Designing Information Security Security Planning Susan Lincke

advertisement
Designing Information
Security
Security Planning
Susan Lincke
Security Planning: An Applied Approach | 6/21/2016 | 2
Objectives
Student should know:
Define information security principles: need-to-know, least privilege, segregation of
duties, privacy
Define information security management positions: data owner, data custodians,
security administrator
Define access control techniques: mandatory, discretionary, role-based, physical, single
sign-on
Define authentication combination: single factor, two factor, three factor multifactor
Define Biometric: FRR, FAR, FER, EER
Define elements of BLP: read down, write up, tranquility principle, declassification
Define military security policy: level of trust, confidentiality principle
Define backup rotation, incremental backup, differential backup, degauss, audit trail,
audit reduction, criticality classification, sensitivity classification
Develop an information security classification scheme that addresses confidentiality and
availability
Security Planning: An Applied Approach | 6/21/2016 | 3
Information Security Goals
Confidentiality
CIA Triad
Integrity
Availability
Conformity to Law
& Privacy Requirements
Security Planning: An Applied Approach | 6/21/2016 | 4
Information Security Principles
Need-to-know: Persons should have ability to access data
sufficient to perform primary job and no more
Least Privilege: Persons should have ability to do tasks sufficient
to perform primary job and no more
Segregation of Duties: Ensure that no person can assume two
roles: Origination, Authorization, Distribution, Verification
Privacy: Personal/private info is retained only when a true
business need exists: Privacy is a liability
Retain records for short time
Personnel office should change permissions as jobs change
Security Planning: An Applied Approach | 6/21/2016 | 5
Review: State Breach Law Protects…
Restricted data generally includes:
Social Security Number
Driver’s license # or state ID #
Financial account number (credit/debit) and access
code/password
DNA profile (Statute 939.74)
Biometric data
Some states & HIPAA protects:
Health status, treatment, or payment
Security Planning: An Applied Approach | 6/21/2016 | 6
President
Chief Sec.
Officer
Physical
Security
Data Owner
Responsible for
security of
data
Business
Executive
Process
Owner
Responsible for
security of
process
Chief Privacy
Officer
Chief Info
Sec. Officer
Protect
customer &
employee rights
Creates and
maintains a
sec. program
IS Auditor
Independent
assurance of
sec. objectives
& controls
Chief Info.
Officer
Manages
Info. Technology
Security
Architect
Security
Admin
Design/ impl.
policies &
procedures
Administrates
computer &
network security
Some positions may be merged
Data
Custodian
Maintains and
protects data:
Backup/restore/
monitor/test
Security Planning: An Applied Approach | 6/21/2016 | 7
Information Owner
or Data Owner
Is responsible for the data within business (mgr/director - not IS
staff)
Determines who can have access to data and may grant
permissions directly OR
Gives written permission for access directly to security
administrator, to prevent mishandling or alteration
Periodically reviews authorization to restrict authorization creep
Security Planning: An Applied Approach | 6/21/2016 | 8
Other Positions
Data Custodian
IS (security or IT) employee who
safeguards the data
Performs backup/restore
Verifies integrity of data
Documents activities
May be System Administrator
Security Administrator
Allocates access to employees
based on written
documentation
Monitors access to terminals
and applications
• Monitors invalid login attempts
Prepares security reports
Security Planning: An Applied Approach | 6/21/2016 | 9
Criticality Classification
Critical $$$$: Cannot be performed manually. Tolerance to
interruption is very low
Vital $$: Can be performed manually for very short time
Sensitive $: Can be performed manually for a period of time, but
may cost more in staff
Nonsensitive ¢: Can be performed manually for an extended
period of time with little additional cost and minimal recovery
effort
Security Planning: An Applied Approach | 6/21/2016 | 10
Sensitivity Classification
(Example)
Proprietary:
Strategic Plan
Confidential:
Salary &
Health Info
Private:
Product Plans
Public
Product Users Manual
near Release
Internal
Security Planning: An Applied Approach | 6/21/2016 | 11
Sensitivity Classification
Workbook
Sensitivity
Classification
Description
Information Covered
Proprietary
Protects competitive edge. Material is of
critical strategic importance to the
company. Dissemination could result
in serious financial impact.
