Uploaded by Mr. DevidasBhat NMAMIT IS

Unit-2

advertisement
Developing the Security
Program
Organizing for Security
As shown in Figure 5- 1, a typical large organization has an
average of one to two full-time security managers, three to four
full-time administrators/technicians, and as many as 16 parttime
staff members who have InfoSec duties in addition to their duties
in other areas. For example, a systems administrator of a
Windows 2016 server may be responsible for maintaining both
the server and the security applications running on it. The very
large organization, as illustrated in Figure 5- 2, may have more
than 20 full-time security personnel and 40 or more individuals
with part-time responsibilities.
Figure 5-4 shows the limited staffing found in smaller organizations, which
typically have either one individual who has full-time duties in InfoSec or, more
likely, one individual who manages or conducts InfoSec duties in addition to those
of other functional areas, most likely IT. This individual may have partial
supervision of one or two assistants.
Placing Information Security Within an
Organization
In large organizations, the InfoSec department is often located within an IT
division headed by the CISO, who reports directly to the CIO. Such a structure
implies that the goals and objectives of the CISO and CIO are closely aligned.
This is not always the case. By its very nature, an InfoSec program, operating as
a department within an IT division, may sometimes find itself at odds with the
goals and objectives of the broader IT division.
The vision of separate IT and InfoSec functions is shared by many executives. A
survey conducted by Meta Group found that while only three percent of the
consulting firm's clients positioned the InfoSec department outside IT, the
clients viewed this positioning as what a forward-thinking organization should
do.
Option 5: Strategy and Planning
In Figure 5-9, you will find still another possible organizational structure
found in the real world. Here the Information Security Department
reports to the Strategy and Planning Department. In this case, the
Information Security Department Manager reports directly to the Vice
President of Strategy and Planning. This option views the information
security function as critical to the success of the organization. This
option would be appropriate for an Internet merchant (a "dot-com"
enterprise) or a credit card company, both of which are critically
dependent on the success of the information security function.
Among the most critical of these components is personnel function and
their expectations, roles, responsibilities, and credentials. Maintaining
a secure environment requires that the InfoSec department be
carefully structured and staffed with appropriately skilled and screened
personnel. It also requires that the proper procedures be integrated
into all human resources (HR) activities, including hiring, training,
promotion, and termination practices.
Staffing the Security Function
Selecting an effective mix of InfoSec personnel for your organization requires that you
consider a number of criteria. Some of these criteria are within the control of the
organization; others are not, such as the supply and demand of various skills and experience
levels.
In general, when the demand for any commodity- including personnel with critical InfoSec
technical or managerial skills- rises quickly, the initial supply often fails to meet it. As
demand becomes known, professionals entering the job market or refocusing their job skills
seek to gain the required skills, experience, and credentials.
Once the supply is level with or higher than demand, organizations can become more
selective and no longer need to pay a premium for those skills. This process swings back and
forth like a clock pendulum because the real economy, unlike an econometric model, is
seldom in a state of equilibrium for long periods of time. For example, there was excess
demand for experienced enterprise resource planning (ERP) professionals in the 1990s and
for experienced Common Business-Oriented Language (COBOL) programmers at the turn of
the 21st century, because of concerns about Y2K issues.
Information Security Positions
Standardizing job descriptions can increase the degree of
professionalism in the field of InfoSec, as well as improve the
consistency of roles and responsibilities among organizations.
Chief Information Security Officer (CISO) Though not usually an executive-level position, the
chief information security officer (CISO) is usually considered the top InfoSec officer in the
organization. He or she frequently reports to the chief information officer (CIO), unless the
organization employs a chief security officer (CSO) who oversees both physical and InfoSec
areas.
Qualifications and Position Requirements
The most common qualifications for the CISO include working as a security manager as well
as experience in planning, policy, and budgets. The most common certifications include the
Certified Information Systems Security Professional (CISSP) and the Certified Information
Security Manager (CISM). A bachelor's degree is almost always required and a graduate
degree in business, technology, criminal justice, or anoth er related field is common as well.
Qualifications and Position Requirements
It has become increasingly common for a security manager to have a
CISSP or CISM. These individuals must have experience in traditional
business activities, including budgeting, project management,
personnel management, and hiring and firing, and they must be able to
draft middle-level and lower-level policies as well as standards and
guidelines. Experience with business continuity planning is usually
considered a plus.
Qualifications and Position Requirements
The technical qualifications and position requirements for a security technician vary
from one organization to another. Organizations typically prefer expert, certified,
proficient technicians.
Implementing Security Education, Training, and Awareness (SETA) Programs
Security Awareness
Project Management in Information Security
Project Management Tools
RISK MANAGEMENT: ASSESSING RISK
Introduction to the Management of Risk
in Information Security
The Information Security Risk Management Framework
Roles of Communities of Interest in Managing Risk
Additional tasks are performed by the governance group
during the framework design phase in cooperation with the
framework team. These tasks include:
• Ensuring compliance with all legal and regulatory statutes
and mandates
Executive
Governance
and Support
• Guiding the development of, and formally approving, the
RM policy
• Recommending performance measures for the RM effort
and ensuring that they
are compatible with other performance measures in the
organization
• Assigning roles and responsibilities
• Ensuring that the selected goals and objectives are
appropriate and in alignment
with the organization's strategic goals and objectives
• Providing needed resources
Framework
Design
In this stage, the framework team begins
designing the RM process by which the
organization will understand its current levels of
risk and determine what, if anything, it needs to
do to bring that level down to an acceptable level
in alignment with the risk appetite specified
earlier in the process.
