86
Vicente Aceituno Boston, July 2010 © ISM3 Consortium 2010 A Revolution in Security: ISM evolution with ISM3

A Revolution in Information Security: ISM Evolution with O-ISM3

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: A Revolution in Information Security: ISM Evolution with O-ISM3

Vicente AceitunoBoston, July 2010

© ISM3 Consortium 2010

A Revolution in Security: ISM evolution with ISM3

Page 2: A Revolution in Information Security: ISM Evolution with O-ISM3
Page 3: A Revolution in Information Security: ISM Evolution with O-ISM3

Mike Jerbic

Edward Stansfeld

Anthony Nelson

Anup Narayanan

Ian Dobson

Jim Hietala

Page 4: A Revolution in Information Security: ISM Evolution with O-ISM3

2002

Page 5: A Revolution in Information Security: ISM Evolution with O-ISM3

2010

Page 6: A Revolution in Information Security: ISM Evolution with O-ISM3
Page 7: A Revolution in Information Security: ISM Evolution with O-ISM3

ScientificMethod

Page 8: A Revolution in Information Security: ISM Evolution with O-ISM3

•Confidenciality•Integrity•Availability•Non-Repudiation•Authorization•Authentication•Audit•Privacy•Secrecy•Intellectual Property

Page 9: A Revolution in Information Security: ISM Evolution with O-ISM3

Feedback Loop

Page 10: A Revolution in Information Security: ISM Evolution with O-ISM3

Modeling

Page 11: A Revolution in Information Security: ISM Evolution with O-ISM3

QualityManagement

Page 12: A Revolution in Information Security: ISM Evolution with O-ISM3

A Maturity Model

For Security Management?

Page 13: A Revolution in Information Security: ISM Evolution with O-ISM3
Page 14: A Revolution in Information Security: ISM Evolution with O-ISM3

Evolution

Page 15: A Revolution in Information Security: ISM Evolution with O-ISM3

+

+

+

Page 16: A Revolution in Information Security: ISM Evolution with O-ISM3

Revolution

Page 17: A Revolution in Information Security: ISM Evolution with O-ISM3

One-size-fits-all

Page 18: A Revolution in Information Security: ISM Evolution with O-ISM3

Security Investment, Maturity Level & Risk

Security Investment

Risk

Risk Reduction/Additional SecurityInvestment

Page 19: A Revolution in Information Security: ISM Evolution with O-ISM3

Business and context fit

Page 20: A Revolution in Information Security: ISM Evolution with O-ISM3

Doorman Mentality

Page 21: A Revolution in Information Security: ISM Evolution with O-ISM3

Manager Mentality

Page 22: A Revolution in Information Security: ISM Evolution with O-ISM3

Threats

Page 23: A Revolution in Information Security: ISM Evolution with O-ISM3

Deliverables

Page 24: A Revolution in Information Security: ISM Evolution with O-ISM3

Incidents = Failure

Page 25: A Revolution in Information Security: ISM Evolution with O-ISM3

Incidents = Opportunity for Improvement

Page 26: A Revolution in Information Security: ISM Evolution with O-ISM3

(But…

Don’t make the same mistake twice.

& Learn from the mistakes of others)

Page 27: A Revolution in Information Security: ISM Evolution with O-ISM3

Preventing policy violations

Page 28: A Revolution in Information Security: ISM Evolution with O-ISM3

Providing value

Page 29: A Revolution in Information Security: ISM Evolution with O-ISM3

Contrarian view of business and security

Page 30: A Revolution in Information Security: ISM Evolution with O-ISM3

Security seen as part of the business.

Page 31: A Revolution in Information Security: ISM Evolution with O-ISM3

Destination: Compliance

Page 32: A Revolution in Information Security: ISM Evolution with O-ISM3

Origin:Compliance

Page 33: A Revolution in Information Security: ISM Evolution with O-ISM3

Risk Management Techniques

+Continuous ImprovementTechniques

Page 34: A Revolution in Information Security: ISM Evolution with O-ISM3

Invulnerability

Page 35: A Revolution in Information Security: ISM Evolution with O-ISM3

Return on Investment

Page 36: A Revolution in Information Security: ISM Evolution with O-ISM3

Protect the asset

Page 37: A Revolution in Information Security: ISM Evolution with O-ISM3

Protect business objectives

Page 38: A Revolution in Information Security: ISM Evolution with O-ISM3

ConfidentialityIntegrityAvailability

…Non-Repudiation…Authorization

…Authentication…Audit

…Privacy…Secrecy

…Intellectual Property

Page 39: A Revolution in Information Security: ISM Evolution with O-ISM3

Operational definitions of security objectivesand business objectives

Page 40: A Revolution in Information Security: ISM Evolution with O-ISM3
Page 41: A Revolution in Information Security: ISM Evolution with O-ISM3

Business Objectives

Page 42: A Revolution in Information Security: ISM Evolution with O-ISM3
Page 43: A Revolution in Information Security: ISM Evolution with O-ISM3

Access for Authorized Users

Page 44: A Revolution in Information Security: ISM Evolution with O-ISM3

…where and when necessary.

