102
1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg) Maltby, PMP, BSCS October 11, 2010 EECS 710

1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

  • View
    221

  • Download
    1

Embed Size (px)

Citation preview

Page 1: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

1

Computer Security Principles and Practices

Security Audit

IT Security Management & Risk Assessment

IT Security Controls, Plans & Procedures

Gregory (Greg) Maltby, PMP, BSCSOctober 11, 2010EECS 710

Page 2: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Technical Security Controls

2

Page 3: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Management Controlsand Implementa-tion

3

Page 4: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

4

Computer Security Principles and Practices

Security Audit

IT Security Management & Risk Assessment

IT Security Controls, Plans & Procedures

Page 5: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

5

Security Audit

• Security auditing architecture• Security audit trail• Implementing the logging function• Audit trail analysis• Example: an integrated approach

Page 6: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Auditing Architecture• Security Audit:

An independent review and examination of a system's records and activities to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures. The basic audit objective is to establish accountability for system entities that initiate or participate in security-relevant events and actions. Thus, means are needed to generate and record a security audit trail and to review and analyze the audit trail to discover and investigate attacks and security compromises.”

6

Page 7: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Auditing Architecture

• Security Audit Trail:A chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction from inception to final results”

7

Page 8: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Audit and Alarms Model

8

Page 9: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Distributed Audit Trail Model

9

Page 10: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Auditing Functions

10

Page 11: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Auditing Requirements – Event Definition• Event definition - must define what are

auditable events– Common Criteria suggests:

• introduction of objects within the security-related portion of the software into a subject’s address space

• deletion of objects• distribution or revocation of access rights or capabilities• changes to (subject or object) security attributes• policy checks performed by the security software• use of access rights to bypass a policy check• use of identification and authentication functions• security-related actions taken by an operator/user• import or export of data from or to removable media

11

Page 12: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Additional Security Auditing Requirements • Event detection: hooks created in the

application & monitoring software to capture activity

• Event recording: secure storage resistant to tampering or deletion.

• Event and audit trail analysis: software, tools, and interfaces

• Security of the auditing function• Minimal effect / impact on functionality

12

Page 13: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Audit – Implementation Guidelines1. Agree on audit requirements with management2. Scope of the checks should be agreed and controlled3. Checks limited to read-only access to software & data4. Other access only for isolated copies of system files, then erased or

given appropriate protection5. Resources for performing the checks should be explicitly identified

and made available6. Identify / agreed on special or additional requirements7. All access should be monitored & logged, produce a reference trail 8. Document procedures, requirements, responsibilities9. Person(s) doing audit independent of activities

13

Page 14: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Audit Trail – What to collect • Issue of amount of data generated– tradeoff quantity vs. efficiency

• Data items captured may include:– events related to the use of auditing software – events related to (the use of) system security mechanisms– events from IDS and firewall systems– system management / operation events– operating system access (e.g. system calls)– access to selected applications– remote access

14

Page 15: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Audit Trail – What to collect

• Auditable items suggested in X.816 (Table 15.2)– events related to a specific connection– events related to the use of security services – events related to management operations or

notifications– Auditable events (some examples)• Deny access• Authenticate• Object: Creation, Deletion or Modification

15

Page 16: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Implementing (Audit Trail) Logging

• The foundation of a security auditing facility is the initial capture of the audit data.

• Software must include hooks (capture points) that trigger data collection and storage of data as preselected events occur.

• Operating system / application dependent– system-level logging can use existing means

16

Page 17: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Implementing the Logging Function

• Useful to categorize audit trails– system-level audit trails– application-level audit trail– user-Level audit trail– physical access control (equipment)

17

Page 18: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Auto Trail Category : System-Level • System-level audit trails:– are generally used to monitor and optimize system

performance– can also serve a security audit function– captures logins, device use, O/S functions, e.g.

