NYS Forum Joint Initiative Security, Project Management & Business Continuity Workgroups Manage Risk by Building Information Security into Your Projects Addendum to the NYS Project Management Guidebook May 26, 2010 Deborah Snyder, CISSP, GIAC GSLC, PMP NYS Office of Temporary & Disability Assistance (518) 473-3195 Deborah.Snyder@otda.state.ny.us Mark Spreitzer, CBCP CGI Group Inc. 917.304.1966 mark.spreitzer@cgi.com Agenda • Welcome and Announcements • • Chuck Weiss Project Management, Information Security & Business Continuity Work Groups – Introductions – PM lifecycle & the Secure SDLC – Risk Management – Relationship to PM processes – 5-Phase Secure SDLC Process – Framework for applying Security & BC considerations to each Phase – Benefits – Resources • Q&A 2 Introduction Project Management Work Group • Co-Chairs • • • • Brenda Breslin, (NYS Department of Health), Vivian Conboy, (Dept. of Tax & Finance), Chris Foster, (CGI Technologies and Solutions Inc.), Jon Haverly, (Keane Inc.) • Overview • Support government entities and their PMs • • • as they adopt PM standards and practices, establish PMOs, implement program and portfolio management within their organizations • PM Community of Practice provides interactive exchange of ideas, practices, and lessons learned • PMO Roundtable to support PM implementation methods3 3 Introduction Security Work Group • Co-Chairs • Deb Snyder (NYS OTDA), Bob Spina (CISCO), Joe Lynch (ORACLE) & Ted Phelps (SUNY) • Overview • Work in collaboration with state & local agencies to develop education/training opportunities & tools that address information security issues • Support the Information Security Community of Practice • Strong working relationships with NYS OFT/CIO & the Office of Cyber Security & Critical Infrastructure Coordination (CSCIC) • International MS-ISAC Security Webcasts • Educational workshops, seminars & events 4 4 Introduction Business Continuity (BC) Work Group • Co-Chairs: • • • • David DeMatteo (SEMO) Ken Mason (SED) Mark Spreitzer, CBCP (CGI) Overview: • • • • • Primary focus is on the ”how to” of business continuity planning Intended to help facilitate “best practice” development amongst state and local resources & representatives of the IT Corporate Roundtable Provide education & training opportunities Collaborate on tools that address BC planning needs Work to emphasize the importance of BC planning in NYS Government, in lieu of an explicit requirement 5 5 From an Operational Perspective… Project Management Life Cycle • • • • • Focus on Implementation Management roles & responsibilities Framework for planning & managing work Develop & manage project plan (scope, schedule) Distinguish PM effort from SD effort Phase Relationships • Origination Initiation System Development Life Cycle • Initiation • Planning Acquisition/ Development • Implementation/ Assessment • Execution Closeout Operations & Maintenance Focus on Operations Technical roles & responsibilities Framework for solving business needs with technology Design & construct system components (modules, databases) Distinguish SD effort from PM effort Production Disposal 6 6 Secure SDLC (High Level) PM Life Cycle SDLC SSDLC Focuses on Information Security & Business Continuity Origination Preparation Initiation Initiation Risk Level & Security Planning Acquisition/ Development Security Requirements & Controls Implementation/ Assessment Security Testing Documentation, C&A Operations & Maintenance Acceptance & Change Management Disposal Disposition / Transition Planning Execution Execution Closeout Maintenance 7 Secure System Development Life Cycle (SSDLC) Principles • • • • • • • • To be effective, information security must be integrated from inception of the project and ensured adequate consideration throughout the SDLC. Information security controls applied to a particular information system must be commensurate with its criticality and sensitivity. SSDLC - conceptual framework to ensure this occurs… Structured process and core set of analysis steps and planning considerations to integrate info-security into the SDLC Helps identify, evaluate & minimize info-security risk Defines info-security requirements, appropriate security level & measures/controls to adequately protect the asset Produces clear, well-documented information security plan Based on industry standards, well-established practices, fundamental security principles and concepts 8 Secure SDLC SSDLC “Roadmap” example… Information Security considerations, checkpoints & deliverables across the SDLC 9 Source: NYS OTDA ISO, Secure SDLC Roadmap NIST Special Publications NIST = National Institute of Standards & Technology • • • • • Chartered to promote & protect economy & public welfare; collaborated with industry, government & academic organizations; used by FEMA for framework development Defines Security to include Business Continuity and Contingency Planning (CP) Integrates Security activities into system development life-cycle (SDLC) Outlines key security roles and responsibilities Defines