Facilitated IT Risk Assessment Program Protecting Your Business Information Security Awareness | security.uwm.edu

advertisement
Facilitated IT Risk Assessment
Program
Protecting Your Business
Information Security Awareness | security.uwm.edu
Protecting campus data
is no longer an option.
It is a requirement.
security.uwm.edu
Major breach of UCLA's computer files
800,000 students, alumni and others are exposed.
Attacks lasted a year LA Times.com December 12, 2006
Hacker accesses 14,000 records at
OSU
Source: AP
The Plain Dealer.com Wednesday, April 18, 2007
Hackers strike Georgia Tech computer,
gain credit card data
InfoSecNews.com 3/31/03
Boston University
50 laptops stolen (between9/03 & 9/04)…
totaling $78,000 in losses for victims
CSOonline.com 9/14/04
security.uwm.edu
What is an IT risk assessment?
• Systematic review of risks, threats, hazards
and concerns
• Prioritizes threat vulnerability
• Identifies appropriate, cost-effective
safeguards to lower risk to acceptable level
security.uwm.edu
What are we protecting?
• Confidential data (defined in next slide)
• Critical systems
• The network
• Our reputation
security.uwm.edu
Examples of confidential data:
• Social Security Numbers (SSNs)
• Student ID numbers
• Credit card numbers
• Banking information
• Research data
• Login/passwords
• Health care information
• Grades
security.uwm.edu
Some of the risks:
• Information exposure
• DOS (Denial of Service)
• Malicious editing
• Equipment theft
• Damage to equipment
security.uwm.edu
How are risks exposed?
• Hacker gets remote access to a computer
• Virus or “worm” causes loss of service-DOS
• Computer lost or stolen and data illegally
shared
• Disgruntled employee compromises data
integrity
• Appropriate security controls not in place or
not enforced
security.uwm.edu
How an assessment is different
from an audit:
• No predetermined criteria to be judged against
• Assesses what is needed to protect business
processes
• Self-directed
• Facilitator is neutral
• Provides a prioritized list of threats and
suggested solutions
• Actions taken are up to you!
security.uwm.edu
Legislative Impetus for
IT Risk Assessments
Wisconsin Act 138 (WA 138)
Data Breach Notification Law
Requires:
• Notification to victims when specific types of
data are exposed to unauthorized third
parties
• Examples include stolen laptops, lost
paperwork, hacked servers, etc.
security.uwm.edu
Legislative Requirements for
IT Risk Assessments
HIPAA
(Health Insurance Portability and Accountability Act)
Requires:
• Periodic information security risk evaluations
• Organizations to assess risks to information
security
• Take steps to mitigate risks to acceptable level
• Maintain acceptable risk level
security.uwm.edu
Legislative Requirements for
IT Risk Assessments
Gramm-Leach-Bliley Act
Financial-based consumer rights legislation
Requires:
• Assessment of data security risks
• Documented plans to address those
risks
security.uwm.edu
Good Records Management
Lowers Institutional Risk
• UWM Libraries and I&MT are strategic
partners in this initiative.
• UWM IT Risk Assessment Program can
help business units get a baseline as
partial preparation for comprehensive
records management review.
• Good records management and good
security practices go hand in hand.
Campus Benefits of
Risk Assessment
• Provides snapshot of IT system and business
process concerns by department/area
• Shows due diligence for legal purposes
• Using information, creates protection strategy
designed to reduce the highest priority
information security risks
• Ensures that funds for security spent where
needed most
security.uwm.edu
Unit Benefits
• Generates a comprehensive list of information
assets and analysis of their relative importance
• Identifies risks to those assets; reviews existing
controls and identifies needed controls
• Leverages internal expertise; not dependent on
outside “experts”
• Provides experience implementing information
security risk assessments for future use
security.uwm.edu
Benefits for Employees
• Increased IT security awareness
• Team-building experience
• Direct involvement in the decisionmaking process
• Provides a structured environment to
offer suggestions/comments/concerns
and solutions
security.uwm.edu
The Process
• Assemble a team consisting of broad
representation from the organization
• Facilitate brainstorming of key business
processes and office/IT systems
• Rank those assets based on importance to
fulfillment of the unit’s mission
security.uwm.edu
The Process (cont.)
• Brainstorm risks to those assets and prioritize
those risks based on likelihood of occurrence
and impact
• Analyze where controls for these high priority
risks exist and suggest controls for the rest
• Provide ongoing monitoring of effectiveness
and ensure risk assessment happens for new
products and services
security.uwm.edu
Business Process Review
• Review how employees access, use and
transmit data; i.e., the “human” element
• Determine data ownership – who is
ultimately responsible for data usage and
protection?
• Where does data come from? Where does
data go?
Business Process Review (cont.)
• How is data shared?
• What is security level for data - public,
confidential, private, proprietary, personal?
• Are policies/procedures established for
accessing and/or sharing data?
security.uwm.edu
Information System/Program
Review
• Review of office equipment, desktop
computers, laptops, servers used
• Discuss purpose of the systems and/or
programs used; Are outdated or ineffective
equipment/programs/images in use?
• Active scan of random IT systems to
determine vulnerabilities
• Map IT systems
security.uwm.edu
Physical Security Review
• Physical location of IT systems
- secured/fire/water/theft protection
• How/where is data stored?
– Paper or electronic? Is it backed up?
• Is data access secured?
– Is data locked up? Is PantherFile used?
Are office space/desk/storage areas
secure?
security.uwm.edu
Required Resources
• Department and UWM IT security staff
• Risk Assessment forms
• Meeting room
• Digital projector
• Whiteboard and markers
security.uwm.edu
Timing and Commitment
• Support from upper management
• 1 mid-level or higher unit designee dedicated
to facilitating process to completion
• Cross-representation (front-line and
management staff) from each major
business and system process
• 2-4 three-hour sessions for each group
Process should have minimal impact on
your operation during the review.
security.uwm.edu
UWM IT Security Commitment
• UWM Facilitated IT Risk Assessment
program administered by UWM IT security
staff specifically trained in IT security
• IT’s role to guide group through program
and provide professional documentation of
results
• Program provided at no cost to the campus
community - benefits are immeasurable
security.uwm.edu
Systemic Approaches Underway
• Comprehensive security policy
• Standardization of laptops and desktops
• Standardization of desktop and laptop images,
active directory (with Vista)
• Standardization of network devices
• Campus VPN
• PantherFile - security and records management
• Standardization of laptop encryption
security.uwm.edu
To request a
Facilitated IT Risk Assessment:
Please have your dean, division head
or designee
contact the
IT Risk Assessment Team at
osa-list@uwm.edu
security.uwm.edu
Facilitated IT Risk Assessment
Program
Protecting Your Business
Questions?
Please contact:
Visit the
UWM IT Security Web Site
security.uwm.edu
Steve Brukbacher, CISSP
Information Security Coordinator
sab2@uwm.edu
414-229-2224
Download