1 Planning for Security

advertisement

Planning for Security

Introduction

{ Creation of information security program begins with policies

{ Then, pick one or several models

{ Selection or creation of a detailed blueprint z Includes the three types of contingency plans

3

Trust

{ Initial step is to determine who gets access

{ How much should you trust resources or people?

{ Possible trust models z Trust everyone all of the time z Trust no one at no time z Trust some people some of the time

5

Scenario

{ Assume you are the manager of xxx software company, the network administrator reports to you that employee y was caught visiting porn sites during work time. What would you do about it?

2

Definition

{ Policy z a plan or course of action used by organization to convey instructions from management to those who perform duties

4

Policy (Cont’d)

{ Objectives: z Reduced risk z Assurance of operation continuity, information integrity, and confidentiality z Compliance with laws and regulations

{ Least expensive means of control

{ Often overlooked and difficult to implenent z legal

6

1

Case Study

In a recent court case, an employee won a

$175,000 settlement because she accidentally viewed what she considered to be a pornographic Web site while on the job. How did she get away with holding her employer accountable? Was the questionable site located on a company owned Web server?

7

Case Study (cont’d)

The court ruled that the company was liable for breach of contract because it did not block all so-called questionable sites. By instituting a policy stating that it would filter out these sites, the company was “accepting responsibility for the successful execution of this activity”- and was therefore accountable.

The damage award, as well as reimbursement for the employee’s “distress,” was based on this finding.

9

Policy Communication

{ For policies to be effective, they must be z Properly disseminated z Read z Understood z Agreed-to

11

Case Study (cont’d)

The company had a corporate policy stating that “pornographic sites will be blocked, and they cannot be accessed from the corporate network.” The company was filtering out access to sites that contained what is considered to be questionable subject matter.

8

Basic Policy Requirements

{ Policies must z be implementable and enforceable z be concise and easy to understand z balance protection with productivity

{ Policies should z state reasons why policy is needed z describe what is covered by the policies z define contacts and responsibilities z discuss how violations will be handled z flexible

10

Policy Management

{ Policies must be managed as they constantly change

{ To remain viable, security policies must have: z Individual responsible for reviews z A schedule of reviews z Method for making recommendations for reviews z Specific policy issuance and revision date

12

2

Relationship with Standards, Practices,

Procedures, and Guidelines

Policies

Standards

Practices Procedures Guidelines

13

Enterprise Information Security Policy (EISP)

{ Sets strategic direction, scope, and tone for all security efforts within the organization

{ Executive-level document z usually drafted by or with CIO of the organization

{ Also known as Security Program Policy

(SPP), general security policy

15

Components of the EISP

{

{

{

Statement of Purpose: What the policy is for

Information Technology Security Elements: Defines information security

Need for Information Technology Security: justifies importance of information security in the organization

{

{

Information Technology Security Responsibilities and Roles: Defines organizational structure

References Information Technology standards and guidelines

17

Types of Policies

{ Policy can be senior management's directives to create an information security program, establish its goals, and assign responsibilities.

{ The term policy is also used to refer to the specific security rules for particular systems.

{ Additionally, policy may refer to entirely different matters, such as the specific managerial decisions setting an organization's e-mail privacy policy or fax security policy.

14

EISP Elements

{ EISP documents should provide : z An overview of corporate philosophy on security z Information about information security organization and information security roles

{ Responsibilities for security shared by all members of the organization

{ Responsibilities for security unique to each role within the organization

16

Example EISP

{ Protection Of Information: Information must be protected in a manner commensurate with its sensitivity, value, and criticality

{

{

Use Of Information: Company X information must be used only for business purposes expressly authorized by management

Information Handling, Access, And Usage:

Information is a vital asset and all accesses to, uses of, and processing of Company X information must be consistent with policies and standards

18

3

Example EISP (Continued)

{

{

Data And Program Damage Disclaimers: Company X disclaims any responsibility for loss or damage to data or software that results from its efforts to protect the confidentiality, integrity, and availability of the information handled by computers and communications systems

