PowerPoint 簡報 - paul

advertisement
Lecture 4: Standards,
Certification,
Accreditation and
Regulation
James Backhouse LSE
Developing Security
Three Key Terms
Evaluation: assessment of a product or
service against defined security evaluation
criteria/standards
Certification: the issue of a formal
statement (certificate) confirming the results
of the security evaluation
Accreditation: the procedure for accepting
a product, a service, a system for use within
a particular environment
Standards by types
Compatibility standards
- allowing products to work together
Minimum quality standards
- set a certain level of quality
Standards by objects
Product standards
- X.509, ISO/IEC 9796-2
Management standards
- ISO 17799, ISO 9000
Professional standards
- ACCA/ACA/CIMA/CIPFA
Standards by the origin
de facto standards
- developed through competitive market
process
de jure (institutional ) standards
- the force of the law, through formal
standard-setting bodies
Voluntary standards
- developed in the public forum
Impacts of standards
Enhance compatibility or interoperability
Reduced uncertainty
Reduced consumer lock-in
Competition for the market vs.
competition in the market
Competition on price vs. features
(Shapiro and Varian, 1999)
Established
Accept
Prefer
Discourage
Wait
Emerging
Proprietary
Open
(source: Lacey 2003)
Security Product Evaluation and Certification
TCSEC
Security Evaluation criteria first
developed in 1983 in USA
Trusted Computer System Evaluation
Criteria known as the Orange Book
Hierarchy of security levels ranges from
D (poorly secured)
A1 (all aspects of design, development and
implementation covered)
Europeans play catch-up
Germany (GISA) published ZSIEC
France (Service Central de la Securité des Systèmes
d’Information) produced the Blue-White Book
UK (DTI) 1991 produced the Green Book
EEC 1990 produced the harmonised White Book
ITSEC: Information Technology Security Evaluation
Criteria - June 1991・
ITSEM: Information Technology Security Evaluation
Manual - September 1993
UK ITSEC Scheme
- 1990
“The objectives of the (ITSEC) scheme are to meet
the needs of Industry and Government for cost
effective and efficient security evaluation and
certification of IT products and systems. The Scheme
also aims to provide a framework for the
international mutual recognition of certificates”
Common Criteria
Common Criteria - harmonisation of
ITSEC and US and Canadian criteria
Common Criteria EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7
ITSEC
E1
E2
E3
E4
E5
E6
To lead to an international standard
(ISO)
Harmonised Criteria
“Users of systems need confidence in the security of
the system they are using. They also need a
yardstick to compare the security capabilities of IT
products they are thinking of purchasing…”
Information Technology Security Criteria
Introduction (ITSEC) Dept of Trade and
Industry, June 1991
CLEF- Commercial Evaluation
Facilities
CLEFs provide evaluation services which
lead to certification for a range of
services or products:
access control and authentication systems
real-time and fault-tolerant systems
secure workstations
communications etc
What is a CLEF?
CLEFs perform evaluation under the UK
ITSEC Scheme
Provisional or Full
CLEFs subject to requirements and
conditions-UKSP02
BT; EDS; IBM Global Services;
LogicaCMG; SiVenture
ITSEC certification for Products
Sun Solaris 8
02/02
Sun
MicroSystems
Computer
Open
INGRES/Enhanced Associates
Security 1.2/01
Datacryptor 2000
Application
Software Version
Thales eSecurity
ITSEC certification for FIREWALLS
3Com®
Embedded
Firewall
3Com Business
Connectivity
Company
Sidewinder
Firewall
Version 5.2.1
Secure
Computing
Corporation
VCS Firewall
Version 3.0
The
Knowledge
Group
IS Security Management
Certification
ISO 27001/BS7799
Certification
ISO/IEC 27001:2005 was published on
the 15th Oct 2005.
ISO ISMS standard replaced BS 7799
Part 2:2002
Business decision, not mandatory
Recognised in many countries.
