Security Incident Management Program

advertisement
Albany Bank Corporation
Security Incident Management Program
2
CONSULTANTS
• Taurus Allen
• Destiny Dyer
• Marta Pelyo
• Daniel Post
• Michele Reina
• Robert Warshauer
3
PROJECT OBJECTIVES
1. Create an effective security incident management program
2. Compliance with regulatory and industry standards
3. Identifying potential vendors
4. Implementation of roadmap
4
AGENDA
• Project Approach
• Bank Profile
• Purpose of Security Incident Management Program
• Industry Regulations and Standards
• Explanation of Proposed Program
• Workflow
• Vendor Recommendations
• Roadmap
5
PROJECT APPROACH
Objective: To assist ABC with creating and recommending a
security incident management program.
Phase 1
Phase 2
Phase 3
Planning and
Content Research
Content
Development and
Recommendations
Final Presentation
and Preparation
Research of Current Events, Weekly Status Report, Project Timeline, Peer Evaluations
6
BANK PROFILE
Overview:
• 20th largest bank in the United States
• Specializes in commercial, retail, investment banking
• Holds $50 billion of assets
Problems Facing Albany Bank Corporation:
• Well known hacking group breached security records
• Approximately 20 million customer records compromised
• ABC did not have formal incident security program in place
• Reputational and financial losses
7
RECENT BREACHES
These breaches occurred due to lack of:
• Adequate cyber security
• Detailed incident response procedures
• Efficient detection/analysis and containment strategies
8
SECURITY INCIDENT MANAGEMENT OBJECTIVE
• Process of monitoring and detecting threats
to a network
• Encompasses integrating IT management
systems
• Identifies and prioritizes incidents based on
business impact
• Used to protect confidential data
NIST Cybersecurity Framework
9
INDUSTRY REGULATIONS: FFIEC
Purpose: To develop and ensure uniformity of report forms, standards,
and principles for financial institutions
Incident Management Requirements:
• Periodic risk assessments
•
Layered security controls
•
Member awareness and education
•
Ad-Hoc activity monitoring
•
Defined escalation protocols
10
INDUSTRY STANDARDS: ISO 27001-27002
Purpose: To provide a model for Information Security Management System
Incident Management Requirements:
• Management of information security risks
• Develop criteria for accepting risks and identifying level of risks
• Identify and evaluate options for treatment of risks
• Implement training and awareness programs
11
INDUSTRY STANDARDS: NIST 800-61 REV 2
Purpose: Computer Security Incident Handling Guide
Incident Management Requirements:
• Procedure for performing incident handling and communication
• Incorporation of response teams in incident handling process
• Reduce frequency of incidents
12
INCIDENT RESPONSE LIFECYCLE
Steps:
• Preparation
• Detection
• Analysis/Classification
• Containment
• Eradication/Recovery
• Post-Incident Activity
13
INCIDENT RESPONSE LIFECYCLE: PREPARATION
Checklist to ensure that all pivotal functions and procedures of incident response
program are being performed
14
INCIDENT RESPONSE LIFECYCLE: PREPARATION
• Establish escalation procedures and response teams
• Improve educational awareness
• Training sessions
• Document procedure checklist
• Implement a playbook system
• Install malware protection software
• Create a simulated attack program to test response teams
15
INCIDENT RESPONSE LIFECYCLE: DETECTION
• C03 automated system
• Report incident: Ticketing System
•
Open Ticket Here
• Triage Incident
• Significance of the constituency
• Experience of the incident reporter
• Severity of the incident
16
INCIDENT RESPONSE LIFECYCLE: ANALYSIS/CLASSIFICATION
Impact: Measures the effect of an
incident on the company
Financial Ranges
Users
Critical
Loss of more
than $5 Million
Affects 76%-100%
High
Loss between
$3 – 5 Million
Affects 51%-75%