Legal Conflicts: Company X information security policies were drafted to meet or exceed the protections found in existing laws and regulations, and any Company X information security policy believed to be in conflict with existing laws or regulations must be promptly reported to Information Security management

19

Example EISP (Continued)

{ Violation Of Law: Company X management must seriously consider prosecution for all known violations of the law

{ Revocation Of Access Privileges: Company X reserves the right to revoke a user's information technology privileges at any time

{ Industry-Specific Information Security Standards:

Company X information systems must employ industry-specific information security standards

21

Example EISP (Continued)

{

{

Exceptions To Policies: Exceptions to information security policies exist in rare instances where a risk assessment examining the implications of being out of compliance has been performed, where a standard risk acceptance form has been prepared by the data

Owner or management, and where this form has been approved by both Information Security management and Internal Audit management

Policy Non-Enforcement: Management's nonenforcement of any policy requirement does not constitute its consent

20

Example EISP (Continued)

{ Use Of Information Security Policies And

Procedures: All Company X information security documentation including, but not limited to, policies, standards, and procedures, must be classified as

“Internal Use Only,” unless expressly created for external business processes or partners

{ Security Controls Enforceability: All information systems security controls must be enforceable prior to being adopted as a part of standard operating procedure

22

Issue-Specific Security Policy (ISSP)

{ The ISSP: z Addresses specific areas of technology z Requires frequent updates z Contains statement on organization’s position on specific issue

{ Three approaches when creating and managing ISSPs: z Create a number of independent ISSP documents z Create a single comprehensive ISSP document z Create a modular ISSP document

23

Issue-Specific Security Policy (ISSP)

{ ISSP topics could include: z E-mail z use of Internet and World Wide Web z specific minimum configurations of computers to defend against worms and viruses z prohibitions against hacking or testing organization security controls z home use of company-owned computer equipment z use of personal equipment on company networks z use of telecommunications technologies z use of photocopy equipment

24

4

Components of the ISSP

{

{

{ z z z

Statement of Purpose z Scope and Applicability z z

Definition of Technology Addressed

Responsibilities

Authorized Access and Usage of Equipment z z

User Access

Fair and Responsible Use z Protection of Privacy

Prohibited Usage of Equipment z z

Disruptive Use or Misuse

Criminal Use

Offensive or Harassing Materials

Copyrighted, Licensed or other Intellectual Property

Other Restrictions

25

Systems-Specific Policy (SysSP)

{ System administrators directions on implementing managerial policy

{ Each type of equipment has its own type of policies

{ Two general methods of implementing such technical controls: z Access control lists z Configuration rules

27

Access Control Lists

{

{

{

{

{

Include user access lists, matrices, and capability tables that govern rights and privileges

Can control access to z file storage systems z object brokers or other network communications devices

Capability Table: user profiles

Specifications are frequently complex matrices

Level of detail and specificity (often called granularity) may vary from system to system z ACLs enable administrations to restrict access according to user, computer, time, duration, or even a particular file

29

Components of the ISSP (Continued)

{

{

{

{

Systems Management z z

Management of Stored Materials

Employer Monitoring z z z

Virus Protection

Physical Security

Encryption

Violations of Policy z Procedures for Reporting Violations z Penalties for Violations

Policy Review and Modification z Scheduled Review of Policy and Procedures for Modification

Limitations of Liability z Statements of Liability or Disclaimers

26

28

ACLs

{ In general ACLs regulate: z Who can use the system z What authorized users can access z When authorized users can access the system z Where authorized users can access the system from z How authorized users can access the system z Restricting what users can access, e.g. printers, files, communications, and applications

30

5

ACLs (Continued)

{ Administrators set user privileges, such as: z Read z Write z Create z Modify z Delete z Compare z Copy

31

Policy Levels

{ Enterprise Wide/Corporate Policy

{ Division Wide Policy

{ Local Policy

{ Issue-Specific Policy

{ Security Procedures And Checklists

33

Class Assignment

{ Use the knowledge you learned about viruses/worms/Trojan horses and policy development, create an issue-specific policy for malicious code protection, assume you are creating this policy for Utica College.