ISO 27001/BS7799 adopted
in many parts of the world as a “common
language” for information security
management: to ensure business continuity,
minimise business damage by preventing and
minimising the impact of security incidents
and to maximise business investments and
opportunities
(source: ISMS 2003)
Accrediting the accreditors
UKAS is root accrediting agency for UK
Organisations awarding accreditation
must be impartial, competent,
effectively managed
Surveillance annually
Reassessment every four years
(source: ISMS 2003)
International Register of ISMS Certificates Jan 2007
Number of Certificates per Country Jan 2006
Japan
1190*
Czech Republic
6
South Africa
2
UK
219
Brazil
5
Bahrain
1
India
146
Greece
5
Chile
1
Taiwan
74
Spain
5
Egypt
1
Germany
52
Turkey
5
Lebanon
1
Italy
41
Croatia
4
Lithuania
1
Korea
35
Iceland
4
Luxemburg
1
USA
31
Philippines
4
Macau
1
Hungary
24
Saudi Arabia
4
Macedonia
1
Netherlands
22
Argentina
3
Morocco
1
China
21
Kuwait
3
New Zealand
1
Hong Kong
20
Mexico
3
Qatar
1
Australia
18
UAE
3
Romania
1
Finland
15
Belgium
2
Russian Federation
1
Norway
13
Canada
2
Serbia and Montenegro
1
Switzerland
13
Colombia
2
Slovenia
1
Ireland
11
Denmark
2
Thailand
1
Singapore
11
France
2
Austria
9
Isle of Man
2
Poland
7
Malaysia
2
Relative Total
2082
Sweden
7
Slovak Republic
2
Absolute Total
2068*
Number of Certificates per Country Jan 2004
Japan
225
Norway
8
Iceland
3
Macau
1
UK
118
Australia
7
Brazil
2
Malaysia
1
Korea
20
Ireland
7
Denmark
2
Netherlands
1
Germany
17
Taiwan
7
Greece
2
Poland
1
India
16
Hungary
6
Mexico
2
Slovenia
1
Hong Kong
15
China
5
Switzerland
2
South Africa
1
Italy
12
USA
5
UAE
2
Spain
1
Singapore
10
Sweden
4
Argentina
1
Relative Total
517
Finland
8
Austria
3
Egypt
1
Absolute Total
513
The Absolute Total represents the actual number of certificates. The Relative Total reflects 4
certificates that represent multi-nation registrations. This table is © ISMS International User Group
2002-2004
IS Security Professional Certification
Professional Certification
Objectives:
to evaluate individual competence
to provide mechanism for maintaining the
desired level of competence
to provide management objective criteria for
personnel selection and promotion
Professional Certification
Requirements
passing a series of examinations
providing proof of at least a few years of
practical auditing experience
Certified Information Systems Auditor
(CISA)
- sponsored by Information Systems Audit and
Control Association (ISACA)
- more 26,000 members in over 100 countries
Certified Information Systems Auditor
(CISA)
Requirement:
- passed the CISA exam
- acquired the relevant information systems auditing,
control or security experience
- abide by the Code of Professional Ethics
- continued to undertake the Continuing Education
Program
Source: ISACA,2003
Certified Information Systems
Security Professional (CISSP)
- sponsored by International Information
Systems Security Certification Consortium,
Inc. (ISC²)
- well-recognised in the industry worldwide
Certified Information Systems Security
Professional (CISSP)
Requirement:
- passed the CISSP exam (up to 6 hours)
- Three years of direct experiences with a
college degree from an accredited university
or college
Certified Information Systems Security
Professional (CISSP)
Examination structure:
-
-
-
Access Control Systems & Methodology
Applications & Systems Development
Business Continuity Planning
Cryptography
Law, Investigation & Ethics
Operations Security
Physical Security
Security Architecture & Models
Security Management Practices
Telecommunications, Network & Internet Security
The Institute of Information Security
Professionals (IISP)…SKILL SET
Information Security
Concepts and Principles
Information Risk
Management
Audit, Review and
Monitoring
Information Security
Governance
Information Security
Strategy
Legal and Regulatory
Environment
Security Architecture
Security Technology
Security Engineering
Secure Development
Information Security
Management
Operations and Service
Delivery
Incident Management
Business Continuity
Management
Awareness Education and
Training
Third Party Management
Mandatory Core Skills
(IISP)
Mandatory Core Skills
(IISP)
Information Security Concepts and
Principles
Interpreting, explaining and communicating
the concepts, definitions, principles of, and
the need for, and benefits of, information
security to specialists and business clients
within their community or organisation. (Z1)
Mandatory Core Skills
(IISP)
Information Risk Management
Recognising the different forms of threat to,
and vulnerabilities of, information systems
and assets. (B01)
Assessing and managing the risks relating to
information systems and assets. (B02)
Mandatory Core Skills
(IISP)
Audit, Review and Monitoring
Leading (or contributing to) the execution of
quality assurance or otherwise
accreditation processes and techniques
used in verifying compliance against the
requirements of legislation, industry
standards and local (community or
organisational) policy regulations. (I0)
Optional Core Skills
(IISP)
Information Security Governance
Determining, establishing and maintaining
appropriate corporate governance
(including processes, roles and
responsibilities) for information security for
