Organizing Personnel Security Security Planning Susan Lincke

advertisement
Organizing Personnel
Security
Security Planning
Susan Lincke
Security Planning: An Applied Approach | 6/21/2016 | 2
Objectives
The students should be able to:
Define and describe security awareness, security training, security education.
Apply segregation of duties to information technology with regard to a business.
Plan allocation of security responsibility, documentation and training.
Describe good practices for hiring and terminating an employee.
Security Planning: An Applied Approach | 6/21/2016 | 3
Security Issues with Personnel
Personnel are the weak link: Social Engineering: phishing, pharming, etc.
Issues to look at include:
Background checks
Hiring
Return equipment
Disable accounts
Termination
Personnel
Skills mgmt.
Signed documents
Job
Descr.
Policies/procedures
Config Mgmt.
Docu-
ments
Job descriptions
Need-to-know
-Fraud
Contracts
Segregation of Duties
Security awareness & training
Training
Job skill training
Fraud reporting
Security Planning: An Applied Approach | 6/21/2016 | 4
Segregation of Duties
Documentation:
Configuration management
Change control
Training
PERSONNEL-FRAUD ISSUES
Security Planning: An Applied Approach | 6/21/2016 | 5
Workbook: Personnel Security
Personnel Threats
Threat
Divulging private
info
Skim payment
cards
Grant abuse
Abuse of student
Role
Employee
Salesperson
Employee
with grant
Employee,
student,
visitor
Liability or Cost if threat occurs
FERPA violation = loss of
federal funds
PCI DSS, state breach violation
Loss of funds from US granting
agencies
Bad press – loss in reputation
May incite lawsuit
Security Planning: An Applied Approach | 6/21/2016 | 6
Fraud Control Types
After Fraud
Corrective
Controls:
Punishment->
Amend controls
Fidelity Insurance
Employee Bonding
Time of
Fraud
Detective Controls:
Finding fraud when it
occurs includes:
Anonymous hotline*->
Surprise audits*->
Monitoring activities->
Logged transactions
Employee badges
Complaint or fraud
investigation
Mandatory vacations
Job rotation
Before Fraud:
***BEST***
Preventive Controls**:
Preventing fraud includes:
Segregation of Duties
Security roles
Ethical culture
Internal controls:
Physical & data security
Need-to-know
Signed documents
Fraud, security awareness training
Employee Support Programs
Background checks
Security Planning: An Applied Approach | 6/21/2016 | 7
Security Roles
Chief Information Security Officer
Data Owner, Process Owner: Allocates permissions, defines safe
processes.
Info Security Steering Committee: Management with knowledge
of business and/or security functions defines security
Incident Response Management/Team: Decides or performs
functions related to incident response.
Security Analyst, Security Administrator: Security staff to design
or implement security functions.
Security Planning: An Applied Approach | 6/21/2016 | 8
Segregation of Duties
Authorization
Distribution
Approves
Acts on
Origination
Double-checks
Verification
Security Planning: An Applied Approach | 6/21/2016 | 9
Organizational
Segregation of Duties
Audit
Ensures procedures are professionally done
Security/
Compliance
Quality
Control
advises &
monitors for
security
tests or ensures
quality of S/W or
production
Business
serves
System/
Network
Admin
advises
Development
delivers
S/W to
Security Planning: An Applied Approach | 6/21/2016 | 10
IT Segregation of Duties
Requirements/Design
Systems Analyst
Database Administrator
User
End User
Data Entry
Test Environment
Quality Assurance
Security
Control Group
Security Admin
Development
Environment:
Application programmer
Systems programmer
Production Environment
Computer Operator
System Administrator
Network Administrator
Help Desk
Security Planning: An Applied Approach | 6/21/2016 | 11
Segregation of Duties Controls
Transaction Authorization
Asset inventory & custody
Data owner’s responsibility is specific and documented
• Allocates authorization according to least-privilege and
segregation of duties
Security Administrator implements physical, system &
application security
• Authorization forms
• User authorization tables: who can view/update/delete data at
transaction or field level
Security Planning: An Applied Approach | 6/21/2016 | 12
Tools to Control Documents:
Configuration Management
Central repository = electronic library document management system.
Retains Important documents
• Software development teams: requirements, design , test documents, and
program code
• Project, audit and security plans.
Maintains history: holds a snapshot of different versions for each document,
• Any version can be retrieved at any time.
Permits users to:
• checkout a document;
• edit, review or approve the document; and
• check it in with increased version #.
The reason for revision and author is recorded and later available as version
history.
Security Planning: An Applied Approach | 6/21/2016 | 13
Tools to Control Documents:
Change Management
Change management helps to create different configuration management
versions.
Maintains state of a change proposal:
1. Starts with a Change Request may be
2. analyzed and approved by management for implementation. The change
is then
3. implemented (e.g., programmed or acted upon) and then
4. tested and approved, when the change is ready for deployment.
Documentation for each of these stages is maintained in a change
management or configuration management repository,
Emails may notify stakeholders of changes of status.