Security/BC components as control objectives (Control Gates - permission to proceed) NIST Special Publication 800 series Guidance • • • • • • • • • • • • • • http://csrc.nist.gov/publications/PubsSPs.html SP 800-12, The Introduction to Computer Security; NIST Handbook SP 800-18, Guide for Developing Security Plans for Information Technology Systems SP 800-27, Engineering Principles for Information Technology Security SP 800-30, Risk Management Guide for IT Systems SP 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach SP 800-39, Managing Risk from Information Systems: An Organizational Perspective SP 800-34, Contingency Planning SP 800-53, Recommended Security Controls & Annexes 1, 2, 3 SP 800-60, Mapping Types of information & Information Systems to Security Categorization Levels SP 800-64, Security Considerations in the System Development Life Cycle SP-800-84. Testing, Training and Exercising NIST SDLC Brochure, August 2004, Information Security in the SDLC http://csrc.nist.gov/SDLCinfosec Federal Information Processing Standards (FIPS) http://csrc.nist.gov/publications/PubsFIPS.html • FIPS 199, Standards for Security Categorization • FIPS 140-2, Security Requirements for Cryptographic Modules FEMA Continuity Guidance Circular 1 (CGC1) www.fema.gov/pdf/about/org/ncp/cont_guidance1.pdf 10 NIST’s Security in the SDLC Source: NIST SDLC Brochure (Aug. 2004, Information Security in the SDLC. 11 Risk Management Relationship to All Other PM Functions Integration Life Cycle & Environment Variables Scope Expectations, Feasibility Time Time Objectives, Restraints Ideas, Directives, Data Exchange Accuracy Project Risk Management Communications Cost Objectives, Restraints Cost Services, Plant, Materials: Performance Quality Requirements, Standards Availability, Productivity Procurement Human Resources Source: Project & Program Risk Management, A Guide to Managing Project Risks & Opportunities, p. II-2. 12 Integrated Risk Management • RM can be viewed as a holistic activity that is fully integrated into every aspect of the organization • RM is driven by organization (mission) risk 13 Source: NIST SP 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission and Information System View. Risk Management Framework 14 Source: NIST Risk Mnanagement Framework http://csrc.nist.gov/groups/SMA/fisma/framework.html & http://csrc.nist.gov/groups/SMA/fisma/Risk-Management-Framework/index.html Some Key Terms… (see handout) • • • • • • • • • • • • • • After Action Review Artifact Business Continuity (Contingency Planning) Business Impact Analysis (BIA) Controls, Safeguards & Countermeasures Control Gates Information Resources Information Security (Confidentiality, Integrity, Availability) Information System Plan of Action and Milestones (POA&M) Recovery Time Objective (RTO) Recovery Point Objective (RPO) Risk & Residual Risk Risk Management 15 Phase 1: Initiation Resources, Expectations, LOE & Schedule PM Life Cycle SDLC SSDLC Focuses on Information Security & Business Continuity Origination Preparation Initiation Initiation Risk Level & Security Planning Planning KEY PROCESSES • Initial Security Planning • Categorize System • Privacy Impact Analysis • Ensure Secure SDLC • Preliminary Risk Assessment • Business Impact Assessment • Availability requirements analysis • Vital Records Analysis • Data and documentation ARTIFACTS • Awareness Training • Security Categorization • High Level Security Requirements • Development/Coding Standards • QA Plans • Draft Privacy Impact Assessment • Linkages to Business Drivers • Core System Components • Draft Business Impact Analysis • Initial RTO/RPO 16 Phase 1: Initiation Level of Risk - Relating security considerations 17 Phase 2: Acquisition / Development Requirements & Control Selection PM Life Cycle SDLC SSDLC Focuses on Information Security & Business Continuity Acquisition/ Development Security Requirements & Controls Implementation/ Assessment Security Testing Documentation, C&A Execution Execution KEY PROCESSES ARTIFACTS • Update Prelim. Risk Assessment • Updated Risk Assessment • Select & Document Security Controls • Security Plan & list of Variations • Design Security Architecture • List of Shared Services & Risks • Engineer Security in – Develop Controls • Security Integration Schematic • BC & DR Concept of Operations • Recovery Strategy • Contingency Plan (drafts) • Draft Contingency Plan • Notification/activation, incident response • Recovery & Reconstitution • COOP, BC, DR • Common Controls • Vital records analysis • TT&E Results • Policy & Control Adjustments • Test, Train & Exercise (TT&E) • • Scenarios & Additional Documentation Test Results (incl. variations) 18 Phase 2: Acquisition / Development Control Selection - Relating Security Considerations 19 Phase 3: Implementation / Assessment Documenting Results (Baseline) PM Life Cycle SDLC SSDLC Focuses on Information Security & Business Continuity Acquisition/ Development Security Requirements & Controls Implementation/ Assessment Security Testing Documentation, C&A Execution Maintenance