Emergency service (fire service) Problem Statement & Student Guide Version 4: 7th January 2016 Scenario description Turing Hill Fire and Rescue Service (THFRS) is responsible for the Turing Hill Metropolitan County, a large urban conurbation in the North of England. It has always sought to exploit technology, both to improve efficiency and to improve safety for its officers. Information about commercial properties which can be used to establish safety and fire risks (Site Specific Risk Information) is collected from a variety of sources, including surveys by fire officers, fire measures in place, construction and CAD drawings of premises. This information is critical to establish the risks should a fire occur at the premises, and is held at the THFRS Data Centre. It is clearly vital that such information is not out of date. Each fire appliance carries a Mobile Data Terminal (MDT) which provides (offline) access to the key risk information and standard operating procedures for the fire type. The MDT is synchronised with the THFRS Data Centre while the appliance is in its base fire station. Senior officers take charge of larger incidents, and there is a requirement for them to have access to this risk critical information at the scene of incidents together with access to standard operating procedures. This information was carried in paper form in an officer’s car. This manual system made it difficult to ensure information was current and the volume of material carried also posed difficulties for rapid access. A new system is to be introduced, where senior officers have mobile devices, connected by a 4G mobile phone network to provide real-time access to data held on THFRS network via Microsoft SharePoint. This enables officers to be fully informed of necessary information whilst they are managing the incident and ensures information is up-to-date. After consultation with business users, the mobile device selected was the Apple iPad, though this was not the preference of the ICT department. Learning Outcomes On successful completion of the scenario, students will be able to: 1. Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. 2. Identify and justify technical controls for securing remote access and data governance. 3. Explain the key features of ISO27001 and risk assessment 4. Explain key features and requirements for an Information Security culture and suggest activities for developing it. 5. Identify and outline key policies required and HR processes. 1 Your Task – Stage 1 You are the newly appointed Chief Information Risk Owner for THFRS and you are concerned about the additional risks that will occur when using this mobile platform. Your discussions with your new colleagues and your boss give you a fair amount of confidence that security is taken seriously and the back-end controls seem appropriate. However, before addressing the risks associated with the new system, you decide that it would be sensible to ensure the organisation is fully compliant with the UK Government’s Security policy framework (Cabinet Office, 2014). 1. Identify a list of the checks that you need to make for an initial audit. You have some limited experience of ISO27001 in a previous role, and whilst you are not (at this stage) considering certification against the standard, you would like to know how well THFRS’ Information Security Management System (ISMS) aligns with ISO27001 requirements. 2. What are the checks you would make to ensure that there is overall alignment? Deliverables A Report and presentation addressing all of the above points. Your Task - Stage 2 Having been satisfied that THFRS’ ISMS adheres to current good practice, you turn your attention to the new risks associated with using iPads to access potentially sensitive data in real time over a 4G network. Furthermore, you discover that, to gain maximum benefit, the mobile devices are also used for usual day-to-day business functions including email and calendar and that users will also be allowed to use the devices for their personal use! You therefore create a working party to perform a risk assessment for this system. Your terms of reference are: 1. To identify the threats, vulnerabilities and associated risks with utilising iPads in this way. 2. To propose a set of controls that are cost-effective in mitigating the risks within acceptable limits for THFRS. 3. To identify any potential commercial products that could meet these requirements. Deliverables A Report and presentation addressing all of the above points. Reflection on Learning It is also important that at the end of the scenario you should reflect on your learning and team working and identify what worked well, what didn’t and actions for future improvement. 2 The Consulting Process One of the benefits of Problem-based Learning is that you learn professional skills as well as technical knowledge. The process we ask you to follow to explore and provide solutions to the problem also mirror those used in consultancy. In order to assist you with the process, the following table shows the activities we would expect you to complete in your PBL team. You should read this carefully and make sure you are familiar with both the generic activities (in column 2) and the specific ones in column 3. Steps 1 & 2 will be conducted in the first PBL tutorial. Step 3 a) and b) comprises your individual research, and summarizing your learning. Step 3 c) takes place as a sharing and teaching session at the next tutorial. This process of sharing and teaching others is extremely beneficial to your own learning. Step 