70
CCNA Security 1 © 2009 Cisco Learning Institute. Chapter Nine Managing a Secure Network

Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Embed Size (px)

Citation preview

Page 1: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

CCNA Security

1© 2009 Cisco Learning Institute.

Chapter Nine

Managing a Secure Network

Page 2: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Major Concepts

• Describe the principles of secure network design.

• Describe the Cisco Self Defending Network.

• Describe the role of operations security in a network.

• Describe the various techniques and tools to use for network security testing.

222© 2009 Cisco Learning Institute.

network security testing.

• Describe the principles of business continuity planning and disaster recovery.

• Describe the SDLC and how to use it to design a Secure Network Life Cycle management process.

• Describe the functions, goals, role, and structure of a comprehensive security policy.

Page 3: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Lesson Objectives

Upon completion of this lesson, the successful participant will be able to:

1. Describe the high-level considerations for ensuring that a network is secure.

2. Describe how to identify threats, risks, and consequences of exploited services.

333© 2009 Cisco Learning Institute.

exploited services.

3. Describe the benefits of risk management and the measures to take to optimize risk management.

4. Describe the CSDN and describe the phases, benefits, and collaborative systems of a CSDN.

5. Describe the Cisco Threat Control Solution and the Cisco Secure Communications Solution.

6. Describe the positioning of the Cisco Integrated Security Portfolio.

Page 4: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Lesson Objectives

7. Describe the overarching concepts of operations security.

8. Describe the core principles of operations security.

9. Describe the role of and the techniques used in network security testing.

10. Describe the tools used in network security testing

444© 2009 Cisco Learning Institute.

11. Describe business continuity planning and disaster recovery

12. Describe the degrees of disruption to business operations and the types of backup.

13. Describe the SDLC.

14. Describe the 5 phases of the SDLC

15. Describe the goals of a security policy.

Page 5: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Lesson Objectives

16. Describe the structure of a security policy.

17. Describe the standards, guidelines, and procedures of a security policy.

18. Describe the roles and responsibilities entailed within a security policy.

19. Describe the concepts of security awareness and how to achieve

555© 2009 Cisco Learning Institute.

19. Describe the concepts of security awareness and how to achieve security awareness through education and training.

20. Describe in brief major laws and ethical guidelines for network security.

21. Describe how to respond to a security breach.

Page 6: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Developing Security Policies

• Business needs: What does the organization want to do with the network? What are the needs of the organization?

• Threat identification: What threats are most likely to occur, given the organization’s purpose and systems?

• Risk analysis: What is the cost versus benefit analysis of mitigating,

666© 2009 Cisco Learning Institute.

• Risk analysis: What is the cost versus benefit analysis of mitigating, transferring and accepting various security risk?

• Security needs: What are the policies, procedures, standards, and guidelines needed to address business needs and risks?

• Industry-recommended practices: What are the security practices that similar organizes currently employ?

• Security operations: What are the current procedures for system hardening, incident response, monitoring, maintenance, and auditing of the system for compliance?

Page 7: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Risk Management Guidelines

• Expect that any aspect of a security system might fail.

• Identify any elements that fail-open. Fail-open occurs when a failure results in a complete bypass of the security function.

• Try to identify all attack possibilities.

• Evaluate the probability of exploitation. The focus should be on the

777© 2009 Cisco Learning Institute.

• Evaluate the probability of exploitation. The focus should be on the resources that are needed to create an attack.

• Assume that people will make mistakes.

• Attackers will not use common and well-established techniques to compromise a system.

• Check all assumptions with other people. They might have a fresh perspective on potential threats and their probability.

Page 8: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Threat Identification – Bank Scenario

Internal system compromise Insider attack on the system

Identified Threats

888© 2009 Cisco Learning Institute.

Stolen customer data

Phony transactions Data Input errors

Data Center Destruction

Page 9: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Risk Analysis

• Evaluate each threat to determine its severity and probability

• Quantitative Risk Analysis uses a mathematical model

999© 2009 Cisco Learning Institute.

This is a test – it is only a test of the material that we actually want..

Qualitative Risk Analysis

Quantitative Risk Analysis

• Qualitative Risk Analysis uses a scenario-based model

Page 10: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Quantitative Risk Analysis

• Asset Value (AV) is the cost of an individual asset.

• Exposure Factor (EF) is the loss, represented as a percentage, that a realized threat could have

101010© 2009 Cisco Learning Institute.

a percentage, that a realized threat could have on an asset.

