133
Chapter 2 Chapter 2 Copyright Pearson Prentice Hall Copyright Pearson Prentice Hall 2013 2013

Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Embed Size (px)

Citation preview

Page 1: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Chapter 2Chapter 2

Copyright Pearson Prentice Hall Copyright Pearson Prentice Hall 20132013

Page 2: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Justify the need for formal management processes.

Explain the plan–protect–respond security management cycle.

Describe compliance laws and regulations.

Describe organizational security issues.

Describe risk analysis.

Describe technical security infrastructure.

Explain policy-driven implementation.

Know governance frameworks.

2Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 3: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

3Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 4: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology2.1 Introduction and Terminology

2.2 Compliance Laws and Regulations2.2 Compliance Laws and Regulations

2.3 Organization2.3 Organization

2.4 Risk Analysis2.4 Risk Analysis

2.5 Technical Security Architecture2.5 Technical Security Architecture

2.6 Policy-Driven Implementation2.6 Policy-Driven Implementation

2.7 Governance Frameworks2.7 Governance Frameworks

4

Page 5: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Security is all about Defense

Corporation is all about Profit◦ Tension between the two

How to justify Defense How to ensure Defense doesn’t stifle

Profit/Opportunity

Copyright Pearson Prentice-Hall 20135

Page 6: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Technology Is Concrete◦ Can visualize devices and transmission lines

◦ Can understand device and software operation

Management Is Abstract

Management Is More Important◦ Security is a process, not a product (Bruce

Schneier)

6Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 7: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

7Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 8: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

8

A failure in any component will lead to failure for the entire system

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 9: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Complex◦ Cannot be managed informally

Need Formal Processes◦ Planned series of actions in security management

◦ Annual planning

◦ Processes for planning and developing individual countermeasures

◦ …

9Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 10: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

A Continuous Process◦ Fail if let up

Compliance Regulations◦ Add to the need to adopt disciplined security

management processes

◦ “Security is a societal pressure in that it induces cooperation … it [security] obviates the need for intimate trust. … it is how we ultimately induce compliance …” (Liars and Outliers: Enabling Trust that Society Needs to Thrive, Bruce Schnier)

10Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 11: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology2.1 Introduction and Terminology

2.2 Compliance Laws and Regulations2.2 Compliance Laws and Regulations

2.3 Organization2.3 Organization

2.4 Risk Analysis2.4 Risk Analysis

2.5 Technical Security Architecture2.5 Technical Security Architecture

2.6 Policy-Driven Implementation2.6 Policy-Driven Implementation

2.7 Governance Frameworks2.7 Governance Frameworks

11

Page 12: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Compliance Laws and Regulations◦ Laws and regulations create requirements for

corporate security Documentation requirements are strong Identity management requirements tend to be

strong

◦ Compliance can be expensive

◦ There are many compliance laws and regulations, and the number is increasing rapidly

12Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 13: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Sarbanes–Oxley Act of 2002◦ Massive corporate financial frauds in 2002

◦ Act requires firm to report material deficiencies in financial reporting processes

◦ Material deficiency a significant deficiency, or combination of significant deficiencies, which results in more than a remote likelihood that a material misstatement of the annual or interim financial statements will not be prevented or detected

13Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 14: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Sarbanes–Oxley Act of 2002◦ Note that it does not matter whether a material

misstatement actually occurs—merely that there is more than a remote likelihood that it could occur and not be detected

◦ A material deviation is a mere 5% deviation

◦ Companies that report material deficiencies typically find that their stock looses value, and the chief financial officer may lose his or her job

14Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 15: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Privacy Protection Laws◦ The European Union (EU) Data Protection

Directive of 2002

◦ The U.S. Gramm–Leach–Bliley Act (GLBA)

◦ The U.S. Health Insurance Portability and Accountability Act (HIPAA) for private data in health care organizations

15Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 16: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Data Breach Notification Laws◦ California’s SB 1386

◦ Requires notification of any California citizen whose private information is exposed

◦ Companies cannot hide data breaches anymore

Federal Trade Commission (FTC)◦ Can punish companies that fail to protect private

information

◦ Fines and required external auditing for several years

16Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 17: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

17

Page 18: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Any person who maintains computerized data that includes personal information on behalf of another business entity shall disclose to the business entity for which the information is maintained any breach of the security of the system as soon as practicable, but no later than 10 days following the determination, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person

Copyright Pearson Prentice-Hall 201318

Page 19: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Notification may be delayed upon request of law enforcement

Personal Information includes:

◦ An individual's username or e-mail address in combination with:◦ a password or security question and answer that would allow access to an online account.◦ An individual's full name in combination with:

◦ a passport number; medical history, treatment or diagnosis information; or health insurance identifier.

