23
Security Risk Management Infosecurity.be Infosecurity.be Alain Desausoi Head of Enterprise Security and Architecture, CISO 24 March 2011

Security Risk Management by Alain Desausoi

Embed Size (px)

DESCRIPTION

Seminar by Alain Desausoi during Infosecurity.be 2011

Citation preview

Page 1: Security Risk Management by Alain Desausoi

Security Risk ManagementInfosecurity.beInfosecurity.be

Alain Desausoi

Head of Enterprise Security and Architecture, CISO

24 March 2011

Page 2: Security Risk Management by Alain Desausoi

Agenda

• Governance and security strategy

• Risk management – where are we now ?

• Risk management – how did we get there ?

• Who is SWIFT?

Security Risk Management – Infosecurity.be – 24 march 2011 2

Page 3: Security Risk Management by Alain Desausoi

Governance and security strategy

Security Risk Management – Infosecurity.be – 24 march 2011 3

Page 4: Security Risk Management by Alain Desausoi

Focus on security and reliability

Management governance to define framework

Security & ReliabilityCommittee

ITOPS Management

SWIFT Board

CEO

SWIFT Controls

Security

CouncilExecutive

Committee

Security Risk Management – Infosecurity.be – 24 march 2011 4

SWIFT’s Security

Control Policy

• Governance• Confidentiality• Integrity• Availability• Change Management

SWIFT’s Corporate

Security Policy

Management Oversight

Detailed Policies & Standards

Organisation

Processes

Tools

SWIFT Controls

To support commitments regarding:

• Confidentiality• Integrity• Availability

Security Objectives

Page 5: Security Risk Management by Alain Desausoi

Providing assurance over SWIFT’s security

Key involved parties

• Internal Audit– Audit universe, over a 3 years period– Reporting to Board committee (AFC)

• External Audit– Focus on critical services of SWIFT– Delivering a SAS70 opinion

Security Risk Management – Infosecurity.be – 24 march 2011 5

– Delivering a SAS70 opinion

• Board committees– Audit/Finance and Technology/Production committees– Providing governance, amongst other on risk management

• Overseers– Lead by National Bank of Belgium– G-10 worldwide Central banks

Page 6: Security Risk Management by Alain Desausoi

Information security risk management framework

PowerPoint Toolkit – 23 October 2008 – Confidentiality: restricted 6

Page 7: Security Risk Management by Alain Desausoi

Security strategy principles

• Security tone at the top– Senior leadership, governance, oversight

• No security single point of failure

• Investing in security

Security Risk Management – Infosecurity.be – 24 march 2011 7

• Investing in security– Keep in line with the threats– People, processes, quality management

• Think the unthinkable– Post 9/11, contingency mentality– Plan for the worse, hope for the best

• Failure not an Option– Continuous learning and improvement culture

Page 8: Security Risk Management by Alain Desausoi

SWIFT security scope

Data

Application

External

ThreatsExternal

Threats Hackers

Organised crime

Security Risk Management – Infosecurity.be – 24 march 2011 8

Networks

Systems

People

Buildings

Internal

Threats

Service providers

Customers

Terrorism

Page 9: Security Risk Management by Alain Desausoi

Information security risk management framework

Where are we ?

Threat

landscape

Changes in business

Incident & Threatmonitoring

Generic security Security

Reporting &escalation

Changes

Changes

Management

Changes in technology & architecture

Security Risk Management – Infosecurity.be – 24 march 2011 9

Generic security

requirements

System/project security

specifications

System/project

implementation

System/project

risk assessment

Security

risk registry

Information classification

Deviation

Risk and actionupdate

Change management & Budgeting

System

deployment

Intrusion

testing

escalation

Deviation

Deviation

Systems/project

Baseline settings

Recurrent

Managementoversight

Page 10: Security Risk Management by Alain Desausoi

Information security risk management framework

How did we get there ?At the start: mature organisation

Security classification (BIA)Strong security culture, part of company’s missionStrong SDLC and change management practices Some Intrusion tests

[2007] Having its own dynamicThreat landscape: business, technology, threatsMeasure , feedback and Lessons learned

[2011] EfficiencyFit vs fat securityCommon attack patterns, checklistsWorkflow and reportingOnline repository of service, products classification (250+)

[2008] Raising the barAdapt rating rules and closure horizonWorst case analysis and malicious insiderBenchmarking and preempting project needs

Security Risk Management – Infosecurity.be – 24 march 2011 10

[2003] No surprises on investments: How to protect ?Generic security requirements -> repeatable specificationsCommon understanding across business unitsTransparency to business unitsSecurity costs build in in project investments

[2004] No surprises on threats: Is it enough?Repeatable risk assessments, linked to SDLC, change management, IJointly with business unitsFramework with impact, likelihood, tolerance, IFully endorsed by CIO

[2005] Industrialise: extend breathMore business units coveredMore awareness, more intrusion testsRisk registry, reporting and tracking

Measure , feedback and Lessons learnedFeedback loop on structural security investments

Page 11: Security Risk Management by Alain Desausoi

Risk management - internals

Security Risk Management – Infosecurity.be – 24 march 2011 11

Page 12: Security Risk Management by Alain Desausoi

Risk identification and assessment

• Security classification

– Simple to understand, Business impact driven : Confidentiality, Integrity , Availability

– Used to define controls to be implemented (deter, prevent, contain, detect, react)

• Risk identification

– Threat landscape, external vulnerabilities, intrusion tests, audit findings, bugs

