAAR Arrangement makes it illegal to export munitions to
terrorist sponsored nations
Exporting of cryptographic software is allowed to non-government end-
users of other countries
No exporting of strong encryption software to terrorists states
Import restriction
In many countries, the import of cryptographic tools with strong
encryption requires a copy of the private keys be provided to law
enforcement
US Safe Harbor Laws
59
INTERNATIONAL ISSUES
Jurisdiction issues
60
PRIVACY ISSUES – EMPLOYEE
MONITORING
Local labor laws related to privacy cannot be violated
Be mindful of the reasonable expectation of privacy (REP)
Gain an employee waiver by signature on policies, etc...
Notify of monitoring that may be used, or do not monitor the
employees at all
Banner and security awareness
Ensure that monitoring is lawful
61
HIPAA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT)
Applies to
Health Insurers
Health Providers
62
GRAMM-LEACH-BLILEY FINANCIAL SERVICES MODERNIZATION ACT
Known as GLBA
Requires financial agencies to better protect customer’s PII
(Personally Identifiable Information)
Three Rules:
Financial Privacy rule-Requires financial institutions to provide
information to customers regarding how PII is protected
Safeguards Rule-Requires each financial institution to have a formal
written security plan detailing how customer PII will be safeguarded
Pretexting Protection-Addresses social engineering and requires
methods be in place to limit information that can be obtained by this type
of attack
63
PCI DSS (PAYMENT CARD INDUSTRY DATA SECURITY STANDARD)
64
PCI DSS (PAYMENT CARD INDUSTRY DATA SECURITY STANDARD)
65
DISCLOSURE
Liability issues
Difficulty of Prosecution
Many states have now passed disclosure laws that legally require
organizations to publicly disclose security breaches that might
compromise personal data
Allow individuals to take corrective action
Additional motivation for organizations to protect customer data
66
ETHICS – ISC2
Canons:
Protect society, the commonwealth, and the infrastructure
Act honorably, honestly, justly, responsibly, and legally
Provide diligent and competent service to principals
Advance and protect the profession
Cannons are applied in order; if there are conflicts go with the higher
one.
67
ETHICS - IAB
68
ETHICS - IAB
Published in 1987
Unethical behavior:
Seeks to gain unauthorized access to the resources of the Internet
Disrupts the intended use of the Internet
69
COMPLIANT AND AUDITING ROLE
70
KNOWLEDGE TRANSFER
71
BEING AWARE OF THE RULES
Administrative control
72
AWARENESS/TRAINING/ EDUCATION
BENEFITS
Overriding Benefits:
Modifies employee behavior and improves attitudes towards information
security
Increases ability to hold employees accountable for their actions
73
Business Continuity and Disaster Recovery
Planning
CONTINUITY OF THE
ENTERPRISE
BCP VS. DRP
76
MITIGATE RISKS
77
BUSINESS CONTINUITY
PLANNING
Disaster recovery and continuity planning deal with uncertainty and
chance
Must identify all possible threats and estimate possible damage
Develop viable alternatives
Threat Types:
Man-made
Strikes, riots, fires, terrorism, hackers, vandals
Natural
Tornado, flood, earthquake
Technical
Power outage, device failure, loss of a T1 line
78
BUSINESS CONTINUITY
Categories of Disruptions PLANNING
Non-disaster: Inconvenience. Hard drive failure
Disruption of service
Device malfunction
Emergency/Crisis
Urgent, immediate event where there is the potential for loss of life or property
Disaster
Entire facility unusable for a day or longer
Catastrophe
Destroys facility
A company should understand and be prepared for each category
Approved in 2011
Provides a standard that did not exist previously
80
BUSINESS CONTINUITY PLAN SUB-PLANS
BCP
Protect
Crisis Communication Plan
OEP (Occupant Emergency Plan)
Recover
BRP (Business Recovery Plan)
DRP (Disaster Recovery Plan)
Sustain
COOP (Continuity of Operations Plan)
81
PROTECT
82
RECOVER
Business Recovery (or Resumption) Plan (BRP)
Purpose: Provide procedures for recovering business operations immediately following a disaster
Scope: Addresses business processes; not IT-focused; IT addressed based only on its support for
business process
Continuity of Support Plan/IT Contingency Plan
Purpose: Provide procedures and capabilities for recovering a major application or general support
system
Scope: Same as IT contingency plan; addresses IT system disruptions; not business process focused
Cyber Incident Response Plan
Purpose: Provide strategies to detect, respond to, and limit consequences of malicious cyber incident
Scope: Focuses on information security responses to incidents affecting systems and/or networks
Disaster Recovery Plan (DRP)
Purpose: Provide detailed procedures to facilitate recovery of capabilities at an alternate site
Scope: Often IT-focused; limited to major disruptions with long-term effects
83
SUSTAIN
84
NIST 800-34 INTERRELATIONSHIP OF THE PLANS
85
ROLES AND RESPONSIBILITIES
86
ROLES AND RESPONSIBILITIES
87
BCP TEAMS
Teams:
Rescue: Responsible for dealing with the immediacy of disaster—
employee evacuation, “crashing” the server room, etc..
