A PREZENTÁCIÓ CÍME, Arial Narrow, 32 pt

advertisement
Information Security and Privacy Regulations in the EU
Dr. Arpad Janko, CISA, CISSP
Agenda
• Information Security – Introduction
• Risk Management
• Information Security Regulations
• How it works in Hungary
• Privacy Regulations
KFKI PRESENTATION ÉLŐLÁB
2
Information Security - General
• What is Information Security?
• Information security is is defined by ISO 17799 as the protection of information
from a wide range of threats in order to ensure business continuity
• Information can exists in many forms
•
•
•
•
Represented electronically
Printed on paper
Shown on films
Spoken in conversation
KFKI PRESENTATION ÉLŐLÁB
3
Information Security - General
• Confidentiality
• Keeps information private
• Integrity
• Keeps information accurate, complete and authentic
• Availability
• Keeps information available
KFKI PRESENTATION ÉLŐLÁB
4
Information Security - Threats
• Potential threats that may arise
• Interception of communications
• Unauthorized access into computers and computer networks
• Network disruptions
• Execution of malicious software
• Malicious misrepresentation
• Environmental and unintentional events
• Social Engineering
• Denial of Service Attack
KFKI PRESENTATION ÉLŐLÁB
5
Information Security - Impact
• Potential impact of security breaches
• Business/operational activities are suspended or partially suspended
• Classified business/operational data are made available to competitors and
unauthorized parties
• Private data abused
• Fraudulent manipulation of data
• Legal issues
• Damage to reputation
• Loss of both tangible and intangible assets (e.g. IT systems, liabilities,
compensation, etc.)
KFKI PRESENTATION ÉLŐLÁB
6
Security Risk Management
• Risk = function (Threat, Impact)
• Risk Management
• Risk assessment
• Calculating risks
• Risk handling:
• Mitigation, Acceptance, Transfer, Ignorance
• Risk Tolerance
• Implement and maintain a set of control
• Administrative, technical and physical controls
KFKI PRESENTATION ÉLŐLÁB
7
Security Risk Management
• Driving factors
• The number and severity of security breaches has increased dramatically
• Stakeholder demand has increased
• Self-initiatives are not effective
• Resulted in
• Growing regulatory activity
• Statutory and regulatory requirements (e.g. defining frameworks, mandating or
recommending certain technologies, or controls)
• Compliance with these requirements results in lower risk exposure
• Financial, government and telecommunication sectors are the most regulated
ones
KFKI PRESENTATION ÉLŐLÁB
8
Regulations
• Standards and guidelines
• Standards are not necessarily binding directly, but can be mandated or
recommended by laws
• Guidelines are not mandatory
• Guidelines help to implement the requirements of standards
• Statutory requirements
• Laws, acts, bills
• Legally binding documents
KFKI PRESENTATION ÉLŐLÁB
9
Regulations
• Based on geographical area
• Global (International regulations)
• E.g. ISO/IEC, OECD Guidelines, Basel II, Convention on Cybercrime
• Regional
• EU: E.g. ETSI, EU Directives
• North-America: E.g. ANSI, SOX
• Local (National regulations)
• E.g. MSZ 27001:2006, BS25999
• Based on Scope
• General
• Specific for a certain industry vertical
• Financial, Government, Telecommunications, Retail, Health, Educations, etc.
KFKI PRESENTATION ÉLŐLÁB
10
Standards, Guidelines
• Standards
• De-jure (e.g. ISO)
• De-facto (e.g. RFC)
• Based on content
•
•
•
•
•
•
Information Security Management (e.g. ISO/IEC 27001)
Technical, technological (e.g. encryptions, etc.)
Process-oriented (e.g. ITIL, ISO13335-2)
Countermeasures (e.g. ISO/IEC TR 15947 Intrusion Detection Framework)
Auditing (e.g. IAS, PCAOB AS 5)
Certification (Common Criteria)
• Standardization bodies
• ISO, ANSI, EITF
KFKI PRESENTATION ÉLŐLÁB
11
Standards, Guidelines
• ISO/IEC
• ISO/IEC 27000 family
• ISO/IEC 13335 – Guidelines for the Management of IT Security
• ISO/IEC 15408 – Common Criteria
ISO/IEC 18044 - Information security incident management
ISO/IEC 18028-1 – Network Security Management
ISO/IEC 18028-2 – Network Security Architecture
ISO/IEC 18028-3 – Securing communications between networks using security
gateways
• ISO/IEC 18028-4 - Securing remote access
• ISO/IEC 15947 – IT Intrusion Detection Framework
•
•
•
•
KFKI PRESENTATION ÉLŐLÁB
12
Standards, Guidelines
• ISMS family of standards (ISO/IEC 27xxx)
•
•
•
•
ISO/IEC 27001 – ISMS (BS 7799-2)
ISO/IEC 27002 – ISO/IEC 17799 (BS 7799-1)
ISO/IEC 27005 – Guidelines for information security risk management
ISO/IEC 27006 – Guide to ISMS certification process
ISO/IEC 27003 – ISMS implementation guide
ISO/IEC 27004 – Information security management measurements
ISO/IEC 27007 - Guideline for ISMS auditing
ISO/IEC 27011 - ISMS implementation guideline for the telecommunications
industry
• ISO/IEC 27034 - a guideline for application security
•
•
•
•
KFKI PRESENTATION ÉLŐLÁB
13
Standards, Guidelines
• ISO/IEC 27001 – ISMS (BS 7799-2)
• ISMS: Information Security Management System
• Model for establishing, implementing, operating, monitoring, reviewing,
maintaining and improving an.