35

Configuration Rules

{ Configuration rules are specific configuration codes entered into security systems to guide execution of system when information is passing through it

{ Rule policies are more specific to system operation

{ Many security systems require specific configuration scripts telling systems what actions to perform on each set of information processed z IDS, firewalls, proxy servers

32

Policies are classified!

34

Security Plan

{ To create or maintain a secure environment

1.

Design working security plan

2.

Implement management model to execute and maintain the plan z May begin with creation or validation of security framework z followed by an information security blueprint

36

6

The Information Security Blueprint

{ Basis for the whole information security program

{ More detailed version of security framework

{ Should specify tasks to be accomplished and the order in which they are to be realized

{ Should be scalable, upgradeable, and comprehensive

{ One common approach z Adapt or adopt a published model (benchmarking)

37

Contingency Planning

Various Security Models

{ ISO 17799/BS7799

{ NIST Security Models z NIST SP800-18

{ IETF security Architecture

{ Visa International Security Model

38

What Is Contingency Planning?

{ The overall planning for unexpected events is called contingency planning (CP)

{ It is how organizational planners position their organizations to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets

{ Main goal: z restoration to normal modes of operation z with minimum cost and disruption to normal business activities

40

Components of Contingency Planning

Over

40%

of businesses that don't have a disaster recovery plan go out of business after a major loss!

41 42

7

CP Components

{ Incident response planning (IRP) focuses on immediate response

{ Disaster recovery planning (DRP) focuses on restoring operations at the primary site after disasters occur

{ Business continuity planning (BCP) facilitates establishment of operations at an alternate site

43

CP Components (Continued)

{ To ensure continuity across all CP processes during planning process, contingency planners should: z Identify the mission- or business-critical functions z Identify resources that support critical functions z Anticipate potential contingencies or disasters z Select contingency planning strategies z Implement selected strategy z Test and revise contingency plans

45

Major Tasks in Contingency Planning

Contingency Plan Implementation

Timeline

44

CP Operations

{ Four teams are involved in contingency planning and contingency operations: z CP team z Incident recovery (IR) team z Disaster recovery (DR) team z Business continuity plan (BC) team

46

First Step: Business Impact Analysis

47

8

Business Impact Analysis (BIA)

{

{

BIA z z z

Provides information about systems/threats and detailed scenarios for each potential attack

Not risk management focusing on identifying threats, vulnerabilities, and attacks to determine controls

Assumes controls have been bypassed or are ineffective and attack was successful

CP team conducts BIA in the following stages: z z z z z

Threat attack identification

Business unit analysis

Attack success scenarios

Potential damage assessment

Subordinate plan classification

49

Business Unit Analysis

{ Second major BIA task is analysis and prioritization of business functions within the organization

51

Attack Scenario

{ Attack name/description

{ Threat

{ Known or possible vulnerabilities

{ Likely precursor activities or indicators

{ Likely attack activities

{ Information asset at risk

{ Damage or loss to information assets likely

{ Immediate actions indicated when this attack is under way

53

Threat/Attack Identification and Prioritization

{ risk management process have identified and prioritized threats

{ update threat list and add one additional piece of information -- the attack profile z Attack profile: detailed description of activities that occur during an attack

50

Attack Success Scenario Development

{ Next create a series of scenarios depicting impact of successful attack on each functional area

{ Attack profiles should include scenarios depicting typical attack including: z Methodology z Indicators z Broad consequences

{ More details are added including alternate outcomes—best, worst, and most likely

52

Potential Damage Assessment

{ Estimate the cost of the best, worst, and most likely outcomes by preparing an attack scenario end case

{ This will allow identification of what must be done to recover from each possible case

54

9

Subordinate Plan Classification

Backup

55

Backup Strategy

{ Very important for all the three types of planning

{ Normally backup to tape z Where should these tapes be stored?

{ Make it easy to backup

{ Always backup!!!

57

Tape Rotation

{ Six-tape rotation z Benefit z Drawback

{ Grandfather-father-son z Benefit z Drawback

{ Towers of Hanoi z Benefit z Drawback

59

Types of Backup

{ Full backup

{ Incremental backup

{ Differential backup

Real-time backup

{ Electronic Vaulting

58

60

10

Real-time Backup

{ Remote journaling

Real-time Backup

{ Database Shadowing

61

Incident Planning

{ Critical to a successful response to a security incident.

