Uploaded by vrushalee

11115 BuildingaGovernmentCyberSecurityProgram DAKIN

advertisement
Colorado Cyber Security Program (CCSP)
Risk Based Gap Analysis (RBGA) and
Statewide Security Planning Update
Rick Dakin, Security Strategist
September 18, 2007
V 1.4
Agenda
 Risk and Threat Review
 CCSP Program Overview


Cyber Security Program
Policies, Plans and Standards
 Risk Based Gap Analysis (RBGA) Program





Process Inventory and System Characterization
Risk Assessment and Gap Analysis
Security Plans
Remediation and Gap Closure Plans
Test and Accredit Operations
 Questions and Open Discussion
2
Security Program Drivers
Enterprise Security Program
Critical Drivers
More
Regulatory
Requirements
Increasing
Cyber
Threats
Reduced
Tolerance
for Service
Disruption
3
Compliance Trends
A Brief History of
Regulatory Time
19701980
 Privacy Act of
1974
 Foreign Corrupt
Practice Act
of 1977
19902000
19801990
 Computer Security Act
of 1987





EU Data Protection
HIPAA
FDA 21CFR Part 11
C6-Canada
GLBA
2000Present
 COPPA
 USA Patriot Act
2001
 EC Data Privacy
Directive
 CLERP 9
 CAN-SPAM Act
 FISMA
 Sarbanes Oxley
(SOX)
 CIPA 2002
 Basel II
 NERC 1200
(2003)
 CISP
 Payment Card
Industry (PCI)
 State Privacy
Laws
4
CCSP Program Overview
RBGA
Draft Versions
HB 06-1157 was incorporated into Colorado Revised
Statute 24-37.5 part 4 in May 2006. The legislation
established the Colorado Information Security Act with
the following provisions:





Designate Chief Information Security Officer (CISO)
Develop Colorado Cyber Security Program (CCSP)
Publish Cyber Security Rules and Associated Policies
Submit an Annual Agency Cyber Security Plans (ACSP)
Include a Plan of Action and Milestones (POAM) with the
ACSP (3 year phase-in period to achieve compliance with the CCSP)
 Implement a Statewide Incident Response Program
 Enhance Statewide Security Awareness and Training
 Establish Security Evaluation and Reporting to Enforce the
Program
5
Security Policies & Rule Review
 Emergency Rule adopted December 20, 2006
 Hearing conducted on January 5, 2007
 Final Rule becomes effective early March, 2007
19 Policies:
Organizational Policies
Cyber Security Planning
Incident Response
Information Risk Management
Vendor Management
Self Assessment
Security Training and Awareness
Security Metrics and Measurement
System Access and Acceptable Use
Online Privacy
Operational Policies
Data Classification and Disposal
Mobile Computing
Wireless Security
Network Operations
System and Application Security
Access Control
Change Control
Physical Security
Personnel Security
Disaster Recovery
6
Risk Based Gap Analysis
(RBGA) Program
The RBGA program was intended to coordinate agency
security planning and provide “expert” resources to jump
start the planning process. The process included:
 Provide orientation to agencies on new CCSP and policies
 Identify major systems and rate criticality
 Review current security programs and existing policies,
procedures and plans
 Facilitate agency Risk Based Gap Analysis (RBGA) for major
systems
 Facilitate development of DRAFT Agency Cyber Security Plans
(ACSP) with integrated Plan of Action and Milestones (POAM)
 Support development of an executive briefing to align new
Executive Directors to the risks within agency systems and plans
to mitigate risks before submittal
7
Security Planning Process
Developed by: The National Institutes of Standards and Technology
8
Risk Management
Process
NIST SP 800-30 is an
industry “Best Practice”
referenced by the FFIEC to
guide our risk assessment.
1. Inventory and
Characterize Systems
2. Threat Identification
3. Vulnerability
Assessment
4. Likelihood
Determination
5. Impact Analysis
6. Recommend Risk
Controls
9
The Ingredients of an Attack
Threat + Motive + Method + Vulnerability = ATTACK!
NonMalicious
Threats
Security
Controls &
Policies
Poor Security
Policies could
Let an attack
through
Methods
and
Tools
Malicious
Threats
Motives
and
Goals
Methods
and
Tools
Vulnerabilities
Methods
and
Tools
Natural
Disasters
ASSETS
Good security
controls can stop
certain attacks
NO security policies or
controls could be disastrous
10
Systems Characterization
 What do you do?



Mission critical processes
Key stakeholders
Map processes
 How important are those functions?