• Jan 27 17:18:38 host1 login: ROOT LOGIN console• Jan 27 17:19:37 host1 reboot: rebooted by root• Jan 28 09:47:35 host1 shutdown: reboot by user1

18

Page 19: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

System Level : Windows Event Log• Each event is an entity that describes some

interesting occurrence – each event record contains:

• numeric id, set of attributes, optional user data

– presented as XML or binary data

• Have three types of event logs:– System event log – applications running under system

service accounts and drivers – Application event log - user-level applications– Security event log - Windows Local Security Authority

19

Page 20: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Windows Event Log ExampleEvent Type: Success AuditEvent Source: Security Event Category: (1)Event ID: 517Date: 3/6/2006Time: 2:56:40 PMUser: NT AUTHORITY\SYSTEMComputer: KENTDescription: The audit log was clearedPrimary User Name: SYSTEM Primary Domain: NT AUTHORITYPrimary Logon ID: (0x0,0x3F7) Client User Name: userkClient Domain: KENT Client Logon ID: (0x0,0x28BFD)

20

Page 21: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Windows Event Categories• Account logon events• Account management• Directory service access• Logon events• Object access• Policy changes• Privilege use• Process tracking• System events

21

Page 22: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Auto Trail Category : Application-Level

• To detect security violations within an application• To detect flaws in application's system interaction• Record appropriate security related details, e.g.

– Apr 911:20:22 host1 AA06370: from=<user2@host2>, size=3355, class=0– Apr 911:20:23 host1 AA06370: to=<user1@host1>, delay=00:00:02,

stat=Sent– Apr 911:59:51 host1 AA06436: from=<user4@host3>, size=1424, class=0– Apr 911:59:52 host1 AA06436: to=<user1@host1>, delay=00:00:02,

stat=Sent

22

Page 23: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Logging at Application Level• Privileged applications present security issues– audit data may not be captured by system or user-level

audit logs– a large percentage of reported vulnerabilities– e.g. failure to adequately check input data or application

logic errors

• Need to capture detailed behavior• Applications can be written to create audit data• If not done, consider two approaches to auditing:– interposable libraries– dynamic binary rewriting

23

Page 24: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Interposable Libraries

24

Page 25: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Auto Trail Category : User-Level • Trace activity of individual users over time– documents user’s actions – can be used as input to an analysis program that attempts

to define normal versus anomalous behavior

• May capture– user interactions with system (e.g.)

• commands issued• identification and authentication attempts• files and resources accessed.• may also log use of applications

25

Page 26: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Auto Trail Category : Physical Access • Generated by physical access control

(equipment)– e.g. card-key systems, alarm systems

• Sent to central host for analysis / storage• Can log– date/time/location/user of access attempt– both invalid and valid access attempts– attempts to change access privileges– may send violation messages to personnel

26

Page 27: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Protecting Audit Trail Data: 3 alternatives• Read/write file on host– easy to implement, least resource use, fast access– vulnerable to attack by intruder

• Write-once device (e.g. CD/DVD-ROM)– more secure but less convenient– need media supply and have delayed access

• Write-only device (e.g. printer)– paper-trail but impractical for analysis

• Must protect both integrity and confidentiality– using encryption, digital signatures, access controls

27

Page 28: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Audit Trail Analysis• Analysis programs/procedures vary widely– cf. NIST SP 800-92 offers some useful advice on this topic

• Security Admin must understand context of log entries– relevant info may reside in same / other logs, or non log

sources (e.g. configuration management entries)– possibility for unreliable entries (e.g. “false positives”)

• Audit file formats contain a mix of plain text / codes– hence must decipher manually / automatically

• To gain an understanding of log data - regularly review log entries

28

Page 29: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Audit Analysis – Develop an Understanding of• Organizations policies regarding acceptable use• Security software (used) – security-related events that can be detected– general detection profile of each program

• Operating Systems and major applications used• Characteristics of common attack techniques– esp. how the use of these techniques might be recorded on

each system

• Software needed to perform analysis– Log viewers, log reduction scripts, database query tools