Confidential
Information protected by FERPA, PCI-DSS
and breach notification law. Shall be
available on a need-to-know basis
only. Dissemination could result in
financial liability or reputation loss.
Private
Should be accessible to management or
for use with specific parties. Could
cause internal strife or divulge trade
secrets if released.
Professor research,
Student homework,
Budgets
Public
Disclosure is not welcome, but would not
adversely impact the organization
Teaching lectures
Student information & grades,
Payment card information,
Employee information
Security Planning: An Applied Approach | 6/21/2016 | 12
Data Classification
How do we mark classified information?
How do we determine which data should be classified
to which class?
How do we store, transport, handle, archive classified
information?
How do we dispose of classified data?
What does the law say about handling this information?
Who has authority to determine who gets access, and
what approvals are needed for access?
Security Planning: An Applied Approach | 6/21/2016 | 13
Handling of Sensitive Data
Access
Paper Storage
Disk Storage
Confidential
Need to know
Locked cabinet,
Private
Need to know
Locked cabinet
Locked room if unattended
Locked room
unattended
Passwordprotected
Password-protected,
Encrypted
Labeling
Handling
& Clean desk, low voice,
Encrypted
Clean desk,
Transmission
No SSNs, ID required
Encrypted
Archive
Disposal
Limited email or append
email security notice
Encrypted
Encrypted
Degauss & damage disks
Secure wipe
Shred paper
low voice
Encrypted
Shred paper
Public
Need to know
Locked cabinet or locked
if room if unattended
Password-Protected
Clean desk,
low voice
Reformat disks
Security Planning: An Applied Approach | 6/21/2016 | 14
Storage & Destruction of Confidential
Information
Repair
Remove memory before
sending out for repair
Disposing of Media
Meet record-retention schedules
Reformat disk
Use “Secure wipe” tool
****If highly secure*****
Degauss = demagnetize
Physical destruction
Storage
Encrypt sensitive data
Avoid touching media surface
Keep out of direct sunlight
Keep free of dust & liquids –
in firm container best
Avoid magnetic, radio, or vibrating fields
Use anti-static bags for disks
Avoid spikes in temperature for disks;
bring to room temperature before use
Write protect floppies/magnetic media
Store tapes vertically
Security Planning: An Applied Approach | 6/21/2016 | 15
Permission types
Read, inquiry, copy
Create, write, update, append, delete
Execute, check
Access Matrix Model (HRU)
Jack
File A
File B
rwx
rx
Jill
Jeff
r
File C
Jack
-
rwx
r
d
rx
rwx
-
Security Planning: An Applied Approach | 6/21/2016 | 16
Information Asset Inventory
Asset Name
Work
book
Course Registration
Value to Organization Records which students are taking which classes
Location
IS Main Center
Sensitivity & Criticality
Classifications
Sensitive, Vital
IS System/
Server Name
Peoplesoft
Data Owner
Registrar: Monica Jones
Designated
Custodian
IS Operations: John Johnson
Granted Permissions
Read: Department Staff, Advising
Read/Write: Students, Registration
CISA Review Manual 2009
Access is permitted at any time/any terminal
Security Planning: An Applied Approach | 6/21/2016 | 17
Question
1.
2.
3.
4.
The person responsible for deciding who should have access to
a data file is:
Data custodian
Data owner
Security administrator
Security manager
Security Planning: An Applied Approach | 6/21/2016 | 18
Question
Least Privilege dictates that:
1. Persons should have the ability to do tasks sufficient to
perform their primary job and no more
2. Access rights and permissions shall be commensurate with a
person’s position in the corporation: i.e., lower layers have
fewer rights
3. Computer users should never have administrator passwords
4. Persons should have access permissions only for their security
level: Confidential, Private or Sensitive
Security Planning: An Applied Approach | 6/21/2016 | 19
Question
A concern with personal or private information is that:
1. Data is not kept longer than absolutely necessary
2. Data encryption makes the retention of personal information
safe
3. Private information on disk should never be taken off-site
4. Personal data is always labeled and handled as critical or vital
to the organization
Security Planning: An Applied Approach | 6/21/2016 | 20
Question
1.
