Code of Practice for Information Security Management

advertisement
BCIS 4630 Fundamentals of IT Security
FOUNDATIONAL CONCEPTS
Dr. Andy Wu
Overview
• Surveying the battle ground
– Adversaries
• Things of Threes – CIA, AAA, SNL
• Defense in Depth
• Regulations
• Security governance – ISO 17799, CobiT, ITIL
2
Weakest Link in Security Is…
• People!
• Not technology. Technology is powerless if people
don’t use them right.
• Not organizational process. Useless if people don’t
follow them.
• Your security is only as good as its weakest link.
3
Code-Red Worm (July 2001)
• On July 19, 2001, over 350,000 computers connected to
the Internet were infected by the Code-Red worm. The
incident took only 14 hours to occur.
• Damages caused by the worm (including variations of
the worm released on later dates) exceeded $2.5 billion.
• The vulnerability exploited by the Code-Red worm had
been known for a month.
4
Slammer Worm (January 2003)
• It exploited a buffer-overflow vulnerability in
computers running Microsoft's SQL Server or
Microsoft SQL Server Desktop Engine.
• This vulnerability was not new. It had been
discovered in July 2002.
• Microsoft had released a patch for the vulnerability
even before it was announced.
5
It’s a Balancing Act
• Security can be looked at as a tradeoff between risks
and benefits.
– Cost of implementing the security mechanism
• Tradeoff involves security versus costs of
implementation, user convenience, business goals,
etc.
• Security often is an inconvenience to users.
6
And It’s a Uphill Battle… for Good Guys
• You have to be secure in all bases, whereas an
attacker only has to be real good at one thing to be
successful.
7
Forget It If You Want to Be Popular
• People are not born security-minded. They may not
appreciate your help.
• If your security measures inconvenience them
enough, they will bypass or even undermine them.
• Don’t be surprised if you’re not invited to parties.
8
Who Are Your Adversaries, then?
• Hackers
– Black hat
– Gray hat
– White hat (actually they’re your friends)
• Pen Testing
• “Get-out-of-the-jail-free card”
• Script kiddies
• Organized crime
9
Typical Hacker
• Young male in late 20s.
• Dress is causal, intellectual or humorous slogan T-shirts, jeans, running
shoes, etc.
– “Outdoorsy”: hiking boots, khakis, chamois shirts, etc.
– Hates business attire.
• Reads Scientific American and Smithsonian
• Attracted to ethnic, spicy, oriental, exotic foods
• Anti-physical and avoid sports
– If any, almost always self-competitive and intellectual, involving concentration,
stamina, and micro-motor skills
Source: Schell et al. The Hacking of America.
10
Hacker Myths and Truths
• Myth: Hackers are computer addicts
– Truth: They’re more like “heavy users”
• Myth: Hackers have odd sleeping patterns
– Truth: 79% sleep sometime 12AM-8AM, for an average of
6.26 hours
• Hackers communicate only with their computers, not
with other people
– Truth: Hackers spend considerable time during the week
communicating with their colleagues.
Source: Schell et al. The Hacking of America.
11
Hacker Myths and Truths
• Myth: Hackers are a threat to network administrators
– Truth: Hacker convention attendees have considerable
white hat skill sets.
– Divided views on hiring hackers as security professionals.
• Myth: Hackers are creative.
– Truth: This seems to be true.
12
Script Kiddies
• Download and run tools that others have developed.
– May not even know why and how the tools work.
• Generally not as interested in attacking specific targets.
• Look for any people or organizations that may not have patched a newly
discovered vulnerability.
• At least 85 to 90% of the individuals conducting “unfriendly” activities on the
Internet are probably accomplished by these individuals.
• Do not underestimate the potential damage they can inflict despite their lower
level of technical sophistication. These kids ain’t cute!
13
Traditional Hacker Motivations
• Feeling of addiction
• The urge of curiosity
• Boredom with education system
• Enjoyment of feeling of power
• Peer recognition
• Political acts
• What is missing?
Source: Taylor, Paul, Hackers: Crime in the Digital Sublime.
14
Hacker Motivation
• “Sutton’s Law”
– Because that’s where the money is!
• Alarming change: the serious attackers are out for
specific purposes with certain types of damage or
fraud in mind.
• Some of them are becoming part of or are hired by
the cyber-equivalent of the mafia.
15
Alarming Trend
Source: CERT
16
Change in Hacker Characteristics
• A the level of sophistication of attacks has increased,
the level of knowledge necessary to exploit
vulnerabilities has decreased.
– The rise of non-affiliated intruders, including “scriptkiddies,” has greatly increased the number of individuals
who probe organizations looking for vulnerabilities to
exploit.