• Process approach - "Plan-Do-Check-Act" (PDCA)
KFKI PRESENTATION ÉLŐLÁB
14
Standards, Guidelines
• ISO/IEC 27002 – ISO/IEC 17799 (BS 7799-1)
• Code of practice for information security management
• Security domains
•
•
•
•
•
•
•
•
•
•
•
Security Policy
Organizing Information Security
Asset Management
Human Resources Security
Physical and Environmental Security
Communications and Operations Management
Access Control
Information Systems Acquisition, Development and Maintenance
Information Security Incident Management
Business Continuity Management
Compliance
KFKI PRESENTATION ÉLŐLÁB
15
Standards, Guidelines
• ISO/IEC 27002 – ISO/IEC 17799 (BS 7799-1)
• Each domain contains multiple security categories
• Each main security categories contains
• Control objective
• One or more controls
• The most widely accepted Information Security standard
• Can be linked to other IT or Information Security framework, standard
• E.g. ISO 27xxx, ITIL, COBIT
KFKI PRESENTATION ÉLŐLÁB
16
Standards, Guidelines
• Common Criteria - ISO/IEC 15408
• Framework for system security evaluation and certification
• International standard
• Unlike its predecessors
• Orange Book (US), ITSEC (EU), CTCPEC (CA)
• More flexible than its predecessors
• Custom evaluation profiles
• Provides assurance about security capabilities
• computer system users specify their security requirements
• vendors implement the security attributes of the products
• testing laboratories evaluate the products
KFKI PRESENTATION ÉLŐLÁB
17
Standards, Guidelines
• International standards
•
•
•
•
•
ISO/IEC 27001:2005
ISO/IEC 17799:2005
ISO/IEC 15947
ISO/IEC 15408 (CC)
Etc.
KFKI PRESENTATION ÉLŐLÁB
->
Local standards
->
->
->
->
MSZ ISO/IEC 27001:2006
MSZ ISO/IEC 17799:2006
MSZ ISO/IEC 15947
MSZ ISO/IEC 15408
18
Standards, Guidelines
• COBIT
• Control Objectives for Information and related Technology
• De-facto Standard
• IT governance framework and supporting toolset
•
•
•
•
Bridge the gap between business and IT
Enhance delivery of value by IT (business enabler)
Emphasizes regulatory compliance and risk management
Performance measurement ->effective resource utilization
• Umbrella framework - Aligned with other frameworks
• E.g. COSO, ISO/IEC 27001, ISO/IEC 27001
• Promoted by numerous regulations/regulator body
• E.g. SOX, Hungarian Financial Supervisory Authority (HFSA)
KFKI PRESENTATION ÉLŐLÁB
19
Standards, Guidelines
• COBIT
• Current version 4.1
• Structured by IT processes – 34 core IT process
• How to control (control objectives)
• How to manage (I/O, RACI)
• How to measure (maturity model)
• 34 IT Process grouped into 4 domains
•
•
•
•
Plan and Organize
Acquire and Implement
Deliver and Support
Monitor and Evaluate
KFKI PRESENTATION ÉLŐLÁB
20
Standards, Guidelines
• Basel II
•
•
•
•
International regulation
Promote greater stability in the financial system
Rigorous risk and capital management requirements
Operational risk management
• PCI DSS
• International regulation
• VISA, MC, American Express, Discover, Diner’s Club, JCB
• Protecting credit card data
KFKI PRESENTATION ÉLŐLÁB
21
EU Legislation
• EU legislation hierarchy
• Regulations
• Directives
• Decisions
• Recommendations
• Communications
• Green and white papers
KFKI PRESENTATION ÉLŐLÁB
22
EU Legislation
• Regulations
• Have general application, i.e. they are applicable to all those falling within their
scope
• Are directly applicable and binding to every Member State
• Do not require any national legislative act to support them. This means that
they become national legislation without any further adjustment and act just like
any other law of the country.
