Security INFO CISSP R-Whitmanch03-04
Security INFO CISSP R-Whitmanch03-04
Seventh Edition
Chapter 3
Planning for
Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Learning Objectives (1 of 2)
• Upon completion of this material, you should be able
to:
– Describe management’s role in the development,
maintenance, and enforcement of information security
policy, standards, practices, procedures, and
guidelines
– Explain what an information security blueprint is,
identify its major components, and explain how it
supports the information security program
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Learning Objectives (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Introduction
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Introduction
1. Planning
2. Policy
3. Programs
4. Protection
5. People
6. Project management
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
1- Information Security Planning
• Planning levels help translate an organization’s strategic
plans into tactical objectives.
• Planning and the CISO
The business strategy is translated into the IT strategy. The
strategies of other business units and the IT strategy are then
used to develop the InfoSec strategy. Just as the CIO uses
the IT objectives gleaned from the business unit plans to
create the organization’s IT strategy, the CISO develops
InfoSec objectives from the IT and other business units to
create the organization’s InfoSec strategy.
⁃ Tactical plans, planning
⁃ Operational plans, planning
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Information Security Planning
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Governance
– Governance:
▪ Set of responsibilities and practices exercised by the board and executive
management
▪ Goal to provide strategic direction, establishment of objectives, and measurement of
progress toward objectives
▪ Also, verifies/validates that risk management practices are appropriate and assets are
used properly.
▪ Corporate governance: Just like governments, corporations and other
organizations have guiding documents—corporate charters or partnership
agreements—as well as appointed or elected leaders or officers, and planning
and operating procedures. These elements in combination provide corporate
governance.
▪ Information security governance: Each operating unit within an organization
also has controlling customs, processes, committees, and practices. The
information security group’s leadership monitors and manages all organizational
structures and processes that safeguard information. Information security
governance then applies these principles and management structures to the
information security function.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Governance Outcomes
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 4-1 Information security
governance roles and responsibilities
Source: This information is derived from the Corporate Governance Task Force Report, “Information
Security Governance: A Call to Action,” April 2004, National Cyber Security Task Force.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
2- Policy as the Foundation for Planning
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
2- Information Security Policy, Standards,
and Practices
• Policy functions as organizational law that dictates
acceptable and unacceptable behaviour within an
organization.
⁃ Policies direct how issues should be addressed and how technologies
should be used.
⁃ Policies do not specify the proper operation of equipment or software—this
information should be placed in the standards, procedures, and practices of
users’ manuals and systems documentation.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
2- Information Security Policy, Standards,
and Practices
• Practices: Examples of actions that illustrate
compliance with policies.
• Procedure: Step-by-step instructions designed to
assist employees in following policies, standards,
and guidelines.
• Guidelines: Nonmandatory recommendations the
employee may use as a reference in complying with
a policy.
• For a policy to be effective, it must be properly
disseminated, read, understood, and agreed to by all
members of the organization, and uniformly enforced.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 4-2 Policies, standards,
guidelines, and procedures
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Management must define three types of security
policy, according to SP 800-14 of the National
Institute of Standards and Technology (NIST):
• Enterprise Information Security Policy (EISP)
• Issue-specific Security Policies (ISSPs)
• Systems-specific Policies (SysSPs)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Enterprise Information Security Policy (EISP) (1
of 2)
• Sets strategic direction, scope, and tone for all
security efforts within the organization
• Executive-level document, usually drafted by or with
chief information officer (CIO) of the organization
• Typically addresses compliance in two areas:
– General compliance to ensure meeting of
requirements to establish program and assigning
responsibilities therein to various organizational
components.
– Use of specified penalties and disciplinary action.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Enterprise Information Security Policy (EISP) (2
of 2)
• EISP Elements should include:
– Overview of the corporate security philosophy
– Information on the structure of the organization and
people in information security roles
– Articulated responsibilities for security shared by all
members of the organization
– Articulated responsibilities for security unique to each
role in the organization
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-1 Components of the EISP (1 of 3)
Component Description
Answers the question 'What is this policy for?" Provides a framework that
helps the reader understand the intent of the document. Can include text
such as the following: This document will:
• Identify the elements of a good security policy
• Explain the need for information security
• Specify the various categories of information security
• Identify the information security responsibilities and roles
Statement of • Identify appropriate levels of security through standards and
Purpose guidelines
This document establishes an overarching security policy and direction
for our company. Individual departments are expected to establish
standards, guidelines, and operating procedures that adhere to and
reference this policy while addressing their specific and individual
needs."
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-1 Components of the EISP (2 of 3)
Component Description
Defines information security. For example:
"Protecting the confidentiality, integrity, and availability of
Information Security information while in processing, transmission, and storage,
Elements through the use of policy, education and training, and
technology ..."
