25
Holistic Security A Discussion of Risk Analysis & Strategic Initiatives by: Benjamin Tomhave

Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Holistic Security

A Discussion of Risk Analysis &Strategic Initiatives

by: Benjamin Tomhave

Page 2: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Agenda, Part I

Introduction Rules of Engagement Legalese About Me

Old School ITN3w Sk3w1 ITWhat is “Holistic Security”?

Page 3: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Agenda, Part II

The Challenge: IT AlignmentThe Solution: Holistic, Strategic SecurityHey, BRRAUSample cases of BAD projectsSample cases of GOOD projects

Page 4: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Rules of Engagement

Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly. Please move outside the room immediately when

taking a call.Q&A: Please ask questions! Please make corrections! I’m a consultant, not a supernatural entity – the

possibility exists that I might be wrong!

Page 5: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Legalese

Disclaimer: The views, opinions, content,techniques, etc., included in this presentationdo not necessarily represent those of myemployer.

Copyright: Unless otherwise stated, allopinions, slides, content, images, techniques,etc., included in this presentation are theIntellectual Property of Benjamin Tomhave.

Page 6: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

About Me

Pre-1994: Desktop weenie; introduced toUNIX; programming in BASIC, PASCAL, C1994: UNIX and Network Admin – Eversupported academia?1996-1998: Freelance, random project,internships, co-ops1998: INS (no, not the INS)1999: Ernst & Young2000: BORN

Page 7: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

A Quote

“Interoperability is NOT a technologyissue – it is a management issue. Nextquestion please.” General Powell (ret.), at Interop ‘99

Page 8: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Old School IT

Centralized computingCentralized administrationAd hoc solutionsFirefighting approachIT dictates to the businessIT holds lots of powerSecurity is the absolute last thought, if at all

Page 9: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

N3w Sk3w1 IT

Distributed computingCost Constraints, Financial ImplicationsHA RequirementsDistributed or Centralized supportStandardizationGlobalizationBusiness is beginning to “understand” ITReduced implementation schedules

Page 10: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

What is “Holistic Security”?

Comprehensive Corporate Security Policy Business Continuity Plan Incident Response and Handling

Managed Better design Cost-effective solutions Not piecemeal! Less firefighting!

IT Supports the Business, rather thanControlling it

Page 11: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

The Challenge:IT Alignment

Traditional ApproachBusiness states needIT provides solution,often redefining needbased on tech knownBusiness adapts,changing visionIT implements, businessapproves, some QADon’t like it? Too bad!

Contemporary ApproachBusiness states needIT co-develops solutionwith BAsIT adapts to thebusiness visionStrong design up front,followed by managedimplementation w/ QADon’t like it? Fix it!

Page 12: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

The Challenge:IT Alignment

So, what’s the problem? IT still traditional, Business is contemporary

How are “we” doing? Depends on who’s running your IT

Who needs to change? IT does!

Page 13: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

The Solution: Holistic,Strategic Security

Comprehensive, Business SolutionsStrategic Initiatives = High-level buy-inWhy A Strategic Approach? Operational Diagram

Page 14: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Operational Diagram

Strategic

Monitor/Respond (Reactive)Assessment (Proactive)

Operations

Strategic

Tactical

Operational

Page 15: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Hey, BRRAU

Basement Research Risk AttributeUtilityhttp://www.basementresearch.net/Content will be coming to the site in thefuture.General utility – not just apropos tosecurity!

Page 16: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

©Risk = AV x PC x TF

AV is “Asset Value”*PC is “Probability of Compromise”TF is “Threat Frequency”

*Asset Value is fixed or increasing.

Risk Attribute Utility, ©Copyright 2000 Basement Research http://www.basementresearch.net/

Page 17: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

©Risk = AV x PC x TF

PC = Probability of Compromise1) Software Defects

Bugs and Patches System Maintenance Discovery

2) Configuration Errors/Weaknesses Inadequate filters Weak firewall rules Inadequate OS configuration

Page 18: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

©Risk = AV x PC x TF

PC = Probability of Compromise Mitigation Methods

Network Assessment (non-/intrusive) Audit/Compliance Development Code Review Critical Design Review Maintenance Procedures Review Etc…

Page 19: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

©Risk = AV x PC x TF

TF = Threat Frequency (“human factor”)1) Social Engineering2) Human Error3) Disgruntled Employees 80-90% of security incidents originate

from inside the firewall/organization Very difficult to measure & defense

Page 20: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

©Risk = AV x PC x TF

TF = Threat Frequency (“human factor”) Mitigation Methods

Corporate Security Policy Business Continuity Plan Policy Enforcement & Buy-in Intrusion Detection & Network Management

Systems Single Sign-On & Directory Services Education & Awareness

Page 21: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Operational Diagram

Strategic

Monitor/Respond (Reactive)Assessment (Proactive)

Operations

Strategic

Tactical

Operational

Page 22: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Sample cases ofBAD projects

Major retailer #1, failed eCommerce siteMajor retailer #2, failed eCommerce siteHershey & IBM: The SAP Disaster

Page 23: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Sample cases ofGOOD projects

Local data reporting centerOriginal Amazon.comW2K Solutions ManagementOther misc: Banks Online trading “Do it right the first time.”

Page 24: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Questions / Discussion

?

Page 25: Holistic Security - secureconsulting.net · Rules of Engagement Cell phones and pagers: You have a job, feel free to leave them on. Please keep them in reach to stop tone quickly

Contact Information

Benjamin Tomhave, BORN [email protected]

American Falcon, freelance security [email protected]://falcon.cybersecret.com/