CH 15
CH 15
Practice
1
Implementing IT
Security
Management
2
Selecting Controls or Safeguards
3
Technical Controls
Supportive: generic,
underlying technical
IT capabilities
Preventative: focus on
preventing security breaches
by warning of violations
Detection/recovery: focus
on response to a security
breach
4
Lists of Controls (NIST, ISO; choose a combination)
CLASS CONTROL FAMILY
Management Risk Assessment
Management Planning
Management System and Services Acquisition
Management Certification, Accreditation, and Security Assessments
Operational Personnel Security
Operational Physical and Environmental Protection
Operational Contingency Planning
Operational Configuration Management
Operational Maintenance
Operational System and Information Integrity
Operational Media Protection
Operational Incident Response
Operational Awareness and Training
Technical Identification and Authentication
Technical Access Control
Technical Audit and Accountability
Technical System and Communications Protection
5
Residual Risk
6
Cost-Benefit Analysis Is cost of implementing a control
justifiable by the reduction in level of risk to an asset?
• Fundamentally a business decision
• Conduct to determine appropriate controls
– greatest benefit given resources available
• Reduces risk more than needed? Choose a less
expensive control
• Costs more than the risk reduction provided?
Choose an alternative
• Does not risk sufficiently? More control is needed
• Provides sufficient reduction and is cost
effective? Use it
7
IT Security Plan
• provides details of
– what will be done
– what resources are needed
– who is responsible
• should include
– risks, recommended controls, action priority
– selected controls, resources needed
– responsible personnel, implementation dates
8
Implementation Plan
9
Security Plan Implementation
10
Security Training / Awareness
11
Security Awareness Issues to address
12
Maintenance of Implemented Controls
14
Security Compliance (Audit/Verify)
• audit process to review security processes
• to verify compliance with security plan
• using internal or external personnel
• usually based on checklists to check
– suitable policies and plans were created
– suitable selection of controls were chosen
– that they are maintained and used correctly
• often as part of wider general audit
15
Change and Configuration
Management
• change management is the process to review
proposed changes to systems
– evaluate security and wider impact of changes
– part of general systems administration process
– cf. management of bug patch testing and install
– may be informal or formal
• configuration management is keeping track of
configuration and changes to each system
– to help restoring systems following a failure
– to know what patches or upgrades might be relevant
– also part of general systems administration process
16
Incident Handling: Essential Control
• need procedures specifying how to respond to a
security incident
– given it will most likely occur sometime
• codify action to avoid panic
• e.g. mass email worm
– exploiting vulnerabilities in common apps
– propagating via email in high volumes
– should disconnect from Internet or not?
• responsible individual should make a decision (the policy
should indicate how to contact the individual)
17
Types of Security Incidents
• any action threatening classic security services
• unauthorized access to a system
– unauthorized viewing by self/other of information
– bypassing access controls
– using another user’s access
– denying access to another user
• unauthorized modification of info on a system
– corrupting information
– changing information without authorization
– unauthorized processing of information
18
Managing Security Incidents
19
Detecting Incidents
• reports from users or admin staff
– train and encourage such reporting
• detected by automated tools
– e.g. system integrity verification tools, log analysis
tools, network and host intrusion detection systems,
intrusion prevention systems
– updated to reflect new attacks or vulnerabilities
• admins must monitor vulnerability reports
20
Responding to Incidents
21
Documenting Incidents
• need to identify vulnerability used
– how to prevent it occurring in future
• recorded details for future reference
• consider impact on org and risk profile
– may simply be unlucky
– more likely risk profile has changed
– hence risk assessment needs reviewing
– followed by reviewing controls in use
22
Sample Implementation Plan
Risk (Asset/Threat) Level of Recommended Controls
for Silver Star Mines
Priority Selected
Risk Controls
All risks (generally 1. configuration and periodic 1 1.
applicable) maintenance policy for servers 2.
2. malicious code / SPAM / spyware 3.
prevention 4.
3. audit monitoring, analysis, 5.
reduction and reporting on servers
4. contingency planning and incident
response policies and procedures
5. system backup and recovery
procedures
Reliability and integrity of High 1. intrusion detection & response 2 1.
SCADA nodes and network system
24
Summary
• security controls or safeguards
– management, operational, technical
– supportive, preventative, detection / recovery
• IT security plan
• implementation of controls
– implement plan, training and awareness
• implementation followup
– maintenance, compliance, change / config
management, incident handling
25