Security Documentation
Security Documentation
net/publication/221176885
Security Documentation
Conference Paper in IFIP Advances in Information and Communication Technology · January 2001
DOI: 10.1007/0-306-47007-1_10 · Source: DBLP
CITATION READS
1 898
3 authors, including:
SEE PROFILE
All content following this page was uploaded by Lam For Kwok on 18 March 2016.
1. INTRODUCTION
The advent of BS7799, which has been adopted by countries like AS
4444 in Australia and has been accepted as an ISO 17799 standard, was
hailed as a major advance in security management, but having given
seminars on Information Security Management Standards to security
officers, one gains the impression that the gap between theory and practice is
still very wide.
In fact one is sometimes left with the suspicion that the Standards may
have done more to solve the problems of security audit and training
organizations, than those of the security officer. Of course, the security
officer can take out insurance and persuade management to fund a
compliance audit. The results of such an audit will enable the security officer
to either:
Display a certificate on the wall, or
Present management with a list of resources necessary to acquire such a
certificate.
But then what? How does the security officer set about ensuring that the
organization, which will probably have an ever increasing business
dependency on its expanding and vulnerable I.T. system, is as well protected
as limited security resources allow?
A security incident could cause serious financial losses to an
organization, its partners and clients. In these litigious days the security
officer could well face a hostile barrister, in the aftermath of such a security
incident. It is not difficult to predict the type of questions that would be
asked; formulating convincing responses might be more problematic. How
can security officers demonstrate that they take all reasonable efforts, to
optimally deploy security resources?
Accountants have long since recognized that their professional
competence may be demonstrated by a pristine set of financial records. An
accountant will probably give a high priority to the maintenance of such
records, when accepting a new appointment. Hence accountancy students are
taught bookkeeping in their first year, however, few information security
courses and textbooks provide an insight in the development and
maintenance of information security documentation.
It is suggested that a comprehensive set of security documentation can
serve to guide the security officer to an optimal information security stance,
and to provide convincing evidence that a reasonable standard of
professional competence had been maintained.
Security Documentation 129
2.1 Overview
2.2 Policies
It is self evident that the security officer should document the relevant
details of all lT systems, buildings etc. within their aegis. The problem is to
ensure that this documentation is continually updated in current networked
environments. Ideally the I.T. departments would supply this information
electronically, and security officers then merely require a linkage from this
documentation. In such a case, is there some mechanism by which the
security officer can highlight recent actual or proposed changes so that the
security implications can be considered?
At the other end of the spectrum, the production and maintenance of this
aspect of the documentation may be extremely time consuming. Such a
situation is one requiring urgent attention, since it implies that the security
officers are not adequately informed of the systems and environments they
are required to protect.
2.5 Responsibilities
2.10 Compliance
In this section the security officer would be wise to make a detailed list of
security recommendations for senior management, and record them for that
interview with the hostile barrister.
3. SECURITY MODEL
3.1 Overview
These entities have, however, been chosen so that the linkages between
them provide security officers with an insight into the security of their
systems. These linkages are described in the next section.
Having traced an attack the security officer will then be concerned with
the degree to which the security measures mitigate such an attack. In this
model it is suggested that such security measures can be effectively
represented as Threat Countermeasure Diagrams [5]. In this approach each
countermeasure is considered to counter the incident threat but also to
introduce consequent threats arising from loopholes in the countermeasure or
attacks on the countermeasure itself. Supporting countermeasures are
commonly employed to address these consequent threats, and a Threat
Countermeasure Diagram is an effective means of representing such
countermeasure rationale.
4. CONCLUSIONS
5. REFERENCES