Chap 8: Administering Security Security is a combination • Technical – covered in chap 1 • Administrative • Physical controls SE571 Security in Computing Dr. Ogara 2 Security Planning Risk analysis Policy Physical control/security SE571 Security in Computing Dr. Ogara 3 Effective security planning is essential for computer organization A Security plan is a document that describes how an organization will address its security needs: • It is an official record of current security practices • Blue print for review to improve those practices SE571 Security in Computing Dr. Ogara 4 To define and implement a security plan we concentrate on three aspects as follows: Contents of security plan/what should be there? 2. Who are involved in security planning? 3. How to obtain support for a plan 1. SE571 Security in Computing Dr. Ogara 5 Security plan should address seven issues 1) 2) 3) 4) 5) 6) 7) Policy – describes the goals and are people involved willing to attain these goals? Current state – the status of security at the time of the plan Requirements – recommends ways to meet the security goals Recommended controls – mapping controls to the vulnerabilities identified in the policy and requirements Accountability – who is responsible for each security activity Timetable – when do different security functions take place? Continuing attention – specify a structure to periodically update the security plan SE571 Security in Computing Dr. Ogara 6 The Software Engineering Institute at Carnegie Mellon University has created a framework for building a security plan Identify enterprise knowledge Identify operational area knowledge Identify staff knowledge Establish security requirements Map high priority information assets to information infrastructure 6) Perform an infrastructure vulnerability evaluation 7) Develop a protection strategy 1) 2) 3) 4) 5) SE571 Security in Computing Dr. Ogara 7 Explain what should be accomplished Are functional or performance demands placed on a system to ensure a desired level of security The inputs to a security plan are shown in the diagram SE571 Security in Computing Dr. Ogara 8 Plan should identify who are responsible for implementing security requirements Different groups can be responsible for different security roles, for example, • PC Users: security of own machines • Project leaders: security of data and computations • Managers: seeing that the people they supervise implement security measures SE571 Security in Computing Dr. Ogara 9 • Database administrators: access to and integrity of data in databases • Information officers: creation and use of data, retention and proper disposal of data • Personnel staff members: security involving employees SE571 Security in Computing Dr. Ogara 10 Membership should relate to different aspects of security Planning team should respect each of the following groups: • • • • • • • Computer hardware group System administrators System programmers Application programmers Data entry personnel Physical security personnel Representative users SE571 Security in Computing Dr. Ogara 11 Ensure the security functions will be implemented and security activities carried out Three groups of people must contribute to making the plan success • The planning team • Those affected by the security recommendations • Management: using and enforcing security Organizations can use a “business continuity plan” to deal with situations having two characteristics: • Catastrophic situations: a computing capability is suddenly unavailable through fire or flood • Long duration SE571 Security in Computing Dr. Ogara 12 Effective security planning includes careful risk planning Risks can be distinguished from other events interms of : • Risk impact associated with an event • The probability (P risk) of an incidence associated with each risk. 0 =< Prisk <= 1; When Prisk = 1 we say that there is a problem Risk control – the degree to which an outcome can be changed SE571 Security in Computing Dr. Ogara 13 The effects of a risk can be quantified by multiplying the risk impact by the risk probability, yielding the risk exposure: Risk Exposure – risk impact * P risk Example: Prisk = 0.40; risk impact $10,000 (cost of cleaning the affected files) Risk Exposure = 0.4*10000 = $ 4,0000 So we can based on the calculation decide an antivirus software worth $400 is worth an investment SE571 Security in Computing Dr. Ogara 14 Three Strategies for Risk Reduction: Avoiding the risk • Change security requirements Transferring the risk • Allocate the risk to other systems, people, assets • Buy insurance to cover any financial loss Assuming the risk • Accept and control it with available resources • Prepare to deal with