• Single Loss Expectancy (SLE) is the result of AV * EF, or the cost of a single instance of a threat.

Page 11: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

• Annualized Rate of Occurrence (ARO) -estimated frequency that a threat is expected to occur.

• Single Loss Expectancy (SLE)

Annualized Rate of Occurrence

111111© 2009 Cisco Learning Institute.

• Annualized Loss Expectancy (ALE) - expected financial loss that an individual threat will cause an organization.

ALE = SLE *ARO

Page 12: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Ways to Handle Risk

• Risk management—Uses the deployment of protection mechanisms to reduce risks to acceptable levels. Risk management is the most basic and the most difficult aspect of building secure systems, because it requires good knowledge of risks, risk environments, and

121212© 2009 Cisco Learning Institute.

good knowledge of risks, risk environments, and mitigation methods.

• Risk avoidance—Eliminates risk by avoiding the threats altogether, which is usually not an option in the commercial world, where controlled (managed) risk enables profits.

Page 13: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Risk Management Scenario

• Internal system compromise—Provide the least amount of privilege access possible to the inside, and utilize a secure multi-tiered application which minimizes inside access.

• Stolen customer data—Keep all of the customer data on inside servers, and only transfer data to the outside on demand.

131313© 2009 Cisco Learning Institute.

• Phony transactions if external server is broken into—Allow only man-in-the-middle attacks on the external server and design the external server application so that is does not to allow arbitrary transactions to be called for any customer account.

• Phony transactions if customer PIN or smart card is stolen—Use a quick refresh of revocation lists and have a contract with the user which forces the user to assume responsibility for stolen token cards.

Page 14: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Risk Management Scenario

• Insider attack on the system—Strictly limit inside access to the application and provide strict auditing of all accesses from the inside.

• Data input error—enhance the security of database applications and provide redundant checking system in order to reduce data entry errors

141414© 2009 Cisco Learning Institute.

• Data Center destruction—Ensure backups are kept off campus and that additional equipment is on-hand. Enhance defenses against flooding by raising equipment and other precautions.

Page 15: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Risk Avoidance Scenario

Using the risk avoidance approach, a company would decide not to offer e-banking service at all because it would be deemed too risky.

151515© 2009 Cisco Learning Institute.

Page 16: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Introduction to Cisco Self-Defending Network

• Least Privilege Concept

• Cisco Self-Defending Network Principles

• Cisco Self-Defending Network Defined

161616© 2009 Cisco Learning Institute.

• Collaborative Systems Enabling Unparalleled Security

Page 17: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Internet Inside

Web Server

Permit HTTP Only Permit HTTP Only

DenyAll

Least Privilege Concept

171717© 2009 Cisco Learning Institute.Cisco Networking Academy Storyboard Template © 2009, Cisco Systems, Inc.

• Inside and outside users only need access to the web server program on the exposed host.– The web server does not need to open any connections to the

inside or outside.– The firewall enforces those minimal permissions.

Page 18: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Cisco Self-Defending Network Principles

181818© 2009 Cisco Learning Institute.

Enabling everyelement to be a pointof defense and policy

enforcement

Integrated

Proactive security technologies that

automatically prevent threats

Adaptive

Collaboration among the services and devices

throughoutthe network to thwart

attacks

Collaborative

Page 19: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Cisco Self-Defending Network Defined

Operational Control and Policy Management

Advanced technologiesand security services that:

Efficient security management, control, and

response

191919© 2009 Cisco Learning Institute.

Threat Control and Containment

Secure Communications

and security services that:

� Mitigate the effects of outbreaks

� Protect critical assets

� Ensure privacy

Security as anintegral, fundamental

network feature

Secure Network Platform

Page 20: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Collaborative Systems EnablingUnparalleled Security

• 360º visibility and protection:

–Delivering comprehensive and proactive network defense

• Simplified control:

Cisco Security Manager

Cisco SecurityMARS

Policy Management

ThreatManagement

202020© 2009 Cisco Learning Institute.

• Simplified control:

–Streamlining policy and threat management across the network

• Business resiliency:

–Ensuring the enterprise operations

Manager MARS

Cisco NAC Appliance and Cisco Security

Agent

Cisco IPS Sensor Software, Cisco IOS Software, and

Cisco ASA Adaptive Security Appliances

Endpoint Security

Network Infrastructure

Page 21: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Cisco Threat Control Solutions

• Threat control for endpoints: This element defends against threats most commonly introduced by Internet use, such as viruses, spyware, and other malicious content.

