IT Security Frameworks ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks Governance Framework – specify how to do security planning and implementation Multiple framework exists CobIT ISO/IEC 27000 COSO Why are IT Security Frameworks needed? Sarbanes-Oxley Act of 2002 (SOX) Section 404 – public companies must use an internal control framework and perform annual assessments No specific framework is required PCAOB Audit Standard No. 2 A control framework should be used to test the effectiveness of accurate financial reporting Information can be the most valuable asset a company has Two Popular IT Security Frameworks COBIT & ISO 27000 FAMILY CobIT Control Objectives for Information and Related Technology Developed in conjunction with the “Big Four” accounting firms Published by the IT Governance Institute Broad framework to implement IT controls CobIT Focuses on four areas of control Planning and Organization (Plan) Acquisition and Implementation (Do) Delivery and Support (Check) Monitoring (Correct) 34 high level control objectives 318 detailed control objectives CobIT Maturity Model Tool for management to go through the company’s current IT process and determine if they are effective or non-existent Assists in determining which areas require more effort Once the environment has been assessed, management can develop: Critical success factors Key performance indicators Key goal indicators CobIT Plan and Organize Necessary to ensure objectives of “Acquire & Implement” and “Delivery & Support” are met Establish the corporate vision Determine level of acceptable risk Focuses on the best way to implement the IT structure CobIT Plan and Organize Control Objectives 1. PO1 – Define a strategic IT plan 2. PO2 – Define the information architecture 3. PO3 – Determine technological direction 4. PO4 – Define the IT processes, organization, and relationships 5. PO5 – Manage the IT investment 6. PO6 – Communicate management aims and direction 7. PO7 – Manage IT human resources 8. PO8 – Manage quality 9. PO9 – Assess and manage IT risks 10. PO10 – Manage projects CobIT Acquire and Implement After planning is completed, the company must determine how to implement the new internal control process Can involve acquiring new technologies CobIT Acquire and Implement Control Objectives 1. AI1 – Identify automated solutions 2. AI2 – Acquire and maintain application software 3. AI3 – Acquire and maintain technology infrastructure 4. AI4 – Enable operation and use 5. AI5 – Procure IT resources 6. AI6 – Manage changes 7. AI7 – Install and accredit solutions and changes CobIT Deliver and Support Controls cost Guarantees the three initiatives of confidentiality, availability, and integrity are in place Ensures new controls are maintained CobIT Deliver and Support Control Objectives 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. DS1 – Define and manage service levels DS2 – Manage third party services DS3 – Manage performance and capacity DS4 – Ensure continuous service DS5 – Ensure systems security DS6 – Indentify and allocate costs DS7 – Educate and train users DS8 – Manage service desk incidents DS9 – Manage the configuration DS10 – Manage problems DS11 – Manage data DS12 – Manage the physical environment DS13 – Manage operations CobIT Monitor and Evaluate Measures if the controls implemented are sufficient Assurance that the company is meeting regulatory requirements Attends to the issue of ongoing evaluation CobIT Monitor and Evaluate Control Objectives ME1 – Monitor and evaluate IT performance ME2 – Monitor and evaluate internal controls ME 3- Ensure compliance with external requirements ME4 – Provide IT governance CobIT Broad framework, covering a large range of internal controls Does not give specific ways to make the companies information more secure ISO 27000 Series Issued by the International Standards Organization Popular globally, used by companies within the US and those abroad Includes multiple standards 27001 27002 27003 27004 27005 27006 27007 27008 ISO 27000 Series ISO 27001 “Specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving a documented Information Security Management System.” ISO ISO 27002 Focuses on information security and lists controls and control mechanisms which can be implemented to comply with ISO 27001 ISO 27000 Series ISO 27002 Covers 11 main areas of information security management 1. Security Policy – creating policies based on the organization’s needs 2. Organization of Information Security – managing of the security infrastructure 3. Asset Management – assigning responsibility for assets & physical security of the assets 4. Human Resource Security – personnel screening, code of conduct, training, and a process to address violations 5. Physical & Environmental Security – analyzing the environment, securing physical perimeter, and appropriate controls ISO 27000 Series ISO 27002 6. Communications and Operations Management - ensures correct and secure operations of assets 7. Access Control – “Properly protect access to an organization’s information, such as controls required to combat hacker attempts and other malicious attempts to access organization networks and information.” –Wallace 8. Information Systems Acquisition, Development, & Maintenance – discusses security requirements needed 9. Information Security Incident Management – plan for reporting and managing security events, incidents, and weaknesses ISO 27000 Series ISO 27002 10. Business Continuity Management – plans to address disruptions in normal operations and ongoing reassessment of plans 11. Compliance – “is intended to ensure that the organization avoids breaches of any criminal or civil law, as well as any statutory, regulator or contractual obligations, and of any security requirements.” - Calder ISO 27000 Series If all controls are implemented properly the company with be in compliance with SOX (in regards to IT security) Focuses solely on IT security CobIT vs. ISO 27000 Series Compare Both relate to IT controls Created based on past experience Continuously refined Contrast CobIT is a broad framework on how to implement internal controls ISO focuses exclusively on IT security Combination of CobIT & ISO 27000 provides an organization the best IT security. ISO 27000 and CobIT Mapping IT Governance institute has created a mapping between ISO 27000 and CobIT Links ISO 27000 control objectives to each dimension in the CobIT framework Results in a framework is high level enough to be integrated with IT governance and overall corporate governance Also detailed enough to provide mangers with the necessary steps to implement these controls ISO 27000 and CobIT Mapping CobIT: Deliver & Support 5.2 Relates to identification, access, and authorization “The logical access to and use of IT computing resources should be restricted by the implementation of adequate identification, authentication and authorization mechanisms, linking users and resources with access rules.” (IT Governance, COBIT Mapping) ISO 27000 and CobIT Mapping ISO objectives (listed in parenthesis next to detail below) state exactly what should be done to meet the requirements of COBIT DS5.2 Access of third parties should be controlled (4.2). Adequate privilege management should be included in application systems. Authorizations should be documented and follow a defined process (9.2.2). Passwords should be used for authentication. Passwords should be given to identified users in a secure manner and not in unprotected electronic mail messages (9.2.3). Access controls to internal and external networked services should be in place (9.4). ISO 27000 and CobIT Mapping User authentication for external connections should be controlled. Access restrictions should be based on a risk assessment. Authentication should consider hardware tokens, challenge/response protocols, dial-back or other mechanisms (9.4.3). Authentication mechanisms should be based on node authentication, if applicable (9.4.4). Access controls (e.g., key locks) should ensure that only required access can be obtained. This should include procedures and arrangements (9.4.5). Special access controls should be in place for shared networks (9.4.7). Identity should be verified as part of operation system access control. Identification of the user’s location should be considered (9.5). ISO 27000 and CobIT Mapping Connection to specific locations should be based on automatic terminal identification, when appropriate (9.5.1). Requirements for terminal logon procedures (e.g., maximum number of unsuccessful logon attempts) provided in the ISO standard should be considered (9.5.2). A unique user ID should be required for all individuals. Users’ privileges should not be identifiable by the user ID. A shared user ID should be used only when a clear business case exists. Identification and authentication can be based on passwords, biometric technologies or a combination of technologies (9.5.3). A good password management system raises the quality of passwords and should be implemented. Requirements for password management systems are provided in the ISO standard (9.5.4). Access should be ended after defined time-out delay. Alternatively, screen savers that prevent unauthorized access to terminals can be used (9.5.7). Conclusion SOX strong focus on internal controls has required organizations to implement an IT governance framework Companies must review and report on internal controls with management and external auditors A combination of CobIT and ISO 27000 series is the best way to ensure compliance