which the professional has formal
responsibility within their community or
organisation (A1)
Specific Skills (IISP)
Information Security Governance
Establishing frameworks to develop and maintain
appropriate expertise within an organisation (A2)
Maintaining the balance of cost against security risk
for the business. (A3)
Gaining management commitment and resources to
support the governance structure (A4)
Incorporating physical and environmental issues into
the overall security governance process. (A5)
Optional Core Skills
(IISP)
Policy and Standards
Persuading others of the need for, and selecting,
appropriate methods of delivery for security
policies, standards and guidelines, including
reference to common legislation, public standards
and local (community or organisational) policy
guidelines (G0)
Security Architecture
Recommending generally how security architecture
relates to business needs and how information
security can be realised. (E0)
Optional Core Skills
(IISP)
Security Technology
Identifying the generic types of security controls
available to prevent, detect and recover from
security incidents and thus mitigate risk. (Y0)
Security Engineering
Recommending, or selecting, generic or specific
security tools, products, standards and protocols
that can be included effectively in security
architectures. (F0)
Optional Core Skills
(IISP)
Secure Development
Recommending, or selecting, the appropriate formal measures
for technical assurance, approval and other accountable
corroborative mechanisms that confirm systems adequately
address their assessed risk profiles. (J0)
Information Security Management
Directing, or materially contributing to, project management
and other relevant issues involved in all aspects of
developing and maintaining a security programme, including
reacting appropriately to new threats and vulnerabilities as
they are identified. (C0)
Optional Core Skills
(IISP)
Incident Management
Applying security measures, in consultation with
appropriate subject experts, that comply with
principles and common practices, including the
requirements of legislation, industry standards and
local (community or organisational) policy
regulations
Optional Core Skills
(IISP)
Business Continuity Management
Establishing with others the need for, and directing
(or contributing substantially to) the processes for
establishing business continuity for information
assets. (D0)
Legal and Regulatory Environment
Understanding of the general principles of law, legal
jurisdiction and associated topics that may affect
information security governance and execution.
(V0)
Optional Core Skills
(IISP)
Third Party Management
Providing guidance on, or participating in effective
agreements for, addressing security requirements
for information assets managed wholly or partially
by third parties - including managed services,
development or procurement projects and
information assets shared with, or managed by,
business partners, clients and contractors. (W0)
Specific Skills
(IISP)
Policy and Standards
Interpreting external requirements and standards in terms of
an organisation (G1)
Developing appropriate organisational security policies,
standards and procedures (G2)
Providing advice on the interpretation of policy (G3)
Managing implementation of security programmes, and
coordinating security activities across the organisation (G4)
ET CETERA
(Mercuri,2003)
Regulations and legislation towards
trust services provision for ecommerce
Three legal approaches
UNCITRAL Model Law on Electronic Commerce
Legislation approaches towards authentication
technologies
Technology prescriptive
Technology neutral
Two-tier
Jurisdiction
Argentina
Australia
Austria
Belgium
Brazil
Canada
Chile
China
Czech Republic
Demark
EU
Finland
France
Germany
Greece
Hong Kong
Hungary
India
Ireland
Israel
Italy
Name of Legislation
Digital Signature Law 2001
Electronic Transaction Act 1999
Electronic Signature Ordinance 2000
Bill on Certification Authorities and Qualified Certificates
Provisional Executive Act 2200
Personal Information Protection and Electronic Documents Act
2000
Electronic Signature Act 2005
Electronic Signature Act 2000
Electronic Signature Act 2000
Directive 1999/93/EC
Draft
Electronic Signature Act 2000
Digital Signature Law 1997
Presidential Act 2001
Electronic Transactions Ordinance 2000
Digital Signature Act 2001
Information Technology Act 2000
Electronic Commerce Act 2000
Electronic Signature Act 2001
Digital Document Regulations 1997
Japan
Korea
Luxembourg
Malaysia
New Zealand
Norway
Poland
Singapore
South Korea
Spain
Sweden
Switzerland
Taiwan
Thailand
The Netherlands
U.K.
United States
Law Concerning Electronic Signatures and Certification Services
2001
Electronic Signature Act 1999
Electronic Commerce Act 2000
Digital Signature 1997
Electronic Transaction Bill 2001
Electronic Signature Act 2001
Drafting
Electionic Transaction Act 1998; Electronic Transaction (CA)
Regulations 1999
Electronic Signature Act 2001
Royal Decree on Digital Signatures 1999
Act on Qualified Electronic Signature 2000
Electronic Signature Act 2001
Electronic Transaction and Electronic Signature Bill 2000
Electronic Signature Act (draft) 2001
Electronic Communication Act 2000
Uniform Electronic Transaction Act
Download