This section can also lay out security definitions or philosophies
to clarify the policy.
Provides information on the importance of information
Need for Information security in the organization and the legal and ethical
Security obligation to protect critical information about customers,
employees, and markets.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-1 Components of the EISP (3 of 3)
Component Description
Lists other standards that influence this policy document and are
Reference influenced by it, perhaps including relevant federal laws, state
Standards laws, and other policies.
to Other Information
and Guidelines
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Issue-Specific Security Policy (ISSP)
(1 of 3)
• The ISSP: These are sets of rules that define acceptable
behavior within a specific organizational resource, such
as e-mail or Internet usage. As an organization supports
routine operations by executing various technologies
and processes, it must instruct employees on their
proper use.
– Addresses specific areas of technology
– Requires frequent updates
– Contains a statement on the organization’s position on
a specific issue.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Issue-Specific Security Policy (ISSP)
(2 of 3)
An ISSP may cover the following topics, among others:
• E-mail
• Use of the Internet and World Wide Web
• Specific minimum configurations of computers to defend against worms and
viruses
• Prohibitions against hacking or testing organization security controls
• Home use of company-owned computer equipment
• Use of personal equipment on company networks (BYOD: bring your own
device)
• Use of telecommunications technologies, such as fax and phone
• Use of photocopy equipment
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-2 Components of the ISSP (1 of 4)
• Statement of policy
― Scope and applicability
― Definition of technology addressed
― Responsibilities
• Authorized access and usage of equipment
― User access
― Fair and responsible use
― Protection of privacy
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-2 Components of the ISSP (2 of 4)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-2 Components of the ISSP (3 of 4)
― Physical security
― Encryption
• Violations of policy
― Procedures for reporting violations
― Penalties for violations
• Policy review and modification
― Scheduled review of policy procedures for
modification
― Legal disclaimers
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 4-2 Components of the ISSP (4 of 4)
• Limitations of liability
― Statements of liability
― Other disclaimers as needed
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Systems-Specific Security Policy (SysSP) (1 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Systems-Specific Security Policy (SysSP) (2 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Systems-Specific Security Policy(SysSP) (3 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Defensible Policy
For policies to be effective and legally defensible, the following must
be done properly:
1. Development—Policies must be written using industry-accepted
practices and formally approved by management.
2. Dissemination—Policies must be distributed using all appropriate
methods.
3. Review—Policies must be readable and read by all employees.
4. Comprehension—Policies must be understood by all employees.
5. Compliance—Policies must be formally agreed to by act or
affirmation.
6. Enforcement—Policies must be uniformly applied to all
employees.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Policy
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
3- Information Security Programs
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Security education, training, and awareness
(SETA) program
Once your organization has defined the policies that will guide
its security program, it is time to implement a security
education, training, and awareness (SETA) program.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Security Education, Training, and Awareness
Program
• Once a general security policy exists, implement a security
education, training, and awareness (SETA) program.
• SETA is a control measure designed to reduce accidental
security breaches.
• The SETA program consists of security education, security
training, and security awareness.
• It enhances security by improving awareness, developing skills
and knowledge, and building in-depth knowledge.
• A security awareness program is one of the least frequently
implemented but most beneficial programs in an organization.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Security Education
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Security education, training, and awareness
(SETA) program
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 4-12 Components of contingency
planning
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Continuity Strategies (1 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Continuity Strategies (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Contingency Planning (CP) Process
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 4-14 Major steps in
contingency planning
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The CP Policy
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Business Impact Analysis (BIA)
• Investigation and assessment of various adverse events that
can affect organization
• Assumes security controls have been bypassed, have failed, or
have proven ineffective, and the attack has succeeded
• Organization should consider scope, plan, balance, knowledge
of objectives, and follow-ups
• Three stages:
– Determine mission/business processes and recovery
criticality
– Identify recovery priorities for system resources
– Identify resource requirements
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
RPO, RTO, WRT, and MTD
Recovery Point Objective (RPO) Work Recovery Time (WRT)
Recovery Time Objective (RTO) Maximum Tolerable Downtime (MTD)
https://defaultreasoning.com/2013/12/10/rpo-rto-wrt-mtd/
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (1 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (2 of 8)
• Incident Planning
– Predefined responses enable the organization to react
quickly and effectively to the detected incident if:
▪ The organization has an IR team
▪ The organization can detect the incident
– IR team consists of individuals needed to handle systems
as incident takes place
• Incident response plan
– Format and content
– Storage
– Testing
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (4 of 8)
• Incident detection
– Most common occurrence is complaint about
technology support, often delivered to help desk.
– Careful training is needed to quickly identify and
classify an incident.
– Once incident is properly identified, the organization
can respond.
