ISMS Awareness Training For General Users
ISMS Awareness Training For General Users
ISMS Awareness Training For General Users
1
INFORMATION SECURITY
What is information?
What is information security?
What is risk?
Introduction to the ISO standards
Managing information security
Your security responsibilities
2
AGENDA
Information is an asset which,
like other important business
assets, has value to an
organization and consequently needs
to be suitably protected
ISO/IEC 27002:2005
3
INFORMATION
Information exists in many forms:
Printed or written on paper
Stored electronically
Transmitted by post or electronic means
Visual e.g. videos, diagrams
Published on the Web
Verbal/aural e.g. conversations, phone calls
Intangible e.g. knowledge, experience, expertise,
ideas
4
INFORMATION TYPES
Information can be …
Created
Owned (it is an asset)
Stored
Processed
Transmitted/communicated
Used (for proper or improper purposes)
Modified or corrupted
Shared or disclosed (whether appropriately or not)
Destroyed or lost
Stolen
Controlled, secured and protected throughout its
existence
5
INFORMATION LIFE CYCLE
What is information security?
Information security is what keeps valuable information
„free of danger‟ (protected, safe from harm)
6
KEY TERMS
PEOPLE
Staff &
management
PROCESSES
Business activities
TECHNOLOGY
7
SECURITY ELEMENTS
People
People who use or have an interest in our
information security include:
Shareholders / owners
Management & staff
Customers / clients, suppliers & business partners
Service providers, contractors, consultants &
advisors
Authorities, regulators & judges
8
PEOPLE
Processes
Processes are work practices or workflows, the
steps or activities needed to accomplish business
objectives.
• Processes are described in procedures.
9
PROCESSES
Technology
Information technologies
Cabling, data/voice networks and equipment
Telecommunications services (PABX, VoIP, ISDN,
videoconferencing)
Phones, cellphones, PDAs
Computer servers, desktops and associated data storage
devices (disks, tapes)
Operating system and application software
Paperwork, files
Pens, ink
Security technologies
Locks, barriers, card-access systems, CCTV
10
TECHNOLOGY
Information security is
valuable because it …
• Protects information against various threats
• Ensures business continuity
• Minimizes financial losses and other impacts
• Optimizes return on investments
• Creates opportunities to do business safely
• Maintains privacy and compliance
We all depend on
information security
11
VALUE
Information security is defined
as the preservation of:
Making information
Confidentiality accessible only to those
authorized to use it
12
CIA
Confidentiality
Confidentiality of data refers to It bring known or Accessible to only
Authorised users. Data
Confidentiality is one of the first layer of data security. For example, only
account holders can view their bank account summary.
Integrity
Integrity is ensuring that the information is accurate, complete, reliable,
and is in its original form. Incomplete or corrupted data can do more harm
than good.
.
13
CIA
Availability
Availability ensure that once the user captures the data in a computer
system, it must make the data available to the users when they request it.
The computing resources need to be available to the users whenever
needed.
14
CIA
Security incidents cause …
• IT downtime, business interruption
• Financial losses and costs
• Devaluation of intellectual property
• Breaking laws and regulations, leading
to prosecutions, fines and penalties
• Reputation and brand damage leading
to loss of customer, market, business
partner or owners‟ confidence and lost
business
• Fear, uncertainty and doubt
15
IMPACTS
What is risk?
Risk is the possibility that a threat exploits a
vulnerability in an information asset,
leading to an adverse impact on the organization
16
KEY TERMS
Threat agent
17
THREAT AGENTS
Motive
18
MOTIVE
Threat type Example
Typo, wrong attachment/email address,
Human error
lost laptop or phone
Force of nature Fire, flood, storm, earthquake, lightning, tsunami, volcanic eruption
Obsolescence iPhone 4?
19
THREAT TYPES
So how do we
secure our
information
assets?
20
HOW TO SECURE?
