IT Governance IT Governance Information Security Governance Acknowledgments Material is sourced from: CISA® Review Manual 2011, © 2010, ISACA. All rights reserved. Used by permission. CISM® Review Manual 2012, © 2011, ISACA. All rights reserved. Used by permission. Author: Susan J Lincke, PhD Univ. of Wisconsin-Parkside Reviewers/Contributors: Todd Burri, Kahili Cheng Funded by National Science Foundation (NSF) Course, Curriculum and Laboratory Improvement (CCLI) grant 0837574: Information Security: Audit, Case Study, and Service Learning. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and/or source(s) and do not necessarily reflect the views of the National Science Foundation. Objectives Students should be able to: Describe IT governance committees: IT strategic committee, IT steering committee, security steering committee** Describe mission, strategic plan, tactical plan, operational plan Define quality terms: quality assurance, quality control Describe security organization members: CISO, CIO, CSO, Board of Directors, Executive Management, Security Architect, Security Administrator Define policy, compliance, IT Balanced Scorecard, measure, ISO 9001, enterprise architecture Define sourcing practices: insource, outsource, hybrid, onsite, offshore Define policy documents: data classification, acceptable usage policy, access control polices Corporate Governance Corporate Governance: Leadership by corporate directors in creating and presenting value for all stakeholders IT Governance: Ensure the alignment of IT with enterprise objectives Responsibility of the board of directors and executive mgmt IT Governance Objectives IT delivers value to the business IT risk is managed Processes include: Equip IS functionality and address risk Measure performance of delivering value to the business Comply with legal and regulatory requirements IT Governance Committees Board members & specialists IT Strategic Committee Focuses on Direction and Strategy Advises board on IT strategy and alignment Optimization of IT costs and risk Business executives (IT users), CIO, key advisors (IT, legal, audit, finance) IT Steering Committee Focuses on Implementation Monitors current projects Decides IT spending IT Strategy Committee Main Concerns Alignment of IT with Business Contribution of IT to the Business Exposure & containment of IT Risk Optimization of IT costs Achievement of strategic IT objectives IT Steering Committee Main Concerns Make decision of IT being centralized vs. decentralized, and assignment of responsibility Makes recommendations for strategic plans Approves IT architecture Reviews and approves IT plans, budgets, priorities & milestones Monitors major project plans and delivery performance Strategic Planning Process Strategic: Long-term (3-5 year) direction considers organizational goals, regulation (and for IT: technical advances) Tactical: 1-year plan moves organization to strategic goal Operational: Detailed or technical plans Strategic Tactical Operational Security Strategic Planning Risk Mgmt – Laws Governance – Policy Organizational Security Data classification Audit – Risk analysis Business continuity Metrics development Incident response Physical security Network security Policy compliance Metrics use Strategic Tactical Operational Strategic Planning Strategy: Achieve COBIT Level 4 Tactical: During next 12 months: Each business unit must identify current applications in use 25% of all stored data must be reviewed to identify critical resources Business units must achieve regulatory compliance A comprehensive risk assessment must be performed for each business unit All users must undergo general security training Standards must exist for all policies Standard IT Balanced Scorecard Establish a mechanism for reporting IT strategic aims and progress to the board Mission Strategies Measures Mission = Direction E.g.: Serve business efficiently and effectively Strategies = Objectives E.g.: Quality thru Availability Process Maturity Measures = Statistics E.g.: Customer satisfaction Operational efficiency IT Balanced Scorecard Financial Goals How should we appear to stockholder? Vision: Metrics: Performance: Internal Business Process What business processes should we excel at? Vision: Metrics: Performance: Customer Goals How should we appear to our customer? Vision: Metrics: Performance: Learning and Growth Goals How will we improve internally? Vision: Metrics: Performance: Case Study: IT Governance Strategic Plan – Tactical Plan Strategic Plan Objective Incorporate the business Pass a professional audit Time frame 5 yrs 4 yrs Tactical Plan: Objective Perform strategiclevel security, includes: Time frame 1 yr Perform risk analysis 6 mos. Perform BIA 1 yr Define policies 1 yr Case Study: IT Governance Operational Planning Objective and Timeframe Hire an internal auditor and security professional 2 months: March 1 Establish security team of business, IT, personnel: 