◦ Social Security number, driver license number, account number, and credit or debit card number.

Notice may be in the form of:

◦ Written

◦ Electronic Unless…

◦ Cost > $250k or > 500k individuals affected Email Conspicuous Posting of notice Notification to statewide media

Penalty

◦ Up to $500,000

Copyright Pearson Prentice-Hall 201319

Page 20: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Industry Accreditation◦ For hospitals, etc.

◦ Often have accredited security requirements

PCI-DSS◦ Payment Card Industry–Data Security Standards

◦ Applies to all firms that accept credit cards

◦ Has 12 general requirements, each with specific subrequirements

20Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 21: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

FISMA◦ Federal Information Security Management Act of

2002

◦ Processes for all information systems used or operated by U.S. government federal agencies

◦ Also by any contractor or other organization on behalf of a U.S. government agency

◦ Certification, followed by accreditation

◦ Continuous monitoring

◦ Criticized for focusing on documentation instead of protection

21Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 22: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Security as an Enabler◦ Security is often thought of as a

preventer

◦ But security is also an enabler

◦ If you have good security, you can do things otherwise impossible Engage in interorganizational

systems with other firms Can use SNMP SET commands to

manage their systems remotely

◦ Must get in early on projects to reduce inconvenience (see SDLC and SLC …)

22Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 23: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

23

The systems life cycle goes beyond the SDLC, to include operational use. SLC thinking is critical in security.

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 24: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Positive Vision of Users◦ Must not view users as malicious or stupid

◦ Stupid means poorly trained, and that is security’s fault

◦ Must have zero tolerance for negative views of users

Think Behaviorally◦ Do you need help to cross the street? Why?

…“the most successful security behaviors were exhibited in schools where students were taught appropriate behaviors and then trusted to behave responsibly.” (Pfleeger and Caputo, 2012 citing Ofsted 2012 study)

24Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 25: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Should Not View Security as Police or Military Force◦ Creates a negative view of users

◦ Police merely punish; do not prevent crime; security must prevent attacks

◦ Military can use fatal force; security cannot even punish (HR does that)

25Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 26: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

1. Identify Current IT Security Gaps

2. Identify Driving Forces1. The threat environment (Chapter 1)

2. Compliance laws and regulations

3. Corporate structure changes, such as mergers

3. Identify Corporate Resources That Need Protection

1. Enumerate all resources

2. Rate each by sensitivity

26Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 27: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

4. Develop Remediation Plans

1. Develop a remediation plan for all security gaps

2. Develop a remediation plan for every resource unless it is well protected

5. Develop an Investment Portfolio

1. You cannot close all gaps immediately

2. Choose projects that will provide the largest returns

3. Implement these

27Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 28: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology2.1 Introduction and Terminology

2.2 Compliance Laws and Regulations2.2 Compliance Laws and Regulations

2.3 Organization2.3 Organization

2.4 Risk Analysis2.4 Risk Analysis

2.5 Technical Security Architecture2.5 Technical Security Architecture

2.6 Policy-Driven Implementation2.6 Policy-Driven Implementation

2.7 Governance Frameworks2.7 Governance Frameworks

28

Page 29: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Technical Security Architectures◦ Definition

All of the company’s technical countermeasures And how these countermeasures are organized Into a complete system of protection

◦ Architectural decisions Based on the big picture Must be well planned to provide strong security

with few weaknesses

29Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 30: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Dealing with legacy technologies

◦ Legacy technologies are technologies put in place previously

◦ Too expensive to upgrade all legacy technologies immediately

◦ Must upgrade if seriously impairs security

◦ Upgrades must justify their costs

30Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 31: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Principles◦ Defense in depth

Resource is guarded by several countermeasures in series

Attacker must breach them all, in series, to succeed

If one countermeasure fails, the resource remains safe

31Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 32: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Principles◦ Defense in depth versus weakest links

Defense in depth: multiple independent countermeasures that must be defeated in series

Weakest link: a single countermeasure with multiple interdependent components that must all succeed for the countermeasure to succeed

32Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 33: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Principles◦ Avoiding single points of vulnerability

Failure at a single point can have drastic consequences

DNS servers, central security management servers, etc.

33Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 34: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Principles◦ Minimizing security burdens

◦ Realistic goals Cannot change a company’s protection level

overnight Mature as quickly as possible

34Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 35: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Elements of a Technical Security Architecture◦ Border management

◦ Internal site management

◦ Management of remote connections

◦ Interorganizational systems with other firms

◦ Centralized security management Increases the speed of actions Reduces the cost of actions

35Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 36: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology2.1 Introduction and Terminology

2.2 Compliance Laws and Regulations2.2 Compliance Laws and Regulations

2.3 Organization2.3 Organization

2.4 Risk Analysis2.4 Risk Analysis

2.5 2.5 Technical Security Architecture

2.6 Policy-Driven Implementation2.6 Policy-Driven Implementation

2.7 Governance Frameworks2.7 Governance Frameworks

36

Page 37: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Chief Security Officer (CSO)◦ Also called chief information security officer

(CISO)

Where to Locate IT Security?◦ Within IT

Compatible technical skills CIO will be responsible for security

◦ Outside of IT Gives independence

Hard to blow the whistle on IT and the CIO if within IT

This is the most commonly advised choice37

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 38: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Located outside of IT dept will require◦ Relationships with Other Departments

Special relationships Ethics, compliance, and privacy officers Human resources (training, hiring, terminations,

sanction violators) Legal department

38Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 39: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Relationships with Other Departments◦ Special relationships

Auditing departments 1) IT auditing, 2) internal auditing, 3) financial

auditing Might place security auditing under one of these This would give independence from the security

function

Facilities (buildings) management Uniformed security

39Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 40: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Relationships with Other Departments◦ All corporate departments

Cannot merely toss policies over the wall

◦ Business partners Must link IT corporate systems together Before doing so, must exercise due diligence in

assessing their security

40Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 41: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Top Management Support◦ Budget

◦ Support in conflicts

◦ Setting personal examples

41Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 42: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Outsourcing IT Security◦ Only e-mail or webservice

◦ Managed Security Service Providers (MSSPs) Outsource most IT security functions to the

MSSP But usually not policy

42Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 43: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

43Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 44: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

44Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 45: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology2.1 Introduction and Terminology

2.2 Compliance Laws and Regulations2.2 Compliance Laws and Regulations

2.3 Organization2.3 Organization

2.4 Risk Analysis2.4 Risk Analysis

2.5 Technical Security Architecture2.5 Technical Security Architecture

2.6 Policy-Driven Implementation2.6 Policy-Driven Implementation

2.7 Governance Frameworks2.7 Governance Frameworks

45

Page 46: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

46Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

What

How

Constraints

Page 47: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Policies◦ Statements of what is to

be done Require Strong Passwords

◦ Not how to do it

47

Page 48: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Tiers of Security Policies◦ Brief corporate security policy to drive everything

◦ Major policies E-mail Hiring and firing Personally identifiable information Acceptable Use Authentication

48Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 49: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Writing Policies◦ For important policies, IT security cannot act alone

◦ There should be policy-writing teams for each policy

◦ For broad policies, teams must include IT security, management in affected departments, the legal department, and so forth

◦ The team approach gives authority to policies

◦ It also prevents mistakes because of IT security’s limited viewpoint

49Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 50: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Limits the discretion of implementers, in order to simplify implementation decisions and to avoid bad choices in interpreting policies

Types of Guidance◦ None

Implementer is only guided by the policy itself

◦ Standards versus Guidelines Standards are mandatory directives Guidelines are not mandatory but must be

considered

50Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 51: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Types of Implementation Guidance◦ Procedures: detailed descriptions of what should

be done

◦ Processes: less detailed specifications of what actions should be taken Necessary in managerial and professional

business function

◦ Baselines: checklists of what should be done but not the process or procedures for doing them

51Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 52: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Types of Implementation Guidance◦ Best practices: most appropriate actions in other

companies

◦ Recommended practices: normative guidance

◦ Accountability Owner of resource is accountable Implementing the policy can be delegated to a

trustee, but accountability cannot be delegated

◦ Codes of ethics

52Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 53: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Ethics◦ A person’s system of values

◦ Needed in complex situations

◦ Different people may make different decisions in the same situation

◦ Companies create codes of ethics to give guidance in ethical decisions

53Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 54: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Code of Ethics: Typical Contents (Partial List)◦ Importance of good ethics to have a good workplace

and to avoid damaging a firm’s reputation

◦ The code of ethics applies to everybody Senior managers usually have additional

requirements

◦ Improper ethics can result in sanctions, up to termination

◦ An employee must report observed ethical behavior

54Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 55: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Code of Ethics: Typical Contents (Partial List)◦ An employee must involve conflicts of interest

Never exploit one’s position for personal gain

No preferential treatment of relatives

No investing in competitors

No competing with the company while still employed by the firm

55Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 56: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Code of Ethics: Typical Contents (Partial List)◦ No bribes or kickbacks

Bribes are given by outside parties to get preferential treatment

Kickbacks are given by sellers when they place an order to secure this or future orders

◦ Employees must use business assets for business uses only, not personal use

56Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 57: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Code of Ethics: Typical Contents (Partial List)◦ An employee may never divulge

Confidential information Private information Trade secrets

57Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 58: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Exceptions Are Always Required◦ But they must be managed

Limiting Exceptions◦ Only some people should be allowed to request

exceptions

◦ Fewer people should be allowed to authorize exceptions

◦ The person who requests an exception must never be authorizer

58Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 59: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Exception Must Be Carefully Documented◦ Specifically what was done and who did each

action

Special Attention Should Be Given to Exceptions in Periodic Auditing

Exceptions Above a Particular Danger Level◦ Should be brought to the attention of the IT

security department and the authorizer’s direct manager

59Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 60: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Oversight◦ Oversight is a term for a group of tools for policy

enforcement

◦ Policy drives oversight, just as it drives implementation

Promulgation◦ Communicate vision

◦ Training

◦ Stinging employees?

60Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 61: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Electronic Monitoring◦ Electronically-collected information on behavior

◦ Widely done in firms and used to terminate employees

◦ Warn subjects and explain the reasons for monitoring

61Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 62: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Security Metrics◦ Indicators of compliance that are measured

periodically

◦ Percentage of passwords on a server that are crackable, etc.

◦ Periodic measurement indicates progress in implementing a policy

62Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 63: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Auditing◦ Samples information to develop an opinion about

the adequacy of controls

◦ Database information in log files and prose documentation

◦ Extensive recording is required in most performance regimes

◦ Avoidance of compliance is a particularly important finding

63Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 64: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Auditing◦ Internal and external auditing may be done

◦ Periodic auditing gives trends

◦ Unscheduled audits trip up people who plan their actions around periodic audits

64Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 65: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Anonymous Protected Hotline◦ Often, employees are the first to detect a serious

problem

◦ A hotline allows them to call it in

◦ Must be anonymous and guarantee protection against reprisals

◦ Offer incentives for heavily damaging activities such as fraud?

65Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 66: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Behavioral Awareness◦ Misbehavior often occurs before serious security

breaches

◦ The fraud triangle indicates motive.

66

Page 67: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Vulnerability Tests◦ Attack your own systems to find vulnerabilities

◦ Free and commercial software

◦ Never test without a contract specifying the exact tests, signed by your superior

◦ The contract should hold you blameless in case of damage

67Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 68: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Vulnerability Tests◦ External vulnerability testing firms have expertise

and experience

◦ They should have insurance against accidental harm and employee misbehavior

◦ They should not hire hackers or former hackers

◦ Should end with a list of recommended fixes

◦ Follow-up should be done on whether these fixed occurred

68Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 69: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Sanctions◦ If people are not punished when they are caught,

nothing else matters

69Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 70: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

2.1 Introduction and Terminology2.1 Introduction and Terminology

2.2 Compliance Laws and Regulations2.2 Compliance Laws and Regulations

2.3 Organization2.3 Organization

2.4 Risk Analysis2.4 Risk Analysis

2.5 Technical Security Architecture2.5 Technical Security Architecture

2.6 Policy-Driven Implementation2.6 Policy-Driven Implementation

2.7 Governance Frameworks2.7 Governance Frameworks

70

Page 71: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Realities◦ Can never eliminate risk