• Directives
• Require a formal legislative act to transpose them into national law
• Each Member State has the freedom to choose the specific measures to
achieve the desired goal or target designated in a Directive.
• However many Directives are quite detailed, which leaves the Member States
less room to choose of measures.
• More detailed Directives ensure greater consistency throughout the EU.
KFKI PRESENTATION ÉLŐLÁB
23
EU Legislation
• Decisions
• Are directed at specific recipients (one or more Member States, private citizens,
enterprises, etc.)
• Are binding upon those to whom they are addressed.
• Recommendations
• Are issued to encourage desirable coordinated actions in a given policy field
when the EU does not want or cannot issue legally binding acts
• Are declaratory, non binding acts
• May bear political weight
• In the field of public health, Recommendations are the only type of act that the
EC can adopt and they are used to help Member States formulate and
implement coordinated objectives and strategies.
KFKI PRESENTATION ÉLŐLÁB
24
EU Legislation
• Communications
• Their nature may vary significantly
• to explain and present a new piece of legislation or a new policy
• documents where the Commission explains its planned actions or policy
• Are not legally binding
• but they may incorporate the proposal for future legislation
• Green and White Papers
• Specific type of Communication to hold discussions with European civil society
or other Institutions
• With the purpose of developing future legislation
• A Green Paper is a discussion document at the very first step, which normally
does not include any legislative proposal
• Paves the way towards the drafting of a proposal.
KFKI PRESENTATION ÉLŐLÁB
25
ENISA
• ENISA: European Network and Information Security Agency
• Established in 2001
• Centre of Expertise for the EU Member States and EU Institutions in
Network and Information Security
• Advising/assisting EU-institutions and the Member States on information
security
• Collecting/analyzing data on security incidents in Europe and emerging risks
• Promoting risk assessment and risk management methods
• Awareness-raising
• Co-operation between different actors in the information security field (EUinstitutions, the Members States and the private business & industry actors)
• Switchboard of information for best practices
KFKI PRESENTATION ÉLŐLÁB
26
EU Legislation - Key EU Documents
• 8th Company Law Directive (2006/43/EC) on Statutory Audits of
Annual and Consolidated Accounts
• Discussed later
• A Community framework for electronic signature (1999/93/EC)
• The purpose is to facilitate the use of electronic signatures and to contribute to
their legal recognition
• Establishes a legal framework for electronic signatures and certain certificationservices
• Directives on data protection (1995/46/EC) and privacy in electronic
communications (2002/58/EC)
• Discussed later
• Directive on electronic commerce (2000/31/EC)
KFKI PRESENTATION ÉLŐLÁB
27
EU Legislation - Key EU Documents
• Directives on electronic communication networks and services
(2002/19/EC – 2002/22/EC)
• Framework Directive, Authorization Directive, Universal Service Directive,
Access Directive
• Regulation (EC) No 1007/2008
• Establishing the European Network and Information Security Agency (ENISA)
• Communication (COM/2008/199) on Preparing Europe's digital future
i2010 Mid-Term Review
• Communication (COM/2007/285 final) on the evaluation of ENISA
• Convention on Cybercrime
• Discussed later
KFKI PRESENTATION ÉLŐLÁB
28
EU Legislation - EuroSOX
• US and EU accounting scandals
• Enron, Worldcom, Parmalat
• With the aim to restore investor confidence in the EU
• SOX, C-SOX, J-SOX, EuroSOX
• Closely follow the US regulations
• EuroSOX
•
•
•
•
to safeguard shareholder’s investments
establish Corporate Governance
increase disclosure requirements
establish separate audit committees.
• Affects only publicly traded companies
KFKI PRESENTATION ÉLŐLÁB
29
EU Legislation - EuroSOX
• Consists of in total 3 separate Directives
• 4th Directive 78/660/EEC - Annual Accounts of specific type of companies
• 7th directive 83/349/EEC - Consolidated Accounts
• 8th directive 84/253/EEC
• Company Law Directive and Corporate Governance
• Company Law Directive on Statutory Audit
• Committees and Interpretations
• The 8th Company Law Directive and Corporate Governance
• The impact of MiFID on corporate governance
• The role of the board of directors and executive management
• Internal controls and external auditors
KFKI PRESENTATION ÉLŐLÁB
30
EU Legislation - EuroSOX
• 8th directive 84/253/EEC
• The 8th Company Law Directive on Statutory Audit
• Approval, continuing education and mutual recognition of statutory auditors and
audit firms
• Registration of statutory auditors and audit firms
• Professional ethics, independence and objectivity
• Auditing standards
• Audit reporting
• Auditors' liability
• The 8th Company Law Directive: Committees and Interpretations
• The European Group of Auditors’ Oversight Bodies (EGAOB)
• The Audit Regulatory Committee (AuRC)
• The European Forum on Auditors’ Liability
KFKI PRESENTATION ÉLŐLÁB
31
EU Legislation - Convention on Cybercrime
• First international treaty on crimes committed via the Internet and
other computer networks
• E.g. infringements of copyright, computer-related fraud, child pornography and
violations of network security
• Involvement
•
•
•
•
Created by the EU, US, Canada and Japan
Signed in Budapest in 2001
Signed by 43 counties
Hungary ratified among the first countries
KFKI PRESENTATION ÉLŐLÁB
32
EU Legislation - Convention on Cybercrime
• Purpose
• To harmonize national laws
• To improve investigative techniques
• To increase cooperation among nations
• Contains a series of powers and procedures (e.g. search of
computer networks and interception).