A brief history of ISO27k
1990‟s
• Information Security Management Code of Practice
produced by a UK government-sponsored working group
• Based on the security policy used by Shell
• Became British Standard BS7799
2000‟s
• Adopted by ISO/IEC
• Became ISO/IEC 17799 (later renumbered ISO/IEC 27002)
• ISO/IEC 27001 published & certification scheme started
Now
• Expanding into a suite of information security standards
(known as “ISO27k”)
• Updated and reissued every few years
21
ISO 27K
ISO 27001
22
ISO 27001
Plan-Do-Check-Act
ISMS PROCESS
Interested Management responsibility Interested
parties parties
PLAN
Establish
ISMS
DO ACT
Implement &
Maintain &
operate the
improve
ISMS
Information
Managed
security CHECK information
requirements Monitor & security
& expectations review ISMS
23
PDCA
Informati
on
Security
Organisat
Policy
ion of
Compliance Informati
on
security
Business Asset
Continuity Managem
Planning ent
Incident Human
Manageme Resource
nt Security
Availab
ility
System
Development
Physical
&
Security
Maintenance
Communicati
Access on &
Control Operations
Management
24
CONTROL & CLAUSES
• Information security policy - management
direction
• Organization of information security -
management framework for implementation
• Asset management – assessment, classification
and protection of valuable information assets
• HR security – security for joiners, movers and
leavers
• Physical & environmental security - prevents
unauthorised access, theft, compromise, damage to
information and computing facilities, power cuts
25
CONTROL & CLAUSES
• Communications & operations management -
ensures the correct and secure operation of IT
• Access control – restrict unauthorized access to
information assets
• Information systems acquisition, development &
maintenance – build security into systems
• Information security incident management – deal
sensibly with security incidents that arise
• Business continuity management – maintain
essential business processes and restore any that fail
• Compliance - avoid breaching laws, regulations,
policies and other security obligations
26
CONTROL & CLAUSES
IS POLICY
SECURITY MANAGEMENT
ORGANISATION REVIEW
PLAN
Establish
ISMS
DO
ASSET Implement &
ACT
Maintain & CORRECTIVE &
IDENTIFICATION Operate the PREVENTIVE
& ISMS Improve ACTIONS
CLASSIFICATION
CHECK
Monitor &
Review ISMS
CONTROL
CHECK
SELECTION &
PROCESSES
IMPLEMENTATION
OPERATIONALIZ
E THE PROCESES
27
IMPLEMENTATION PROCESS CYCLE
• Demonstrable commitment to security by the
organization
• Legal and regulatory compliance
• Better risk management
• Commercial credibility, confidence, and
assurance
• Reduced costs
• Clear employee direction and improved
awareness
28
BENEFITS
ISMS scope
29
SCOPE
Key ISMS documents
30
KEY DOCUMENTS
Information security vision
Vision
The organization is acknowledged as an
industry leader for information security.
Mission
To design, implement, operate, manage and
maintain an Information Security Management
System that complies with international
standards, incorporating generally-accepted
good security practices
31
VISION & MISSION
Who is responsible?
• Information Security Management Committee
• Information Security Manager/CISO and Department
• Incident Response Team
• Business Continuity Team
• IT, Legal/Compliance, HR, Risk and other departments
• Audit Committee
32
WHO?
Corporate Information Security Policy
33
POLICY
Information Asset Classification
CONFIDENTIAL:
If this information is leaked outside the organization, it will result in major financial and/or image
loss. Compromise of this information may result in serious non-compliance (e.g. a privacy
breach). Access to this information must be restricted based on the concept of need-to-know.
Disclosure requires the information owner‟s approval. In case information needs to be disclosed
to third parties, a signed confidentiality agreement is required.
Examples: customer contracts, pricing rates, trade secrets, personal information, new product
development plans, budgets, financial reports (prior to publication), passwords, encryption keys.
PUBLIC:
This information can be freely disclosed to anyone although publication must usually be explicitly
approved by Corporate Communications or Marketing.
Examples: marketing brochures, press releases, website.
34
INFORMATION ASSET CLASSIFICATION
Confidentiality
Confidentiality of information concerns the protection of sensitive (and often highly valuable)
information from unauthorized or inappropriate disclosure.
Confidentiality Explanation
level
Information which is very sensitive or private, of great value to
the organization and intended for specific individuals only. The
unauthorized disclosure of such information can cause severe
High harm such as legal or financial liabilities, competitive
disadvantage, loss of brand value e.g. merger and acquisition
related information, marketing strategy
35
CLASSIFICATION
Physical security
Do • Read and follow security policies and procedures
• Display identity cards while on the premises
• Challenge or report anyone without an ID card
• Visit the intranet Security Zone or call IT Help/Service Desk
for advice on most information security matters
36
USER RESPONSIBILITIES
Password Guidelines
Use long, complicated passphrases - whole sentences if you can
Reserve your strongest passphrases for high security systems (don‟t
re-use the same passphrase everywhere)
Use famous quotes, lines from your favorite songs, poems etc. to
make them memorable
37
USER RESPONSIBILITIES
Internet usage
Use the corporate Internet facilities only for legitimate and
authorized business purposes
38
USER RESPONSIBILITIES
E-mail usage
Use corporate email for business purposes only
Follow the email storage guidelines
If you receive spam email, simply delete it. If it is
offensive or you receive a lot, call the IT Help/Service
Desk
39
USER RESPONSIBILITIES
Security incidents
Report information security incidents, concerns and
near-misses to IT Help/Service Desk:
Email …
Telephone …
Anonymous drop-boxes …
Take their advice on what to do
40
USER RESPONSIBILITIES
Ensure your PC is getting antivirus updates and patches
Lock your keyboard (Windows-L) before leaving your PC
unattended, and log-off at the end of the day
Store laptops and valuable information (paperwork as well as
CDs, USB sticks etc.) securely under lock and key
Keep your wits about you while traveling:
Keep your voice down on the cellphone
Be discreet about your IT equipment