Info. Security Program Development
Info. Security Program Development
Security
Program
Development
Acknowledgments
Material is sourced from:
CISM® Review Manual 2012, ©2011, ISACA. All rights reserved.
Used by permission.
CISA® Review Manual 2011, ©2010, ISACA. All rights reserved.
Used by permission.
Policy Level
COBIT: Free
NIST: Free
ISO 17799: $50 SABSA
Standards Level
ISO 15408: $90
Logical,
Manage & Physical,
Measure Design Component,
Operational
Attributes defined
and measured
Implement
Develop
Conceptual
(Control Objectives)
http://www.isaca.org/
COBIT:
Planning and Organization
PO1 Define a strategic IT plan.
PO2 Define the information architecture.
PO3 Determine technological direction.
PO4 Define the IT processes, organisation and relationships.
PO5 Manage the IT investment.
PO6 Communicate management aims and direction.
PO7 Manage IT human resources.
PO8 Manage quality.
PO9 Assess and manage IT risks.
PO10 Manage projects.
Risk
Process
Assurance Engineering
Process Process
SSE-CMM: System Security Eng –
Capability Maturity Model
Stage 5 Optimized
Continual reevaluation ensures responsiveness and improvement
Stage 0 Nonexistent:
Control processes are not recognized as important
Level 1 – Performed Informally
Security design is poorly-defined
Security issues are dealt with in a reactive
way
No contingency plan exists
Budgets, quality, functionality and project
scheduling is ad hoc
No Process Areas
Level 2 – Planned & Tracked
Procedures are Common Features include:
established at the project Planning Performance
level Disciplined Performance
Definition, planning & Verifying Performance
performance become de-
Tracking Performance
facto standards from
project to project
Events are tracked
Level 3 – Well Defined
Standardized security Common Features include:
processes across Defining a Standard
organization Process
Personnel are trained to Perform the Defined
ensure knowledge and Process
skills Coordinate Security
Assurance (audits) track Practices
performance
Measures are defined
based upon the defined
process
Level 4 – Quantitatively Controlled
Measurable goals for Common Features
security quality exist include:
Measures are tied to Establish Measurable
the business goals of Quality Goals
the organization Objectively Manage
Performance (SLA)
Level 5 – Continuously Improving
Continuous Common Features
improvement arise include:
from measures and Improve
security events Organizational
New technologies and Capability
processes are Improve Process
evaluated Effectiveness (ROI)
Security Baseline
Today’s Goal
Baseline Baseline
Security Standards
These standards can be used to develop or advance a
security program (if one is not in place):
ISO/IEC 27001
ISACA COBIT
Where Where we
we are want to be
COBIT Levels
Security architecture
and engineering
Level 3: Security Policy
Policy = First step to developing security
infrastructure
Set direction for implementation of
controls, tools, procedures
Approved by senior mgmt
Documented and communicated to all
employees and associates
Example Policies
Risks shall be managed utilizing appropriate controls and
countermeasure to achieve acceptable levels at acceptable
costs
Monitoring and metrics shall be implemented, managed,
and maintained to provide ongoing assurance that all
security polices are enforced and control objectives are
met.
Incident response capabilities are implemented and
managed sufficient to ensure that incidents do not
materially affect the ability of the organization to continue
operations
Business continuity and disaster recovery plans shall
be developed, maintained and tested in a manner that
ensures the ability of the organization to continue
operations under all conditions
Security Policy Document
Definition of information security
Statement of management commitment
Framework for approaching risk and controls
Brief explanation of policies, minimally covering
regulatory compliance, training/awareness,
business continuity, and consequences of violations
Allocation of responsibility, including reporting
security incidents
References to more detailed documents
Policy Documentation
Policy= Direction for Control Employees must understand intent
Philosophy of organization Auditors test for compliance
Created by Senior Mgmt
Reviewed periodically
Example 1:
Policy: Computer systems are not exposed to illegal, inappropriate, or
dangerous software
Policy Control Standard: Allowed software is defined to include ...
Policy Control Procedure: A description of how to load a computer with required
software.
Example 2:
Policy: Access to confidential information is controlled
Policy Control Standard: Confidential information SHALL never be emailed
without being encrypted
Policy Guideline: Confidential info SHOULD not be written to a memory stick
Discussion: Are these effective controls by themselves?
Policy Function:
Policies and Procedures
Policies Procedures
Direction of Management Specific Directions
Requires approval from Document every step
senior mgmt Changes with procedure
Should change infrequently Provided on Need-to-
Communicated to entire Know basis
workforce via varied means Should be tested
Technology-independent
Should have 24 or less
Technology-specific
One general mandate
stated in fewer than 1-3
sentences
Level 4 Monitoring:
Includes Metrics
Metrics allow independent auditors to
attest that the security program is in place
Monitoring achievement of control
objective is more important than perfecting
security procedures
Monitoring Function: Metrics
Project Plan or Budget Metrics
Strategic Risk performance
Metrics Disaster Recovery Test results
Audit results
Regulatory compliance results
Metrics
Opera-
Tactical
tional
Metrics Metrics Vulnerability Scan results
Policy compliance metrics Server config. standards
Exceptions to policy/standards compliance
Changes in process or system IDS monitoring results
affecting risk Firewall log analysis
Incident management effectiveness Patch mgmt status
Monitoring Function: Metrics
Risk: Cost Effectiveness:
The aggregate ALE What is:
% of risk eliminated, mitigated, Cost of workstation security per user
transferred Cost of email spam and virus
# of open risks due to inaction protection per mailbox
Operational Performance Organizational Awareness:
Time to detect and contain incidents % of employees passing quiz, after
% packages installed without problem training vs. 3 months later
% of systems audited in last quarter % of employees taking training
Technical Security Architecture Security Process Monitoring:
# of malware identified and neutralized Last date and type of BCP, DRP, IRP
Types of compromises, by severity & testing
attack type Last date asset inventories were
Attack attempts repelled by control reviewed & updated
devices Frequency of executive mgmt review
Volume of messages, KB processed activities compared to planned
by communications control devices
Workbook: Metrics
Metrics Selected
What are the most important areas to monitor in your organization?
14 COBIT: Planning and Organization CISA: page 425 and CISM: page 150
15 COBIT: Acquisition and Implementations CISA: page 425 and CISM: page 150
16 COBIT: Delivery and Support CISA: page 425 and CISM: page 150