2.
3.
4.
The person responsible for restricting and monitoring
permissions is the:
Data custodian
Data owner
Security administrator
Security manager
Security Planning: An Applied Approach | 6/21/2016 | 21
Path Access
Authentication: Login/Password, Biometrics
Remote Access
AUTHENTICATION & ACCESS
CONTROL
Security Planning: An Applied Approach | 6/21/2016 | 22
Security: Defense in Depth
Border Router
Perimeter firewall
Internal firewall
Intrusion Detection System
Policies & Procedures & Audits
Authentication
Access Controls
Security Planning: An Applied Approach | 6/21/2016 | 23
Four Layers of Logical Security
System 1
System 2
App1
Database
App2
Two layers of general access to Networks and Systems
Two layers of granularity of control to Applications and Databases
Security Planning: An Applied Approach | 6/21/2016 | 24
Password Rules
One-way encrypted using a strong algorithm
Never displayed (except ***)
Never written down and retained near terminal or in desk
Passwords should be changed every 30 days, by notifying user in
advance
A history of passwords should prevent user from using same
password in 1 year
Passwords should be >= 8 (better 12) characters, including 3 of:
alpha, numeric, upper/lower case, and special characters
Passwords should not be identifiable with user, e.g., family
member or pet name
Security Planning: An Applied Approach | 6/21/2016 | 25
Authentication Combinations
Single Factor: Something you know
• Login & Password
Multifactor Authentication: Using two or more authentication
methods.
Two Factor: Add one of:
• Something you have: Card or ID
• Something you are or do: Biometric
Three Factor: Uses all three: e.g., badge, thumb, pass code
Security Planning: An Applied Approach | 6/21/2016 | 26
Biometrics
Biometrics: Who you are or what you do
Susceptible to error
False Rejection Rate (FRR): Rate of users rejected in error
False Acceptance Rate (FAR): Rate of users accepted in error
Failure to Enroll Rate (FER): Rate of users who failed to
successfully register
Equal Error Rate
EER:
FRR increases
FRR = FAR
FAR increases
Security Planning: An Applied Approach | 6/21/2016 | 27
Biometrics with Best Response & Lowest
EER
Type (Top Best)
Advantages
Disadvantages
Palm
Hand (3D)
Social acceptance
Physical contact
Social acceptance, low storage
Not unique, injury affects
Iris
No direct contact
High cost, high storage
Retina
Low FAR
High cost, 1-2 cm away: invasive
Fingerprint
Low cost, More storage=Lower
EER
Physical contact-> grime ->poor
quality image
Voice
Phone use, social acceptance
High storage, playback, voice
change, background noise
Signature
Easy to use, low cost
Uniqueness, writing onto tablet
differs from paper
Face
Social
CISA acceptance
Review Manual 2009
Not unique, overcome with high
storage
Security Planning: An Applied Approach | 6/21/2016 | 28
Biometric Info Mgmt & Security Policy
Identification & authentication procedures
Backup authentication
Safe transmission/storage of biometric data
Security of physical hardware
Validation testing
Auditors should ensure documentation & use is professional
Security Planning: An Applied Approach | 6/21/2016 | 29
Single Sign On
Advantages
Disadvantages
One good password replaces Single point of failure -> total
lots of passwords
compromise
IDs consistent throughout
system(s)
Complex software development
due to diverse OS
Reduced admin work in setup Expensive implementation
& forgotten passwords
Quick access to systems
App1
Enter
Password
DB2
App3
Secondary Domains
Primary Domain (System)
Security Planning: An Applied Approach | 6/21/2016 | 30
Recommended Password Allocation
User
Security Admin
User allocated
random password
or sent email w. link
Account
[unlocked]
Inform user
in controlled
manner
Verify user ID
(e.g., email)
First time login:
change
password
[Forgot
Password]
Subsequent
Logins
[Invalid password
Attempts]
Account
[locked]
[Manual] Enter 5 invalid
