U.Va.’s IT Security Risk Management Program ITS-RM) April 2004 LSP Conference

advertisement
U.Va.’s IT Security
Risk Management Program
(ITS-RM)
April 2004 LSP Conference
Brian Davis
OIT, Security and Policy
IT Security Risk Management
Program (ITS-RM)


Announcing the roll out of version 1.0
Will assist departments in appropriately
protecting their IT assets
Why?
IT Security Risk Management.
It’s not just a “best practice,”
it’s a good idea!
Good News



Most of you are already doing most of
what you need to be doing
Program provides tools to make
identification and prioritization of the rest
easier
Be prepared when your department’s
administrators come to you for assistance
What’s Risk Management?
Formally defined
“The total process to identify, control, and
manage the impact of uncertain harmful
events, commensurate with the value of
the protected assets.”
More simply put…
“Determine what your risks are and then
decide on a course of action to deal with
those risks.”
Even more colloquially…
What’s your threshold for pain?
Do you want failure to deal with this risk to
end up on the front page of the
Daily Progress?
Risk Management Practices
Conduct a mission impact analysis and risk
assessment to:
1. Identify various levels of sensitivity
associated with information resources
2. Identify potential security threats to those
resources
Risk Management Practices
(cont.)
Conduct a mission impact analysis and risk
assessment to:
3. Determine the appropriate level of security
to be implemented to safeguard those
resources
4. Review, reassess and update as needed or
at least every 3 years
Risk Management Practices
(cont.)


Coordinated and integrated with
contingency planning and mission
resumption activities
Mission continuity plan that will provide
reasonable assurance that critical data
processing support can be continued or
resumed within an acceptable time frame
if normal operations are interrupted
University Level




Design university-wide program for
analysis, assessment & planning
Identify general security threats & provide
other guidance material
Oversee completion of department level
analysis, assessment, planning efforts
Complete yearly analysis & assessment
for enterprise systems; update enterprise
business continuity regularly
Departmental Level



Identify sensitive department system data,
assets & threats to those data, assets
Determine appropriate safeguards & form
plan for implementing them
Complete U.Va. templates at least every
three years & when computing
environment changes significantly
Brief Description
ITC implementing a University-wide IT
Security Risk Management Program for
 IT Mission Impact Analysis
 IT Risk Assessment
 IT Mission Continuity Planning
 Evaluation and Reassessment
What Has Been Done





ITC conducts a yearly business analysis and risk
assessment for directly managed resources;
updates its business continuity plan more often
Similar planning occurred across the University as
part of the Y2K initiative
Comptroller’s Office collects information on the
existence–but not quality–of security-related plans
Audit Department includes review of security plans
during routine departmental audits
ITC’s departmental security self-assessment
checklist (part of security awareness program)
Why That’s Not Enough





Y2K business continuity plans not updated
No mechanisms for tracking the frequency
of updates, quality and consistency
No central repository for safeguarding
assessment and planning documents
No university-level procedure dealing
explicitly with ongoing IT security risk
management
Non-compliant with state standards or
HIPAA and GLBA
Responsibilities

ITC
Health System
Audit Department
Other Offices

The Departments…



Executive Support




Strong executive support has been a key
success factor at other institutions
Executives fully behind program at U.Va.
University policy requiring participation in
the program is coming
Encouragement from LSPs will also be
necessary as many department heads will
not fully appreciate the need for IT security
assessment and planning
Step 1 - Identify
Critical IT Assets
Critical
Assets
List
ITS-RM Toolbox:
1. Criteria
2. Template
Step 2 Р Assess Risks
ITS-RM Toolbox:
1. threat scenarios
2. response strategies
3. remediation plan
template & example
For each c ritical asset:
Ґ Weigh likelihood & impact
of threats to each asset
Ґ Prioritize thre ats
Ґ Select response strategies
Ґ Develop remediation plan
Remediation
Plan
Step 3 Р Mission
Continuity Planning
ITS-RM Toolbox:
1. disaster recovery
plan example
2. interim manual
procedures
example
Create a response plan to
use in the e vent th at
critical I T assets are lost,
unavailable, corrupted or
disclosed
Disaster
Recovery
Plan
Interim
Manual
Procedures
Step 4 Р Evaluation and Reassessment
Required at l east once every thre e years
Let’s look at an example…
It’s good for you!



Risk management makes you more
efficient
Risk management helps you make your
case
Risk management has got your back
It’s not as painful as it looks!



No one will be starting from scratch
Little is expected from those with little,
more is expected from those with more
The templates are designed for the most
complex situations but work for simple
solutions, too
ITS-RM Roll Out




Version 2.0 coming soon…
Top 5 by end of year
Next 5 by next summer
Encourage other departments to get
moving
You’re Not Alone...


ITC can’t do it for you
Available to consult


Meet to explain process
Service consultations if we have solutions that
fill a gap
For More Information...
http://www.itc.virginia.edu/security/riskmanagement
Brian Davis
bdavis@virginia.edu
243-8707
Shirley Payne
payne@virginia.edu
924-4165
Download