How To Make Sense of Cybersecurity Frameworks: Frank Kim
How To Make Sense of Cybersecurity Frameworks: Frank Kim
Frank Kim
Founder / Instructor
ThinkSec / SANS Institute
@fykim
www.frankkim.net
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
Time
– ISO 27001 Frameworks
– NIST CSF Program
Frameworks
Risk Frameworks Control
– NIST 800-39, 800-37, 800-30 Frameworks
– ISO 27005
– FAIR Experience
6
Control Frameworks
#RSAC
8
#RSAC
NIST SP 800-53
Configuration Media Protection
Access Control (AC) Risk Assessment (RA)
Management (CM) (MP)
Awareness and Contingency Planning Physical & Env. System and Services
Training (AT) (CP) Protection (PE) Acquisition (SA)
Program Management
Maintenance (MA)
(PM)
9
#RSAC
10
#RSAC
Priority
Initial Control Baselines
Cntl
Control Name
No.
Low Mod High
AC-9 Previous Logon (Access) Notification P0 Not selected Not selected Not selected
CIS Controls
Basic Foundational Organizational
1 Inventory and Control of 7 Email and Web Browser 12 Boundary Defense 17 Security Awareness &
Hardware Protect Training Program
3 Continuous Vuln 9 Limit & Control of Port, 14 Controlled Access on 19 Incident Response and
Management Protocol, Services Need to Know Management
4 Controlled Use 10 Data Recovery 15 Wireless Access 20 Penetration Tests & Red
of Admin Privileges Capabilities Control Team Exercises
5 Secure Config for Hardware 11 Secure Config for 16 Account Monitor and
& Software Network Devices Control
12
#RSAC
Large enterprises
– United States Department of State
o 90% Risk Reduction in Year 1
– Australian Defense Services Directorate
o Stopped 85% of intrusions
– United States Federal Reserve System
o Basis for Internal Audit to assess Cyber Security
Smaller organizations
– “A Small Business No Budget Implementation”
13
#RSAC
Management Takeaways
Free resources
– AuditScripts Control Master Mapping
o Maps Controls to nearly every known regulatory compliance standard
– AuditScripts Control Manual Assessment Tool
o Self-assessment of current state of Controls implementation
– CIS Controls Implementation Guide
o Key questions to ask when implementing the Controls
14
Program Frameworks
#RSAC
16
#RSAC
27006 27003
27008 27017
Requirements for Implementation guidance
Guidance for auditors Cloud services
certification bodies for management
27009 27004
27014 27018
Sector specific Monitoring, measurement,
Governance PII in public clouds
requirements analysis, evaluation
27021
27005 27019
Competence reqs for
Risk management Energy and Utility
security professionals
17
#RSAC
ISO 27001
ISO 27001
– Information Security Management System (ISMS) requirements
Defines areas of focus in building a security program
– Organizational context
– Leadership
– Planning
– Support
– Documentation
– Operation
– Performance evaluation
– Improvement
18
#RSAC
Information security
Information security Communications
Access control incident
policies security
management
System acquisition, Security aspects of
Organization of
Cryptography development, and business continuity
information security
maintenance management
Physical and
Human resource
environmental Test data Compliance
security
security
Supplier
Asset management Operations security
relationships
19
#RSAC
20
#RSAC
Framework Categories
Function Category Composed of three parts
Asset Management
Business Environment – Core, Implementation Tiers, and Profiles
Governance
Identify Risk Assessment
Risk Management Strategy Defines a common language for
Supply Chain Risk Management
Identity Management, Authn & Access Control
managing security risk
Awareness & Training
Data Security – Core has five functions that provide a
Protect Information Protection Processes & Procedures high-level, strategic view of the security
Maintenance
Protective Technology life cycle
Anomalies & Events
Detect Security Continuous Monitoring
Detection Processes Helps organizations ask:
Response Planning
Communications
– What are we doing today?
Respond Analysis
Mitigation
– How are we doing?
Improvements – Where do we want to go?
Recover
Recovery Planning
Improvements – When do we want to get there?
Communications
21
#RSAC
22
#RSAC
23
#RSAC
24
Risk Frameworks
#RSAC
26
#RSAC
27
#RSAC
Determine Risk
28
#RSAC
Step 6 Step 2
Monitor Select
Security Controls Security Controls
Step 5 Step 3
Authorize Implement
Information System Security Controls
Step 4
Assess
Security Controls
29
#RSAC
ISO 27005
Risk Treatment
Risk Acceptance
30
#RSAC
International standard
– Quantifying information security and operational risk
– Provides a standard taxonomy and ontology for measuring risk
– Complement to other risk assessment and management frameworks
Supported by two organizations
– FAIR Institute
o Promotes FAIR
– Open Group
o Publishes Open FAIR risk taxonomy and analysis standards
31
#RSAC
FAIR Model
Risk
Secondary
Contact Threat
loss event
frequency capability
frequency
Secondary
Probability of Resistance
loss
action Strength
magnitude
32
#RSAC
Risk Definition
Risk = Impact × Likelihood
Risk = Impact x (Vulnerability × Threat)
NIST definition
– “A measure of the extent to which an entity is threatened by a potential
circumstance or event, and typically a function of: (i) the adverse
impacts that would arise if the circumstance or event occurs; and (ii) the
likelihood of occurrence”
FAIR definition
– “Probable frequency and magnitude of future loss”
33
#RSAC
34
Summary
#RSAC
In Summary
As you mature your security program
– Choose one (or more) framework from each category
Control Framework
– Identify baseline controls to implement
Program Framework
Risk
– Build a comprehensive security program
Time
Frameworks
Program
– Simplify communications with business Frameworks
Control
Risk Framework Frameworks
36
#RSAC
37
Frank Kim
@fykim
[email protected]
www.frankkim.net