17
What Are You Trying to Protect?
• Three properties of information that are the goals of
security protection.
– Confidentiality
– Integrity
– Availability
18
Confidentiality
• The protection of information within systems so that
unauthorized people, programs, and processes
cannot access that information.
• Sensitive information is protected against
unauthorized disclosure.
• Encryption is a primary tool to ensure confidentiality.
19
Integrity
• The protection of information or processes from
intentional or accidental unauthorized changes.
• Integrity ≠Business accuracy, logicalness, relevance,
ethicalness, etc. of information
• Integrity = No unauthorized alteration
20
Availability
• The assurance that information and systems are
accessible by authorized users whenever needed.
– Protected against denial-of-service (DoS) attacks and
vandalism
– Protected against losses stemming from natural disasters or
human errors and actions (this type probably is more common)
• Time can be of the essence for many information-related
activities.
21
DAD Triad
• Disclosure
– Unauthorized individuals gain access to confidential information
• Alteration
– Data is modified through some unauthorized mechanism
• Denial
– Authorized users cannot gain access to a system for legitimate
purposes
• DAD activities may be malicious or accidental
22
AAA
• Authentication
– Is the user really who she says she is?
• Authorization
– Now the user is indeed Joan, what is she allowed to do the
system(s)?
• Accounting (Auditing)
– Joan has been authenticated and authorized. What has she
done to the system?
23
Authentication
• Verifies the identity of subjects (they are who/what
they claim to be).
24
Authorization
• Defines a subject’s access
rights to an object (“access
control list”, ACL); she will
be able to use those rights
once she has been
properly authenticated.
25
Accountability (Auditing)
•
Ensures that users are accountable for their actions; provides evidence for
investigating security breaches.
26
The “Saturday Night Live” Triad
• The S-N-L Triad
– Segregation of Duties
– Need to Know
– Least Privilege
• Related concepts include security clearances and data classification.
• Often these principles are discussed as related to human users.
– Their proper application prevents many organizational problems for InfoSec.
– However, remember they’re equally applicable to inanimate subjects such as OS
processes.
27
Segregation of Duties
• Aka “separation of duties” or “separation of privileges”.
• No single person should have enough authority to cause a
critical event to happen.
– A task is designed so that separate actions must be performed by
different people and these actions in combination achieve the task.
– Prevents one individual from having control of an entire process
and so as to manipulate the process for personal gain.
• Collusion will be needed for abuse, making abuse more
difficult and less likely.
28
Need to Know
• Subjects should be granted access only to the objects necessary
for completion of their tasks.
• Having the authorization or clearance to see a particular
classification level of information is not sufficient reason to see all
information at that level.
• No access should be granted solely by virtue of office, position,
rank, or security clearance.
29
Least Privilege
• Subjects should be granted the minimum level of
access (the most restrictive set of privileges) needed
for the performance of authorized tasks.
– If Read-Only is sufficient, don’t grant Read-Write.
– Should not grant more rights than necessary just because
it is easier to do.
• Limits the damage that may result from security
breaches or incidents.
30
Data Classification
• Know what you’re protecting!
• Provides users with a way to stratify sensitive information.
• Provides a system for applying safeguards appropriate to the
level of confidentiality required.
• Government and private industry have similar classification
systems, although:
– Normally government classification systems are more restrictive
and bureaucratic than industry systems.
– The ones used by non-government entities have more variations.
31
Classification Systems
• U.S. Government Classifications
– Top Secret, Secret, Confidential, Sensitive but Unclassified
(For Official Use Only), and Unclassified
• Common Industry Classifications
– Trade Secret, Company Confidential/Proprietary, Unclassified
– Trade secrets are often not protected by patents or
copyrights, employees must understand legal obligation to not
disclose information.
32
Data Classification
• Don’t go overboard.
– Too many types will frustrate users.
– In 1956 George Miller wrote an article The Magical
Number Seven Plus or Minus Two: Some Limits on Our
Capacity for Processing Information. He showed that the
amount of information which people can process and
remember is often limited to about seven items.
• The classifications must be mutually exclusive.
33
Security Clearances
• Go hand-in-hand with data classification.
• If you as a consultant or your organization works with certain
government entities, you are required to obtain clearances
before you perform work.
• It can sometimes involve rigorous background checks,
polygraphs, and agreements about disclosure of sensitive
information.
• Usually clearance is tied to essential activities of an
individual’s current job.
34
Confidentiality Model - Bell-LaPadula
• Simple security rule (No read up) – No subjects can read
information from an object with a higher security classification.
