Firsttestans
Firsttestans
Firsttestans
(1, 7a)
The Committee on National Security Systems (CNSS) defines information security as the
protection of information and its critical elements, including the systems and hardware that
use, store, and transmit that information. Figure 1-3 shows that information security
includes the broad areas of information security management, computer and data security,
and network security. The CNSS model of information security evolved from a concept
developed by the computer security industry called the C.I.A. triangle. The C.I.A. triangle has
been the industry standard for computer security since the development of the mainframe.
It is based on the three characteristics of information that give it value to organizations:
confidentiality, integrity, and availability. The security of these three characteristics of
information is as important today as it has always been, but the C.I.A. triangle model no
longer adequately addresses the constantly changing environment.
2.2
CNSS Security Model
The definition of information security presented in this text is based in part on the CNSS
document called the National Training Standard for Information Systems Security
Professionals NSTISSI No. 4011. (See www.cnss.gov/Assets/pdf/nstissi_4011.pdf. Since this
document was written, the NSTISSC was renamed the Committee on National Security
Systems (CNSS)—see www.cnss.gov. The library of documents is being renamed as the
documents are rewritten.) This document presents a comprehensive information security
model and has become a widely accepted evaluation standard for the security of
information systems. The model, created by John McCumber in 1991, provides a graphical
representation of the architectural approach widely used in computer and information
security; it is now known as the McCumber Cube. The McCumber Cube in Figure 1-6, shows
three dimensions. If extrapolated, the three dimensions of each axis become a 3x 3 x3 cube
with 27 cells representing areas that must be addressed to secure today’s information
systems. To ensure system security, each of the 27 areas must be properly addressed during
the security process. For example, the intersection between technology, integrity, and
storage requires a control or safeguard that addresses the need to use technology to protect
the integrity of information while in storage. One such control might be a system for
detecting host intrusion that protects the integrity of information by alerting the security
administrators to the potential modification of a critical file. What is commonly left out of
such a model is the need for guidelines and policies that provide direction for the practices
and implementations of technologies.
Even with the best planning and implementation, it is impossible to obtain perfect information
security. Recall James Anderson’s statement from the beginning of this chapter, which emphasizes
the need to balance security and access. Information security cannot be absolute: it is a process, not
a goal. It is possible to make a system available to anyone, anywhere, anytime, through any means.
However, such unrestricted access poses a danger to the security of the information. On the other
hand, a completely secure information system would not allow anyone access. For instance, when
challenged to achieve a TCSEC C-2 level security certification for its Windows operating system,
Microsoft had to remove all networking components and operate the computer from only the
console in a secured room.
To achieve balance—that is, to operate an information system that satisfies the user and the security
professional—the security level must allow reasonable access, yet protect against threats. Figure 1-8
shows some of the competing voices that must be considered when balancing information security
and access.
It takes a wide range of professionals to support a diverse information security program. As noted
earlier in this chapter, information security is best initiated from the top down. Senior management
is the key component and the vital force for a successful implementation of an information security
program. But administrative support is also essential to developing and executing specific security
policies and procedures, and technical expertise is of course essential to implementing the details of
the information security program. The following sections describe the typical information security
responsibilities of various professional roles in an organization.
Senior Management
The senior technology officer is typically the chief information officer (CIO), although other titles
such as vice president of information, VP of information technology, and VP of systems may be used.
The CIO is primarily responsible for advising the chief executive officer, president, or company owner
on the strategic planning that affects the management of information in the organization. The CIO
translates the strategic plans of the organization as a whole into strategic information plans for the
information systems or data processing division of the organization. Once this is accomplished, CIOs
work with subordinate managers to develop tactical and operational plans for the division and to
enable planning and management of the systems that support the organization.
The chief information security officer (CISO) has primary responsibility for the assessment,
management, and implementation of information security in the organization. The CISO may also be
referred to as the manager for IT security, the security administrator, or a similar title. The CISO
usually reports directly to the CIO, although in larger organizations it is not uncommon for one or
more layers of management to exist between the two. However, the recommendations of the CISO
to the CIO must be given equal, if not greater, priority than other technology and information-
related proposals. The placement of the CISO and supporting security staff in organizational
hierarchies is the subject of current debate across the industry.
The information security project team should consist of a number of individuals who are
experienced in one or multiple facets of the required technical and nontechnical areas. Many of the
same skills needed to manage and implement security are also needed to design it. Members of the
security project team fill the following roles:
Champion: A senior executive who promotes the project and ensures its support, both financially
and administratively, at the highest levels of the organization.
Team leader: A project manager, who may be a departmental line manager or staff unit manager,
who understands project management, personnel management, and information security technical
requirements.
Security policy developers: People who understand the organizational culture, existing policies, and
requirements for developing and implementing successful policies.
Risk assessment specialists: People who understand financial risk assessment techniques, the value
of organizational assets, and the security methods to be used.
Security professionals: Dedicated, trained, and well-educated specialists in all aspects of information
security from both a technical and nontechnical standpoint.
Systems administrators: People with the primary responsibility for administering the systems that
house the information used by the organization.
End users: Those whom the new system will most directly affect. Ideally, a selection of users from
various departments, levels, and degrees of technical knowledge assist the team in focusing on the
application of realistic controls applied in ways that do not disrupt the essential business activities
they seek to safeguard.
Data Responsibilities
The three types of data ownership and their respective responsibilities are outlined below:
Data owners: Those responsible for the security and use of a particular set of information. They are
usually members of senior management and could be CIOs. The data owners usually determine the
level of data classification (discussed later), as well as the changes to that classification required by
organizational change. The data owners work with subordinate managers to oversee the day-to-day
administration of the data.
Data custodians: Working directly with data owners, data custodians are responsible for the storage,
maintenance, and protection of the information. Depending on the size of the organization, this may
be a dedicated position, such as the CISO, or it may be an additional responsibility of a systems
administrator or other technology manager. The duties of a data custodian often include overseeing
data storage and backups, implementing the specific procedures and policies laid out in the security
policies and plans, and reporting to the data owner.
Data users: End users who work with the information to perform their assigned roles supporting the
mission of the organization. Everyone in the organization is responsible for the security of data, so
data users are included here as individuals with an information security role.
Communities of Interest
Each organization develops and maintains its own unique culture and values. Within each
organizational culture, there are communities of interest that develop and evolve. As defined here,
a community of interest is a group of individuals who are united by similar interests or values within
an organization and who share a common goal of helping the organization to meet its objectives.
While there can be many different communities of interest in an organization, this book identifies
the three that are most common and that have roles and responsibilities in information security. In
theory, each role must complement the other; in practice, this is often not the case.
The roles of information security professionals are aligned with the goals and mission of the
information security community of interest. These job functions and organizational roles focus on
protecting the organization’s information systems and stored information from attacks.
The organization’s general management team and the rest of the resources in the organization make
up the other major community of interest. This large group is almost always made up of subsets of
other interests as well, including executive management, production management, human
resources, accounting, and legal, to name just a few. The IT community often categorizes these
groups as users of information technology systems, while the information security community
categorizes them as security subjects. In fact, this community serves as the greatest reminder that all
IT systems and information security objectives exist to further the objectives of the broad
organizational community. The most efficient IT systems operated in the most secure f ashion ever
devised have no value if they are not useful to the organization as a whole.