Criticality rating (FIPS 199)
Priority for risk analysis and deployment of controls
 What Systems are used?



Systems Inventory (applications, host platforms)
Service Providers
Diagrams.
11
Threat Identification
Human
 Terrorist
 Hacker
 Disgruntled
Employee
 Vendors
 Untrained Staff
Non-Human






Acts of Nature
Fire
Power Failures
Contamination
Configuration
Errors
Systems
Obsolescence
12
Vulnerability Assessment
 What systems and processes are used to support critical
operations ?





Servers
Software
Network Connectivity
User Access
Standard processes
 What vulnerabilities could be exploited?






Patch levels
Unnecessary services
Security architecture
Monitoring and reporting
Access Controls
User behavior
13
Risk Analysis
LIKELIHOOD
HIGH
LOW
HIGH
SEVERITY
14
Sample Risk Assessment
Risks / Hazards
Controls Deployed
Recommended Remediation
 Security oversight
may not identify
and prioritize risk
mitigation
 IT Steering
Committee
 Dedicate an Information Security
Officer (ISO) to oversee development
of the security program
 Formally establish an IT security
committee with specific duties
 IT security policy
gaps fail to guide
staff behavior
 Only limited informal
security policies
 A complete set of policies should be
developed according to best practices
 Policies approved by IT Steering
 Staff Trained
 Business Continuity
& Disaster
Recovery plans are
not adequate
 Some system
hardening and limited
recovery plans or
facilities are in place
today
 A BCP/disaster recovery plan will
have to be developed
 Deploy redundant facilities
 Train staff
 Update and test annually
 Physical security
does not protect
critical systems
 Physical security is
limited only to the
data rooms
 Develop and deploy a comprehensive
physical Security policy and plan for
facility access, data center, access to
network wiring infrastructure, media
 Unauthorized
access to data
 Weak passwords
 Shared accounts
 Limited access
granting process
 Upgrade Access controls
Access granting process
Unique user ID
Strong passwords (complexity)
15
Point Solutions
Intrusion
Detection
Firewalls
Access
Controls
Vulnerability
Assessment
16
Unified Security Programs
PCI
SOX
HIPAA
GLBA
ISO-17799
Privacy Laws
Training
Sec.
Doc.
Unified IT
Controls
Access
Controls
Security
Policy
Security Arch.
Design
Code Penetration
Review
Testing
NIDS/HIDS
Hosting
Firewall
Virus
Protection
17
Measure Control Effectiveness
CoBIT Metrics
Control Design Adequacy
1
Controls Designed
and Selected
2
Control Effectiveness
3
4
5
Control Deployed
With
REPEATABLE
processes
Controls
Documented
 Policies
 Procedures
 Inventories
 Diagrams
Oversight Provided
 Control
effectiveness
reports
 IT oversight
• Evidence or work
papers from
internal or external
reports / meeting
minutes
• Formal
accountability
assigned
Program Adjustment
after Justification
Level 2 –
security controls
documented as
procedures
Level 3 –
procedures have
been
implemented
Level 4 – procedures
and security controls
are tested and
reviewed
Level 5 – procedures
and security controls
are fully integrated
into a comprehensive
program
Steering Committee
review and
recommendations, etc
NIST Metrics
Level 1 –
control objective
documented in a
security policy
18
Security Plans
Leverage NIST SP 800 – 100 and SP 800-18
 Organization Mission
 Summary of Environment
 Roles and Responsibilities
 Summary of Risks
 Selection of Controls
 Deployment and Training
 Test and Audit of Control Effectiveness
 Accredit Systems Operations
 Process to Enhance Plans
19
Plan of Action and Milestones
(POAM)
Goal: Each risk assessment will identify gaps in current
security plans that should be remediated by priority.
Nov 07
Dec 07
Jan 08
Feb 08
Mar 08
Jul 08
Risk Assessment
Draft Security Plan
Update Policies
Remediate Gaps
Document and Train
Executive Briefing
Update Security Plans
Test and Accredit System
20
Lessons Learned
 New processes take time … Start Early
 New security planning processes require training
… even with seasoned IT professionals
 It takes time and resources to deploy and manage
controls … get key executives involved early to
start planning budget impact
 Why does it cost so much to protect systems that
don’t cost very much?
 Even with a great security plan, you may still get
compromised. Have an IR Plan.
21
Open Discussion
 Questions
 Feedback
 Next Steps – “What can you do?”


Form a security oversight team
Launch a program with a Risk Assessment First
http://www.colorado.gov/cybersecurity/
22
Related documents
Download