{ Allows the organization to plan and practice z CD Universe

{ Allows the participants to have a consistent level of knowledge and expectation when the incident occurs z What is to be done?

z Who will be doing it?

65

62

Second Step: Incident Response Planning

Incident Response Planning

{ Incident response planning covers identification of, classification of, and response to an incident

{ Attacks classified as incidents if they: z Are directed against information assets z Have a realistic chance of success z Could threaten confidentiality, integrity, or availability of information resources

{ Incident response (IR) is more reactive, than proactive z Exception: planning must occur prior to the incident to prepare

IR teams to react to an incident

64

Incident Response Planning

{ Should also include z Which processes have what level of priority z Circumstances that will indicate an incident and determine direction of response

{ Some cases, may want to disconnect from network

{ Some cases, may want to collect more information z Should document procedures involving remote systems and connections to partners and public networks

{ Individual who will be authorized to disconnect

{ Notification process

66

11

Incident Detection/Determination

{ Seems simple

{ however, “Is the event that has been detected really an incident?”

{ Might be just z Symptoms of an impending hardware failure z A simple error caused by a user or an administrator

{ Should have clear definition of when to invoke the plan or when the appropriate people who can invoke the plan needs to be notified z Define what constitute a security incident z Different for different organizations

67

Possible Indicators

{ Those unusual things that might indicate that there is a security incident underway z Unfamiliar files z Unknown programs or processes z Consumption of resources z System crashes

69

Definite Indicators

{ Surely a security incident is there z Use of dormant accounts z Changes to logs z Presence of hacker tools z Notification by partner z Notification by hacker

71

Incident Determination

{ What a system administrator knows about the system?

z How the system should behave

{ Indicators: some unusual behavior that, when detected, require more investigation z Possible indicators z Probable indicators z Definite indicators

68

Probable Indicators

{ Those things that could not occur on the system without someone actually instigating them z Activities at unexpected time z Presence of new accounts z Reported attack z Notification from IDS

70

Occurrences of Actual Incidents

{ Loss of availability

{ Loss of integrity

{ Loss of confidentiality

{ Violation of policy

{ Violation of law

72

12

Incident Response Plan

{ Incident detection/determination

{ Incident notification

{ Incident documentation

{ Incident containment

{ Assessing the damage

{ Incident recovery

{ Reflection

73

Incident Notification - Internal

{

{

{ z z z

Initial notification z z z

Automated threats spread very fast

Should have rapid internal notification

Acting incident security manager

Response team z z

Alert message: explicit

Documentation should start now

Management

After the incident is confirmed and

Severity determined

Should be before the news media

75

Law Enforcement Involvement

{ When incident violates civil or criminal law, it is organization’s responsibility to notify proper authorities

{ Selecting appropriate law enforcement agency z Federal z State z Local

{ Some questions are best answered by organization’s legal department

77

Incident Notification

{

{

Who is the most likely to be the first person that notices a security incident?

z z

Users

May not be reported as security incident

Help desk and system operations: best place for originating notification

{ Incident notification z z z

Notification procedure should be pre-arranged

An alert roster should be decided

Should be made out-of-band

74

Incident Notification - External

{ Computer security incident organizations

{ Affected partners

{ News media

{ Law enforcement

76

Benefits and Drawbacks of Law Enforcement

Involvement

{ Involving law enforcement agencies has advantages: z Agencies may be better equipped at processing evidence z Organization may be less effective in convicting suspects z Law enforcement agencies prepared to handle warrants and subpoenas needed z Law enforcement skilled at obtaining witness statements and other information collection

78

13

Benefits and Drawbacks of Law Enforcement

Involvement (continued)

{ Involving law enforcement agencies has disadvantages: z Once a law enforcement agency takes over case, organization loses complete control over chain of events z Organization may not hear about case for weeks or months z Equipment vital to the organization’s business may be tagged evidence

