33
INFORMATION SECURITY MANAGEMENT LECTURE 4: INFORMATION SECURITY POLICY You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Embed Size (px)

Citation preview

Page 1: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

INFORMATION SECURITY MANAGEMENT

LECTURE 4: INFORMATION SECURITY POLICY

You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Page 2: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Principles of Information Security Management

Include the following characteristics that will be the focus of the current course (six P’s):

1. Planning2. Policy3. Programs4. Protection5. People6. Project Management

http://csrc.nist.gov/publications/PubsTC.html

Chapters 2 & 3

Chapter 4

Page 3: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Introduction

“The success of an information resources protection program depends on the policy generated, and on

the attitude of management toward securing information on automated systems”

Policy is the essential foundation of an effective information security program

Page 4: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Policy

• Explains the will of the organization’s management in controlling the behavior of employees

Page 5: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Policy – Biggest Threat to Endpoint Security?

• 78% consider negligent or careless employees who do not follow security policies to be biggest threat to endpoint security

• 50% did not receive any security or policy awareness training

"I wouldn’t go so far to say they don’t care – mostly - but I’d also point out that organizations probably haven’t done a good job of helping them understand why they should care"

http://www.securityweek.com/employees-not-following-policy-biggest-threat-endpoint-security-it-pros-say

Page 6: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Bulls-eye Model

Page 7: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Policy, Standards, and Practices

• Policy & Types • Enterprise • Issue-specific • Systems-specific

• Standards

• Practices

Page 8: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Enterprise Information Security Policy (EISP)

• Sets strategic direction, scope, and tone for organization’s security efforts

• Assigns responsibilities for various areas of information security

• Examples:

http://uncw.edu/policies/it.html http://doit.maryland.gov/support/pages/

securitypolicies.aspx

Page 9: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

EISP Elements

• Overview of the corporate philosophy on security

• Information about information security organization and information security roles

Responsibilities for security that are shared by all members of the organization

Responsibilities for security that are unique to each role within the organization

Page 10: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Example ESIP Components

• Statement of purpose• Information technology security elements• Need for information technology security• Information technology security responsibilities

and roles• Reference to other information technology

standards and guidelines

Page 11: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Issue-Specific Security Policy (ISSP)

• Provides detailed, targeted guidance

• Protects organization from inefficiency and ambiguity

• Indemnifies the organization against liability for an employee’s inappropriate or illegal system use

Page 12: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Issue-Specific Security Policy (cont’d.)

• Every organization’s ISSP should:

Examples at UNCW: Email Abuse

Page 13: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

ISSP - Topics

– Email and internet use– Minimum system configurations – Prohibitions against hacking– Home use of company-owned computer

equipment– Use of personal equipment on company networks– Use of telecommunications technologies – Use of photocopy equipment

Page 14: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Components of the ISSP

• Statement of Purpose • Authorized Access and Usage of Equipment• Prohibited Usage of Equipment• Systems management• Violations of policy• Policy review and modification• Limitations of liability

Page 15: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Implementing the ISSP

• Common approaches

Page 16: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

System-Specific Security Policy

• System-specific security policies (SysSPs) frequently do not look like other types of policy

• SysSPs can be separated into:

Page 17: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Managerial Guidance SysSPs

• Created by management to guide the implementation and configuration of technology

• Applies to any technology that affects the confidentiality, integrity or availability of information

• Informs technologists of management intent

Example:• Lifecycle Replacement

Page 18: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Technical Specifications SysSPs

• System administrators’ directions on implementing managerial policy

• General methods of implementing technical controls– Access control lists– Configuration rules

Page 19: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Technical Specifications SysSPs (cont’d.)

• Access control lists– Include the user access lists, matrices, and capability

tables that govern the rights and privileges

– Enable administrations to restrict access according to user, computer, time, duration, or even a particular file

Examples:• Access to Information Resources and Data

Page 20: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Technical Specifications SysSPs (cont’d.)

• Access control lists regulate:

• Administrators set user privileges

Page 21: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Technical Specifications SysSPs: Case Study

Disaster at a University:A Case Study in Information Security

OverviewIssuePeople InvolvedApproach and ResolutionOutcomesConclusion

Page 22: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Guidelines for Effective Policy

• For policies to be effective, they must be properly:

Page 23: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Developing Information Security Policy

• It is often useful to view policy development as a two-part project

1. Design and develop the policy (or redesign and rewrite an outdated policy)

2. Establish management processes to perpetuate the policy within the organization

Page 24: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Developing Information Security Policy (cont’d.)

• Policy development projects should be– Well planned– Properly funded– Aggressively managed to ensure that it is completed on

time and within budget

• The policy development project can be guided by the SecSDLC process

Page 25: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

SecSDLC Process of Policy Development

• Investigation phase– Obtain support from senior management– Clearly articulate the goals of the policy project– Acquire a capable project manager– Develop a detailed outline of and sound estimates for

project cost and scheduling

Page 26: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Developing Information Security Policy (cont’d.)

• Analysis phase should produce– New or recent risk assessment or IT audit documenting

the current information security needs of the organization

– Key reference materials• Including any existing policies

Page 27: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Developing Information Security Policy (cont’d.)

• Design phase includes– How the policies will be distributed– How verification of the distribution will be

accomplished

Page 28: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Developing Information Security Policy (cont’d.)

• Implementation phase includes– Writing the policies– Policy distribution

• Maintenance Phase– Maintain and modify the policy as needed– Built-in reporting mechanism– Periodic review

Page 29: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Alternative Approaches: The Information Securities Policy Made Easy Approach

• Gathering key reference materials • Defining a framework for policies • Preparing a coverage matrix • Making critical systems design decisions • Structuring review, approval, and enforcement

processes

Page 30: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Alternative Approaches: Guide for Developing Security Plans for Federal Information Systems

• NIST Special Publication 800-18, Rev. 1 reinforces a business process-centered approach to policy management

• Policies are living documents

• Good management practices for policy development and maintenance make for a more resilient organization

Page 31: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

• Policy requirements– An individual responsible for reviews– A schedule of reviews– A method for making recommendations for reviews – An indication of policy and revision date

Management of Information Security, 3rd ed.

Alternative Approaches: Guide for Developing Security Plans for Federal Information Systems

Page 32: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

A Final Note on Policy

Lest you believe that the only reason to have policies is to avoid litigation, it is important to emphasize the preventative nature of policy.

Page 33: INFORMATION SECURITY MANAGEMENT L ECTURE 4: I NFORMATION S ECURITY P OLICY You got to be careful if you don’t know where you’re going, because you might

Next Class

• Chapter 5 – Security Programs

• Case Studies • We will be covering the cases during lecture. Be

prepared to discuss your assigned case and read the other cases

• Assessment 1