– Incident indicators vary.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (5 of 8)
• Incident reaction
– Consists of actions that guide the organization to stop
incidents, mitigate their impact, and provide information for
recovery
– Actions that must occur quickly:
▪ Notification of key personnel
▪ Documentation of the incident
• Incident containment strategies
– Containment of the incident’s scope or impact is first priority;
must then determine which information systems are affected.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (6 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (7 of 8)
– Organization repairs vulnerabilities, addresses any
shortcomings in safeguards, and restores data and
services of the systems.
• Damage assessment
– Several sources of information on damage can be used,
including system logs, intrusion detection logs,
configuration logs and documents, documentation from
incident response, and results of detailed assessment of
systems and data storage.
– Computer evidence must be carefully collected,
documented, and maintained to be usable in formal or
informal proceedings.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Incident Response Planning (8 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Disaster Recovery Planning
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Business Continuity Planning (1 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Business Continuity Planning (2 of 3)
• Continuity strategies
– There are a number of strategies for planning for business continuity.
– The determining factor in selecting between options is usually cost.
– In general, there are three exclusive options: hot sites, warm sites, and
cold sites.
– "cold" (facility is prepared), "warm" (equipment is in place), "hot" (operational data is loaded)
– There are three shared functions: time-share, service bureaus, and mutual
agreements.
– Time-sharing in BCP refers to an arrangement where multiple
organizations share the use of a disaster recovery facility or data
center.
– Service bureaus in BCP are external providers that offer specific
disaster recovery and business continuity services
– Mutual agreements in BCP are reciprocal arrangements between two
or more organizations to support each other during a disruption.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Business Continuity Planning (3 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Crisis Management (1 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Crisis Management (2 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Crisis Management (3 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The Consolidated Contingency Plan
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Law Enforcement Involvement
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Benefits and Drawbacks of Law Enforcement
Involvement (1 of 2)
• Advantages of involving law enforcement agencies:
– Agencies may be better equipped at processing
evidence.
– Organization may be less effective in extracting the
necessary information to legally convict a suspected
criminal.
– Law enforcement agencies are prepared to handle
any necessary warrants and subpoenas.
– Law enforcement is skilled at obtaining witness
statements and other information collection.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Benefits and Drawbacks of Law Enforcement
Involvement (2 of 2)
• Disadvantages of involving law enforcement
agencies:
– Once a law enforcement agency takes over the case,
the organization cannot control the chain of events.
– The organization may not hear about the case for
weeks or months.
– Equipment vital to the organization’s business may be
tagged as evidence.
– If the organization detects a criminal act, it is legally
obligated to involve appropriate law enforcement
officials.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The next 3 P’s
4- Protection
The protection function is executed via a set of risk management activities, as well as
protection mechanisms, technologies, and tools. Each of these mechanisms or
safeguards represents some aspect of the management of specific controls in the
overall InfoSec plan.
5- People
People are the most critical link in the InfoSec program. This area encompasses
security personnel (the professional information security employees), the security of
personnel (the protection of employees and their information), and aspects of the
SETA program mentioned earlier.
6- Project management
Whether an InfoSec manager is asked to roll out a new security training program or
select and implement a new firewall, it is important that the process be managed as a
project. The final element for thoroughgoing InfoSec management is the application
of a project management discipline to all elements of the InfoSec program.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The Information Security Blueprint
• Basis for design, selection, and implementation of all security
policies, education and training programs, and technological
controls.
• Detailed version of security framework (outline of overall
information security strategy for organization)
• Specifies tasks and the order in which they are to be
accomplished.
• Should also serve as a scalable, upgradeable, and comprehensive
plan for the current and future information security needs.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (1 of 8)
• One of the most widely referenced security models
• Standard framework for information security that states
organizational security policy is needed to provide
management direction and support
• Purpose is to give recommendations for information security
management
• Provides a starting point for developing organizational security.
• While the details of the ISO/IEC 27000 series are available
only to those who purchase the standard, its structure and
general organization are well known and are becoming
increasingly significant for all who work in information security.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (2 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (3 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (4 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (5 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (6 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (7 of 8)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
The ISO 27000 Series (8 of 8)
Source: 27001 Academy: ISO 27001 and ISO 22301 Online Consultation
Center
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
NIST Security Models
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
NIST Special Publication 800-14 (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
NIST Cybersecurity Framework (1 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
NIST Cybersecurity Framework (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Other Sources of Security Frameworks
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Design of Security Architecture (1 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Design of Security Architecture (2 of 2)
• Defense in depth
– Implementation of security in layers
– Requires that organization establish multiple layers of
security controls and safeguards
• Security perimeter
– Border of security protecting internal systems from
outside threats
– Does not protect against internal attacks from
employee threats or onsite physical threats
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Spheres of security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Defense in depth
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Security perimeters and domains
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Summary (1 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Summary (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.