1 month: Feb. 1 Team initiates risk analysis and prepares initial report 3 months: April 1 Responsibility VP Finance VP Finance & Chief Info. Officer (CIO) CIO & Security Team Enterprise Architecture Constructing IT is similar to constructing a building It must be designed and implemented at various levels: Technical (Hardware, Software) IT Procedures & Operations Business Procedures & Operations Data Functional Network (Applic.) Scope Enterprise Model Systems Model Tech Model Detailed Representation (Tech) People (Org.) Process (Flow) Strategy Sourcing Practices Insourced: Performed entirely by the organization’s staff Outsourced: Performed entirely by a vendor’s staff Hybrid: Partial insourced and outsourced Onsite: Performed at IS dept site Offsite or Nearshore: Performed in same geographical area Offshore: Performed in a different geographical region What advantages can you think of for insourcing versus outsourcing? Quality with ISO 9001 ISO 9001: Standard for Quality Mgmt Systems. Recommendations include: Quality Manual: Documented procedures HR: Documented standards for personnel hiring, training, evaluation,… Purchasing: Documented standards for vendors: equipment & services Gap Analysis: The difference between where you are and where you want to be Quality Definitions Quality Assurance: Ensures that staff are following defined quality processes: e.g., following standards in design, coding, testing, configuration management Quality Control: Conducts tests to validate that software is free from defects and meets user expectations Performance Optimization Phases of Performance Measurement include: Establish and update performance metrics Establish accountability for performance measures Gather and analyze performance data Report and use performance results Note: Strategic direction for how to achieve performance improvements is necessary Categories of Performance Measures Performance Measurement: What are indicators of good IT performance? IT Control Profile: How can we measure the effectiveness of our controls? Risk Awareness: What are the risks of not achieving our objectives? Benchmarking: How do we perform relative to others and standards? IS Auditor & IT Governance Is IS function aligned with organization’s mission, vision, values, objectives and strategies? Does IS achieve performance objectives established by the business? Does IS comply with legal, fiduciary, environmental, privacy, security, and quality requirements? Are IS risks managed efficiently and effectively? Are IS controls effective and efficient? Audit: Recognizing Problems End-user complaints Excessive costs or budget overruns Late projects Poor motivation - high staff turnover High volume of H/W or S/W defects Inexperienced staff – lack of training Unsupported or unauthorized H/W S/W purchases Numerous aborted or suspended development projects Reliance on one or two key personnel Poor computer response time Extensive exception reports, many not tracked to completion Audit: Review Documentation IT Strategies, Plans, Budgets Security Policy Documentation Organization charts & Job Descriptions Steering Committee Reports System Development and Program Change Procedures Operations Procedures HR Manuals QA Procedures Contract Standards and Commitments Bidding, selection, acceptance, maintenance, compliance Question 1. 2. 3. 4. The MOST important function of the IT department is: Cost effective implementation of IS functions Alignment with business objectives 24/7 Availability Process improvement Question 1. 2. 3. 4. Product testing is most closely associated with which department: Audit Quality Assurance Quality Control Compliance Question 1. 2. 3. 4. “Implement virtual private network in the next year” is a goal at the level: Strategic Operational Tactical Mission Question Which of the following is not a valid purpose of the IS Audit? 1. Ensure IS strategic plan matches the intent of the enterprise strategic plan 2. Ensure that IS has developed documented processes for software acquisition and/or development (depending on IS functions) 3. Verify that contracts followed a documented process that ensures no conflicts of interest 4. Investigate program code for backdoors, logic bombs, or Trojan horses Question Documentation that would not be viewed by the IT Strategy Committee would be: 1. IT Project Plans 2. Risk Analysis & Business Impact Analysis 3. IT Balanced Scorecard 4. IT Policies Information Security Governance Governance Policy Risk Information Security Importance Organizations are dependent upon and are driven by information Software = information on how to process Data, graphics retained in files Information & computer crime has escalated Therefore information security must be addressed and supported at highest levels of the organization Security Organization Review Risk assessment & Business Impact Analysis Define penalties for non-compliance of policies Board of