KEY PROCESSES • Finalize Detailed Security Plan • Create detailed C&A Plan • Control Integration • System Security Assessment • Product / Component Inspection ARTIFACTS • Verified Operational Security Controls • C&A Work Plan • Completed System Documentation • Security Assessment Report • Security Authorization Decision • • • Finalize BC, COOP & DR Control Integration Implement Vital Records program • • • BC, COOP & DR Plans Updated backup processes After Action Review • • Certification/Acceptance TT&E • • TT&E Plan & Statement of residual risk 20 Phase 3: Implementation / Assessment Documenting Results - Baseline 21 Phase 4: Operations / Maintenance PM Life Cycle Closeout SDLC Focuses on Information Security & Business Continuity Operations & Maintenance Acceptance & Change Management Disposal Disposition / Transition KEY PROCESSES • Awareness Campaign • Configuration Management • Continuous Monitoring • TT&E • Change Control • Incident Management • SSDLC Recertification/Acceptance Maintenance ARTIFACTS • Evaluation/Impact of Changes • Change Control Approvals • Updated Security Documentation • Continuous Monitoring Results • Updated Authorization Pkg. • Authority to Operate (Decision) • Security Evaluations / Audits • POA&M Review • Exercise Schedule • After Action Reviews • Recoverability Statement • BCP Evaluations / Audits 22 Phase 4: Operations / Maintenance Acceptance & Change Management 23 Phase 5: Disposal (Sunset) PM Life Cycle Closeout SDLC SSDLC Focuses on Information Security & Business Continuity Operations & Maintenance Acceptance & Change Management Disposal Disposition / Transition KEY PROCESSES • Disposal / Transition Planning (migration to new system) • • • • • Ensure Information Preservation Media Sanitization Hardware/Software Disposal Control Catalog review Close System • • • • • Business Link Analysis Interdependencies Enterprise BCP Impact analysis Review service agreements Continuous Monitoring ARTIFACTS • Disposal/Transition Plan • Hardware/Software Disposition • Reallocation/Sanitization Records • System Closure Documentation • Information Archiving • Update SLAs & MOUs • Updated Security Controls • Enterprise plan updates – Value Chains – BC, COOP & DR plans • Updated BCP Controls 24 Phase 5: Disposal (Sunset) Data & Partners 25 Mapping the Risk Management to the SDLC Enterprise RISK Management • Review Risk • Assess controls IT Alignment and Planning Information Systems Management IS Architecture • identify • document • implement • monitor Enterprise Architecture & SDLC Compliance Capital Planning and Investment Financial Management Risk Management Risk Based Funding Requests Information Security Origination Initiation Initiation Risk Level & Security Planning Acquisition/ Development Security Requirements & Controls Implementation/ Assessment Security Testing Documentation, C&A Operations & Maintenance Acceptance & Change Management Disposal Disposition / Transition Initiation Planning Execution Closeout Certification & Accreditation Continuous Monitoring 26 Further Observations • All Processes and Artifacts are scalable • • • Preliminary Risk Assessment defines impact & requirements “Right Size” for your project Use common sense • Business Continuity & Information Security interrelate • Common Purpose, Artifacts & Goals • • • Confidentiality Integrity Availability 27 Reflections on SEI | Carnegie Mellon “The surest way to leave risks undocumented is to make the program risks accessible to all members.” • An undocumented risk can get lost to everyone -- far better to have risks documented privately than not documented at all. • Engage a Security team early • Encourages work team agreements on risks and an end-point against which to identify and analyze • Provides a standard way of capturing (documenting) risks • Positions facilitators practiced and comfortable with writing risks in front of a group • Support good risk identification • • • • Encourage documentation of risks privately at the working team level Integrate risk identification and management into normal project management Accept any risk identified – don’t “vet them out” Acknowledge that the program’s decision-makers are the real “risk managers,” and have the decision-makers step up to the job 28 CMMi Capability Maturity Model 29 More Information on CMMI - www.sei.cmu.edu/searchresults.cfm & www.sei.cmu.edu/cmmi/tools/dev/index.cfm Benefits • Advances Organization along CMM • Informed, Risk Management-based, decisions • Improved organization and customer confidence • • • Lower total effort & cost • • • • • • Awareness campaigns Education, ownership/adoption and usage Improved interoperability and integration Early identification of controls Proven methods and techniques Reuse of strategies and tools Shared security services Improved Security & Compliance Posture 30 Questions Deborah Snyder, CISSP, GSLC, PMP NYS Office of Temporary & Disability Assistance (518) 473-3195 Deborah.Snyder@otda.state.ny.us Mark Spreitzer, CBCP CGI Group Inc. (917) 304-1966 Mark.Spreitzer@cgi.com 31