passwords
Notify
Security
[Auto
Timeout]
System
automatically
unlocks
Account
[unlocked]
Security Planning: An Applied Approach | 6/21/2016 | 31
Admin & Login ID Rules
Restrict number of admin accounts
Admin password should only be known by one user
Admin accounts should never be locked out, whereas others are
Admin password can be kept in locked cabinet in sealed
envelope, where top manager has key
Login IDs should follow a confidential internal naming rule
Common accounts: Guest, Administrator, Admin should be
renamed
Session time out should require password re-entry
Security Planning: An Applied Approach | 6/21/2016 | 32
Access Control Techniques
Mandatory Access Control
File
A
B
C
D
E
User
John
June
May
Al
Don
Group Permi…
Mgmt
rwx, r x
Billing
,r
Factory r x, r x
Billing
Billing
Discretionary Access Control
John
A, B, C, D, E, F
June
A, B, C
May
D, E, F
Role-Based Access Control
Login
John
June
Al
May
Pat
Role
Mgr
Acct.
Acct.
Factory
Factory
Permission
A, B,C,D,E,F
A,B,C
A,B,C
D,E,F
D,E,F
Al
A, B
Don
B, C
Pat
D, F
Tom
E, F
Tim
E
Security Planning: An Applied Approach | 6/21/2016 | 33
Access Control Techniques
Mandatory Access Control: General (system-determined) access
control
Discretionary Access Control: Person with permissions controls
access
Role-Based Access Control: Access control determined by role in
organization
Physical Access Control: Locks, fences, biometrics, badges, keys
Security Planning: An Applied Approach | 6/21/2016 | 34
Workbook:
Role-Based Access Control
Role Name
Instructor
Advising
Registration
Information Access
(e.g., Record or Form) and
Permissions (e.g., RWX)
Student Records: Grading Form RW
Student Transcript (current students) R
Transfer credit form R
Student Records: Student Transcript
(current students) R
Fee Payment R
Transfer credit form R
Student Records: Fee Payment RW
Transfer credit form RW
Security Planning: An Applied Approach | 6/21/2016 | 35
System Access Control
Establish rules for access to information resources
Create/maintain user profiles
Allocate user IDs requiring authentication (per person,
not group)
Notify users of valid use and access before and upon
login
Ensure accountability and auditability by logging user
activities
Log events
Report access control configuration & logs
Security Planning: An Applied Approach | 6/21/2016 | 36
Application-Level Access Control
Create/change file or database structure
Authorize actions at the:
• Application level
• File level
• Transaction level
• Field level
Log network & data access activities to monitor access violations
Security Planning: An Applied Approach | 6/21/2016 | 37
Which Computer Do You Trust?
You plan to make a purchase on-line…
A library or college computer?
Your office computer?
Your children’s computer?
Security Planning: An Applied Approach | 6/21/2016 | 38
Trusted Computing Base (TCB)
Trusted app has
Horizontal dependencies: operating system, hardware
Vertical dependencies: server applications, network, authentication server, …
Trusted Trusted Trusted
App 1
App 2
App 3
Trusted Operating System
Trusted Trusted Trusted
Service Service Service
1
2
3
Trusted Operating System
Trusted Hardware
Trusted Hardware
Trusted network
Security Planning: An Applied Approach | 6/21/2016 | 39
Processing requires Dependencies
Vertical Dependencies:
Secret App requires
Secret-level database
Secret-level OS
Secret-level hardware
Horizontal Dependencies:
Secret App requires:
Secret-level servers
Secret-level communications
Secret-level authentication
Security Planning: An Applied Approach | 6/21/2016 | 40
Trusted Computing Base (TCB)
TCB Subset: Verified security policy, provides reliability
Encapsulated security implementation provides rapid implementation
Security
Policy
Trusted Trusted
App 1
App 2
Trusted
OS
Trusted
App 3
Trusted Trusted Trusted
Service Service Service
1
2
3
Trusted
Encapsulated
OS
security impl.