Directors Defines security objectives and institutes security organization Executive Mgmt Senior representatives of business functions ensures alignment of security program Security with business Steering objectives Committee Other positions: Chief Risk Officer (CRO) Chief Compliance Officer (CCO) Chief Info Security Officer (CISO) Security Governance Strategic Alignment: Security solution consistent with organization goals and culture Risk Management: Understand threats and costeffectively control risk Value Delivery: Prioritized and delivered for greatest business benefit Performance Measurement: Metrics, independent assurance Resource Management: Security architecture development & documentation Process Integration: Security is integrated into a wellfunctioning organization Executive Mgmt Info Security Concerns Reduce civil and legal liability related to privacy Provide policy and standards leadership Control risk to acceptable levels Optimize limited security resources Base decisions on accurate information Allocate responsibility for safeguarding information Increase trust and improve reputation outside organization Legal Issues International trade, employment may be liable to different regulations than exist in the U.S. affecting: Hiring Internet business Trans-border data flows Cryptography Copyright, patents, trade secrets Industry may be liable under legislation: SOX: Sarbanes-Oxley: Publicly traded corp. FISMA: Federal Info Security Mgmt Act HIPAA: Health Insurance Portability and Accountability Act GLBA: Gramm-LeachBliley: Financial privacy Etc. Road Map for Security (New Program) Documentation Security Issues Security Policies Training materials Interview stakeholders (HR, legal, finance) to determine org. issues & concerns Develop security policies for approval to Mgmt Conduct security training & test for compliance Improve standards Develop compliance monitoring strategy Info Security Steering Committee Security Relationships Exec. Mgmt Security requirements Access control Security requirements in RFP Contract requirements S /W Dev. Purchasing Security Strategy, Risk, & Alignment Human Res. Hiring, training, roles & responsibility, Incident handling BusiSecurity requirements ness sign-off, Mgmt CISO Acceptance test, Access authorization Security requirements and review Change control Security upgrade/test Quality Control IT Operations Legal Dept Laws & Regulations Security monitoring, Incident resp., Site inventory, Crisis management Security Governance Framework Security Strategy Security Organization Security Framework Compliance Monitoring Policies, Standards, Procedures Secure Strategy: Risk Assessment Five Steps include: 1. Assign Values to Assets: 2. Determine Loss due to Threats & Vulnerabilities 3. Weekly, monthly, 1 year, 10 years? Compute Expected Loss 5. Confidentiality, Integrity, Availability Loss = Downtime + Recovery + Liability + Replacement Estimate Likelihood of Exploitation 4. Where are the Crown Jewels? Risk Exposure = ProbabilityOfVulnerability * $Loss Treat Risk Survey & Select New Controls Reduce, Transfer, Avoid or Accept Risk Example Policy Documents Data Classification: Defines data security categories, ownership and accountability Acceptable Usage Policy: Describes permissible usage of IT equipment/resources End-User Computing Policy: Defines usage and parameters of desktop tools Access Control Policies: Defines how access permission is defined and allocated After policy documents are created, they must be officially reviewed, updated, disseminated, and tested for compliance Compliance Function Compliance: Ensures compliance with organizational policies E.g.: Listen to selected help desk calls to verify proper authorization occurs when resetting passwords Best if compliance tests are automated Compliance: ongoing process Ensures adherence to policies Time Audit: Snapshot of compliance in time Compliance Program – Security Review or Audit Test Objective: Is our web-interface to DB safe? Scope: Penetration test on DB Constraints: Must test between 1-4 AM Approach: 1. Tester has valid session credentials 2. Specific records allocated for test 3. Test: SQL Injection Result: These problems were found: … Security Positions Security Architect Design secure network topologies, access control, security policies & standards. Evaluate security technologies Work with compliance, risk mgmt, audit Security Administrator Allocate access to data under data owner Prepare security awareness program Test security architecture Monitor security violations and take corrective action Review and evaluate security policy Security Architect: Control Analysis Do controls fail secure or fail open? Is restrictive or permissive policy (denied unless expressly permitted or vice versa?) Does control align with policy & business expectation? Policy Where are controls located? Are controls layered? Is control redundancy needed? Placement Does control