• Threat control for infrastructure: This element safeguards the server and application infrastructure against attacks and intrusions. It also defends against internal and external attempts to penetrate or

212121© 2009 Cisco Learning Institute.

also defends against internal and external attempts to penetrate or attack servers and information resources through application and operating system vulnerabilities.

• Threat control for e-mail: This element protects business productivity, resource availability, and confidential information by stopping e-mail initiated threats.

Page 22: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Secure Communications

Benefits to implementing a secure communication structure:

• Improve business productivity and efficiency

• Enable new business applications

• Help comply with information privacy regulations

222222© 2009 Cisco Learning Institute.

Secure Communications for Remote Access

Secure Communications for Site-to-Site Access

Provides highly secure, customizable access to corporate networks and applications by establishing an encrypted tunnel across the Internet

Provides an Internet-based WAN infrastructure for connectingbranch offices, home offices, or the sites of business partnersto all or portions of a network

Page 23: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Operational Control and Policy Management

The Cisco Security Management Suite provides a number of benefits:

• Increases speed and accuracy of policy deployment

• Improves visibility to monitor end-to-

232323© 2009 Cisco Learning Institute.

• Improves visibility to monitor end-to-end security

• Provides more rapid response to threats

• Enforces corporate policy compliance

• Enhances proper workflow management

Page 24: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Cisco Security Manager

• Responds faster to threats by allowing an administrator to define and assign new security policies

• Provide flexible methods to manage devices and policies

242424© 2009 Cisco Learning Institute.

manage devices and policies

• Contains extensive animated help for the new user

• Allows an administrator to centrally specify which policies are shared and inherited

• It integrates with Cisco Secure ACS

• It integrates with Cisco Security MARS to correlate events with the associated firewall rules

• It provides the ability to assign specific tasks to each administrator during the deployment of a policy

Page 25: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Cisco Security MARS

• Greatly reduces false positives

• Defines the most effective mitigation responses

252525© 2009 Cisco Learning Institute.

• Promotes awareness of environmental anomalies

• Provides quick and easy access to audit compliance reports

• Makes precise recommendations for threat removal,

Page 26: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Automated ThreatResponse

Virtualized Security Services

Behavioral-BasedProtection

Dynamic DDoSMitigation

Endpoint and Application-Layer Inspection

Endpoint PostureControl

IntegrateAdvancedServices

Advanced Technologies and Services

Integrate Advanced Security Services Where NeededIPsec and SSL Security Point

Secure Network Platform Security Services Integrated into the Network

262626© 2009 Cisco Learning Institute.

Leverage Existing

InvestmentFirewall Network AntivirusAccess Control

IPsec and SSL VPN

IPS IP Network

Integrated Collaborative Adaptive

Integrate Advanced Security Services Where Needed

Firewall Network AntivirusAccess Control

IPsec and SSL VPN

IPSSecurity Point

Products

Page 27: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

MARS

Remote WorkerVPN

ACS

FirewallInternet

Core Topology

272727© 2009 Cisco Learning Institute.

IPS

Remote BranchVPN

VPN

Iron Port

Web Server

Email Server DNS

LAN

CSA

WAN

Page 28: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Operations Security

• Cisco Self-Defending Network design provides products that can deploy independently of one another

• All networks will be vulnerable to attack if the planning,

282828© 2009 Cisco Learning Institute.

to attack if the planning, implementation, operations, and maintenance of the network do not adhere to operational security practices

• Operations security starts with the planning and implementation process of a network

Page 29: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Core Principles

• Separation of duties: two-man control and dual operator

• Rotation of duties

292929© 2009 Cisco Learning Institute.

• Trusted recovery: failure preparation and system recovery

• Change and configuration controls

Page 30: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Separation of Duties

303030© 2009 Cisco Learning Institute.

Page 31: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Rotation of Duties

Technical support

Week 2

Week 1

313131© 2009 Cisco Learning Institute.

Data Entry

Data Center Support

Week 2

Week 3

Page 32: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Trusted Recovery

Practices:

• A junior staff member is responsible for loading blank media.

• Backup software uses an account that is unknown to individuals to bypass file

323232© 2009 Cisco Learning Institute.

unknown to individuals to bypass file security.

