21
ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview ISMS Templates 69 Risks Identified 26 Risk Mitigations 7 Templates > 250 pages Password & Mobile Device Security SOPs Applicable Cyberlaw AGENDA

ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

Embed Size (px)

Citation preview

Page 1: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 1

ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices

• Why apply ISMS to Mobile Devices?•Overview ISMS Templates

• 69 Risks Identified• 26 Risk Mitigations• 7 Templates > 250 pages• Password & Mobile Device Security SOPs

•Applicable Cyberlaw

AGENDA

Page 2: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 2

What is ISO/IEC 27001?

INTERNATIONAL ISO/IECSTANDARD 27005

Information technology – SecurityTechniques – information security riskmanagement

ISO IEC

INTERNATIONAL ISO/IECSTANDARD 27002

Information technology – SecurityTechniques – Code of practice forInformation security management

ISO IEC

INTERNATIONAL ISO/IECSTANDARD 27001

Information technology – SecurityTechniques – information securityManagement systems - requirements

ISO IEC

ISO/IEC 27001 - gold standard guidance for information security management

Page 3: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 3

What are Mobile Devices? Who uses them?

Leverage ISO/IEC 27001 ISMS to address new information security risks created when workers use Mobile Devices around the world

Page 4: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 4

New Risks Associated with Mobile Devices

• Small size -> easy to lose, easy to steal• Bad mobile social media posts can ruin reputations, leak information,

violate privacy and intellectual property laws…• Malware downloaded from the cloud, communications networks, desktop

synchronization and tainted storage media•Spam• Spyware can be used for electronic eavesdropping on phone calls,

texts…• Geotagging & location tracking allow the whereabouts of registered cell

phones to be known and monitored•Server-resident content such as email may expose sensitive information

via server vulnerabilities

Page 5: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 5

Overview of ISMS Mobile

7 templates (>250 pages) per ISO/IEC 27001 Section 4.3 list of documents for robust security management, identification of risks & countermeasures, & support of ISMS certification:

ISMS Mobile Policy (MS Word) ISMS Mobile Scope (MS Word) ISMS Mobile Project Plan (MS Project) ISMS Mobile Risk Assessment Methodology (MS Word) ISMS Mobile Risk Assessment (MS Excel) ISMS Mobile Risk Treatment Plan (MS Word) ISMS Mobile Statement of Applicability (SoA) (MS Word)

Additional templates:

ISMS Mobile Password Policy Template (MS Word) ISMS Mobile SOP - Mobile Device Security Template (MS Word)

ISMS Mobile formally tested by an independent quality control specialistISMS Mobile can jumpstart safeguarding mobile information for organizations

Page 6: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 6

Overview of ISMS Mobile

ISMS Mobile templates

are password protected

files that can be

downloaded from the

ISMS Mobile website

http://www.drdenenelson.com/ISMS-Template.htm

Page 7: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 7

Example from the ISMS Mobile Policy

Page 8: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 8

Risk Level: 1,2,3

Detectability:Low, Medium, High

Risk Prioritization

Risk Level

Likelihood: Low, Medium, HighImpact: Low, Medium, High

ISMS Mobile Risk Evaluation

Page 9: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 9

Example from the ISMS Mobile Project Plan

Page 10: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 10

Example from the ISMS Mobile Risk Register

Page 11: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 11

Correlating Risk to Risk Treatment

Risk ID

Risk Scenario (In order by Priority from High to Low)

Likelihood (High 1.0,

Medium 0.5 Low 0.1)

Impact (High 100, Medium 50 Low 10)

Class

(1,2,3)

Detectability (High 100,

Medium 50,

Low 10)

Priority

(High, Mediu

m, Low)

Risk Treatment

1Mobile device victim of "hacking defaults" because the default settings were not changed

0.5 50 2 10 High T1: Change Defaults

ISMS Mobile Risk Register

ISMS Mobile Risk Treatment Plan

Find Risk Treatment Name & Number in Risk Treatment Column of Risk Register

Page 12: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 12

Example from the ISMS Mobile Statement of Applicability - Implemented

Page 13: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 13

Example from the ISMS Mobile Statement of Applicability – Outside Scope

Page 14: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 14

Special Strategies Used in ISMS Mobile

Process used at NASA for safety-critical software was applied to security of mobile devices