29

Page 30: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Types of Audit Trail Analysis• Audit trails can be used in multiple ways• This depends in part on when analysis is done• Possibilities include:– audit trail review after an event• triggered by event to diagnose cause & remediate

– periodic review of audit trail data• review bulk data to identify problems & behavior

– real-time audit analysis• as part of an intrusion detection function

30

Page 31: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Audit Review• Audit review capability provides administrator

with information from selected audit records– actions of one or more users (e.g. identification)– actions on a specific object or resource– all or a specified set of audited exceptions– actions on a specific system / security attribute

• May be filtered by time / source / frequency • Used to provide system activity baseline• To gauge level of security related activity

31

Page 32: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Approaches to Data Analysis• Basic alerting– indicate interesting type of event has occurred

• Baselining– define normal vs. unusual events / patterns– compare with new data to detect changes

• Windowing– detection of events within a given set of parameters

• Correlation– seek relationships among events

32

Page 33: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Integrated Approaches• Large volume of audit data means manual analysis

and manual baselining is impractical• Need a Security Information and Event Management

(SIEM) system– a centralized logging and analysis package– agentless or agent-based– normalizes a variety of log formats– analyzes combined data– correlates events among the log entries– identifies and prioritizes significant events– can initiate responses

33

Page 34: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

SIEM Example: Cisco MARS• Example of SIEM product• Supports a wide variety of systems• Agentless with central dedicated server• Wide array of analysis packages• An effective GUI• Server collects, parses, normalizes, correlates

and assesses events to then check for false positives, vulnerabilities, and profiling

34

Page 35: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Audit : Summary• Introduced need for security auditing• Audit model, functions, requirements• Security audit trails– system Level– application Level– user Level

• Implementing logging – “What to collect”• Audit trail analysis• Integrated SIEM products

35

Page 36: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

36

Computer Security Principles and Practices

Security Audit

IT Security Management & Risk Assessment

IT Security Controls, Plans & Procedures

Page 37: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

37

IT Security Management & Risk Assessment

• IT Security Management• Organizational context and Security Policy• Security Risk Assessment• Detailed Security Risk Analysis

Page 38: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Risk Assessment Overview• Security requirements means asking– What assets do we need to protect?– How are those assets threatened?– What can we do to counter those threats?

• IT security management answers these– determining security objectives & creating a risk

profile– perform security risk assessment of assets– select, implement, monitor controls – iterate process

38

Page 39: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Management

IT Security Management: a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity and reliability.

39

Page 40: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Management Functions

• Determining organizational IT security objectives, strategies and policies

• Determining organizational IT security requirements

• Identifying and analyzing security threats to IT assets

• Identifying and analyzing risks

40

Page 41: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Management Functions (2)

• Specifying appropriate safeguards • Monitoring the implementation and operation

of safeguards (providing cost effective protection)

• Developing and implementing a security awareness program

• Detecting and reacting to incidents

41

Page 42: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Overview of IT Security Manange-ment

42

Page 43: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Plan – Do – Check - Act Process Model

43

Page 44: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Organizational Context and Security Policy• First examine organization’s IT security:– objectives - wanted IT security outcomes– strategies - how to meet objectives– policies - identify what needs to be done

• Maintained and updated regularly– using periodic security reviews– reflect changing technical / risk environments

• Examine role of IT systems in organization

44

Page 45: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Policy TopicsNeeds to address:• scope and purpose of the policy• the relationship of the security objectives to legal

& regulatory obligations & business objectives • IT security requirements• assignment of responsibilities • risk management approach• security awareness and training

45

Page 46: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Policy Topics (2)Need to address (cont)• general personnel issues • any legal sanctions that may be imposed on staff• integration of security into systems development • information classification scheme • contingency and business continuity planning • incident detection and handling processes • how when policy reviewed, and change control to it

46

Page 47: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Needs Management Support • IT security policy must be supported by senior

management • Need IT security officer– to provide consistent overall supervision – liaison with senior management– coordinate the Security Response Team efforts – manage process (including security awareness)