• A different staff member removes the backup media and securely stores it on site while being assisted by another member of the staff.

• A separate copy of the backup is stored off site and is handled by a third staff member who is accompanied by another staff member.

Backup 1

Backup 2Backup 3

Page 33: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Configuration Change Control

There are five steps in a change control process:

1.Apply to introduce the change.

333333© 2009 Cisco Learning Institute.

2.Catalogue the proposed change.

3.Schedule the change.

4. Implement the change.

5.Report the change to relevant parties.

Page 34: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Objectives of Security Testing andEvaluation

�Uncover design, implementation, and operational flaws that could lead to the violation of the security policy.

Objectives of ST&E:

343434© 2009 Cisco Learning Institute.

�Determine the adequacy of security mechanisms, assurances, and device properties to enforce the security policy.

�Assess the degree of consistency between the system documentation and its implementation.

Page 35: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Assessing the Operational Status

• Network scanning

• Vulnerability scanning

• Password cracking

• Log review

353535© 2009 Cisco Learning Institute.

• Integrity checkers

• Virus detection

• War dialing

• War driving (802.11 or wireless LAN testing)

• Penetration testing

Page 36: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Using Testing Results

• As a reference point for corrective action

• To define mitigation activities to address identified vulnerabilities

• As a benchmark to trace the progress of an organization in meeting security requirements

• To assess the implementation status of system security requirements

363636© 2009 Cisco Learning Institute.

• To assess the implementation status of system security requirements

• To conduct cost and benefit analysis for improvements to system security

• To enhance other activities such as risk assessments, Certification and Authorization (C&A), and performance improvement efforts

Page 37: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Security Testing Tools

• Nmap: – discovers computers and services on a computer network, thus creating a map of the network.

• GFI LANguard: network and security scanner which detects vulnerabilities.

• Tripwire: assesses and validates IT configurations against internal policies, compliance standards, and security best practices

373737© 2009 Cisco Learning Institute.

policies, compliance standards, and security best practices

• Nessus: vulnerability scanning software, focusing on remote access, misconfiguration passwords, and DoS against the TCP/IP stack.

• L0phtcrack: password auditing and recovery application.

• Metasploit: provides information about vulnerabilities and aids in penetration testing and IDS signature development.

• SuperScan: port scanning software designed to detect open TCP and UDP ports and what services are running on those ports

Page 38: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Nmap

Basic functionality

• Classic TCP and UDP port scanning

• Classic TCP and UDP

383838© 2009 Cisco Learning Institute.

• Classic TCP and UDP port sweeping

• Stealth TCP and UDP port scans and sweeps

• Remote operating system identification, known as OS fingerprinting.

Page 39: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

SuperScan

• Improved host detection using multiple ICMP methods

• TCP SYN scanning

• UDP scanning (two methods)

• Source port scanning

393939© 2009 Cisco Learning Institute.

• Source port scanning

• Fast hostname resolving

• Extensive banner grabbing

• IP and port scan order randomization

• Extensive Windows host enumeration capability

Page 40: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Continuity Planning Objectives

• Moving or relocating critical business components and people to a remote location while the original location is

404040© 2009 Cisco Learning Institute.

the original location is being repaired

• Utilizing different channels of communication to deal with customers, shareholders, and partners until operations return to normal

Page 41: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Disaster Recovery

• The process of regaining access to the data, hardware, and software necessary to resume critical business

414141© 2009 Cisco Learning Institute.

critical business operations after a disaster.

• Plan for coping with unexpected or sudden loss of key personnel.

Page 42: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Disruptions

• Identify types of disasters or disruptions possible

• Take into account the

424242© 2009 Cisco Learning Institute.

• Take into account the magnitude of the disruption

Page 43: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Backups

• Redundancy

- Replacement components owned by the organization or a server provider

- Service level agreement

434343© 2009 Cisco Learning Institute.

- Service level agreement (SLA)

• Redundant facility

- Hot Site

- Warm Site

- Cold Site

Page 44: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

System Development Life Cycle (SDLC) Initiation

Initiation

Acquisition andDevelopment

DispositionSecurity categorization: This task defines three levels of potential impact on organizations or individuals should there be a breach of

444444© 2009 Cisco Learning Institute.

Development

ImplementationOperations andMaintenance

impact on organizations or individuals should there be a breach of security: low, moderate, and high,. Security categorization standards help organizations make the appropriate selection of security controls for their information systems.Preliminary risk assessment: This task results in an initial description of the basic security needs of the system. A preliminary risk assessment should define the threat environment in which the system will operate.