◦ “Information assurance” is impossible

Risk Analysis◦ Goal is reasonable risk

◦ Risk analysis weighs the probable cost of compromises against the costs of countermeasures

◦ Also, security has negative side effects that must be weighed

71Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 72: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Single Loss Expectancy (SLE)

Annualized Loss Expectancy (ALE)

Asset Value (AV)

X Exposure Factor (EF)◦ Percentage loss in asset

value if a compromise occurs

= Single Loss Expectancy (SLE)◦ Expected loss in case of

a compromise

SLE X Annualized Rate of

Occurrence (ARO)◦ Annual probability of a

compromise

= Annualized Loss Expectancy (ALE)◦ Expected loss per year

from this type of compromise

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

72

Page 73: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

73

Base Case

Countermeasure

A

Asset Value (AV) $100,000 $100,000

Exposure Factor (EF) 80% 20%

Single Loss Expectancy (SLE): = AV*EF $80,000 $20,000

Annualized Rate of Occurrence (ARO) 50% 50%

Annualized Loss Expectancy (ALE): = SLE*ARO $40,000 $10,000

ALE Reduction for Countermeasure NA $30,000

Annualized Countermeasure Cost NA $17,000

Annualized Net Countermeasure Value NA $13,000

Counter-measure A should reduce

the exposure factor by

75%

Counter-measure A should reduce

the exposure factor by

75%

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 74: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

74

Base Case

Countermeasure

B

Asset Value (AV) $100,000 $100,000

Exposure Factor (EF) 80% 80%

Single Loss Expectancy (SLE): = AV*EF $80,000 $80,000

Annualized Rate of Occurrence (ARO) 50% 25%

Annualized Loss Expectancy (ALE): = SLE*ARO $40,000 $20,000

ALE Reduction for Countermeasure NA $20,000

Annualized Countermeasure Cost NA $4,000

Annualized Net Countermeasure Value NA $16,000

Counter-measure B should cut the frequency of compromises in half

Counter-measure B should cut the frequency of compromises in half

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 75: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

75

Base Case

Countermeasure

A B

Asset Value (AV) $100,000 $100,000 $100,000

Exposure Factor (EF) 80% 20% 80%

Single Loss Expectancy (SLE): = AV*EF $80,000 $20,000 $80,000

Annualized Rate of Occurrence (ARO) 50% 50% 25%

Annualized Loss Expectancy (ALE): = SLE*ARO $40,000 $10,000 $20,000

ALE Reduction for Countermeasure NA $30,000 $20,000

Annualized Countermeasure Cost NA $17,000 $4,000

Annualized Net Countermeasure Value NA $13,000 $16,000

Although Countermeasure A reduces the ALE more,Countermeasure B is much less expensive.

The annualized net countermeasure value for B is larger.

The company should select countermeasure B.

Although Countermeasure A reduces the ALE more,Countermeasure B is much less expensive.

The annualized net countermeasure value for B is larger.

The company should select countermeasure B.

Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 76: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Uneven Multiyear Cash Flows◦ For both attack costs and defense costs

◦ Must compute the return on investment (ROI) using discounted cash flows

◦ Net present value (NPV) or internal rate of return (ROI)

76Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 77: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Total Cost of Incident (TCI)◦ Exposure factor in classic risk analysis assumes

that a percentage of the asset is lost

◦ In most cases, damage does not come from asset loss

◦ For instance, if personally identifiable information is stolen, the cost is enormous but the asset remains

◦ Must compute the total cost of incident (TCI)

◦ Include the cost of repairs, lawsuits, and many other factors

77Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 78: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Many-to-Many Relationships between Countermeasures and Resources◦ Classic risk analysis assumes that one

countermeasure protects one resource

◦ Single countermeasures, such as a firewall, often protect many resources

◦ Single resources, such as data on a server, are often protected by multiple countermeasures

◦ Extending classic risk analysis is difficult

78Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 79: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Impossibility of Knowing the Annualized Rate of Occurrence◦ There simply is no way to estimate this