the loss if it happens SE571 Security in Computing Dr. Ogara 15 In addition to impact cost there is also costs associated with reducing it Risk leverage is the difference in risk exposure divided by the cost of reducing the risk Risk leverage = (risk exposure before reduction – risk exposure after reduction)/cost of risk reduction SE571 Security in Computing Dr. Ogara 16 So if the leverage value of a proposed action is not high enough then we need to find a less costly strategy The parameters in Risk Leverage equation demand the risk analysis process to identify and list all exposures in the computing system For each exposure we need to identify possible controls and their costs Finally we need to carry out a cost–benefit analysis SE571 Security in Computing Dr. Ogara 17 The basic steps of risk analysis are: 1. Identify the assets 2. Determine vulnerabilities 3. Estimate likelihood of exploitation 4. Compute expected annual loss 5. Survey applicable controls and their costs 6. Project annual savings of control SE571 Security in Computing Dr. Ogara 18 US Army – OPSEC used during Vietnam War 1) Identify critical information to be protected 2) Analyze the threats 3) Analyze the vulnerabilities 4) Asses the risks 5) Apply countermeasures SE571 Security in Computing Dr. Ogara 19 US Airforce – Operational Risk Management Procedure (AIROO) 1) Identify hazards 2) Assess hazards 3) Make risk decisions 4) Implement controls 5) Supervise SE571 Security in Computing Dr. Ogara 20 Indicating the goals of a computer security effort and the willingness of the people involved to work to achieve those goals. SE571 Security in Computing Dr. Ogara 21 Document to inform users of the objectives and constraints on using a system Purpose of policy document • Recognize sensitive information assets • Clarify security responsibilities • Promote awareness for existing staff • Provide guidelines to new employees SE571 Security in Computing Dr. Ogara 22 A security policy must address the following: • The audience – who can gets access? • Contents – which resources • Characteristics of good security policy – how? SE571 Security in Computing Dr. Ogara 23 Three groups of audience • Users • Owners • Beneficiaries (e.g. customers, clients) Audience uses the security policy in important but different ways For each policy define the degree of confidentiality, integrity, and the continuous availability in the computing resources provided to them SE571 Security in Computing Dr. Ogara 24 The risk analysis identified the assets that are to be protected These assets (computers, networks, data) should be listed in the policy document The policy should also indicate: • Who should have access to protected resources • How unauthorized people will be denied access • How that access will be ensured SE571 Security in Computing Dr. Ogara 25 Coverage – should be comprehensive ad general Durability – survive system’s growth and expansion…applicable to new situations Realism – realistic/feasible to implement Usefulness – should be concise, clear and direct SE571 Security in Computing Dr. Ogara 26 Examples: • Data sensitivity policy • U.S. Government Agency IT Security Policy • Internet Security Policy • The U.S. government Email Policy SE571 Security in Computing Dr. Ogara 27 Describes protection needed outside the computer system Physical security can be in one of this forms: • Natural disasters • Power loss • Human vandals Contingency planning is key to successful recovery: • Backups, offsite backups, network storage, etc SE571 Security in Computing Dr. Ogara 28 Describing the status of security at the time of the plan Risk analysis – a careful investigation of the system, its environment, and the things that might go wrong SE571 Security in Computing Dr. Ogara 29 Recommending ways to meet the security goals Heart of the security plan Organizational needs SE571 Security in Computing Dr. Ogara 30 Mapping controls to the vulnerabilities identified in the policy and requirements SE571 Security in Computing Dr. Ogara 31 Describing who is responsible for each security activity Personal computer Project leaders Managers Database administrators Information officers Personnel staff SE571 Security in Computing Dr. Ogara 32 Describing who is responsible for each security activity Personal computer Project leaders Managers Database administrators Information officers Personnel staff SE571 Security in Computing Dr. Ogara 33 Identifying when different security functions are to be done Show how and when the element of the plan will be performed SE571 Security in Computing Dr. Ogara 34 Specifying a structure for periodically updating the security plan SE571 Security in Computing Dr. Ogara 35