Encapsulated
security impl.
Trusted Hardware
Trusted Hardware
Trusted network
Security Planning: An Applied Approach | 6/21/2016 | 41
Bell and La Padula Model (BLP)
Property of Confinement:
Read Down: if Subject’s class is
>= Object’s class
Top Secret
Write Up: if Subject’s class is <=
Object’s class
Secret
Tranquility Principle: Object’s
class cannot change
Confidential
Declassification: Subject can
lower his/her own class
Non-Classified
Joe => (Secret)
Security Planning: An Applied Approach | 6/21/2016 | 42
Military Security Policy
(Confid.,
Finance)
Class
Finance
Engineering
Top Secret
Customer list
New plans
Secret
Dept. Budgets Code
Personnel
review
Confidential
Expenses
Emails
Salary
Users
Manuals
Position
Descriptions
Non-Classified Balance sheet
Personnel
Person has an Authorization Level or Level of Trust
(S,D) = (sensitivity, domain) for Subject (potentially Project)
Object has a Security Class
Confidentiality Property: Subject can access object if it
dominates the object’s classification level
(Secret, Eng)
Security Planning: An Applied Approach | 6/21/2016 | 43
BIG Data
Alice Winter
222 Pine Dr.
262-513-2341
Blacklist: Not stored
Or access via permission
Birth=1989
Diabetic
Anonomize: Alter via
statistical distribution
Whitelist:
Permitted to
see
Options include:
Encryption, access control, firewall, security intelligence
Obfuscate: Make data unclear
Distribute data across multiple locations
No single location has useful data (e.g., RAID)
Security Planning: An Applied Approach | 6/21/2016 | 44
IS Auditor Verifies…
Written Policies & Procedures are professional & implemented
Access follows need-to-know
Security awareness & training implemented
Data owners & data custodians meet responsibility for
safeguarding data
Security Administrator provides physical and logical security for IS
program, data, and equipment
Authorization is documented and consistent with reality
See CISA Review Manual for specific details
Security Planning: An Applied Approach | 6/21/2016 | 45
Question
1.
2.
3.
4.
A form of biometrics that is considered invasive by users is:
Retina
Iris
3D hand
Signature
Security Planning: An Applied Approach | 6/21/2016 | 46
Question
A form of biometrics that is not prone to error is
1. Retina
2. Voice
3. Finger
4. Signature
Security Planning: An Applied Approach | 6/21/2016 | 47
Question
Julie is a Data Owner. She configures permissions in the
database to enable users to access the forms she thinks they
should be able to access. This technique is known as
1. Bell and La Padula Model
2. Mandatory Access Control
3. Role-Based Access Control
4. Discretionary Access Control
CISA Review Manual 2009
Security Planning: An Applied Approach | 6/21/2016 | 48
Question
John has a security clearance of (Engineering, Confidential).
Using Bell and La Padula Model, John can write to:
1. Confidential
2. Top Secret, Secret, and Confidential
3. Confidential and Unclassified
4. Unclassified
CISA Review Manual 2009
Security Planning: An Applied Approach | 6/21/2016 | 49
AUDIT TRAILS
Security Planning: An Applied Approach | 6/21/2016 | 50
Audit Trail
Audit trail tracks responsibility
• Who did what when?