◦ This is the worst problem with classic risk analysis

◦ As a consequence, firms often merely rate their resources by risk level

79Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 80: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Problems with “Hard-Headed Thinking”◦ Security benefits are difficult to quantify

◦ If only support “hard numbers” may underinvest in security

80Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 81: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Perspective◦ Impossible to do perfectly

◦ Must be done as well as possible

◦ Identifies key considerations

◦ Works if countermeasure value is very large or very negative

◦ But never take classic risk analysis seriously

81Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 82: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

OCTAVE Allegro

Page 83: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Operationally

Critical

Threat,

Asset,

Vulnerability

Evaluation

Page 84: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

The combination of a threat (a condition) and the resulting impact of the threat if acted upon (a consequence).

Page 85: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Methodology for identifying and evaluating security risks

◦ develop qualitative risk evaluation criteria that describe the organization’s operational risk tolerances

◦ identify assets that are important to the mission of the organization

◦ identify vulnerabilities and threats to those assets

◦ determine and evaluate the potential consequences to the organization if threats are realized

Page 86: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

OCTAVE

OCTAVE-S

OCTAVE-Allegro

Page 87: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

For large Organizations >300 employees

have a multi-layered hierarchy maintain their own computing

infrastructure have the ability to run vulnerability

evaluation tools have the ability to interpret the

results of vulnerability evaluations performed in a series of workshops

conducted and facilitated by an interdisciplinary analysis team drawn from business units throughout the organization (e.g. senior management, operational area managers, and staff) and members of the IT department [Alberts 2002].

Phase I◦ Organizational View

Identify important information assets

Phase II◦ Technological View

Supplement Threat Analysis

Phase III◦ Strategy and Plan

Risk Identification Risk Mitigation

Page 88: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

For Small Manufacturing Companies

performed by an analysis team that has extensive knowledge of the organization

designed to include a limited examination of infrastructure risks◦ No vulnerability testing (or limited)

Page 89: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Broad Assessment of Operational Risk Environment

Focus on Information Assets◦ How they are used

◦ Where they are used

◦ Where they are stored, transported, & processed

◦ How are they exposed to Threats, Vulnerabilities & Disruptions

Page 90: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Step1:Establish Risk Measurement Criteria

Step2:Develop Information Asset Profile

Step 3:Identify Information Asset Containers

Step 4:Identify Areas of Concern

Step 5:Identify Threat Scenarios

Step 6:Identify Risks

Step 7:AnalyzeRisks

Step 8:SelectMitigationApproach

Establish Drivers Profile Assets Identify Threats Identify/Mitigate Risks

The outputs of each step are recorded in a worksheet and become inputs for the next step

Page 91: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Risk Measurement Criteria Determined:◦ Qualitative Measure

Used to evaluate effect of Risk

◦ Forms information asset risk assessment

Rank Significance of Impact Area◦ E.g. Customers vs. Compliance

Page 92: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 93: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 94: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

94

Page 95: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

95

Page 96: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

96

Page 97: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

The most important category should receive the highest score and the least important the lowest.

Page 98: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Information Asset◦ information or data that is of value to the

organization◦ Can exist in physical form (on paper, CDs, or

other media) or◦ Electronically (stored in databases, in files, on

personal computers). Describe Assets:

◦ unique features, qualities, characteristics, and value

◦ unambiguous definition of the assets boundaries◦ security requirements for the asset are

adequately defined Confidentiality, Integrity, Availability

Page 99: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Focus on “critical few” Which would have the largest impact on

your organization, based on the Risk Measurement if:◦ The asset or assets were disclosed to

unauthorized people.

◦ The asset or assets were modified without authorization.

◦ The asset or assets were lost or destroyed.

◦ Access to the asset or assets was interrupted.

Page 100: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 101: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

101

Page 102: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Places where Information Assets are:

◦ Stored

◦ Processed

◦ Transported

Three Types of Containers

◦ Technical: hardware, software, application systems, servers, and networks or

◦ Physical: file folders (where information is stored in written form)

◦ People (who may carry around important information such as intellectual property).

Containers are both Internal to the Organization and External

an organization must identify all of the locations where its information assets are stored, transported, or processed, whether or not they are within the organization’s direct control.