• Large organizations needs IT security officers on major projects / teams

47

Page 48: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Risk Assessment• Critical component of process – else may have vulnerabilities or waste money

• Ideally examine every asset versus risk – not feasible in practice

• Choose one of possible alternatives based on organization’s resources and risk profile– baseline– informal– detailed (formal)– combined

48

Page 49: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment – Baseline Approach• Use “industry best practice ”– easy, cheap, can be replicated – but gives no special consideration to org– may give too much or too little security

• Implement safeguards against most common threats

• Baseline recommendations and checklist documents available from various bodies

• (usually) Only suitable for small organizations

49

Page 50: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment – Informal Approach• Conduct informal, practical risk analysis on

organization’s IT systems• Exploits knowledge and expertise of analyst • Fairly quick and cheap • Does address some organization’s specific issues • Some risks may be incorrectly assessed • Skewed by analysts views, varies over time• Suitable for small to medium sized organizations

50

Page 51: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment – Detailed Approach• Most comprehensive approach • Assessment uses a formal structured process – with a number of stages – identify likelihood of risk and consequences – analysis provides confidence controls appropriate

• Costly and slow, requires expert analysts • May be a legal requirement to use • Suitable for large organizations with IT systems

critical to their business objectives

51

Page 52: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment – Combined Approach• Combines elements of other approaches – initial (suitable) baseline on all systems – informal analysis to identify critical risks – formal assessment on these systems – iterated and extended over time

• Better use of time and money resources • Better security earlier, evolves over time • May miss some risks early • Recommended alternative for most organizations

52

Page 53: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment Methodology

53

Page 54: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment Context• Determine broad risk exposure of organization– related to wider political / social environment – identify legal and regulatory constraints – provide baseline for organization’s risk exposure

• Specify organization’s risk appetite• Set boundaries of risk assessment – depend in part on the risk assessment approach used

• Decide on risk assessment criteria used

54

Page 55: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Assessment Asset Identification • Identify assets– “anything which needs to be protected”– of value to organization to meet its objectives– tangible or intangible (assets)– in practice try to identify significant assets

• Draw on expertise of people in relevant areas of organization to identify key assets – identify and interview such personnel – see checklists in various standards

55

Page 56: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Related Terms• Asset: anything that has value to the organization.• Threat: a potential cause of an unwanted incident

which may result in harm to a system or organization.

• Vulnerability: a weakness in an asset or group of assets which can be exploited by a threat

• Risk: the potential that a given threat will exploit vulnerabilities of an asset or group of assets to cause loss or damage to the assets.

56

Page 57: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Threat identification• To identify threats or risks to assets ask:– 1. Who or what could cause it harm?– 2. How could this occur?

• Threats are anything that hinders or prevents an asset (providing appropriate levels of the key security services) from functioning properly:– confidentiality, integrity, availability, accountability,

authenticity and reliability • Assets may have multiple threats

57

Page 58: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Threat Sources• Threats may be– natural “acts of god”– man-made and either accidental or deliberate

• Should consider human attackers:– motivation– capability– resources – probability of attack – Deterrence

• Any previous history of attack on organization

58

Page 59: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

“Threat identification” - Sources

• Depends on risk assessors experience • Uses variety of sources – natural threat chance from insurance (industry)

statistics – lists of potential threats in standards, IT security

surveys, information from government security agencies (e.g. CERT)

– needs to be tailored to organization’s environment – consider any vulnerabilities in its IT systems

59

Page 60: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Vulnerability Identification

• Identify exploitable flaws or weaknesses in organization’s IT systems or processes

• Determine applicability and significance of threat to organization

• Need combination of threat and vulnerability to create a risk to an asset

• (again) Can use lists of potential vulnerabilities in standards etc.