79

Assess the Damage

{ Several sources of information on damage z system logs; z intrusion detection logs; z configuration logs and documents; z documentation from incident response; z results of detailed assessment of systems and data storage

{ Computer evidence must be carefully collected, documented, and maintained to be acceptable in formal proceedings z Computer Forensics

{ Individuals who assess damage need special training

81

Recovery Process

z Repair the vulnerability z Improve the safeguard z Update detection z Restoration of data if necessary z Restoration of services z Monitor for additional sign of attack z Restoration of confidence

83

Incident Containment

{

{ to stop the incident or minimize its impact

Incident containment strategy z z z z z z z

Stopping the spread

{ The Internet Worm infected about ten percent of the

60,000 systems linked to the Internet within hours of its release

Determine affected system

Deny access

Eliminate rogue processes

Regain control

Scrub the system

Rebuild the system

80

Incident Recovery

{

The process of bringing the system back to a known good state

82

Documentation and Reflection

{ AAR (After Action Review): detailed examination of events that occurred

{ All team members: z Review their actions during the incident z Identify areas where the IR plan worked, didn’t work, or should improve

84

14

Automated Response

{ New systems can respond to incident threat autonomously

{ Downsides of current automated response systems may outweigh benefits

85

Honey Pots, Honey Nets, and Padded Cell

Systems (continued)

{ Padded cell: hardened honey pot

{ In addition to attracting attackers with tempting data, a padded cell operates in tandem with a traditional IDS

{ When the IDS detects attackers, it seamlessly transfers them to a special simulated environment where they can cause no

87

Honey Pots, Honey Nets, and Padded Cell Systems

(continued)

{ Disadvantages z Legal implications of using such devices are not well defined z Honey pots and padded cells have not yet been shown to be generally useful security technologies z Expert attacker, once diverted into a decoy system, may become angry z Administrators and security managers will need a high level of expertise to use these systems

89

Trap and Trace

{ Honey pots

{ Honey nets

{ Honey pots designed to: z Divert attacker from accessing critical systems z Collect information about attacker’s activity z Encourage attacker to stay on system long enough for administrators to document event and, perhaps, respond

86

Honey Pots, Honey Nets, and Padded Cell Systems

(continued)

{ Advantages z Attackers can be diverted to targets they cannot damage z Administrators have time to decide how to respond to attacker z Attackers’ actions can be easily and more extensively monitored, and records can be used to refine threat models and improve system protections z Honey pots may be effective at catching insiders who are snooping around a network

88

Trap and Trace Systems

{ Legal drawbacks to trap and trace z Enticement: process of attracting attention to system by placing tantalizing bits of information in key locations z Entrapment: action of luring an individual into committing a crime to get a conviction.

z Enticement is legal and ethical, whereas entrapment is not

90

15

Data Backup

{ Three types of backup z Full-backup z Incremental backup z Differential backup

{ Common practice z Full backup during the weekend, and incremental or differential backup for weekdays

{ Full backup + incremental backup vs full backup + differential backup

91

Rotation Strategies

{

{

Father-son z z z

A set of four backup media sets for M-Th

Another group of 5 for weekly backup

A final group of 3 for monthly backup

Tower of Hanoi z z z z z

The 1 st etc.) set is used for every other backup, starting day 1 (1, 3, 5,

The 2 nd

10, etc) set is used for every 4 th backup, starting on day 2 (2, 6,

The 3 rd etc) set is used for every 8 th backup, starting day 4 (4, 12, 20,

The 4 th set is used for every 16 th backup, starting day 8 (8, 24, 40, etc)

The final set is used for every 16 th

32, 48, etc) backup, starting day 16 (16,

92

Disaster Recovery

{ Disaster recovery planning (DRP) is the preparation for and recovery from a disaster, whether natural or man made

{ In general, an incident is a disaster when: z organization is unable to contain or control the impact of an incident

OR z level of damage or destruction from incident is so severe, the organization is unable to quickly recover

{ Key role of DRP: defining how to reestablish operations at location where organization is usually located

93

Disaster or not

{

{

{

{

{

A hacker gets into the network and deletes files from a server.

