Document 13214134

advertisement
National Cybersecurity
Management System
Framework – Maturity Model
RACI Chart – Impementation Guide
Taieb DEBBAGH
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
2
Agenda
1 - Introduction
2 - National Cybersecurity Management System
3 - NCSec Framework : 5 Domains
4 – NCSec Framework : 34 processes
5 - Maturity Model
6 – NCSec Assessment
7 - Roles & Responsibilities (RACI Chart)
8 - Implementation Guide
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
3
1 - Introduction (1/2)
Increasing computer security challenges in the world;
No appropriate organizational and institutional structures to
deal with these issues;
Which entity(s) should be given the responsibility for
computer security?
Despite there are best practices that organizations can refer to
evaluate their security status;
•
•
•
•
But, there is lack of international standards (clear guidance)
with which a State or region can measure its current security
status.
•
4
1 - Introduction (2/2)
The main objective of this presentation is to propose a Model of
National Cybersecurity Management System (NCSecMS), which
is a global framework that best responds to the needs expressed
by the ITU Global Cybersecurity Agenda (GCA).
This global framework consists of 4 main components:
• NCSec Framework;
• Maturity Model;
• Roles and Responsibilities chart;
• Implementation Guide.
5
2 – NCSec Management System
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
6
3 - NCSec Framework : 5 Domains
7
4 - NCSec Framework (5 Domains and 34 Processes)
1 - SP : Strategy and Policies
SP1
3 - AC : Awareness and Communication
NCSec Strategy : Promulgate & endorse a National Cybersecurity Strategy
Lead Institutions : Identify a lead institutions for developing a national strategy, and 1 lead institution
SP2
per stakeholder category
AC1
Leaders in the Government : Persuade national leaders in the government of the need for national
action to address threats to and vulnerabilities of the NCSec through policy-level discussions
AC2
National Cybersecurity and Capacity : Manage National Cybersecurity and capacity at the national
level
SP3
NCSec Policies : Identify or define policies of the NCSec strategy
AC3
Continuous Service : Ensure continuous service within each stakeholder and among stakeholders
SP4
Critical Information Infrastructures Protection : Establish & integrate risk management for identifying &
prioritizing protective efforts regarding CII
AC4
National Awareness : Promote a comprehensive national awareness program so that all
participants—businesses, the general workforce, and the general population—secure their own parts
of cyberspace
SP5
Stakeholders : Identify the degree of readiness of each stakeholder regarding to the implementation of
NCSec strategy & how stakeholders pursue the NCSec strategy & policies
AC5
Awareness Programs : Implement security awareness programs and initiatives for users of systems
and networks
2 - IO : Implementation and Organisation
AC6
IO1
NCSec Council : Define National Cybersecurity Council for coordination between all stakeholders, to
approve the NCSec strategy
AC7
IO2
NCSec Authority : Define Specific high level Authority for coordination among cybersecurity stakeholders
AC8
National CERT : Identify or establish a national CERT to prepare for, detect, respond to, and recover
from national cyber incidents
Privacy and Personnal Data Protection : Review existing privacy regime and update it to the on-line
environment
IO3
IO4
Citizens and Child Protection : Support outreach to civil society with special attention to the needs of
children and individual users
Research and Development : Enhance Research and Development (R&D) activities (through the
identification of opportunities and allocation of funds)
CSec Culture for Business : Encourage the development of a culture of security in business
enterprises
AC9
Available Solutions : Develop awareness of cyber risks and available solutions
AC10
NCSec Communication : Ensure National Cybersecurity Communication
IO5
Laws : Ensure that a lawful framework is settled and regularly levelled
IO6
Institutions : Identify institutions with cybersecurity responsibilities, and procure resources that enable
NCSec implementation
CC1
International Compliance & Cooperation : Ensure regulatory compliance with regional and
international recommendations, standards …
4 - CC : Compliance and Communication
IO7
National Experts and Policymakers : Identify the appropriate experts and policymakers within
government, private sector and university
CC2
National Cooperation : Identify and establish mechanisms and arrangements for cooperation among
government, private sector entities, university and ONGs at the national level
IO8
Training : Identify training requirements and how to achieve them
CC3
IO9
Government : Implement a cybersecurity plan for government-operated systems, that takes into
account changes management
CC4
IO10
International Expertise : Identify international expert counterparts and foster international efforts to
address cybersecurity issues, including information sharing and assistance efforts
CC5
Private sector Cooperation : Encourage cooperation among groups from interdependent industries
(through the identification of common threats) .
