Information Systems Security Policies & ISO 17799 Maria Karyda, PhD mka@aegean.gr Laboratory of Information and Communication Systems Security Department of Information and Communication Systems Engineering University of the Aegean Karlovassi, Samos, GR-83200, GREECE Overview Information Systems Security Policies What is a Security Policy? Why do we need them? How can we design a Policy and what should we include? What makes a Security Policy effective? Information Security Management Standards How can the ISO 17799 assist us? IPICS – Chios, July 2005 2 Information Systems Security Practices Information Systems Risk Management aims to minimize risk at acceptable levels by implementing risk analysis and management methods (e.g. OCTAVE, CRAMM, SBA) baseline security is also an option Information Systems Security Policy most common security management practice based on risk evaluation results based on standards and best practices IPICS – Chios, July 2005 3 What is a Security Policy? High level statements describing the security goals, priorities and the management intention with regard to information systems security, as well as the ways to achieve these goals. Written in one or more documents. IPICS – Chios, July 2005 4 Information Systems Security Policies Design Implement Publish Enforce Monitor compliance Evaluate Review Amend and update IPICS – Chios, July 2005 5 Who is involved? Security experts System / network administrators set security goals provide resources Users implement security controls, guidelines Management design, review and update the policy follow security procedures Auditors monitor compliance IPICS – Chios, July 2005 6 Related Concepts Law, Regulations Security Requirements Best Practice Information Systems Security Policy Security Procedures e.g. Data Protection, Intellectual Property Management Security Requirements Guidelines Countermeasures Law and Regulations Information systems security management standards confidentiality, availability, privacy, integrity, non repudiation Best practices and Security Standards Security, countermeasures, guidelines and procedures IPICS – Chios, July 2005 7 Why do we need a security policy? -1 Provides a comprehensive framework for the selection and implementation of security measures Communication means among different stakeholders Management of resources people, skills, money, time Conveys the importance of security to all members of the organization IPICS – Chios, July 2005 8 Why do we need a security policy? -2 Helps create a “security culture” Shared beliefs and values concerning security Legal obligation Helps promote “trust relationships” between the organizations and its business partners / clients IPICS – Chios, July 2005 9 Designing a Security Policy: security goals elicitation Risk evaluation Other sources of security requirements: management legal framework contractual obligations users and administrators business partners and clients IPICS – Chios, July 2005 10 Designing a Security Policy: Issues to be addressed Goal and security targets Scope Assets covered by the Policy Roles and responsibilities Compliance monitoring data, software, hardware, locations, processes etc. incentives, penalties etc. Time IPICS – Chios, July 2005 11 What kind of Security Policies are there? Computer-oriented Security Policies Information Security Policies that implement access control (Discretionary Access Control, Mandatory Access Control) operating systems networks application Human-oriented Security Policies scope: department, organization applied by IS users IPICS – Chios, July 2005 12 Security Policies Structure -1 Individual Security Policies application or system (e.g. email policy) “use policies” + effective for isolated systems and autonomous applications - high complexity, fragmented IS security management IPICS – Chios, July 2005 13 Security Policies Structure -2 Comprehensive Security Policies one document addressing all applications, processes and systems - big volume, not easy to use - contain high level security guidelines IPICS – Chios, July 2005 14 Security Policies Structure -3 Modular Security Policies comprehensive document with multiple annexes containing specific (e.g. per application or system) policies can be in hypertext form IPICS – Chios, July 2005 15 ISO/IEC 17799 First Edition: 01-12-2000 Prepared by the British Standards Institution (as BS 7799) and was adopted by Joint Technical Committee ISO/IEC JTC 1, Information Technology, in parallel with its approval by national bodies of ISO and IEC. “Information technology — Code of practice for information security management” New Edition: June 2005 IPICS – Chios, July 2005 16 Security Policies Content -1(based on ISO 17799-2000) I. Organizational Security “Information security is a business responsibility shared by all members of the management team.” Information security infrastructure management should approve the information security policy, assign security roles and co-ordinate the implementation of security across the organization co-operation and collaboration of managers, users, administrators, application designers, auditors and security staff, and specialist skills in areas such as insurance IPICS – Chios, July 2005 17 Security Policies Content -2(based on ISO 17799) II. Asset classification and control Asset accountability Accountability should remain with the owner of the asset. Responsibility for implementing controls may be delegated. Information classification Information should be classified to indicate the need, priorities and degree of protection, depending on varying degrees of sensitivity and criticality. IPICS – Chios, July 2005 18 Security Policies Content -3(based on ISO 17799) III. Personnel security Security in job definition and resourcing User training Users should be trained in security procedures and the correct use of information processing facilities to minimize possible security risks. Responding to security incidents and malfunctions Weaknesses, malfunctions Learning from incidents Disciplinary process IPICS – Chios, July 2005 19 Examples* “The Terms and Conditions of Employment of the Organization are to include requirements for compliance with Information Security” “All staff must have previous employment and other references carefully checked” “All employees must comply with the Information Security Policy of the Organization. Any Information Security incidents resulting from non-compliance will result in immediate disciplinary action” * RUSecureTM Information Security Policies IPICS – Chios, July 2005 20 Examples* “The