Page 45: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Acquisition and Development

Initiation

Acquisition andDevelopment

Disposition

Risk assessment: an analysis that identifies the protection requirements for the system through a formal risk assessment process. Security functional requirements: an analysis of requirementsSecurity assurance requirements: an analysis of the requirements that address the developmental activities that are required and the assurance evidence that is needed to produce the desired level of confidenceSecurity cost considerations and reporting:

454545© 2009 Cisco Learning Institute.

Development

ImplementationOperations andMaintenance

evidence that is needed to produce the desired level of confidenceSecurity cost considerations and reporting: determines how much of the development cost to attribute to information securitySecurity planning: new and current agreed upon security controls should be fully documented. Security control development: ensures that the security controls that the respective security plans describe are designed, developed, and implemented. Developmental security test and evaluation: ensures that security controls that are developed for a new information system are working properly and are effective.

Page 46: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Implementation

Initiation

Acquisition andDevelopment

Disposition

Inspection and acceptance: ensures that the organization validates and verifies that the functionality that the specification describes is included in the deliverables.System integration: ensures that the system is integrated at the operational site where the information system is deployed for operation. Security certification: ensures that one effectively implements the controls through established verification techniques and procedures.

464646© 2009 Cisco Learning Institute.

Development

ImplementationOperations andMaintenance

controls through established verification techniques and procedures. Security accreditation: provides the necessary security authorization of an information system to process, store, or transmit information that is required.

Page 47: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Operations and Maintenance

Initiation

Acquisition andDevelopment

Disposition

Configuration management and control: ensures that there is adequate consideration of the potential security impacts due to specific changes to an information system or its surrounding environment. Continuous monitoring: ensures that controls continue to be effective in their application through periodic testing and evaluation.

474747© 2009 Cisco Learning Institute.

Development

ImplementationOperations andMaintenance

effective in their application through periodic testing and evaluation.

Page 48: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Disposition

Initiation

Acquisition andDevelopment

Disposition

484848© 2009 Cisco Learning Institute.

Development

ImplementationOperations andMaintenance

Information preservation: ensures that information is retained, as necessary, to conform to current legal requirements and to accommodate future technology changes that can render the retrieval method obsolete.Media sanitization: ensures that data is deleted, erased, and written over, as necessary.Hardware and software disposal: ensures that hardware and software is disposed of as directed by the information system security officer.

Page 49: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Determining an Organization’s Assets

Ask the following questions:

• What does the organization have that others want?

• What processes, data, or information systems are critical

THREATS

494949© 2009 Cisco Learning Institute.

information systems are critical to the organization?

• What would stop the organization from doing business or fulfilling its mission?

Security Policies are designed to protect assets

Page 50: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Security Policy Benefits

• Demonstrates an organization’s commitment to security.

• Sets the rules for expected behavior.

• Ensures consistency in system

505050© 2009 Cisco Learning Institute.

• Ensures consistency in system operations, software and hardware acquisition and use, and maintenance.

• Defines the legal consequences of violations.

• Gives security staff the backing of management.

Page 51: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Audience

• Anyone with access to the network

- Internal audience

- External audience

• Determines the content of the policy

515151© 2009 Cisco Learning Institute.

• Determines the content of the policy

Page 52: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Hierarchy of Policies

Governing Policy

525252© 2009 Cisco Learning Institute.

Technical Policies

End-User Policies

Page 53: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Governing Policy

Important components:

• A statement of the issue that the policy addresses.

• How the policy applies in the environment.

535353© 2009 Cisco Learning Institute.

environment.

• The roles and responsibilities of those affected by the policy.

• The actions, activities, and processes that are allowed and those that are not.

• The consequences of noncompliance.

Page 54: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Technical Policies

• General policies

• E-mail policies

• Remote -access policies

545454© 2009 Cisco Learning Institute.

• Telephony policy

• Application policies

• Network policies

• Wireless communication policy

Page 55: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

End User Policy

• Cover all rules pertaining to information security that end users should know about, comply

555555© 2009 Cisco Learning Institute.

know about, comply with, and implement.

• May overlap with technical policies.