KFKI PRESENTATION ÉLŐLÁB
33
EU Legislation
• EU legislation -> Local legislation
• Directive may be mapped to one or multiple legislation pieces (acts, decrees,
etc.)
• Directive 1999/93/EC of the European Parliament and the Council on a Community
framework for electronic signature -> Hungarian Act 2001/XXXV
• 8th Company Law Directive on Statutory Audit is mapped to multiple legislation
pieces due to its complexity
KFKI PRESENTATION ÉLŐLÁB
34
Hungarian Laws and Regulations
• Local Legislation
• Mirrors global legislation
• Adapts global legislation considering local conditions
• ISO/IEC Standards
• ISO/IEC 17799:2005
• MSZ ISO/IEC 17799:2006
• IBIK (Information Security Management System)
• Government Decree 84/2007
• ISO/IEC 27001:2005
• MSZ ISO/IEC 27001:2006
• Also other ISO/IEC standards
KFKI PRESENTATION ÉLŐLÁB
35
Hungarian Laws and Regulations
• 8th Company Law Directive (2006/43/EC) on Statutory Audits
• 2007/LXXV. Act on Statutory Auditors
• Common Criteria
• Government IT Committee’s Proposal: IT Hungarian IT Security Evaluation and
Certification Schema (MIBÉTS)
• COBIT promoted by
• Hungarian Financial Supervisory Authority (PSZÁF)
• State Audit Office of Hungary (ÁSZ)
KFKI PRESENTATION ÉLŐLÁB
36
Hungarian Laws and Regulations
• Convention on Cybercrime
• Hungarian Criminal Code has been modified
• Privacy Law
• 1992/LXIII Act, Hungarian Privacy Act
KFKI PRESENTATION ÉLŐLÁB
37
How it Works
• Implementation
• „Member States shall bring into force the laws, regulations and administrative
provisions necessary to comply with this Directive before xxxx”
• Member States are mandated to comply with EU legislation
• Significant difference between the government and financial sectors
• Financial sector (also other business segments)
•
•
•
•
Influence of foreign companies in business sector
Higher awareness and maturity level
Regular audits (1-2 years)
No serious consequences of audit findings
KFKI PRESENTATION ÉLŐLÁB
38
How it Works
• Government Sector
•
•
•
•
•
Low security awareness
Low compliance awareness
Regular audits (1-2 years)
No serious or no consequences at all
Advanced eGovernance
• IS consultant companies may raise the compliance awareness level
• Key success factors
• Enforcement
• Security Awareness
KFKI PRESENTATION ÉLŐLÁB
39
Privacy Regulation
• Europe <-> USA
• Different approach
• US: sectoral approach that relies on a mix of legislation, regulation
• EU: comprehensive legislation
• Safe Harbour
• Bridges the two approaches
• Data Protection Directive (97/66/EC)
• The Privacy and Electronic Communications Directive (2002/58/EC)
•
•
•
•
A complement to the Data Protection Directive
Due to the growing online marketing practices
Free movement of lawfully obtained personal data within EU member states
Internet and telephone lines
KFKI PRESENTATION ÉLŐLÁB
40
Privacy Regulation
OECD Guidelines on the Protection of Privacy and Transborder
Flows of Personal Data
•
•
7 privacy principles
•
•
•
•
•
•
•
•
Collection Limitation
Data Quality
Purpose Specification
Use Limitation
Security Safeguards
Openness
Individual Participation
Accountability
Hungary
•
•
1992/LXIII Act - Privacy Act
KFKI PRESENTATION ÉLŐLÁB
41
Thank You
Dr. Arpad Janko, CISA, CISSP
Janko.Arpad@kfkizrt.hu
KFKI PRESENTATION ÉLŐLÁB
42
Questions
•
Which one is not part of the EU legislation hierarchy?
1.
2.
3.
4.
•
Communications
Directives
Regulations
Red Papers
Which one is meant to restore investor confidence in the EU?
1.
2.
3.
4.
Data Protection Directive
EuroSOX
Common Criteria
COBIT
KFKI PRESENTATION ÉLŐLÁB
43
Download