Designing the RM program means not only
defining and specifying the detailed tasks to be
performed by the framework team, but also those
to be performed by the process team.
Once the framework itself has been designed and
completed at least one iteration, most of the work
of the framework team involves oversight of the
process rather than development of the
framework.
Framework Monitoring and Review
After the initial implementation and as the RM effort proceeds, the framework
team continues to monitor the conduct of the RM process while simultaneously
reviewing the utility and relative success of the framework planning function
itself. In the first few iterations, the framework team will examine how
successful it was in designing and implementing the RM framework, plan, and
RM process, and what issues required adjustments of the plan. The framework
itself only exists as a methodology to design and implement the process, so once
the framework is documented in the RM plan, the success of the process
becomes the greatest concern. Success or failure in the framework's planning
process may be relatively simple to resolve if addressed early, but issues
downstream in the actual RM process may require redesign all the way back up
to the framework and then modification of the RM plan.
The Risk Management Process
During the implementation phase of the RM framework, the RM plan guides
the implementation of the RM process, in which risk evaluation and
remediation of key assets are conducted. The three communities of interest
must work together to address every level of risk, ranging from full-scale
disasters (whether natural or human-made) to the smallest mistake made by
an employee. This process uses the specific knowledge and perspective of
the team to complete the following tasks:
RM Process Preparation-Establishing the Context
As the RM process team convenes, it is initially briefed by representatives of the
framework team, and possibly by the governance group. These groups seek to provide
executive guidance for the work to be performed by the RM process team, and to
ensure that the team's efforts are in alignment with managerial intent, as documented
in the RM policy and plan. The group is briefed on its responsibilities and set to its
work. The plan is reviewed and individual assignments given.
The context in this phase is the understanding of the external and internal
environments the RM team will be interacting with as it conducts the RM process. It
also means understanding the RM process as defined by the framework team and
having the internal knowledge and expertise to implement it. Finally, it means ensuring
that all members of the RM process team understand the organization's risk appetite
statement and are able to use the risk appetite to translate that statement into the
appropriate risk treatment when the time comes.
Risk Assessment: Risk Identification
Key Terms
Identification of Information Assets
The risk identification process begins with
the identification and cataloging of
information assets, including people,
procedures, data, software, hardware, and
networking elements. This step should be
done without prejudging the value of each
asset; values will be assigned later in the
process.
This simplistic approach may be best for organizations just starting out
in RM.
1. Identifying Hardware, Software, and Network Assets
2. Identifying People, Procedures, and Data Assets
3.
4.
5.
6.
Classifying and Categorizing Information Assets
Assessing the Value of Information Assets
Prioritizing (Rank Ordering) Information Assets
Associating Information Assets with Media
Threat Assessment
The ultimate goal of risk identification is to assess the
circumstances and setting of each information asset to reveal any
vulnerabilities. Armed with a properly classified inventory, you
can assess potential weaknesses in each information asset- a
process known as threat assessment.
Identifying Threats
12 categories of threats to InfoSec, which are listed alphabetically
in Table 6-3. Each of these threats presents a unique challenge to
InfoSec and must be handled with specific controls that directly
address the particular threat and the threat agent's attack
strategy. Before threats can be assessed in the risk identification
process, however, each threat must be further examined to
determine its potential to affect the targeted information asset. In
general, this process is referred to as threat assessment.
Assessing Threats
Not all threats endanger every organization, of course. Examine
each of the categories in Table 6-3 and eliminate any that do not
apply to your organization. It is unlikely that an organization can
eliminate an entire category of threats, but doing so speeds up
the threat assessment process. The Offline feature titled "Threats
to Information Security: Survey of Industry" describes the threats
that some CIOs of major companies identified for their
organizations. Although the feature directly addresses only
InfoSec, note that a weighted ranking of threats should be
compiled for any information asset that is at risk.
Risk Assessment: Risk Analysis
Assessing the relative risk for each vulnerability is accomplished via a
process called risk analysis. Risk analysis assigns a risk rating or score to
each specific vulnerability.
While this number does not mean anything in absolute terms, it enables you
to gauge the relative risk associated with each vulnerable information asset,
and it facilitates the creation of comparative ratings later in the risk treatment
process
Determining the Likelihood of a Threat Event
Likelihood is the overall rating- a numerical value on a defined scale- of the probability that a
specific vulnerability will be exploited or attacked.
Using this scale, the likelihood of a system being damaged by a water
leak could be rated as 1, while the likelihood of receiving at least one email that contains a virus or worm in the next year would be rated as 5.
You could also choose to use a different number scale, such as 1 to 10
or 1 to 100, depending on the granularity needed by the organization’s
process. Whatever rating system you employ for assigning likelihood,
use professionalism, experience, and judgment to determine the
rating- and use it consistently.
Assessing Potential Impact on Asset Value
Once the probability of an attack by a threat has been evaluated, the organization typically looks at the
possible impact or consequences of a successful attack. A feared consequence is the loss of asset value.
As mentioned in the section on assessing threats, the impact of an attack (most often as a loss in asset
value) is of great concern to the organization in determining where to focus its protection efforts. The
weighted tables used in risk identification can help organizations better understand the magnitude of a
successful breach. Another good source of information is popular media venues that report on successful
attacks in other organizations.
The use of a risk impact value similar to the one used for risk likelihood- ranging from o to 5- is shown in
Table 6-11
Risk Evaluation
Download