35
Confidentiality Model - Bell-LaPadula
• *-property (No write down) – A subject cannot write to an
object with a lower security classification.
36
Security by Obscurity
• Protects information and systems by hiding them.
• Usually not a good approach to security.
– One of the few exceptions may be steganography
(steganos Gk., covered).
– Not to be confused with stenography.
• Should be implemented with other security measures.
37
Master of Defense in Depth - Vauban
38
Source: P. Griffith, The Vauban Fortifications of France, Osprey.
El Morro Fort, San Juan, PR
Five layers (levels) of protection;
The inner layer has the highest
concentration of protective measures.
Source: bitscn.com.
39
Defense in Depth – Orig. Flavor
40
Source: P. Griffith, The Vauban Fortifications of France, Osprey.
Defense in Depth – Orig. Flavor
41
Source: P. Griffith, The Vauban Fortifications of France, Osprey.
Layered Protection
42
Based on Carr et l, The Management of Network Security, Prentice Hall.
Defense in Depth
• Aka “Layered protection”.
• Broached by the SANS Institute.
• Organization must have a layered defense at the perimeter, network,
equipment, and data layers.
• Because there are so many potential attackers taking advantage of numerous
attack vectors, there is no single method for successfully protecting a
network.
• Instead, we should protect a network with a variety of defensive mechanisms
so that if one mechanism fails, another will already in place to thwart an
attack.
43
Layered Protection
• Makes the effort needed to pull off a compromise more costly in
time and labor than it is worth to a potential attacker.
• Delays the attacker to buy time for implementing incident response
actions.
• Eliminates the existence of one single point of failure in security.
• More general types of protection in the outer layers so that
performance does not degrade.
• Granularity increases as layers get closer to the resource to be
protected and packets are fewer and more specific.
44
Layered Protection
• However, more layers mean more complexity.
• They are more expensive too.
• Sometimes one layer may hamper the correct
functioning of another.
– Example: Network-based intrusion detection systems
cannot read network traffic if it is encrypted.
• Again, balance is the key.
45
So, Do I Really Have to Have Security?
• For many organizations, it’s NOT optional.
• Mandatory regulations required by government
–
–
–
–
SOX
GLBA
HIPAA
Data center requirements for financial institutions
• “Self regulations”
– PCI DSS
46
Sarbanes-Oxley Act (SOX)
• Public Company Accounting Reform and Investor Protection Act of
2002
• Intended to prevent Enron scandals of the future.
• Protects investors by requiring accuracy and reliability in corporate
disclosures.
• Created new penalties for acts of wrongdoing, both civil and
criminal.
– CEOs and CFOs are personally liable. Certification of fraudulent reports
may be punished by fines up to $1 million and/or imprisonment of up to
10 years.
47
SOX
Sec.
201
Sec.
302
Sec.
404
Sec.
409
Sec.
802
Sec.
806
Sec.
807
• Services outside scope of auditor practice
• Corporate responsibility for financial reports
• Assessment of internal controls
• Real time issuer disclosures
• Criminal penalties for altering documents
• Protection of employees exposing fraud
• Criminal penalties for defrauding shareholders
48
Critical Aspects of SOX
• Specifies new financial reporting requirements.
– Section 302 requires CEOs and CFOs to certify their company’s SEC
reports.
• Requires all financial reports to include an internal control report.
– Section 404 requires CEOs and CFOs to report on the effectiveness of
the company’s internal controls over financial reporting.
– To comply with Section 404, companies have to ensure that their data are
accurate.
• Auditing firms are also required to attest to the accuracy of the
assessment.
49
Gramm-Leach-Bliley Act (GLBA)
• The Financial Modernization Act of 1999
• Protects personal financial information held by
financial institutions
– Privacy Rule
– Safeguards Rule
– Pretexting Rule
50
GLBA – Privacy Rule
• A financial institution may not share non-public
information on a consumer with non-affiliated third
parties unless it gives notice to the consumer (notice
of privacy).
• The customer must be given a chance to opt out.
51
Concern for Privacy
52
Based on: Wu, Prybutok, Koh, and Hanus, “A nomological model of RFID privacy concern,” Business Process Management Journal, 18(3),
2012, pp. 420-444, adapted from original work by Smith, Milberg, and Burke, MIS Quarterly, 20(2), 1996, pp. 167-196.
Concern for Privacy
Dimension
Description
Collection
Concern that large amount of personal information is collected
and stored in databases.
Unauthorized
Secondary Use
Concern that personal information is collected ostensibly for
one purpose but, once collected, used for another purpose
(secondary use). This can be done either inside or outside of
the company that collected the data.