Security Planning: An Applied Approach | 6/21/2016 | 14
Security Awareness & Training
Training covers what is expected
of employees
Why is policy in place?
How is policy enforced?
Training may be implemented as:
New employee orientation
Company newsletters
Determine effectiveness by
interviewing employees
Security Planning: An Applied Approach | 6/21/2016 | 15
Awareness Function:
Types of Security Training
Awareness:
Create securityconscious workforce
Employees, partners
& vendors
Newsletters, surveys,
quizzes, video
training, forums,
posters
Training:
Necessary skills for a
particular position
HR, legal, middle or
top mgmt, IT,
programmers
Workshops,
conferences
Education:
High level skills
High-skilled
professions: audit,
security admin/mgmt,
Risk mgmt…
Organized and
gradual development:
teaching & coaching
Security Planning: An Applied Approach | 6/21/2016 | 16
Awareness Training
Signed employment agreements, video, memos, emails, posters,
seminars and training classes
A combination of parallel approaches
Knowledge areas:
•
•
•
•
•
•
•
Back-up work-related files
Choosing passwords and avoiding exposure
Avoiding email and web viruses
Recognizing social engineers
Recognizing & reporting security incidents
Securing electronic & paper media against theft & exposure
Spotting malware that could lead to identity theft & desktop spying
Metrics should be established to determine effectiveness of
change in behavior and workforce attitude
Security Planning: An Applied Approach | 6/21/2016 | 17
Security Certificates & Continuing Education
Security
Certification(s)
Minimum 1-year
Requirement
Minimum 3year
Requirement
20
120
10
60
Security+
-
50
Other CompTIA
certificates
-
20-75
CISSP, CISA, CISM,
CRISC, CEH
SSCP, CAP, HCISPP
Security Planning: An Applied Approach | 6/21/2016 | 18
Other Personnel Preventive Controls
Training and written policies and procedures
Ethical Culture: Mgmt must live, mentor, insist on ethical
behavior.
Employee Support Programs: Addresses personal/financial
problems before they are unmanageable.
Background checks: For handlers of PII.
Need to Know/Least Privilege
Security Planning: An Applied Approach | 6/21/2016 | 19
Detective & Corrective Controls
Detective/Deterrence Controls Corrective Controls
Fraud reporting or hotline
Employee Bonding: Insurance
protects against losses due to
Logged transactions
theft, mistakes and neglect.
Internal Audit Dept and Surprise
Fidelity Insurance: Insurance
Audits
against fraud or employee
Mandatory vacations or job
misdeeds is useful for rare but
rotation.
expensive risks
Security Planning: An Applied Approach | 6/21/2016 | 20
Workbook: Personnel Security
Threat
Personnel Controls
Role
Control
Divulging Employe FERPA training:
private info e
annual quiz review,
new
employee
training
Grant abuse Employe Financial controls:
e
with employee
and
grant
administrator
and
Security Planning: An Applied Approach | 6/21/2016 | 21
Workbook: Personnel Security
Responsibility of Security to Roles
Role
Responsibility
Registr Establish FERPA training
ar
Data Owner: student scholastic and
financial information
Oversee
FERPA
adherence
in
Registration dept.
Admin. Attend FERPA training
Retain locked cabinets with student info
Securit Monitor
logs,
enable/disable
Security Planning: An Applied Approach | 6/21/2016 | 22
Workbook: Personnel Security
Requirements: Training, Documentation
Role
Registrar
Requirements: Training,
Documentation
FERPA experience in hiring.
Training every 3-5 years at national
conference or workshop
Employee University FERPA documentation,
handling FERPA web page, annual quizzes,
student
sign acceptable use policy
data
Security Planning: An Applied Approach | 6/21/2016 | 23
Hiring
Contracts
Termination
PERSONNEL ISSUES
Security Planning: An Applied Approach | 6/21/2016 | 24
Personnel Issues
Background checks can reduce fraud
• More secure position=more checking required
• A standard or procedure is useful
Training & signed contracts
Track and document theft
• Minor incidents could add up to a major pattern problem
Email can be monitored for potential problem
employees
• Assuming policy is in place and employees are aware
Security Planning: An Applied Approach | 6/21/2016 | 25
Employee Hiring
Document security responsibilities
Screen candidates for sensitive positions
Have signed agreements regarding
• Job responsibilities, conditions of employment
• Security responsibilities (incl. copyright)
• Confidentiality agreement
• Indicate corrective actions taken if security requirements
not followed
Security Planning: An Applied Approach | 6/21/2016 | 26
New Employee Orientation
New employee signs Privacy Policy document:
Has read and agreed to follow security policies
Conform to laws and regulations
Promise to not divulge logon IDs and passwords
Create quality passwords
Lock terminal when not present
Report suspected violations of security
Maintain good physical security (locked doors, private keys)
Use IT resources only for authorized business purposes
Security Planning: An Applied Approach | 6/21/2016 | 27
Signed Agreements
Code of Conduct: Describes general ethical behavior
requirements
Acceptable Use Policy: Addresses which and how company data
is accessed
Privacy Policy: Defines behavior re confidential info:
• password policies, physical security, locked terminals, and
reporting security issues.
