Is Information Security warranted on your campus

advertisement
Information Security
Is it warranted on your campus?
William C. Moore II, CISSP
Chief Information Security Officer
Valdosta State University
Requirement in many new mandates
•
•
•
•
•
FERPA
HIPPA
Sarbanes Oxley
Graham Leach Bliley
VISA Requirements
Many of these mandates have
accountability requirements
•
HIPPA
– Information Security is responsible for data security and shall audit the access to
enterprise-wide systems and data. This includes, but is not limited to, access to
Network, Email, Internet, PRISM, Medipac, Human Resources, Accounts
Payable, Payroll, General Ledger and TESS
•
GLBA
– (i) ensure the security and confidentiality of covered records, (ii) protect against
any anticipated threats or hazards to the security of such records, and (iii) protect
against the unauthorized access or use of such records or information in ways
that could result in substantial harm or inconvenience to customers
•
VISA CISP- Digital Dozen
– 1. Firewalls 2. Security Patches 3. Stored Data 4. Encryption 5. Anti-Virus 6.
Restrict Access 7. Unique IDs 8. Change Default Security Settings 9. Track
Access 10, Test Security Regularly 11. Implement and Maintain Security Policy
12. Restrict Physical Access
• These are mandates that require addressing Information Security as a responsibility for
operating the business of education.
So, what do we, as USG do?
•
•
•
•
•
•
•
•
•
Acquire administrative support
Appoint an accountable individual(s)
Evaluate current state
Develop policies
Develop procedures
Provide training and awareness
Enforce policies and procedures
Report
Repeat
Administrative Support
• Is it needed
– ABSOLUTELY
• What level is needed
– The higher, the better. Minimum of CIO/VP
• When should you seek support?
– NOW!
• How did VSU meet the demand?
Milestones for VSU
•
Obtain CIO and executive approval/buy
in before proceeding further.
– Obtained CIO and VP of Business and
Finance support to meet University goals
and mandates
VSU Internal Project
•
Began internal project directions with
existing personnel
– Designate group of individuals “Taskforce”
from various depts. (Student Information
Systems, Business Finances/People Soft,
Main I.T. Systems Support, Network
Services, Library, Auxiliary Services, Faculty
Senate) to carry out the following task:
Assess Current Status
•
Gather current inventory of existing
technologies on campus
– Through departmental surveys
•
17799 assessment for all areas on
campus.
– Additional departmental surveys and
observations
Assess Current Status
• 17799 Assessment
– Essential for measuring the current status of
organizational security.
– Demonstrates a formal assessment of organizations
strengths and weaknesses
– Presents meaningful insight thereby presenting focus
and direction for security actions
– Develop a plan of action to address deficiencies
found in assessment
Report Current Status
• Report 17799 to “Taskforce” and
authorizing Executive(s)
• Report findings or strengths and
weaknesses
• Report plans for rectifying vulnerabilities
(Action steps for security campus)
Data Classification
•
Develop and implement method of data
classification for campus (will require buy
in and assistance from all areas of
campus).
Method of Prioritizing
•
Use data classification to steer
mandatory campus policies/procedures
for business continuity and disaster
recovery. (classification should be used
to set priority of what data is critical, vital,
important and, less important for the
continuation of business by the campus,
college, and then dept. level)
Determine effectiveness
•
Once data classification is implemented
and running, re-assess using ISO-17799.
– Allows for measuring effectiveness of
classification scheme.
– Reemphasizes priorities of various
systems/data
– Important method of budget justifications
Develop Policies
• Security Taskforce should develop campus
information security policy recommendations
– Request comments (not necessarily approval) from
faculty, staff and students
• All policy recommendations should be submitted
through Legal Affairs for approval.
• Submit recommendations to B.O.R. Information
Security for comments/review
• Policies must receive Cabinet and/or President
approval
• Make all users aware of policies after approval
1st Vulnerability Test
•
Begin vulnerability test for critical areas after
written approval from CIO (should be
scheduled and well known to those tested to
allow for addressing problems if they should
arise). Do not use invasive techniques at this
time.
–
–
Review findings with CIO and affected System
Administrators.
Make recommendations to CIO and affected
Administrators
•
•
Risks must be reduced, accepted, transferred or rejected
with reason
If necessary, point to policies
1st Vulnerability Test
• Based off 1st vulnerability test findings
– Work with Systems Administrators on
developing procedures to address findings
• Provides initial “Raw” score
• Procedures provide steps to meet policies
• Procedures should be as specific and standard as
possible
Procedures are in place
• Reinitiate vulnerability test for critical areas
(Again, after written approval from CIO)
• Report both findings to CIO and
supporting executive(s)
• If necessary, use these findings as support
mechanisms for obtaining methods of
mitigating risks (i.e. campus AV, firewalls,
IDS, training, etc.)
Use procedures to provide:
• Awareness and Training
– Required by some federal mandates
– Employee participation can be your strongest
or weakest segment of your security initiatives
– Raising levels of awareness could help gain
support
• Make security personal by demonstrating how it
can help champion other goals
• Demonstrate how security can help increase value
by increasing “uptime” and reliability or save
money by standardizing areas of support
Use procedures to provide:
• Awareness and Training cont.
• Start small (cheap) websites, posters,
email notices, etc.
• Coming soon through Vista, general
Security Awareness for Admins and End
Users.
• Use specific procedures to develop new
employee training
Use procedures to provide:
• Awareness and Training cont.
• Mentor potential cross-trainers.
– If other I.T. personnel show an interest in
Information Security, offer additional training
leading to certifications
– Consider “Train the Trainers” for other depts.
• Offer to include nearby USG campuses
So what do you do now?
•
•
•
•
•
•
•
•
Gain support
Designate or appoint an accountable person
Evaluate
Develop policies and procedures
Report
Awareness/Training
Enforce policies and procedures
Maybe next year Incident Response
Questions / Comments?
Download