Improper Access
Concern that personal information, once collected, becomes
accessible to people who do not have the authorization to view
or work with it.
Errors
Concern that personal information may become corrupted and
erroneous due to malicious or inadvertent modifications.
53
Source: Wu, Prybutok, Koh, and Hanus, “A nomological model of RFID privacy concern,” Business Process Management Journal, 18(3),
2012, pp. 420-444, adapted from original work by Smith, Milberg, and Burke, MIS Quarterly, 20(2), 1996, pp. 167-196.
GLBA – Safeguards Rule
• FTC requires financial institutions to create an
information security program.
– Specifies the administrative, technical, and physical controls
to protect information.
– Assign an “owner” of the program.
– Conduct risk assessments and address identified risks.
– Review the program on an ongoing basis.
• Financial institutions must also ensure that its service
providers protect customer information.
54
HIPAA
• Health Insurance Portability and Accountability Act of 1996
• Protects against loss of health insurance due to change of jobs.
• Protects the privacy and security of personal health information.
• Protected health information (PHI) is any individually identifiable
information, including:
– Info on the physical and mental health of a person.
– Notes doctors put into a person’s medical record.
– Billing and payment related to healthcare.
55
HIPAA – Security Rule
• The Security Rule dictates how covered entities must protect
the confidentiality, integrity, and availability of electronic PHI
(EPHI).
• Covered entities must create, review, and update policies and
procedures to comply with the Security Rule.
• Covered entities must implement administrative, physical, and
technical safeguards.
• The Rule includes standards that must be implemented for
each safeguard (“implementation specifications”).
56
What About Availability
57
Disaster Recovery Regulations
• September 11 exposed the risks of data loss caused by
disastrous events.
• On April 7, 2003, the Securities and Exchange Commission
(SEC), Comptroller of the Treasury, and the Federal Reserve
issued the Interagency Paper on Sound Practices to
Strengthen the Resilience of the U.S. Financial System.
• Now, financial institutions that account for at least 5% of the
transactions in critical financial markets are required to
implement sound business continuity practices.
C.F.: Yang and Wu, “Using virtualization to ensure uninterrupted access to software applications for financial services firms,”
Proceedings of the 45th Hawaii International Conference on System Sciences, 2012, pp. 5623-5630.
58
Three-Datacenter Strategy
• One required practice is to maintain sufficient geographically
dispersed resources, most importantly, data centers. The
targeted recovery time is two hours.
• Largest institutions are required to maintain three data centers.
• Although DR practices are not mandatory for other financial
services firms, many of those firms are adopting the practices
because it is prudent to do so.
• Medium firms’ voluntarily compliance calls for two data
centers.
C.F.: Yang and Wu, “Using virtualization to ensure uninterrupted access to software applications for financial services firms,”
Proceedings of the 45th Hawaii International Conference on System Sciences, 2012, pp. 5623-5630.
59
California SB1386
• California’s Database Security Breach Notification Act of 2003
was the first notification law.
– Created by and more commonly referred to as California Senate
Bill 1386.
– Realizing that identity theft was one of the fastest growing crimes.
• Covers any entity that stores personal information on a
California resident.
• The entity must notify California residents of a breach of its
computer systems.
60
Personal Information
• CA SB1386 defines this broadly:
– Social security number
– Driver’s license/CA ID number
– Account/CC number, with related security code, access code, password,
etc.
– Medical information
– Health insurance information
• Information accessible to the public through government records is
not personal information.
• If data are encrypted, then no notification is required.
61
Other States Follow Suit
• After the ChoicePoint breach, many other states
created their own notification laws.
– As of January 2010, 45 states (incl. D.C.)
• Many were modeled after the SB1386.
• There are a number of differences across states.
62
Self-Regulation – PCI DSS
• The Payment Card Industry Security Council is a private
industry organization.
• Any credit card-accepting merchant or service provider must
comply with the Payment Card Industry Data Security
Standard (PCI DSS).
• DSS provides an uniform approach to safeguarding sensitive
cardholder data for all credit card issuers.
• It identifies 12 basic categories of security requirements for
credit card data protection.
63
PCI DSS
• Applies only to the systems that process, store, or transmit credit card data.
• Uses preventive, detective, and corrective controls to secure data.
• Compliance level is based on the size of merchants’ credit card operations.
• Compliance audits are performed periodically.
– Questionnaire
– Perimeter scan
– On-site security audit
• Enforcement is weak. Card companies use the threat of financial penalties to
compel compliance.
64
BS7799
• The British standard for information security management.
• Provides the framework necessary to create a secure system.