Organization is committed to providing regular and relevant Information Security awareness communications to all staff by various means, such as electronic updates, briefings, newsletters etc.” “Periodic training for the Information Security Officer is to be prioritized to educate and train in the latest threats and Information Security Techniques” “The Organization is committed to providing training to all users of new systems to ensure that their use is both efficinet and does not compromise Information Security” * RUSecureTM Information Security Policies IPICS – Chios, July 2005 21 Security Policies Content -4(based on ISO 17799) IV. Physical and environmental security Secure areas Security perimeter, entry controls Protection provided should be commensurate with the identified risks Equipment security Safety IPICS – Chios, July 2005 22 Examples* “A formal Hardware Inventory of all equipment is to be maintained and kept up-to-date at all times” “All information system hardware faults are to be reported promptly and recorded in a hardware fault register” * RUSecureTM Information Security Policies IPICS – Chios, July 2005 23 Security Policies Content -5(based on ISO 17799) V. Communications & operations management Operational procedures and responsibilities System planning and acceptance Capacity planning, performance requirements, system acceptance Protection against malicious software Back ups, logging Network management Media handling Incident management procedures Segregation of duties Separation of development and operational facilities tapes, disks, cassettes Information exchange between organizations Policy on the use of e-mail or fax Electronic commerce security IPICS – Chios, July 2005 24 Examples* Policy statement on the use of fax: “Sensitive or confidential information may only be faxed were more secure methods of transmission are not feasible. Both the owner of the information and the intended recipient must authorize the transmissions beforehand” Policy statement on media handling: “Only personnel who are authorized to install or modify software shall use removable media to transfer data to/from the organization's network. Any other persons shall require specific authorization” * RUSecureTM Information Security Policies IPICS – Chios, July 2005 25 Security Policies Content -6(based on ISO 17799) VI. Access control User access management User responsibilities Network access control Access rights, passwords Network segregation Operating system access control Application access control Monitoring system access and use Mobile computing and teleworking IPICS – Chios, July 2005 26 Examples* User access management: “Access to all systems must be authorized by the owner of the system and such access, including the appropriate access rights, or privileges, must be recorded in an Access Control List. Such records are to be regarded as Highly Confidential documents and safeguarded accordingly” Operating system access control “Access to operating system commands is to be restricted to those who are authorized to perform systems administration/management functions. Even then, such access must be operated under dual control requiring the specific approval of senior management” *RUSecureTM Information Security Policies IPICS – Chios, July 2005 27 Security Policies Content -7(based on ISO 17799) VII. Systems development and maintenance Security requirements of systems Security in application systems “built-in” security Message authentication, hash algorithms, cryptography Cryptographic controls To protect the confidentiality, authenticity or integrity of information (encryption, digital signatures, key management) IPICS – Chios, July 2005 28 Examples* “All new hardware installations are to be planned formally and notified to all interested parties ahead of the proposed installation date. Information security requirements are to be circulated for comment to all interested parties, well in advance of installation” “All equipment must be fully and comprehensively tested and formally accepted by users before being transferred to the live environment” *RUSecureTM Information Security Policies IPICS – Chios, July 2005 29 Security Policies Content -8(based on ISO 17799) VIII. Business continuity management “To counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters.” Analyze the consequences of disasters, security failures and loss of service. Develop and implement contingency plans to ensure that business processes can be restored within the required time-scales. Such plans should be maintained and practiced to become an integral part of all other management processes. Business continuity management should include controls to identify and reduce risks, limit the consequences of damaging incidents, and ensure the timely resumption of essential operations. IPICS – Chios, July 2005 30 Security Policies Content -9(based on ISO 17799) IX. Compliance Compliance with legal requirements Data protection and privacy of personal information Intellectual property rights (IPR) Regulation of cryptographic controls Compliance with security policy IPICS – Chios, July 2005 31 Examples* “Persons responsible for Human Resources Management are to prepare guidelines to ensure that all employees are aware of the key aspects Copyright legislation, in so far as these requirements impact on their duties” “All employees are required to fully comply with the organisation’s Information Security Policies. The monitoring of such compliance is the responsibility of management” *RUSecureTM Information Security Policies IPICS – Chios, July 2005 32 Critical factors for successful application -1 Alignment with business goals Management support Organizational culture Address specific security requirements User awareness, training and education Review and evaluation procedures Gradual introduction, change management IPICS – Chios, July 2005 33 Critical factors for successful application -2 Clear, easy to understand Easily accessible Complete Up-to-date Extendable Applicable Technology independent IPICS – Chios, July 2005 34 Security Policies Review Scheduled reviews Occasional e.g. once every 18 months when major changes occur (e.g. network configuration, new applications) Review results utilized for evaluating and updating the Security Policy IPICS – Chios, July 2005 35 Conclusions There is no “out of the box” security solution Customize Security Policies content, structure, security guidelines Utilize best practice, Information Security Standards Effective implementation context-dependent IPICS – Chios, July 2005 36