60

Page 61: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Analyze Existing Controls and Risks

• Specify likelihood of occurrence of each identified threat to an asset given existing controls– management, operational, technical processes and

procedures to reduce exposure of organization to some risks

• Specify consequence should threat occur• Derive overall risk rating for each threat– risk = probability threat occurs x cost to organization

61

Page 62: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Analyze Risks (cont)

• In practice, risks are very hard to determine exactly / estimate

• Use qualitative not quantitative, ratings for each risk (probability, cost)

• Goal : order / prioritize resulting risks, to help determine which risks to address first (i.e. which risks to focus resources on)

62

Page 63: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Determine Likelihood (table 16.2, pg. 525)

Rating Likelihood Description

Expanded Definition

1 Rare May occur only in exceptional circumstances and may deemed as “unlucky” or very unlikely.

2 Unlikely Could occur at some time but not expected given current controls, circumstances, and recent events.

3 Possible Might occur at some time, but just as likely as not. It may be difficult to control its occurrence due to external influences.

4 Likely Will probably occur in some circumstance and one should not be surprised if it occurred.

5 Almost Certain

Is expected to occur in most circumstances and certainly sooner or later.

63

Page 64: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Consequences (Table 16.3, pg. 526)

64

Rating Consequence

1 Insignificant Generally a result of a minor security breach in a single area. Impact is likely to last less than several days and requires only minor expenditure to rectify

2 Minor Result of a security breach in one or two areas. Impact is likely to last less than a week, but can be dealt with at the segment or project level without management intervention. Can generally be rectified within project or team resources.

3 Moderate Limited systemic (and possibly ongoing) security breaches. Impact is likely to last up to 2 weeks and generally requires management intervention. Will have ongoing compliance costs to overcome

4 Major Ongoing systemic security breach. Impact will likely last 4-8 week sand require significant management intervention and resources to overcome, and compliance costs are expected to be substantial. Loss of business or organizational outcomes is possible, but not expected, especially if this is a once

5 Catastrophic Major systemic security breach. Impact will last for 3 months or more and senior management will be required to intervene for the duration of the event to overcome shortcomings. Compliance costs are expected to be very substantial. Substantial public or political debate about, and loss of confidence in, the organization is likely. Possible criminal or disciplinary action is likely

6 Doomsday Multiple instances of major systemic security breaches. Impact duration cannot be determined and senior management will be required to place the company under voluntary administration or other form of major restructuring. Criminal proceedings against senior management is expected, and substantial loss of business and failure to meet organizational objectives is unavoidable

Page 65: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Level Determination

Consequences

Likelihood Doomsday Catastrophic Major Moderate Minor Insignificant

Almost Certain

E E E E H H

Likely E E E H H M

Possible E E E H M L

Unlikely E E H M L L

Rare E H H M L L

65

Page 66: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Level MeaningRisk Level Description

Extreme (E)

Will require detailed research and management planning at an executive/director level. Ongoing planning and monitoring will be required with regular reviews. Substantial adjustment of controls to manage the risk are expected, with costs possibly exceeding original forecasts.

High (H) Requires management attention, but management and planning can be left to senior project or team leaders. Ongoing planning and monitoring with regular reviews are likely, though adjustment of controls are likely to be met from within existing resources.

Medium (M)

Can be managed by existing specific monitoring and response procedures. Management by employees is suitable with appropriate monitoring and reviews.

Low (L) Can be managed through routine procedures.

66

Page 67: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Register

Asset Threat / Vulnerability

Existing Controls

Likelihood Consequence

Level of Risk

Risk Priority

Internet router

Outside hacker attack

Admin password only

Possible Moderate High 1

Destruction of data center

Accidental fire or flood

None (no disaster recovery plan)

Unlikely Major High 2

67

Page 68: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Treatment Alternatives

• Risk acceptance• Risk avoidance• Risk transferal• Reduce the consequence• Reduce likelihood

68

Page 69: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Risk Register Exercise