protect ImplemenEfficiency broadly or one application? Have controls been tested? tation If control fails, is there a Are controls self-protecting? control remaining? Do controls meet control Effectiveness (single point of failure) objectives? If control fails, does appl. fail? Will controls alert security Are controls reliable? personnel if they fail? Do they inhibit productivity? Are control activities logged Are they automated or manual? and reviewed? Are key controls monitored in real-time? Are controls easily circumvented? Control Practices These may be useful in particular conditions: Automate Controls: Make technically infeasible to bypass Access Control: Users should be identified, authenticated and authorized before accessing resources Secure Failure: If compromise possible, stop processing Compartmentalize to Minimize Damage: Access control required per system resource set Transparency: Communicate so that average layperson understands control->understanding & support Trust: Verify communicating partner through trusted 3rd party (e.g., PKI) Trust No One: Oversight controls (e.g., CCTV) Segregation of Duties: Require collusion to defraud the organization Principle of Least Privilege: Minimize system privileges Security Administrator: Security Operations Identity Mgmt & Access control System patching & configuration mgmt Change control & release mgmt Security metrics collection & reporting Control technology maintenance Incident response, investigation, and resolution Summary of Security Mgmt Functions Develop security strategy Linked with business objectives Regulatory & legal issues are addressed Sr Mgmt acceptance & support Complete set of policies Standards & Procedures for all relevant policies Security awareness for all users and security training as needed Classified information assets by criticality and sensitivity Summary of Security Mgmt Functions Effective compliance & enforcement processes Metrics are maintained and disseminated Monitoring of compliance & controls Utilization of security resources is effective Noncompliance is resolved in a timely manner Effective risk mgmt and business impact assessment Risks are assessed, communicated, and managed Controls are designed, implemented, maintained, tested Incident and emergency response processes are tested Business Continuity & Disaster Recover Plans are tested Summary of Security Mgmt Functions Develop security strategy, oversee security program, liaise with business process owners for ongoing alignment Clear assignment of roles & responsibilities Security participation with Change Management Address security issues with 3rd party service providers Liaise with other assurance providers to eliminate gaps and overlaps Question Who can contribute the MOST to determining the priorities and risk impacts to the organization’s information resources? 1. Chief Risk Officer 2. Business Process Owners 3. Security Manager 4. Auditor Question 1. 2. 3. 4. A document that describes how access permission is defined and allocated is the: Data Classification Acceptable Usage Policy End-User Computing Policy Access Control Policies Question 1. 2. 3. 4. The role of the Information Security Manager in relation to the security strategy is: Primary author with business input Communicator to other departments Reviewer Approves the strategy Question 1. 2. 3. 4. The role most likely to test a control is the: Security Administrator Security Architect Quality Control Analyst Security Steering Committee Question 1. 2. 3. 4. The Role responsible for defining security objectives and instituting a security organization is the: Chief Security Officer Executive Management Board of Directors Chief Information Security Officer Question When implementing a control, the PRIMARY guide to implementation adheres to: 1. Organizational Policy 2. Security frameworks such as COBIT, NIST, ISO/IEC 3. Prevention, Detection, Correction 4. A layered defense Question 1. 2. 3. 4. The persons on the Security Steering Committee who can contribute the BEST information relating to insuring Information Security success is: Chief Information Security Officer Business process owners Executive Management Chief Information Officer Reference Slide # Slide Title Source of Information 4 Corporate Governance CISA: page 87, 88 6 IT Governance Committees CISA: page 90 7 IT Strategy Committee CISA: page 90 12 Standard IT Balance Scorecard CISA: page 91 16 Enterprise Architecture CISA: page 94, 95 Exhibit 2.5 17 Sourcing Practices CISA: page 106 18 Quality with ISO 9001 CISA: page 112 19 Quality Definitions CISA: page 116 20 Performance Optimization CISA: page 113, 114 21 Categories of Performance Measures CISA: page 114 32 Security Organization CISA: page 94, 95 Exhibit 2.4 33 Security Governance CISA: page 92, 93 39 Secure Strategy: Risk Assessment CISM: page 100 40 Example Policy Documents CISA: page 100 43 Security Positions CISA: page 116, 117