Medium
Loss between
$1 – 3 Million
Affects 25%-50%
Low
Loss of less than
$1 Million
Affects 0-24%
17
INCIDENT RESPONSE LIFECYCLE: ANALYSIS/CLASSIFICATION
Core Business Operations
Urgency: Measures the effect an
incident has on the core business
functions
Critical
Interferes with core business functions
or loss of critical data
High
Interferes with non-core activities or
functions that do not affect the entire
company
Medium
Interferes with normal completion of
work or tasks that are more difficult
but not impossible to complete
Low
Interferes with non-business related
use
18
INCIDENT RESPONSE LIFECYCLE: ANALYSIS/CLASSIFICATION
Response and Resolution Time for Incidents:
Incident Priority
Timeframe
Critical
Action within 1 hour
Resolution within 1 day
High
Action within 2 hours
Resolution within 2 days
Medium
Action within 1 day
Resolution within 5 days
Low
Action within 2 days
Resolution within 7 days
19
INCIDENT RESPONSE LIFECYCLE: ANALYSIS/CLASSIFICATION
Incident Classification Matrix
Impact
Matrix Key
Critical
Red
High
Black
Medium
Gray
Low
White
20
INCIDENT RESPONSE WORKFLOW
21
22
INCIDENT RESPONSE LIFECYCLE: DETECTION/ANALYSIS
Detection / Analysis Checklist:
23
INCIDENT RESPONSE LIFECYCLE: CONTAINMENT
•
Sandbox method: Threat quarantined, assessed and monitored
•
Freeze assets threatened
•
Suspend network services
•
Protect the chain of custody
24
INCIDENT RESPONSE LIFECYCLE: ERADICATION/RECOVERY
Checklist
What information is
recoverable
•
Restore systems
Change passwords
•
Tighten network
•
What information is
permanently lost
•
Replace compromised
files
•
Timeline of recovery
•
Install patches
•
25
INCIDENT RESPONSE LIFECYCLE: ERADICATION/RECOVERY
Eradication/Recovery Checklist:
26
INCIDENT RESPONSE LIFECYCLE: POST-INCIDENT
Perpetual loop of improvement:
• Improve technology
• Follow up report
• Lessons learned meeting
• Trend analysis team
• Communicate incidents to affected users
Post-Incident Checklist
27
IDENTIFYING POTENTIAL VENDORS
Vendor Checklist
28
IDENTIFYING POTENTIAL VENDORS
29
IDENTIFYING POTENTIAL VENDORS
Major Solutions Offered:
•
•
•
Ticketing system
Compliance of Security Incident Response Cycle
Risk assessment
•
•
•
Auditing
Employee training
Single user sign on
•
•
•
Workflow
Matrix
Automatic response system
•
•
•
Advanced layered security
Risk management
Compliance
30
SECURITY MANAGEMENT PROGRAM: ROADMAP
• 0-3 Months
• Preparation
Step II
• 3-6 Months
• Implementation
Step I
• 6-18 Months
• Finalization
Step III
31
PHASE ONE: 0-3 MONTHS
•
•
•
•
•
•
Research of regulation and standards
Finalize business function requirements
Implement response teams: red, black, gray, and white
Perform vendor selection
Effective escalation process (via use of teams)
Manual management for short term security incident response
program
32
PHASE TWO: 3-6 MONTHS
•
•
•
•
•
•
Implement the selected vendor tools
Implement the workflow
Implement the tool for manual
Define and document incident response plans
Implement incident management and ticketing system
Continuous management of any security incident
33
PHASE THREE: 6-18 MONTHS
• Perform security response testing/training
• Initiate a communication plan for security incident management program for
internal/external stakeholders
• Meets legal and regulatory tandards
• Employee education and training
• Customer awareness
• Vendor training: Roles and responsibilities
• Trend analysis capability
34
MEASURE OF SUCCESS
• How fast was incident contained?
• How quickly did Albany Bank Corporation recover from the incident?
• How well did Albany Bank Corporation mitigate their losses?
• How effective was Albany Bank Corporation’s communication of incident?
35
NEXT STEP RECOMMENDATIONS
•
Initiate Incident Response Program
•
Quarterly assessment of risks
•
Annual testing of response teams and procedures
We guarantee to help
“Chase Risk Away”
Download