• Periodic review will help to find excess-authority access, login successes &
failures, and track fraud
Attackers often want to change the audit trail (to hide tracks)
Audit trail must be hard to change:
• Write-once devices
• Digital signatures
• Security & systems admins and managers may have READ-only access to
log
Audit trail must be sensitive to privacy
• Personal information may be encrypted
Security Planning: An Applied Approach | 6/21/2016 | 51
Audit Trail Tools
Audit Reduction: Filter important logs - eliminate unimportant
logs
Attack/Signature Detection: A sequence of log events may signal
an attack (e.g., 1000 login attempts)
Trend/ Variance-Detection: Notices changes from normal user
or system behavior (e.g., login during night)
Security Planning: An Applied Approach | 6/21/2016 | 52
Question
Audit trails:
1. Should be modifiable only by security administrators
2. Should be difficult to change (e.g., write-once)
3. Should only save important logs, using log reduction
4. Should avoid encryption to ensure no loss and quick
access
Security Planning: An Applied Approach | 6/21/2016 | 53
Summary
Data in inventoried
Data is allocated a sensitivity and criticality class
Class handling is defined for handling, transporting, storage
Roles are allocated permissions (access control)
Authorization ensures access control is enforced: biometrics, two-factor
authentication, single sign-on
Trust enables use
Access may be distributed: Trusted Computing Base
Audit trails enforce accountability
Security Planning: An Applied Approach | 6/21/2016 | 54
Jamie Ramon MD
Doctor
Chris Ramon RD
Dietician
Terry
Pat
Licensed
Software Consultant
Practicing Nurse
HEALTH FIRST CASE STUDY
Designing Information Security
Security Planning: An Applied Approach | 6/21/2016 | 55
Define Sensitivity Classification
Sensitivity
Classification
Proprietary
Description
Protects competitive edge. Material is of critical strategic
importance to the company and its dissemination could
result in serious financial impact.
Confidential
Information protected by law. Shall be made available or
visible on a need-to-know basis only. Dissemination could
result in financial liability or reputation loss.
Private
Should be accessible to management or affected parties
only.
Could cause internal strife or external
embarrassment if released: for use with particular parties
within the organization.
Disclosure is not welcome, but would not adversely
impact the organization
Public
OR
Information is public record
Information
Covered
Security Planning: An Applied Approach | 6/21/2016 | 56
Define Sensitivity Classification
Proprietary:
Strategic
Plan
Confidential:
Salary &
Health Info
Private:
Product Plans
Public
Product Users Manual
near Release
Security Planning: An Applied Approach | 6/21/2016 | 57
How should classes be treated?
Table 4.1.2: Handling of Sensitive Data
Proprietary
Access
Paper Storage
Need to know
Locked cabinet,
Locked
room
if
unattended
Password-protected,
Disk Storage
Encrypted
Labeling
and ‘Confidential’
Clean desk,
Handling
low voice,
shut door policy
Transmission
Encrypted
Archive
Encrypted
Degauss & damage disks
Disposal
Shred paper
Special
Confidential
Need to know
Locked cabinet
Locked
room
unattended
Password-protected
Encrypted
Clean desk,
low voice,
shut door policy
Private
Need to know
Locked cabinet or
if room if unattended
Password-Protected
Clean desk,
low voice,
shut door policy
Encrypted
Encrypted
Secure wipe, damage Reformat disks
disks
Shred paper
locked
Security Planning: An Applied Approach | 6/21/2016 | 58
Define Roles & Role-Based Access Control
Health Plan Eligibility
Health Plan:
Maximum Benefit:
Exclusions
In-Plan Benefits
Procedure
Dates
Co-Pay:
Eligibility: Active
Deductible:
Out-of-Plan Benefits
Coordination of Benefits
Coverage
Role Name
Specific Procedure Request
Max. Coverage
Co-pay / Non-covered
Patient Resp Amounts
Information Access (e.g., Record or Form)
and Permissions (e.g., RWX)
Security Planning: An Applied Approach | 6/21/2016 | 59
Work
book
Information Asset Inventory
Asset Name
Value to
Organization
Location
Security Risk
Classification
Course Registration
Records which students are taking which classes
IS Main Center
Sensitive, Vital
IS Server
Peoplesoft
Data Owner
(Who decides who should have access?)
Designated
Custodian
(Who takes care of backups and sys admin
functions?)
Granted Permissions
Read: Department Staff, Advising
Read/Write: Students, Registration
Access is permitted at any time/any terminal
Download