• First version was created in 1995. Revised version was
released in 1999.
– Volume 1 – Code of Practices for Information Security
Management provides guidance on best practice in security
management.
– Volume 2 – Specification for Information Security Management
Systems specifies the standard against which an organization can
be assessed and certified.
65
ISO/IEC17799:2005
• The Code of Practice for Information Security Management is a standard
sanctioned by the International Organization for Standardization (ISO) and
the International Electrotechnical Commission (IEC).
– Based on UK’s BS7799
– First edition was ISO/IEC17799:1999
• Is proposed to be ISO/IEC27002
–
–
–
–
ISO27001 (Based on BS7799 Part 2): Audit and certification
ISO27002 (Based on BS7799 Part 1): Code of Practices for ISMS
ISO27003 (Unofficial): Implementation guidance
ISO27004 (Unofficial): Measurement and metrics
66
Using ISO17799
• Provides a series of systematic recommendations for building a security
program that fits a company’s business model.
• If a company follows ISO17799 as their information security standard, they
will address many of the other legal requirements placed on them by the
Sarbanes-Oxley Act (SOX), the Gramm-Leach-Bliley Act (GLBA), and the
Health Insurance Portability and Accountability Act (HIPAA).
• It’s easy to map the requirements from SOX, GLBA, and HIPAA to ISO17799.
• The controls suggested by the standard should be selected based on risk
assessment.
• Short of providing guidance on how to implement the standard based on a
company’s unique requirements.
67
Structure of ISO17799
• 11 control areas, 39 control objectives, 133 controls
• A control is an action, process, or technology that can lower the
risk to a company.
– A management control requires management approval, support, or
activities.
– An operational control is action- or task-oriented.
– A technical control requires modification, configuration, or verification of
information processing facilities.
• Some companies use the TOC of the standard to structure their
information security policies.
68
ISO17799 Control Areas
• Security Policy
• Organization of information security
• Asset management
• Human resources security
• Physical and environmental security
• Communications and operations management
69
ISO17799 Control Areas
• Access control
• Information systems acquisition, development, and
maintenance
• Information security incident management
• Business continuity management
• Compliance
70
ISO17799 Example: Security Policy
• The Security Policy control area has one control
objective and two controls
– Control objective: 5.1 Security policy (Sections 1 through
4 are non-action items)
– Control #1: 5.1.1 Information security policy document
– Control #2: 5.1.2 Review of the information security policy
• These two controls, esp. 5.1.1 is the focus of an
information security program.
71
ISO17799 Example: Security Policy
• 5.1.1 Information security policy document
– Is there a formal information security document published by management
representing the business, legal, contractual, and regulatory requirements?
– Is the policy document available to all employees and users?
– How is the policy communicated to all affected parties? How often?
– How does the information security policy document support the business
objectives?
– Is there a documented structure for risk assessment and risk management within
the policy?
– Are all the 11 control areas represented in the policy?
– Does the policy reference other policies, standards, or procedures when
appropriate?
72
ISO17799 Example: Security Policy
• 5.1.2 Review of the information security policy
– How often is the information security policy reviewed?
– Does management engage qualified external subject matter experts to
review the policy?
– Is the policy reviewed and revised based on a defined process?
– How are events or plans reviewed to determine if a policy revision or
update is required?
– Is formal management approval process required for policy changes?
73
Other Security Frameworks
• National Institute of Standard and Technology (NIST)
Special Publications (800 series)
• These are not InfoSec-specific frameworks but both
have a significant security focus:
– Control Objectives for Information and Related
Technology (CobiT)
– IT Infrastructure Library (ITIL)
74
CobiT and Security
•
•
CobiT centers on the IT processes of an organization, which are broken down into four
domains:
–
Planning and Organize (PO)
–
Acquire and Implement (AI)
–
Deliver and Support (DS)
–
Monitor and Evaluate (ME)
CobiT hierarchy
–
Domains
–
Control Objectives
–
Detailed Control Objectives
•
DS5 Ensure Systems Security governs security and contains 11 DSOs.
•
CobiT Security Baseline includes DS5 and other relevant control objects.
75
CobiT
76
Source: ITGI, CobiT Security Baseline.
ITIL
• Also originates in UK (Office of Government Commerce).
• A collection of books grouped into areas including service delivery, service
support, security management, application management, etc.
• Focuses on IT services and quality.
• Like CobiT, ITIL focuses on IT processes.
– One of ITIL’s underpinnings is embedding security into everyday processes .
• Security management is a major part and singled out as a book.
– The Control process in Security Management stresses the importance of
operational level agreement via the use of SLAs.
77
Download