4, 5 consist of team work and whilst they are logically distinct, they may take place at the same meeting as stage 3c) depending on the schedule of meetings. Step 6,7: In this Scenario you will not be planning or implementing a solution, so these steps are not undertaken in this scenario Step 8 should be completed at the end of the scenario, both individually and as a team, to identify what you’ve learned and how you can improve your learning and team performance in future. Your tutor/ facilitator will discuss it with you. 3 The CSKE Consulting/ Learning Model Problem-solving model 1 Understanding organizational history and context What PBL normally includes’ 2 Determining the problem to be resolved a) Scenario analysis Socio-technical organizational analysis. Clarification of ambiguities Requirements Analysis: identify key issues Simulated consultation with stakeholders (e.g. through role-play and/or online interaction). Reviewing technology/ processes in use. What you will be doing at each stage b) c) a) b) c) 3 Identifying/ learning necessary knowledge 4 Identifying alternative solutions 5 6 7 8 Choosing optimal solution Planning the implementation Implementation Determining and agreeing evaluation criteria and process. Identifying technical possibilities, considering acceptance issues and organizational fit. Facilitator Guidance. Deciding on best technical, organizational and social outcomes. Proposing solution with justification b) c) a) b) c) Individual research & learning to resolve knowledge gaps. Individually creating summary of learning and how it applies to the scenario. Team sharing learning/ teach each other. Determining evaluation criteria through team discussion. Team identification of options considering acceptance issues and organizational fit. Facilitator Guidance. a) b) c) Team decision and justification. Produce Report. Presentation to tutor in role of main stakeholders. a) Team evaluation of performance and project success. Individual reflection on personal learning & development. Applying planning and scheduling techniques. Proposing plan and deadlines. Building the solution (if appropriate). Deploying the solution (if appropriate). Formal evaluation methods re project success. Personal reflection and evaluation. 4 Individual research & learning to resolve knowledge gaps. Summarising & reflection. Teams share learning. Final evaluation Team review of scenario: identifying key issues. Identifying learning goals. Team publish action list & summary in forum. Identifying learning goals. Facilitator Guidance. a) Individual and team review of scenario text and video resources. Team discussion. Clarification of ambiguities with tutor/facilitator. b) Resources There are a number of resources available to you: Alnatheer, M., Chan, T. & Nelson, K. (2012) Understanding And Measuring Information Security Culture. Proceedings of the Pacific Asia Conference on Information Systems A useful review of Security culture factors, followed by development of metrics, which are probably less useful for this task. British Standards ISO 27001 Overview: http://www.bsigroup.com/en-GB/iso-27001information-security/ [Last accessed 22-Nov-2015] A very useful introduction to ISO27001, before looking at the standards documents themselves. Cabinet Office (2014) Security policy framework: https://www.gov.uk/government/publications/security-policy-framework [Last accessed 23-Nov-15] The security policy framework describes the standards, best-practice guidelines and approaches that are required to protect UK government assets (people, information and infrastructure). It focuses on the outcomes that are required to achieve a proportionate and riskmanaged approach to security that enables government business to function effectively, safely and securely. Home Office (2013) Emergency services mobile communications programme: https://www.gov.uk/government/publications/the-emergency-services-mobilecommunications-programme [Last accessed 22-Nov -15] The emergency services mobile communications programme will provide a new communication system for the 3 emergency services and other public safety users. This system will be called the emergency services network (ESN). In the document you will find: o information about the development of ESN o a timeline for ESN o information about procurement for ESN o latest procurement news o information about supporting programmes ISACA, 2009. An Introduction to the Business Model for Information Security. Rolling Meadows: ISACA. An excellent discussion of how to integrate Information Security into the Business, essential for this scenario ISACA, 2013. CISM Review Manual. Rolling Meadows: ISACA. The CISM review manuals provide detailed, though quite dense discussion of the knowledge, skills and tasks associated with each of the CISM domains. A p[particularly useful aspect is the inclusion of test questions (and answers) which are very thought provoking and good for discussion. ISO 22301:2012 Societal security -- Business continuity management systems --Requirements A related standard that clearly is relevant, but more detailed than necessary for this scenario ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements 5 A surprisingly readable and brief standard that is well-worth reading for this scenario. ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls The partner to ISO27001, providing details of the controls, a useful reference document to help explain the annex in ISO27001. ISO/IEC 27035:2011 Information technology — Security techniques — Information security incident management This standard is being updated, 2011 is the old version. There is increasing acknowledgement that the question of how to respond to incidents is one of the most critical, it is not a matter of if you will suffer, but when. Thus, increased emphasis on incident management is important. Posthumus, S., & Von Solms, R. (2004). A framework for the governance of information security. Computers & Security, 23(8), pp. 638-646. [Online]. Available from: http://www.sciencedirect.com/science/article/pii/S0167404804002639 [Accessed on 22/11/2015] Whilst this is not a new article, it is a good discussion of Information Security Governance. Sonnenreich,W. Albanese,J. and Stout,B. (2006) Return on Security Investment (ROSI) – A Practical Quantitative Model, Journal of Research and Practice in Information Technology, 38, 1, A paper that is well-written and useful reading for ROSI in this scenario. Stuntz,J. (2014) A Review of Return on Investment for Cybersecurity , McDonough School of Business Provides a good overview of ROSI. Not as detailed as Sonnereich Von Solms, R., Thomson, K. L., & Maninjwa, M. (2011). Information security governance control through comprehensive policy architectures. In Information Security South Africa (ISSA), (pp. 1-6). IEEE. [Online]. Available from: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6027522, [Accessed on 11/03/2015] 6 A short (6-page) conference paper that gives a useful overview of InfoSec governance and argues for a “more complete information security policy architecture that will facilitate complete control, and therefore compliance, to ensure sound Information Security Governance.” Assessment Grading Criteria Learning Outcome Evidence (graded on) Pass (40-49%) Most appropriate threats, vulnerabilities and reasoned risk levels assigned. LO1. Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. LO2. Identify and justify technical controls for securing remote access and data governance. Team Report LO3. Explain the key features of ISO27001 and risk assessment LO4. Explain key features and requirements for an Information Security culture and suggest activities for developing it. LO5. Identify and outline key policies required and HR processes. Appropriate risk treatment measures for major risks. Key features of ISO27001 & Security Policy Framework identified. Security culture and standards discussed briefly. Some risks relating to legal regulations explicitly identified. Reports are structured with appropriate headings. Acceptable spelling and grammar. Mostly relevant content. Some good quality references provided Presentation is As pass and presentation consistent with, emphasises key points and has report. balanced content. Working With Others: Participate constructively in team by Taking responsibility, Showing sensitivity and provide supportive feedback to others, Meeting deadlines Timekeeping, oral contributions, VLE postings, timeliness of work produced. Usually communicates quickly with others if problems attending or meeting commitments, On time for most meetings, Completes most work allocated. NB Students can be excluded from teams for not meeting these requirements. Sound Pass (50-59%) Almost all threats and risks identified correctly and in suitable format, and prioritised appropriately. Addresses all major risks, with appropriate controls. Links are made between risks/threats and solutions, including culture. Most risks relating to legal regulations explicitly identified. Very Good Pass (60-69%) Consistent treatment of assets/threats/risks, correct id & in suitable format. As sound pass and clearly linked to most requirements. Benefits of solution identified. Systematic and complete treatment of legal regulations. Key features of ISO27k, & Security Policy framework explained. ISO27k, & Security Policy framework integrated into the report Alternatives are discussed, but may be briefly. Alternatives are discussed highlighting key issues. Report structured with appropriate headings. Written in clear consistent and appropriate (business) style of English. Generally appropriate level of detail, but inconsistent. Good quality references provided with correct syntax. Range may be limited. As sound pass and presentation clearly links features/ benefits of solution with client needs and problems. An appropriate range of good quality references provided with correct syntax. Excellent (70-100%) Weight Comprehensive list of threats, risks, and impact clearly related and in suitable format, evaluated and prioritised appropriately. Report is detailed, addresses all major risks, appropriate controls, including culture, clearly linked to most requirements and critical evaluation of alternate solutions provided. Systematic and complete treatment of legal regulations. 70% ISO27k, & Security Policy framework integrated into the report Key points of ROSI explicitly discussed Alternatives are discussed critically highlighting key issues complete/consistent solution. Clear, concise and complete with appropriate level of detail throughout almost all report. Presentation is persuasive, balanced, thorough and clearly links features/benefits of solution to client needs/problems Presentation is consistent with, and relates to report. 20% Considered reliable by team mates. Almost always communicates quickly As Sound pass and on time for with others & renegotiates if almost all meetings, Completes all problems attending or meeting work as agreed. commitments, Shares work with others in timely way. As Very good pass and shows initiative / leadership in some areas of work. 10% 7