Recovery: Responsible for getting the alternate facility up and running
and restoring the most critical services first.
Salvage: Responsible for the return of operations to the original or
permanent facility (reconstitution)
88
DEVELOPING THE TEAMS
89
7 PHASES OF BUSINESS CONTINUITY
PLAN
Phases of Plan:
Project Initiation
Business Impact Analysis
Recovery Strategy
Implementation
Testing
Maintenance
90
7 PHASES OF BUSINESS CONTINUITY
PLAN
91
PHASES OF THE PLAN: PROJECT
INITIATION
Project Initiation
Obtain senior management’s support
Secure funding and resource allocation
92
PHASES OF THE PLAN: BUSINESS IMPACT ANALYSIS
93
PHASES OF THE PLAN: BUSINESS IMPACT ANALYSIS
94
ELEMENTS OF THE PLAN: BUSINESS IMPACT ANALYSIS
Communications systems
95
RESULTS FROM THE BIA
Outage time that would be critical vs those which would not be critical
Preventive Controls
96
PHASES OF THE PLAN: IDENTIFY RECOVERY STRATEGIES
Personnel recovery
Data Recovery
97
FACILITY RECOVERY
Facility Recovery
Subscription Services
Hot, warm, cold sites
Reciprocal Agreements
Others
Redundant/Mirrored site (partial or full)
Outsourcing
Rolling hot site
Prefabricated building
Offsite Facilities should be no less than 15 miles away for low to medium
environments. Critical operations should have an offsite facility 50-200
miles away
98
FACILITY RECOVERY OPTIONS
99
FACILITY RECOVERY: RECIPROCAL AGREEMENTS
100
HARDWARE RECOVERY
Supplies
101
SOFTWARE RECOVERY
Licensing Information
Configuration Settings
Applications
102
PERSONNEL RECOVERY
103
ADDITIONAL DATA REDUNDANCY
Database Shadowing
Remote Journaling
Electronic Vaulting
104
DATA RECOVERY CONTINUED
Database Backups
Disk-shadowing
Mirroring technology
Updating one or more copies of data at the same time
Data saved to two media types for redundancy
105
DATA RECOVERY CONTINUED
Electronic Vaulting
Copy of modified file is sent to a
remote location where an original
backup is stored
Transfers bulk backup information
Remote Journaling
Moves the journal or transaction log
to a remote location, not the actual
files
106
PHASES OF THE PLAN: PLAN AND DESIGN DEVELOPMENT
Now that all the research and planning has been done, this phase is
where the actual plan is written
Should address
Responsibility
Authority
Priorities
Testing
107
PHASES OF THE PLAN: IMPLEMENTATION
Plan is often created for an enterprise with individual functional
managers responsible for plans specific to their departments
Copies of Plan should be kept in multiple locations
108
PHASES OF THE PLAN: IMPLEMENTATION
109
PHASES OF THE PLAN: TESTING
Checklist Test
Copies of plan distributed to different departments
Functional managers review
Simulation Test
Going through a disaster scenario
Continues up to the actual relocation to an offsite facility
111
TYPES OF TESTS
Parallel Test
Systems moved to alternate site, and processing takes place
there
Full-Interruption Test
Original site shut down
All of processing moved to offsite facility
112
POST-INCIDENT REVIEW
113
PHASES OF THE PLAN: MAINTENANCE
Change Management:
Technical –hardware/software
People
Environment
Laws
114
PHASES OF THE PLAN: MAINTENANCE
Personnel evaluations
Report regularly
Audits
115
MODULE REVIEW
CHAPTER 1: SECURITY AND RISK MANAGEMENT REVIEW
Security Basics
Confidentiality, integrity, and availability concepts
Risks
Security governance principles
Compliance
Legal and regulatory issues
Professional ethics: download ISC2 code of ethics at
https://www.isc2.org/uploadedfiles/(isc)2_public_content/code_of_ethics/isc2-code-of-ethics.pdf
Business Continuity Planning
1.Project Initiation
2.Business Impact Analysis
3.Recovery Strategy
4.Plan Design and Development
5.Implementation
6.Testing
7.Maintenance
117
MODULE SELF CHECK
Module self check
119
Module self check
120
Module self check
121
Module self check
122
Module self check
123
Module self check
124
Module self check
125