Incidents Handling : Manage incidents through national CERT to detect, respond to, and recover
from national cyber incidents, through cooperative arrangement (especially between government
and private sector)
Points of Contact : Establish points of contact (or CSIRT) within government, industry and university
to facilitate consultation, cooperation and information exchange with national CERT, in order to
monitor and evaluate NCSec performance in each sector
5 - EM : Evaluation and Monitoring
EM1
NCSec Observatory : Set up the NCSec observatory
EM3
NCSec Assessment : Assess and periodically reassess the current state of cybersecurity efforts and
develop program priorities
EM2
Mechanisms for Evaluation : Define mechanisms that can be used to coordinate the activities of the
lead institution, the government, the private sector and civil society, in order to monitor and evaluate
the global NCSec performance
EM4
NCSec Governance : Provide National Cybersecurity Governance
8
ACM Publication – December 2008
5 - NCSec Maturity Model
PS
Mor
SP1
3
Promulgate &
endorse a National
Cybersecurity
Strategy
Recognition of the
need for a
National strategy
NCSec is
announced &
planned.
NCSec is
operational for all
key activities
NCSec is under
regular review
NCSec is under
continuous
improvement
SP2
1
Identify a lead
institution for
developing a national
strategy, and 1 lead
institution per
stakeholder category
Some institutions
have an
individual cybersecurity strategy
Lead institutions
are announced
for all key
activities
Lead institutions
are operational
for all key
activities
Lead institutions
are under regular
review
Lead institutions
are under
continuous
improvement
SP3
2
Identify or define
policies of the
NCSec strategy
Ad-hoc & Isolated
approaches to
policies & practices
Similar &
common
processes
announced &
planned
Policies and
procedures are
defined,
documented,
operational
National best
practices are
applied
&repeatable
Integrated
policies &
procedures
Transnational
best practice
SP4
1
Establish & integrate
Risk management
process for
Identifying &
prioritizing
protective efforts
regarding NCSec
(CIIP)
Recognition of the
need for risk
management
process in CIIP
CIIP are
identified &
planned. Risk
management
process is
announced
Risk management
process is
approved &
operational for all
CIIP
CIIP risk
management
process is
complete,
repeatable, and
lead to CI best
practices
CIIP risk
management
process evolves
to automated
workflow &
integrated to
enable
improvement
Process
Description
Level 1
Level 2
Level 3
Level 4
Level 5
10
Example : SP1 Maturity Model
•
the first process SP1 consists in “Promulgating and endorsing
a National Cybersecurity Strategy”.
•
Process SP1 is in conformance with level 5 if the following
conditions are respected:
1.
2.
3.
4.
5.
11
Recognition of the need for National Cybersecurity Strategy
the NCSec strategy is “announced and planned”
the NCSec strategy is “operational”
the NCSec strategy is under a “regular review”
the NCSec strategy is under “continuous improvement”
ce
6 - NCSec Assessment
SP1
5
EM4
SP4
4
Legend:
3
2
1
CC2
IO2
0
CC1
IO3
AC5
SP1: National Cybersecurity Strategy
SP4: CIIP
IO2: National Cybersecurity Authority
IO3: National-CERT
IO5: Cyber Law
AC5: Awareness Programme
CC1: International Cooperation
CC2: National Coordination
EM4: Cybersecurity Governance
IO5
12
7 - RACI Chart / Stakeholders
SP1
NCSec Strategy
Promulgate & endorse a
National Cybersecurity
Strategy
I
A
C
C
R
C
C
C
I
SP2
Lead Institutions
Identify a lead institutions
for developing a national
strategy, and 1 lead
institution per stakeholder
category
I
I
A
C
R
C
C
I
SP3
NCSec Policies
Identify or define policies
of the NCSec strategy
A
C
R
C
I
C
SP4
Critical Infrastructures
Establish & integrate risk
management for
identifying & prioritizing
protective efforts
regarding NCSec (CIIP)
A
R
R
C
I
13
I
R
I
I
I
R
C
C
I
R
R
R = Responsible, A = Accountable, C = Consulted, I = Informed
I
C
I
C
I
C
R
I
8 - Implementation Guide
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
14
ITU-D / SG1 / Question 22-1/1
Securing information and communication networks, best practices for
developing a culture of cybersecurity
Report of the meeting of the Rapporteur Group on Question
22-1/1 (Geneva, Wednesday, 22 September 2010
• Document 1/23 was presented by Morocco. It provides a
model for administrations to use in managing their
cybersecurity programme based on ISO 27000 family and
COBIT. It was suggested that it could be a framework to be
used by developing countries in assessing their cybersecurity
strategy. The Rapporteur asked the BDT to put the entire
document on the web site of Study Group 1 and invited
comments for the next meeting.
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
15
Thank you for your attention
Email : t.debbagh@technologies.gov.ma
or tdebbagh@gmail.com
16
Download