Page 15: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 15

What is Included in ISMS for Mobile Devices

110 ISO/IEC 27001 Annex A Security Controls Investigated:25 deemed out of ISMS Mobile project scope85 security controls addressed

69 Risks Identified for Mobile Devices:2 high priority25 medium priority42 low priority (but high impact should they occur)

26 Risk Treatments Devised & Justified (eg. cost vs. risk, already in use…)

2 Additional Templates:- ISMS Mobile Password Policy template- ISMS Mobile SOP - Mobile Devices Security template

Page 16: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 16

Systems Security – 26 Risk Treatments for Mobile Devices – page 1

(Alphabetical Order)

T1: Change Defaults

T2: Disciplinary Action Procedure

T3: Event Log

T4: Forensics

T5: Information Access Control Procedure

T6: Mobile Malware Protection and Detection Software

T7: Prevent Unauthorized Electronic Tracking

T8: Prevention of Attagging

T9: Prevention of Electronic Eavesdropping

T10: Prevention of Jailbreaking

T11: Prevention of Tapjacking (clickjacking)

T12: Procedure for Lost or Stolen Mobile Device

T13: Proper use of Geotagging

Page 17: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 17

Systems Security – 26 Risk Treatments for Mobile Devices – page 2

T14: Retrieval of Information - Lost or Forgotten Passwords

T15: Safeguarding Mobile Data

T16: Secure Bluetooth

T17: Secure Mobile Device Enterprise Server

T18: Secure Wired Network

T19: Secure Wireless Network Transactions

T20: Securing Mobile Cloud Computing

T21: Security Incident

T22: Synchronization – ActiveSync

T23: Synchronization Configuration

T24: Synchronization - HotSync

T25: Test Data Password Protected

T26: Training for Mobile Social Media Usage(Alphabetical Order)

Page 18: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 18

Security Planning and Management

Not always a 1-1 relationship between risks and countermeasures

Security controls must be planned, implemented, tested, & monitored to ensure they protect data

1 SOP covers many risks

1 countermeasure for changing defaults required for many mobile devices

Page 19: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 19

Applicable Cyberlaw, Regulations and Compliance – page 1

Cyberlaw struggles with privacy concepts such as when the needs of the many supercede the rights of the individual, for example:

• ECPA Section 2709 allows FBI to issue National Security Letters to ISPs ordering disclosure of customer records (Electronic Communications Privacy Act of 1986, 2012)

In the USA, laws are specific to certain industries, for example:

FISMA - Federal Information Systems Management Act of 2002

Graham-Leach-Bliley Act – personal financial security (Graham-Leach-Bliley Act, 2012)

HIPAA - privacy of health data (Health Insurance Portability and Accountability Act, 2012)

Sarbanes-Oxley Act of 2002 (SOX) – public financial security (Sarbanes-Oxley Act, 2012)

Page 20: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Page 20

Applicable Cyberlaw, Regulations and Compliance – page 2

ISO/IEC 27001 (ISMS)

ISO/IEC 27002 (Security Controls)

ISO/IEC 27005 - Information Security Risk Management

NIST Guidelines on Mobile Security

NIST Guidelines on PDA Forensics

NIST National Vulnerability Database

Generally Accepted Information Security Principles

Guidelines Used for ISMS Mobile:

Page 21: ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview

ISMS for Mobile Devices

Stacy (Dene’) Nelson Student ID #000221918 Page 21

Electronic Communications Privacy Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act.

Federal Information Security Management Act of 2002. (2012). Retrieved from http://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002.

GAISP. (2004). Generally Accepted Information Security Principles. Retrieved from http://all.net/books/standards/GAISP-v30.pdf.

Graham-Leach-Bliley Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act.

Health Insurance Portability and Accountability Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act.

ISO/IEC 27001. (2005). Information Technology — Security Techniques — Information Security Management Systems – Requirements. Retrieved from http://www.iso27001security.com/html/27001.html

ISO/IEC 27005. (2012). Information Technology — Security Techniques — Information Security Risk Management (Second Edition). Retrieved from http://www.iso27001security.com/html/27005.html

NIST SP 800-30. (2002). Risk Management Guide for Information Technology Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

Sarbanes–Oxley Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Sarbanes%E2%80%93Oxley_Act.a

References