Information Security Governance and The Law: Learning Objectives of This Chapter: Principles and Practices
Information Security Governance and The Law: Learning Objectives of This Chapter: Principles and Practices
Information Security Governance and The Law: Learning Objectives of This Chapter: Principles and Practices
Guiding principles
Need to Know
Since the weakest link in a system may expose the easiest path for
penetration, but it is never clear a priori who or which system compo-
nent or processes may be most vulnerable to an attack, it is desirable
to limit the potential damage. One mechanism to do so is to allow an
entity (be in people or processes) access to only information on the
basis of a ‘need to know’. If and when an entity does not need access
to a specific information to carry out tasks that have been assigned
to the entity, then the entity should be prevented access to said infor-
mation (also known as ‘least privilege access’). Need to know based
information sharing is often augmented with compartmentalization
when assigning tasks - where different entities have access to differ-
ent subsets of information, so that as an ensemble, a given task can
be accomplished, but most individual entities do not have access to
the whole set of information. This paradigm is again inspired from
military doctrine. A specific example of facilitating need to know
information sharing in the context operating systems is to apply
discretionary access control, where the owner of a file can determine
whether specific people can access the said file. Mandatory access
controls augments such an approach, where an explicit authorisation
for access of a particular resource is determined. A layman example
of discretionary access control will be where a project manager de-
cides to share a particular contract (say with a client) document with
a programmer working on the client’s project, because he thinks it
will be useful for the programmer to understand all the client needs.
However, if the official policy of the organization is that personnel
below managerial positions should in general not have access to legal
documents such as contracts, then, the programmer will still need an
explicit authorisation for access enforced through mandatory access
control.
Implementing a need to know access paradigm may be wrought
with problems of practicality — it is not always obvious what might
adequate information to carry out a task, and if and when more
information is sought, it may be difficult to assess and grant access
in a timely manner not to disrupt functionality. In the best case
situation, it may render the system inefficient, while at the worst,
it may compromise functionality altogether. Thus, an organization
needs to carry out proper risk and benefit analysis and determine
when and up to what extent a paradigm like need to know is to be
applied.
2. information security governance and the law 19
ISO/IEC standards
for example, Personal Data Protection Act (2012), Banking Act (2008)
or Casino Control Act of Singapore, which has direct implications
to issues such as data confidentiality (e.g., financial details of cus-
tomers), integrity (e.g., for audit purposes), availability (e.g., for audit
purposes or for fraud detection, and so on). Some relevant US laws
include Federal Information Security Management Act (2002) outlin-
ing the necessary security for IT infrastructure used by any federal
government body, while acts like Sarbanes-Oxley Act of 2002 is for
corporate accountability to check financial and accounting irregular-
ity, or Health Insurance Portability and Accountability Act (HIPAA)
1996 to protest patient health information acts serve specific (other)
purposes that however rely heavily on proper information security
management. Most countries have or are in the process of legislating
similar, as well as other laws and regulations which often have strong
information & cyber security implications, simply because of the
ubiquity of information systems in all walks of modern life.
Many cybercrimes are however borderless in nature, and hard to
address because of a multitude of issues, including heterogeneity of
national laws, some of which are occasionally conflicting in nature,
lack of a global law enforcement agency with jurisdiction over all
sovereign entities, as well also because many criminal (organizations)
are stateless, operating from dispersed geographic locations, and also
because many criminal acts are in fact orchestrated by state actors, or
state sponsored actors, albeit in disguise, to be conveniently denied.
Some examples where states or state sponsored entities have
been alleged (varied degree of evidence, but unsurprisingly, without
any convictions at any court of law) to have carried out cybercrime
(Cyber attacks/wars, Cyber espionage) include the massive denial of
service attack on Estonia’s IT infrastructure in 2007, the 2010 Stuxnet
worm incident, NSA’s PRISM surveillance programme (revealed by
Edward Snowden in 2013), to name a few prominent ones.
The conflicting interests notwithstanding, there are efforts to
streamline international efforts to stem cybercrime. The Budapest
convention on cybercrime (2001) is an international treaty aimed to
address internet and computer crimes by harmonizing national laws,
improving and coordinating investigations, and facilitate coopera-
tion among nations. Even where there are intent and in principle
agreements on part of countries, it is not always feasible to harmo-
nize all relevant laws, particularly when they are in contradiction to
other laws of a country. A well documented instance is the conflict
posed by US’s first amendment for free speech, based on which a
ban on virtual child pornography had already been struck down
from the Child Pornography Prevention Act of 1996 in US by the U.S.
Supreme Court’s ruling (2002) in Ashcroft v. Free Speech Coalition 2 , 2
https://en.wikipedia.org/wiki/
Ashcroft_v._Free_Speech_Coalition
24 security management
thus right to know the actual medical condition(s) Anne has. This is
thus an example of breach of Anne’s privacy as a patient.
How can such breach be mitigated? The breach in this event did
not happen due to deliberate malice on either Lisa or Carol’s part.
Nevertheless, as per HIPAA requirements, PHI (Patient Health in-
formation) ought to be protected from even accidental disclosures.
The lapse here has been at the company’s process and/or operations
aspects. For instance, Lisa should have used a screen saver, locked
her computer or closed the application before leaving her desk. Like-
wise, Carol entered the accounts department. Likewise, if a policy of
restricted physical access was in place, then the PHI disclosure would
not have occurred.
This example also goes on to demonstrate that even a small slip-
page, whether unknowingly or by mistake could risk the confi-
dentiality and integrity of the organization and thus lead to major
implications.
The intent of the discussion here is not so much as getting into
specifics of what is required and how it is achieved in the IT space
to comply with SOX, FISMA or HIPAA (or other laws which have
implications on an organization’s information security governance)
but to emphasize that all acquired third party as well as built in-
house IT tools and systems used in relevant sectors are immediately
affected by the corresponding acts, and be it the executives of the
organizations that need to assess their IT infrastructure and acquire
the necessary tools, or be the IT product vendors catering to these en-
tities, a lot of information system design, implementation, operations
and monitoring has/had to undergo consequent changes and adap-
tations, and the effect sometimes transcend the specific industry for
which the original law was intended. For instance, a private sector
organization, or an entity even outside US may still also benefit by
using FISMA compliant products.
logical phases.
Compliance
Perform the review: The actual review processes for the audit may
rely on various means. It could be manual assessments, including
interviewing staff, performing security vulnerability scans and pen-
etration testing, analyzing physical access to systems, determining
if the latest updates have been installed in all equipments, etc. Use
of computer-aided audit tools (CAAT) for automated monitoring,
applying statistical and data mining tools for anomaly detection, etc.
are also on the rise.
The final outcome of a review needs to detail the methodology
and steps taken to carry out the review, describe the findings on the
performance of the organization, as well as make recommendations
advocating corrective follow-up actions.
We conclude with a commentary on measuring security and its
performance. Though security is intrinsically measureless, there are
numerous attempts to quantify security performance, typically by
measuring different manifestations of security (lapses). For instance,
though it can still be be tedious, one can determine the number of
infected (by known malware) machines, or number of machines with-
out patches for known vulnerabilities. One can also record known
occurrences of security incidents. Likewise, an organization can qual-
itatively measure capability, particularly in a relative manner with
respect to some known benchmarks (say, relative to the industry best
practices). One can also align security measurement with risk man-
agement by determining the costs/benefits and return of investment
to determine whether to establish specific security capabilities, or to
assign a value to the said security.