69

Page 70: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Management & Risk Assessment : Summary• Need to perform risk assessment as part of IT

security management process• Relevant security standards• Presented risk assessment alternatives• Detailed risk assessment process involves:– context including asset identification– identify threats, vulnerabilities, risks– analyze and evaluate risks

70

Page 71: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

71

Computer Security Principles and Practices

Security Audit

IT Security Management & Risk Assessment

IT Security Controls, Plans & Procedures

Page 72: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

72

IT Security Controls, Plans & Procedures

• IT Security management implementation• Security controls or safeguards• IT security plan• Implementation of controls• Implementation follow-up

Page 73: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Management Controlsand Implementa-tion

73

Page 74: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

• Controls or Safeguards are – practices, procedures or mechanisms which may

protect against a threat, reduce a vulnerability, limit the impact of an unwanted incident, detect unwanted incidents and facilitate recovery

Controls or Safeguards

74

Page 75: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Controls or Safeguards: Classes• Management– focus on security policies, planning guidelines, and

standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission

– refer to issues that management needs to address • Technical– involve the correct use of hardware and software

security capabilities in systems

75

Page 76: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Controls or Safeguards: Classes

• Operational – address the correct implementation and use of

security policies and standards, ensuring consistency in security operations and correcting identified operational deficiencies

– relate to mechanisms and procedures that are primarily implemented by people rather than systems

76

Page 77: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Additional Types of Controls• Supportive: pervasive, generic, underlying technical

IT Security capabilities, used by many other controls

• Preventative: focus on preventing security breaches from occurring by inhibiting attempts to violate security policies of exploit a vulnerability

• Detection and Recovery: focus on the response to a security breach by warning of violations and provide means to restore the resulting lost computing resources

77

Page 78: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Technical Security Controls

78

Page 79: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

NSIT Security Controls

79

Class

Management Risk Assessment

Management Planning

Management System and Services Acquisition

Management Certification, Accreditation,& Security Assessments

Technical Identification and Authentication

Technical Access Control

Technical Audit and Accountability

Technical System and Communication Protection

Page 80: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

NSIT Security Controls (cont)

80

Class

Operational Personnel Security

Operational Physical and Environmental Protection

Operational Contingency Planning

Operational Configuration Management

Operational Maintenance

Operational Systems and Information Integrity

Operational Media Protection

Operational Incident Response

Operational Awareness and Training

Page 81: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Potential Adjustments to Controls

• Technology• Common controls• Public access systems• Infrastructure controls• Scalability issues• Risk assessment

81

Page 82: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Residual Risk

82

Page 83: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Cost-Benefit Analysis

• Perform C-B A to identify appropriate controls – greatest benefit given resources available

• Qualitative or quantitative • Show cost justified by reduction in risk• Contrast impact of implementing it or not • Management chooses selection of controls – considers if it reduces risk too much or not enough, is

too costly or appropriate

83

Page 84: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Plan

• Provides details of– what will be done – what resources are needed– who is responsible

• Goal is to detail the actions needed to improve the identified deficiencies in the organization’s risk profile in a timely manner.

84

Page 85: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Plan (2)• IT Security Plan should include– risks (asset/threat/vulnerability combinations)– recommended controls (from risk assessment)– action priority for each risk– selected controls (based on Cost-Benefit Analysis)– required resources – responsible personnel– implementation dates (start and end dates)– maintenance requirements– other comments (as needed)

85

Page 86: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Controls – Implementation Plan Table

Risk (Asset / Threat)

Level of Risk

Recommended Controls

Priority Selected Controls

Required Resources

Responsible Persons

Start – End Date

Other Comments

Hacker attack on Internet Router

High - Disable external Telenet access

- Set policy for strong admin passwords

- Set backup strategy for router configuration files

High - Install intrusion detection software

- 1 day of network admin time to install and test software - 2 days of training for network admin staff