Page 45: A Revolution in Information Security: ISM Evolution with O-ISM3

Unathorized user access denial

Page 46: A Revolution in Information Security: ISM Evolution with O-ISM3

Responsibility

Page 47: A Revolution in Information Security: ISM Evolution with O-ISM3

Secrets

Page 48: A Revolution in Information Security: ISM Evolution with O-ISM3

Privacy

Page 49: A Revolution in Information Security: ISM Evolution with O-ISM3

Intellectual Property

Page 50: A Revolution in Information Security: ISM Evolution with O-ISM3

Information available for as long as necessary…

…but not after it has expired.

Page 51: A Revolution in Information Security: ISM Evolution with O-ISM3

Comply with laws and regulations

Page 52: A Revolution in Information Security: ISM Evolution with O-ISM3

Keep systems protected

Page 53: A Revolution in Information Security: ISM Evolution with O-ISM3

Improvement using lagging indicators.

Page 54: A Revolution in Information Security: ISM Evolution with O-ISM3

Test & Audit

Page 55: A Revolution in Information Security: ISM Evolution with O-ISM3

Certification

Page 56: A Revolution in Information Security: ISM Evolution with O-ISM3

Improvement using leading indicators

Page 57: A Revolution in Information Security: ISM Evolution with O-ISM3

Metrics

Page 58: A Revolution in Information Security: ISM Evolution with O-ISM3

Management Practices

Page 59: A Revolution in Information Security: ISM Evolution with O-ISM3

Continuous Improvement

Page 60: A Revolution in Information Security: ISM Evolution with O-ISM3

Capability Level Basic Defined Managed Controlled Optimized

Management Practices Enabled

Audit, Certify Test Monitor Planning

Benefits Realization Assessment Optimization

Documentation * * * * * * *

Met

ric

Typ

e

Activity * * * * * *

Scope * * * * * *

Unavailability * * * * * *

Effectiveness * * * * * *

Load * * * * *

Quality * *

Efficiency *

Page 61: A Revolution in Information Security: ISM Evolution with O-ISM3

Management Practices

Page 62: A Revolution in Information Security: ISM Evolution with O-ISM3

Planning

Page 63: A Revolution in Information Security: ISM Evolution with O-ISM3

Test

Page 64: A Revolution in Information Security: ISM Evolution with O-ISM3

Monitor

Page 65: A Revolution in Information Security: ISM Evolution with O-ISM3

Assessment

Page 66: A Revolution in Information Security: ISM Evolution with O-ISM3

Assessment

Page 67: A Revolution in Information Security: ISM Evolution with O-ISM3

Improvement

Page 68: A Revolution in Information Security: ISM Evolution with O-ISM3

Benefits Realization

Page 69: A Revolution in Information Security: ISM Evolution with O-ISM3

Value

Page 70: A Revolution in Information Security: ISM Evolution with O-ISM3

Metrics

Page 71: A Revolution in Information Security: ISM Evolution with O-ISM3

Activity

Page 72: A Revolution in Information Security: ISM Evolution with O-ISM3

Scope

Page 73: A Revolution in Information Security: ISM Evolution with O-ISM3

Unavailability

Page 74: A Revolution in Information Security: ISM Evolution with O-ISM3

Effectiveness

Page 75: A Revolution in Information Security: ISM Evolution with O-ISM3

Efficiency

Page 76: A Revolution in Information Security: ISM Evolution with O-ISM3

Load

Page 77: A Revolution in Information Security: ISM Evolution with O-ISM3

Quality

Page 78: A Revolution in Information Security: ISM Evolution with O-ISM3

Metrics

Page 79: A Revolution in Information Security: ISM Evolution with O-ISM3

79

Measurement

Page 80: A Revolution in Information Security: ISM Evolution with O-ISM3

80

Interpretation

Page 81: A Revolution in Information Security: ISM Evolution with O-ISM3

Representation

Page 82: A Revolution in Information Security: ISM Evolution with O-ISM3

Representation

Page 83: A Revolution in Information Security: ISM Evolution with O-ISM3

83

Investigation

Page 84: A Revolution in Information Security: ISM Evolution with O-ISM3

Capability Level Basic Defined Managed Controlled Optimized

Management Practices Enabled

Audit, Certify Test Monitor Planning

Benefits Realization Assessment Optimization

Documentation * * * * * * *

Met

ric

Typ

e

Activity * * * * * *

Scope * * * * * *

Unavailability * * * * * *

Effectiveness * * * * * *

Load * * * * *

Quality * *

Efficiency *

Page 85: A Revolution in Information Security: ISM Evolution with O-ISM3
Page 86: A Revolution in Information Security: ISM Evolution with O-ISM3