Service Level Agreement: Contract between a customer and
provider.
Security Planning: An Applied Approach | 6/21/2016 | 28
Third Party Agreements
Define information security policy
Define procedures to implement policy
Deploy controls to protect against malicious software
Publish restrictions on copying/distributing information
Implement procedures to determine whether assets were
compromised
Ensure return or destruction of data at end of job
Security Planning: An Applied Approach | 6/21/2016 | 29
Service Level Agreement (SLA)
A Service Level Agreement (SLA) is a contract to outsource IT or other
sensitive service
• Can including networking, business continuity, security or information
security
An SLA ensures levels of quality for performance, security, legal compliance,
by defining:
Introduction and Scope of Work
Security
Performance, Tracking and Reporting
Termination of Contract
Problem Management
Schedules and General
Compensation
Signatures
Customer Duties and Responsibilities
Warranties and Remedies
Intellectual Property Rights and Confidential Information
Legal Compliance and Resolution of Disputes
Security Planning: An Applied Approach | 6/21/2016 | 30
Employee Termination
Employees about to leave or who have left the organization
cause 70% of internal information theft
Unless continued relationship expected:
Disable all corporate accounts and access permissions
Return equipment
Revoke access
Return all access keys, ID cards and budgets
Notify all staff and security personnel
Arrange final pay
Perform termination interview
Security Planning: An Applied Approach | 6/21/2016 | 31
Responsibility of Security to Roles
Role
Chief Info
Security
Officer:
John Doe
Responsibility
Lead Info Sec. Steering Committee and incident response teams.
Lead efforts to develop security policy, security workbook.
Manage security projects, budgets, staff.
Lead security training for required staff on FERPA, PCI DSS, HIPAA.
Maintain security program: metrics, risk, testing, and policy revisions.
Personnel: Participate in Information Security Steering Committee.
Alice
Tracks and documents theft (to determine pattern).
Strong
Prepare/manage contracts with Third Party contracts, establishing expectations
relative to security.
At hiring: Perform background check for persons handling confidential info,
major assets or interfacing with students. Write job descriptions considering
segregation of duties, security responsibilities.
Any Employee:
Signs Acceptable Use Policy;
Takes security awareness training including compliance, policy training.
At termination: Revoke computer authorization, return badges/keys and
equipment, notify appropriate staff.
Security Planning: An Applied Approach | 6/21/2016 | 32
Question
Which of the following duties can be performed by one
person in a well-controlled IS environment?
1.
Software Developer and System Administration
2.
Database administration and Data Entry
3.
System Administrator and Quality Assurance
4.
Quality Assurance and Software Developer
Security Planning: An Applied Approach | 6/21/2016 | 33
Question
Which is MOST important for a successful security
awareness program?
1. Technical training for security administrators
2. Aligning the training to organization requirements
3. Training management for security awareness
4. Using metrics to ensure that training is effective
Security Planning: An Applied Approach | 6/21/2016 | 34
Question
To detect fraud, the BEST type of audit trail to log would be:
1. User session logs
2. Firewall incidents
3. Operating system incidents
4. Application transactions
Security Planning: An Applied Approach | 6/21/2016 | 35
Summary of Personnel Controls
Personnel Hiring
Daily Support & Controls
Security Documentation:
Policies & Procedures
Configuration Management
and Change Management
Vetting new employees
Segregation of Duties
Signed Documents
Hotline
Job Descriptions
Other fraud controls
Training
Controlled departures
Contracts and
Service Level Agreements
Security Planning: An Applied Approach | 6/21/2016 | 36
Jamie Ramon MD
Doctor
Chris Ramon RD
Dietician
Terry
Pat
Licensed
Software Consultant
Practicing Nurse
HEALTH FIRST CASE STUDY
Designing Physical Security
Security Planning: An Applied Approach | 6/21/2016 | 37
Workbook: Personnel Security
Step 1: Define Personnel Threats
Threat
Role
Liability or Cost if threat occurs
Malpractice
HIPAA violation
Medicare Fraud
Fraud against company
Security Planning: An Applied Approach | 6/21/2016 | 38
Workbook: Personnel Security
Step 2: Define Personnel Controls
Threat
Role
Control
Training?
Need to know?
Documentation?
Security Planning: An Applied Approach | 6/21/2016 | 39
Allocate Responsibility of Security to Roles
Look through other chapters.
What requirements do you have for:
Risk?
Physical security?
Business Continuity?
Metrics?
Information Security?
Governing?
Network Security?
Incident Response?
Someone has to do the tasks allocated in these chapters.
Who will be responsible for each?
How is this documented?
How will they be trained?
Security Planning: An Applied Approach | 6/21/2016 | 40
Step 3: Allocate Responsibility of Security
to Roles
Role
Nurse
Partner
Security
Admin
Responsibility
Security Planning: An Applied Approach | 6/21/2016 | 41
Step 4: Allocate Training, Documentation to
Roles
Role
Nurse
Partner
Requirements: Training,
Documentation
Download