0% found this document useful (0 votes)
15 views23 pages

CH 15

Uploaded by

khannashriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views23 pages

CH 15

Uploaded by

khannashriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 23

Computer Security: Principles and

Practice

Chapter 15 – IT Security Controls,


Plans and Procedures
First Edition
by William Stallings and Lawrie Brown
Lecture slides by Lawrie Brown

1
Implementing IT
Security
Management

2
Selecting Controls or Safeguards

• controls or safeguards are


– practices, procedures or mechanisms which may
protect against a threat, reduce a vulnerability, limit
the impact of an unwanted incident, detect
unwanted incidents and facilitate recover
• classes of controls:
– Management: focus on policies, planning
– Operational: address (correct) implementation
– Technical: correct uses of SW and hardware

3
Technical Controls
Supportive: generic,
underlying technical
IT capabilities

Preventative: focus on
preventing security breaches
by warning of violations

Detection/recovery: focus
on response to a security
breach

4
Lists of Controls (NIST, ISO; choose a combination)
CLASS CONTROL FAMILY
Management Risk Assessment
Management Planning
Management System and Services Acquisition
Management Certification, Accreditation, and Security Assessments
Operational Personnel Security
Operational Physical and Environmental Protection
Operational Contingency Planning
Operational Configuration Management
Operational Maintenance
Operational System and Information Integrity
Operational Media Protection
Operational Incident Response
Operational Awareness and Training
Technical Identification and Authentication
Technical Access Control
Technical Audit and Accountability
Technical System and Communications Protection

5
Residual Risk

After implementing a new control: reduction in threat

6
Cost-Benefit Analysis Is cost of implementing a control
justifiable by the reduction in level of risk to an asset?
• Fundamentally a business decision
• Conduct to determine appropriate controls
– greatest benefit given resources available
• Reduces risk more than needed? Choose a less
expensive control
• Costs more than the risk reduction provided?
Choose an alternative
• Does not risk sufficiently? More control is needed
• Provides sufficient reduction and is cost
effective? Use it

7
IT Security Plan
• provides details of
– what will be done
– what resources are needed
– who is responsible
• should include
– risks, recommended controls, action priority
– selected controls, resources needed
– responsible personnel, implementation dates

8
Implementation Plan

Risk Level Recommended Prio Selected Required Responsible Start Other


(Asset/Threat) of Controls rity Controls Resources Persons – End Comments
Risk Date
Hacker attack High 1. disable external 1 1. 1. 3 days IT John Doe, 1-Feb- 1. need
on Internet telnet access 2. net admin Lead Network 2006 periodic test
Router 2. use detailed 3. time to Sys Admin, to 4- & review of
auditing of privileged 4. change & Corporate IT Feb- config &
command use 5. verify router Support Team 2006 policy use
3. set policy for strong config,
admin passwords write
4. set backup strategy policies;
for router config file 2. 1 day of
5. set change control training for
policy for the router net admin
configuration staff

9
Security Plan Implementation

• plan documents what is required


• identified personnel perform needed tasks
– to implement new or enhanced controls
– may need upgrades or new system installation
– or development of new/extended procedures
– need support from management
• monitored to ensure process correct
• when completed management approves

10
Security Training / Awareness

• responsible personnel need training


– on details of design and implementation
• need general awareness workshop for all
– spanning all levels in organization
– essential to meet security objectives
– lack of training leads to poor practices reducing
security

11
Security Awareness Issues to address

• organization’s security objectives, strategies,


policies
• need for security, general risks to organization
• understanding why security controls are used
• roles and responsibilities for various personnel
• the need to act in accordance with policy and
procedures, consequences of unauthorized
actions
• the need to report any security breaches
observed and to assist with their investigation

12
Maintenance of Implemented Controls

• need continued maintenance and monitoring


– to ensure continued correct functioning and
appropriateness
• tasks include:
– periodic review of controls
– upgrade of controls to meet new requirements
– check system changes do not impact controls
– address new threats or vulnerabilities
• goal to ensure controls perform as intended

14
Security Compliance (Audit/Verify)
• audit process to review security processes
• to verify compliance with security plan
• using internal or external personnel
• usually based on checklists to check
– suitable policies and plans were created
– suitable selection of controls were chosen
– that they are maintained and used correctly
• often as part of wider general audit

15
Change and Configuration
Management
• change management is the process to review
proposed changes to systems
– evaluate security and wider impact of changes
– part of general systems administration process
– cf. management of bug patch testing and install
– may be informal or formal
• configuration management is keeping track of
configuration and changes to each system
– to help restoring systems following a failure
– to know what patches or upgrades might be relevant
– also part of general systems administration process

16
Incident Handling: Essential Control
• need procedures specifying how to respond to a
security incident
– given it will most likely occur sometime
• codify action to avoid panic
• e.g. mass email worm
– exploiting vulnerabilities in common apps
– propagating via email in high volumes
– should disconnect from Internet or not?
• responsible individual should make a decision (the policy
should indicate how to contact the individual)

17
Types of Security Incidents
• any action threatening classic security services
• unauthorized access to a system
– unauthorized viewing by self/other of information
– bypassing access controls
– using another user’s access
– denying access to another user
• unauthorized modification of info on a system
– corrupting information
– changing information without authorization
– unauthorized processing of information

18
Managing Security Incidents

19
Detecting Incidents
• reports from users or admin staff
– train and encourage such reporting
• detected by automated tools
– e.g. system integrity verification tools, log analysis
tools, network and host intrusion detection systems,
intrusion prevention systems
– updated to reflect new attacks or vulnerabilities
• admins must monitor vulnerability reports

20
Responding to Incidents

• need documented response procedures


• procedures should
– identify typical categories of incidents and approach
taken to respond
– identify management personnel responsible for
making critical decisions and their contacts
– whether to report incident to police/CERT etc

21
Documenting Incidents
• need to identify vulnerability used
– how to prevent it occurring in future
• recorded details for future reference
• consider impact on org and risk profile
– may simply be unlucky
– more likely risk profile has changed
– hence risk assessment needs reviewing
– followed by reviewing controls in use

22
Sample Implementation Plan
Risk (Asset/Threat) Level of Recommended Controls
for Silver Star Mines
Priority Selected
Risk Controls
All risks (generally 1. configuration and periodic 1 1.
applicable) maintenance policy for servers 2.
2. malicious code / SPAM / spyware 3.
prevention 4.
3. audit monitoring, analysis, 5.
reduction and reporting on servers
4. contingency planning and incident
response policies and procedures
5. system backup and recovery
procedures
Reliability and integrity of High 1. intrusion detection & response 2 1.
SCADA nodes and network system

Integrity of stored file Extreme 1. audit of critical documents 3 1.


and database information 2. document creation & storage policy 2.
3. user security education and training 3.
Availability & integrity of High - - (general
Financial, Procurement, controls)
& Maintenance/
Production Systems
Availability, integrity and High 1. contingency planning – backup 4 1.
confidentiality of email email service

24
Summary
• security controls or safeguards
– management, operational, technical
– supportive, preventative, detection / recovery
• IT security plan
• implementation of controls
– implement plan, training and awareness
• implementation followup
– maintenance, compliance, change / config
management, incident handling

25

You might also like