– Self assessment, proactive assessment

• Risk assessment

Security Risk Management – Infosecurity.be – 24 march 2011 12

• Risk assessment

– Repeatable and consistent

– Impact rating: based on security classification

– Likelihood rating: based on 5 dimensions

• A qualitative mixture of difficulty and motivation of a vulnerability being exploited in light of prevailing threats and surrounding controls currently implemented. It is not a statistical measure of the exploit or breach actually happening. It takes however into account occurrences of similar attacks in relevant outside areas

– Risk rating and risk tolerance

• Worst case assessment

– Malicious insider, distributed DoS, I

– Likelihood -> opportunity (access profile), additional knowledge

– Impact -> Recovery time oriented

Page 13: Security Risk Management by Alain Desausoi

Risk assessment

Impact ratings

Classification

Impact ratingConfidentiality Integrity Availability

High Highly Confidential data Essential data

High critical services that cannot be restarted within crisis timer

At least 1 critical customer or more than 50.customers

Security Risk Management – Infosecurity.be – 24 march 2011 13

50.customers

Medium Highly Confidential data Important data

Medium critical services that cannot be restarted within crisis timer

High critical services that can be restarted within crisis timer

At least 1 critical customer or more than 50 customers

Low Confidential data Normal data

Low critical services

Medium critical services that can be restarted within crisis timer

Very low Restricted data Non critical services

Page 14: Security Risk Management by Alain Desausoi

Risk assessment

Likelihood rating

KnowledgeEasy, known

Medium, known

Medium, secret

Control

Security Risk Management – Infosecurity.be – 24 march 2011 14

Anyone

Customer

SWIFT

OPC

>5 M$

>1 M$

>100 K$

Any

Threat source

High, secret

ControlInfrastructure

Occurrence

HighMediumLowVery low

Page 15: Security Risk Management by Alain Desausoi

Risk mitigation

• Risk mitigation

– Identify and prioritise mitigation: Feeds into change management process

– Joint effort business units/implementation teams and security teams

• Risk acknowledgment and acceptance

• Risk registry and tracking

Security Risk Management – Infosecurity.be – 24 march 2011 15

– Transparency off mitigation

– Risk closure horizon attached to initial risk rating

– Residual risk analysis, Overdue reporting

Page 16: Security Risk Management by Alain Desausoi

Risk rating

H

M

Lik

elih

ood

Immediateattention3 6 9

2 4 6Needs

2

1 Severe

Blocking

CRseverity

Riskrating

9

6

Risk Tolerance

Security Risk Management – Infosecurity.be – 24 march 2011 16

Impact

M

L

VL

HMVL L

Lik

elih

ood2 4 6

1 2 4

Needschange

/ 1 2

1

/

/

Severe

Major

Minor

Cosmetic

TypicalMax Possible

6

4

3

2

1

Page 17: Security Risk Management by Alain Desausoi

SWIFT – some facts

Security Risk Management – Infosecurity.be – 24 march 2011 17

Page 18: Security Risk Management by Alain Desausoi

SWIFT – A customer centric user community

BanksCorporates

InsuranceCompanies

Government Broker-Dealers

Payment Systems

Clearing & SettlementSystems

IMI's

Payments MI's

GovernmentInstitutions

Trustees

Broker-Dealers

Depositories

Stock Exchanges Securities MI’s

18Security Risk Management – Infosecurity.be – 24 march 2011

Page 19: Security Risk Management by Alain Desausoi

3,8 billion messages per year

8,830 customers

209 countries and territories

SWIFT figures

209 countries and territories

Over 2,000 employees

Average daily traffic 15.3 million messages

Last peak day – 18,9 messages million messages – 1st March 2011

19Security Risk Management – Infosecurity.be – 24 march 2011

Page 20: Security Risk Management by Alain Desausoi

AMERICASAMERICAS EMEAEMEA ASIA PACIFICASIA PACIFIC

New York

Miami

San Francisco

LondonStockholm

Frankfurt

ZurichParis

MilanMadrid

Vienna

HQ La HulpeHQ La Hulpe

Seoul

TokyoBeijing

SWIFT Offices around the world

Security Risk Management – Infosecurity.be – 24 march 2011 20

Sao Paulo

Miami MilanMadrid

Dubai

Johannesburg

Sydney

Shanghai

Hong KongMumbai

Singapore

Page 21: Security Risk Management by Alain Desausoi

Q&A

?Security Risk Management – Infosecurity.be – 24 march 2011 21

?

Page 22: Security Risk Management by Alain Desausoi

Thank you

Page 23: Security Risk Management by Alain Desausoi

Security strategy - evolution process

Security

Council

Security & ReliabilityCommittee

Technology & ProductionCommittee

Changing environment• Threats• Technology• Commitments – KPI

Assessment• Risk assessment• Technology evaluation• Business case• Management oversight

Changing environment• Threats• Technology• Commitments – KPI

Assessment• Risk assessment• Technology evaluation• Business case• Management oversight

Security Risk Management – Infosecurity.be – 24 march 2011 23

Risk tolerance Risk acceptance vs Risk mitigation Balance Cost / Risk

• Commitments – KPI• Legal & oversight• Business strategy• Benchmarks• Intrusion tests• CPR - PIMRs

Actions• New initiatives• Improvement programmes(control definition, control execution)

• Commitments – KPI• Legal & oversight• Business strategy• Benchmarks• Intrusion tests• CPR - PIMRs

Actions• New initiatives• Improvement programmes(control definition, control execution)