Containers Risks are inherited by Information Assets within them

Page 103: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Controls are at the Container level

Security depends on how well the control reflects security requirements of container

Any vulnerabilities or threats to a Container is inherited by the Information Asset inside

Page 104: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 105: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 106: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 107: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Identify Conditions that can threaten information assets

Not intended to be an exhaustive list of all Threats

Rather a list of threats that are immediately thought of

Page 108: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 109: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Areas of Concern are expanded into Threat Scenarios

◦ Actor Involved◦ Means◦ Motive◦ Outcome◦ Security Requirements

From Threat Scenario Questionnaires◦ Probability of Occurrence

High, Medium, Low

Page 110: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 111: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 112: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 113: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 114: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 115: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 116: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

For Any Yes from the questionnaireCreate anInformationAssetRiskWorksheet

Page 117: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Determine Consequences if Threat Occurs

More than one consequence is possible◦ Reputation Consequence

◦ Financial Consequence

Threat (condition) + Impact (consequence) = Risk

[Steps 4 and 5] + [Step 6] = Risk

Page 118: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013
Page 119: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Compute Quantitative Measure of Risk◦ Using Consequence and Relative Importance of

Impact Area High = 3, Medium = 2 or Low = 1

◦ Probability (if used)

Page 120: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

The scores generated in this

activity are only meant to be

used as a prioritization tool.

Differences between risk

scores are not considered to

be relevant. In other words, a

score of 48 means that the risk

is relatively more important to

the organization than a score

of 25, but there is no

importance to the difference of

13 points.

The scores generated in this

activity are only meant to be

used as a prioritization tool.

Differences between risk

scores are not considered to

be relevant. In other words, a

score of 48 means that the risk

is relatively more important to

the organization than a score

of 25, but there is no

importance to the difference of

13 points.

Page 121: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

The most important category should receive the highest score and the least important the lowest.

Page 122: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

122

4 x 3 = 12

H = 3M = 2L = 1

Page 123: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

123

Page 124: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice-Hall 2013 12

4

Risk Score

Modification – Unauthorized Access

30

Disclosure – Unauthorized

18

Interruption _ DOS attack

31

Disclosure – Unauthorized

20

Disclosure – Paper Copies of Bills

18

Destruction – Back-up Tapes Destroyed

31

Disclosure – Bills sent to wrong address

15

Modification – Improper Billing Codes

37

Summary of All Identified Risks

Page 125: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Take Relative Risk score and divide into 4 even Pools. Than use pools to determine Mitigation, Defer, or Accept decision. If probabilities are used than create Matrix (Probability of Occurrence x Risk score)

Page 126: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

First, Prioritize Risks based on Risk Score (7)

Mitigation strategies are developed that consider the value of the asset

The Assets security requirements

The containers in which it lives

The organization’s unique operating environment.

Page 127: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Accept◦ Take no action, risk has low or zero impact

Mitigate◦ Develop controls to counter risk

Defer◦ Gather more information and re-analyze in the

future

Page 128: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Improper Billing Codes

DOS Attack

Page 129: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Risk Reduction◦ The approach most people consider

◦ Install countermeasures to reduce harm

◦ Makes sense only if risk analysis justifies the countermeasure

Risk Acceptance◦ If protecting against a loss would be too

expensive, accept losses when they occur

◦ Good for small, unlikely losses

◦ Good for large but rare losses

129Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 130: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Risk Transference◦ Buy insurance against security-related losses

◦ Especially good for rare but extremely damaging attacks

◦ Does not mean a company can avoid working on IT security

◦ If bad security, will not be insurable

◦ With better security, will pay lower premiums

130Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 131: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Risk Avoidance◦ Not to take a risky action

◦ Lose the benefits of the action

◦ May cause anger against IT security

Recap: Four Choices when You Face Risk◦ Risk reduction

◦ Risk acceptance

◦ Risk transference

◦ Risk avoidance

131Copyright Pearson Prentice Hall 2013Copyright Pearson Prentice Hall 2013

Page 132: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

132

Page 133: Planning and Policy Chapter 2 Copyright Pearson Prentice Hall 2013

Copyright © 2013 Pearson Education, Inc.  Copyright © 2013 Pearson Education, Inc.  Publishing as Prentice HallPublishing as Prentice Hall