Page 56: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Standards, Guidelines, and Procedures

• The security policy documents are high-level overview documents

• Standards, guidelines, and procedures contain the actual details defined in the policies

565656© 2009 Cisco Learning Institute.

details defined in the policies

• Each document serves a different function, covers different specifications and targets a different audience

Page 57: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Standards Documents

575757© 2009 Cisco Learning Institute.

Standards documents include the technologies that are required for specific uses, hardware and software versioning requirements, program requirements, and any other organizational criteria

Page 58: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Guideline Documents

• Provide a list of suggestions

• Provide flexibility

• Not usually mandatory

• Sources:

585858© 2009 Cisco Learning Institute.

• Sources:

- National Institute of Standardsand Technology (NIST) Computer Security Resource Center

- National Security Agency (NSA) Security Configuration Guides

- The Common Criteria standard

Page 59: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Procedure Documents

595959© 2009 Cisco Learning Institute.

Procedure documents include the details of implementation, usually with step-by-step instructions and graphics

Page 60: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Management Responsibilities

606060© 2009 Cisco Learning Institute.

Executive-level management must always be consulted during security policy creation in order to ensure the policy is comprehensive, cohesive, and legally binding.

Page 61: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Executive Titles

• Chief Technology Officer (CTO)—Identifies and evaluates new technologies and drives new technology development Maintains and enhances current enterprise systems.

• Chief Information Officer (CIO)—Responsible for the information technology and computer systems that support enterprise goals, to include successful deployment of new

616161© 2009 Cisco Learning Institute.

enterprise goals, to include successful deployment of new technologies and work processes.

• Chief Security Officer (CSO)—Develops, implements and manages the organization’s security strategy, programs, and processes associated with all aspects of business operation including intellectual property.

• Chief Information Security Officer (CISO)—Develops and implements security policy. .

Page 62: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Security Awareness Program

• Reflects the business needs of an organization

• Informs users of their IT security responsibilities

• Explains all IT security policy and procedures

• Explains proper rules of behavior for the use of the IT

626262© 2009 Cisco Learning Institute.

• Explains proper rules of behavior for the use of the IT systems and data

• Details sanctions for noncompliance

• Components

- Awareness campaigns

- Training and education

Security Awareness Program

Page 63: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Awareness

Methods for increasing awareness:

• Lectures, videos

• Posters, newsletter

636363© 2009 Cisco Learning Institute.

• Posters, newsletter articles, and bulletins

• Awards for good security practices

• Reminders such as login banners, mouse pads, coffee cups, and notepads

Page 64: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Training and Education

From: IT department

To: all Employees

Subject: Course Offerings

We are currently offering several training opportunities. Please see the list below and contact your manager if interested.

646464© 2009 Cisco Learning Institute.

Page 65: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Success

656565© 2009 Cisco Learning Institute.

A successfully implemented security awareness program measurably reduces unauthorized actions by insiders, increases the effectiveness of existing controls, and helps fight waste, fraud, and abuse of information systems resources.

Page 66: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Laws and Ethics

• Types of Laws

- Criminal

- Civil

- Administrative

666666© 2009 Cisco Learning Institute.

• Ethics

- Computer Ethics Institute

- Internet Activities Board (IAB)

- Generally Accepted System Security Principles (GASSP)

- International Information Systems Security Certification Consortium, Inc (ISC)2 Code of Ethics

Page 67: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

The ISC2 Code of Ethics

• Code of Ethics Preamble

Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior. Therefore, strict adherence to this Code is

676767© 2009 Cisco Learning Institute.

Therefore, strict adherence to this Code is a condition of certification.

• Code of Ethics Canons

- Protect society, the commonwealth, and the infrastructure.

- Act honorably, honestly, justly, responsibly, and legally.

- Provide diligent and competent service to principals.

- Advance and protect the profession.

Page 68: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Motive, Opportunity, and Means

• Motive answers the question of why a person (or persons) committed the illegal act.

• Opportunity answers the question of when and where

686868© 2009 Cisco Learning Institute.

question of when and where the person committed the crime.

• Means answers the question of how the person committed the crime.

Page 69: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

Forensics Procedures

• Proper data collection

• Data chain of custody

• Data storage

696969© 2009 Cisco Learning Institute.

• Data backups

Page 70: Chapter 9 - Managing a Secure Network.ppt - Leamanleaman.org/ccna_sec/Chapter_9.pdfLesson Objectives 7. Describe the overarching concepts of operations security. 8. Describe the core

707070© 2009 Cisco Learning Institute.