SECURITY POLICIES

advertisement
SECURITY POLICIES
Indu Ramachandran
Outline








General idea/Importance of security policies
When security policies should be developed
Who should be involved in this process
Cost of security policies
Available resources
Security policies in detail
Failure of Security policies
After Security policy is written
About Security Policies






Increased level of threats
Organization’s attitude towards security
policies
Establishing Standards
More than just “Keeping the bad guys out”!
Management and Security policy
Policies Not Procedures!!
Importance of Security Policies

Establishes Standards

Provides basic guidelines

Defines appropriate behavior

Helps against being sued
Aspects of Security

Traditional Ideas of Security

Revised Security aspects

Confidentiality


Protect objects from unauthorized release/use of
info
Integrity

Preserve objects / avoid unauthorized modification
When should Policies be
developed

Ideal Scenario






Often not the case
After a Security Breach
To mitigate Liability
For document compliance
To demonstrate quality control processes
Customers/Clients requirements
Who should be involved





Basically EVERYONE!!!!!
System users
System support personnel
Managers
Business lawyers
Importance of Involving
Management

Funding and Commitment

Leadership

Authority

Responsibility/Support
Do you need Sec. Policies??
Questions to answer this question…



Do workers at your organization handle
information that is confidential?
Do workers at your organization access the
internet?
Does your organization have trade secrets?
Custom questions to suit you!!
The Security Cost Function




Cost for security
Exponential increase
Trade off between cost for security and cost of
violations
Formula for calculating cost :
Total cost for Violations = Cost for a single Violation X
frequency of the violation
GOOD NEWS!!!!
You are not on your own !!!

Internet Resources




The SANS institute
NIST (National Inst. Of Stds. And
Technology)
RFC
Universities
Resources (cont’d)

Books


Guide for Developing Security Policies for
Information Technology Systems
Information Security Policies made easy



around 1360+ security templates
used by several large organizations
Training Sessions

SANS Institute
Types of security policies

Administrative Security Policy

Examples of Administrative sec policies:
Users must change password each quarter
 Employees must not use dial out modems from
their desktops.


Technical sec policies

Examples
Server will be configured to expire password each
quarter
 Accounts must initiate a lockout after four
unsuccessful attempts to login

What is in a security policy
Three Categories
First category – Parameters Section



Introduction
Audience
Definitions
What is in a security policy (cont’d)
The Second category

Risk assessments
 When
this should be done
 Benefits
 Who should do this


Identifying Assets
Threats to assets
What is in a security policy (cont’d)
The Third Category

Actual Policies
Examples of policies

Physical security
Examples of policies (cont’d)

Authentication

Password policy

Remote Access Policy

The Modem Issue
Examples of policies (cont’d)

Acceptable Use Policy
Examples of AU Policy at
http://www.eff.org/pub/CAF/policies

Other Policies
Examples of policies as well as their templates on
the SANS website.
http://www.sans.org/resources/policies/
What makes a good security
policy






Must be usable
Must communicate clearly
Must not impede/interfere with business
Enforceable
Update regularly
Other factors


Interests
Laws
Problems with Sec. Policies

Increase in tension level

Security needs viewed differently

Too restrictive/hard to implement

Impediments productivity
Conflict and Politics

Management concentrates on goals for
company

Technical Personnel’s agenda
So what happens???
What do you do???
Information Security
Management Committee

Bridge the gap

Committee Composition

Responsibilities of the committee
Real world problems caused by
missing policies

At A Government Agency...

At A Local Newspaper...
Why Security Policies Fail

Security is a barrier to Progress



Perceived to have zero benefit
Obstacles/Impediment productivity
Security is a learned behavior



Not instinct
Value of assets
Not taken seriously
Why Security Policies Fail (cont’d)


Complexity
Security work is never finished


Failure to review
Other reasons


Lack of stake holder support
Organizational Politics
Compliance & Enforcement

Training

Testing and effectiveness of the policy

Monitoring

Taking Action
Review The Policy

Review Committee




Good representation
Frequency of review meetings
Responsibilities
What to Review
References







Barham, Scott - Writing information security policies
http://dmoz.org/Computers/Security/Policy/Sample_Poli
cies/
http://www.netiq.com/products/pub/ispme_realproblems.
asp
http://www.sans.org/rr/policy/policy.php
http://www.networknews.co.uk/Features/1138373
http://irm.cit.nih.gov/security/sec_policy.html
http://www.cisco.com/warp/public/126/secpol.html
Download