A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained before it moves out of the area.

A tornado hits a local power company, and the company will be without power for three to five days.

Employees go on strike, and the company could be without critical workers for weeks.

A disgruntled employee takes a critical server home, sneaking it out after hours.

94

Disaster Classifications

{ A DRP can classify disasters in a number of ways

{ Most common method: separate natural disasters from man-made disasters

{ Another way: by speed of development z Rapid onset disasters z Slow onset disasters

95

Planning for Disaster

{ Scenario development and impact analysis are used to categorize the level of threat of each potential disaster

{ DRP must be tested regularly

{ Key points in the DRP: z z z

Clear delegation of roles and responsibilities

Execution of alert roster and notification of key personnel

Clear establishment of priorities z z z

Documentation of the disaster

Action steps to mitigate the impact

Alternative implementations for various systems components

96

16

Crisis Management.

{ Which component is most important in a disaster?

z Human safety

{ Crisis management team manages event: z Supporting personnel and their loved ones during crisis z z z z Determining event's impact on normal business operations

When necessary, making a disaster declaration

Keeping public informed about event

Communicating with outside parties

{ Two key tasks of crisis management team: z z

Verifying personnel status

Activating alert roster

97

Responding to the Disaster

{ Actual events often outstrip even best of plans

{ To be prepared, DRP should be flexible

{ If physical facilities are intact, begin restoration there

{ If organization’s facilities are unusable, take alternative actions

{ When disaster threatens organization at the primary site, DRP becomes BCP

98

Disaster Recovery and Business Continuity

Planning Sample Disaster Recovery Plan

7.

8.

9.

5.

6.

3.

4.

1.

2.

Name of agency

Date of completion or update of the plan and test date

Agency staff to be called in the event of a disaster

Emergency services to be called (if needed) in event of a disaster

Locations of in-house emergency equipment and supplies

Sources of off-site equipment and supplies

Salvage Priority List

Agency Disaster Recovery Procedures

Follow-up Assessment

99

Business Continuity Planning (BCP)

{ BCP z Ensures critical business functions can continue in a disaster z Most properly managed by CEO of organization z Activated and executed concurrently with the DRP when needed z Reestablishes critical functions at alternate site (DRP focuses on reestablishment at primary site) z Relies on identification of critical business functions and the resources to support them

101

100

Continuity Strategies

{ Several continuity strategies for business continuity z Determining factor is usually cost

{ Four exclusive-use options: z z z z

Hot sites

Warm sites

Cold sites

Mobile sites

{ Shared-use options: z z z

Timeshare

Service bureaus

Mutual assistance agreements (MAA)

102

17

Exclusive Use Options

{ Hot Sites z Fully configured computer facility with all services

{ Warm Sites z Like hot site, but software applications not kept fully prepared

{ Cold Sites z Only rudimentary services and facilities

{ Mobile Sites z Non-mainstream alternatives to the previous three

103

Database Recovery

{ To get any BCP site running quickly, organization must be able to recover data

{ Options: z Electronic vaulting z Remote Journaling z Database mirroring

105

Testing Contingency Plans

{ Once problems are identified during the testing process, improvements can be made, and the resulting plan can be relied on in times of need

{ There are five testing strategies that can be used to test contingency plans: z Checklist test z Structured walkthrough z Simulation z Parallel testing z Full interruption

107

Shared Use Options

{ Timeshares z Like an exclusive use site but leased

{ Service Bureaus z Agency that provides physical facilities

{ Mutual Agreements z Contract between two organizations to assist each other z Problems:

{ Difficult to enforce

{ Locations

{ Confidentiality

104

Software Escrow Agreement

{ A unique tool used to protect a company against the failure of a software developer to provide adequate support for its product or the possibility that the developer will go out of business.

{ Usually consider this for small software companies.

106

A Single Contingency Plan Format

108

18

Continuous Improvement

{ Iteration results in improvement

{ A formal implementation of this methodology is a process known as continuous process improvement

(CPI)

{ Each time plan is rehearsed, it should be improved

{ Constant evaluation and improvement leads to an improved outcome

109

19

Download