Bob, Network Admin

10/28 – 10/28

10/29- 10/30

Look into replacing Telenet

86

Page 87: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Plan Implementation• IT security plan documents what needs to be

done for each control• Identifies personnel to perform needed tasks– implement new or enhanced controls– system configuration changes, software upgrades

or new system / software installation(s) – development of new / extended procedures

• Monitor implementation to ensure it done correctly (…test controls)

87

Page 88: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Training / Awareness

• Personnel need training – on details of design and implementation – awareness of operational procedures

• Also need general awareness for all– all levels (personnel) in organization – essential to meet security objectives – aim to convince personnel that risks exist and

breaches may have significant consequences

88

Page 89: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

• Security management is cyclic, should be repeated • Need to monitor implemented controls• Evaluate changes for security implications – if not done, may increase chance of security breach

• Follow-up includes– maintenance of security controls – security compliance checking– change and configuration management– incident handling

Security Implementation Follow-Up

89

Page 90: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Maintenance of Implemented Controls• Need continued maintenance and monitoring

of implemented controls to ensure continued correct functioning and appropriateness

• Tasks include:– periodic review of controls– upgrade of controls to meet new requirements – checking system changes to ensure they do not

impact controls– address new threats or vulnerabilities

• Goal - ensure controls perform as intended

90

Page 91: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Security Compliance• Audit process to review security processes • To verify compliance with security plan• May use internal or external personnel• Usually based on checklists – verify suitable policies and plans were created– verify suitable selection of controls were chosen – verify controls are maintained and used correctly

• Process often as part of wider general audit

91

Page 92: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Change Control / Management

• Change management is the process to review proposed changes to systems – evaluate security and wider impact of changes – part of general systems administration process – management of bug / patch testing and installation– may be informal or formal

92

Page 93: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Configuration Management

• Configuration management is keeping track of configuration and changes to each system – information needed to help restore systems

following a failure– to know what patches or upgrades might be

relevant to particular systems – part of general systems administration process

93

Page 94: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Incident Handling

• Need procedures specifying how to respond to a security incident(s)– an incident will most likely occur sometime

• Response needs to reflect the range of consequences of an incident on the organization– procedures identify a suitable response

• Classify types of action to avoid panic

94

Page 95: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Incident Handling (2)

• Benefits of having incident response capability– ability to respond systematically, taking

appropriate action– helps personnel recover quickly, minimizing loss – captured information can be used• to better prepare for future incidents• to properly deal with legal issues that may arise

95

Page 96: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Types of Security Incidents• Any action threatening classic security services • Unauthorized modification of info on a system– corrupting information– changing information without authorization – unauthorized processing of information

• Unauthorized access to a system – unauthorized viewing by information– bypassing access controls – denying access to another user

96

Page 97: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Incident Response Lifecycle

97

Page 98: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Detecting Incidents• Reports from users or admin staff – encourage such reporting

• Detected by automated tools – e.g. system integrity verification tools, log analysis tools,

network and host intrusion detection systems, intrusion prevention systems

– updated to reflect new attacks or vulnerabilities – have costs – justified by benefits gained

• Security Admins must monitor vulnerability reports

98

Page 99: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Responding to Incidents• Need documented response procedures– how to identify cause of the security incident – describe action taken to recover from it

• Procedures should– identify typical categories of incidents and

approach taken to respond– identify management personnel responsible for

making critical decisions and their contacts – identify whether to report incident to police /

CERT etc.

99

Page 100: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Documenting Incidents

• Need to identify vulnerability used– record details for future reference– (purpose) how to prevent it occurring in future

• Consider impact on organization and it’s risk profile – was this a one-time isolated occurrence – should the risk profile be reevaluated and

(possibly) changed

100

Page 101: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

IT Security Controls, Plans & Procedures : Summary• Security controls also called safeguards – management, operational, technical – supportive, preventative, detection / recovery

• IT security plan• Implementation of controls – implement plan, training and awareness

• Implementation follow-up– maintenance, compliance, change / config

management, incident handling

101

Page 102: 1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)

Real World / Industrial Strength Security Plan

102