40
Donald Hester February 9, 2010 For audio call Toll Free 1-888-886-3951 and use PIN/code 360619 IT Best Practices for Community Colleges Part 1: IT Risk Management

IT Best Practices for Community Colleges Part 1: IT Risk Management

Embed Size (px)

DESCRIPTION

IT Best Practices for Community Colleges Part 1: IT Risk Management. Donald Hester February 9, 2010 For audio call Toll Free 1 - 888-886-3951 and use PIN/code 360619. Housekeeping. Maximize your CCC Confer window. Phone audio will be in presenter-only mode. - PowerPoint PPT Presentation

Citation preview

Page 1: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Donald HesterFebruary 9, 2010

For audio call Toll Free 1-888-886-3951

and use PIN/code 360619

IT Best Practices for Community Colleges Part 1: IT Risk ManagementIT Best Practices for Community Colleges Part 1: IT Risk Management

Page 2: IT Best Practices for Community Colleges Part 1:  IT Risk Management

• Maximize your CCC Confer window.• Phone audio will be in presenter-only mode.• Ask questions and make comments using the chat window.

HousekeepingHousekeeping

Page 3: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Adjusting AudioAdjusting Audio

1) If you’re listening on your computer, adjust your volume using the speaker slider.

2) If you’re listening over the phone, click on phone headset.

Do not listen on both computer and phone.

Page 4: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Saving Files & Open/close CaptionsSaving Files & Open/close Captions

1. Save chat window with floppy disc icon

2. Open/close captioning window with CC icon

Page 5: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Emoticons and PollingEmoticons and Polling

1) Raise hand and Emoticons

2) Polling options

Page 6: IT Best Practices for Community Colleges Part 1:  IT Risk Management

CISOA Conference CISOA Conference

http://cisoa.net

Page 7: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Donald Hester

IT Best Practices for Community Colleges Part 1: IT Risk ManagementIT Best Practices for Community Colleges Part 1: IT Risk Management

Page 8: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Series 1 Spring 2010• Part 1 Risk Management

• Part 2 Business Continuity

• Part 3 Configuration Management

• Part 4 Awareness Training

Series 2 Fall 2010

8

Page 9: IT Best Practices for Community Colleges Part 1:  IT Risk Management

How do you justify a new firewall? Is it more than you need? Is it less than you need? How does someone outside of IT know it

was the right choice? How do you demonstrate due care?

9

Page 10: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Risk: the potential for any loss Asset: something of value Probability: the likelihood of an event Control: something that reduces risk (countermeasure,

safeguard) Threat: event that has an undesirable impact, potential

danger Vulnerability: weakness Exposure: open to threat Residual risk: risk left over after controls are put in

place Acceptable risk: risk accepted by management

Page 11: IT Best Practices for Community Colleges Part 1:  IT Risk Management

AssetV

uln

erab

ilit

y

Threat

Threat

Asset

Vu

lner

abil

ity

Counterm

easure

Page 12: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Risk Management: process of reducing risks because it cannot be eliminated

Risk Analysis: identify assets and potential losses

Risk Assessment: determination of recommended controls that would reduce risk to an acceptable level

Vulnerability Assessment: used for the risk analysis, determines vulnerabilities

Page 13: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Process not a goal SDLC (Systems

Development Life Cycle)

Any change in environment changes your risk level

Page 14: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Management’s role• Balance cost with operational goals

• Acceptable levels of risk (risk apatite)

• Use the risk analysis process for decision-making

• Cost benefit analysis (ROI)

• Determine if controls are in place

• Sign-off forms to take responsibility

• Risk analysis team

Page 15: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Management can choose how to deal with risk once they have all the information and recommendations.

After they have the results form the risk analysis they can determine how they want to mitigate risks.

Mitigating risks to an acceptable level. Any risk remaining is residual risk.

Page 16: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Reduce the risk • Apply countermeasures and controls

(mitigation) Accept the risk

• Accept the risk with or without controls Transfer the risk

• Buy insurance (mitigation) Reject the risk

• Ignore the risks

Page 17: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Purpose• 1st step in Risk Management• Ensure that the security program (controls) are

adequate and appropriate for the real risks Goals

• Identify assets• Identify risks• Connect risks and assets• Determine impact• Cost vs. benefit • Prioritize control selection/implementation

Page 18: IT Best Practices for Community Colleges Part 1:  IT Risk Management

We need to determine what we have, what it is worth, what could happen to it, how often it could happen, what the impact would be if it did happen, so that we could determine what controls should be used based on cost, and document everything we discovered.

Page 19: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Identify assets, determine their value and classify them.

Page 20: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Physical• Hardware

• Buildings

Information• Data

• Software

• Documentation

Human Resources Reputation

Page 21: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Acquisition costs Development costs Maintenance costs Value to user, customer Value to enemy Market value (how much

someone will pay) Replacement costs Liability

Impact to• Productivity

• Usefulness

• Reputation

• Operations

• Competitiveness

Page 22: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Identify the risks associated with the assets.

Threat / Vulnerability pare

Page 23: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Physical Loss• Theft

• Environmental

Errors and Omissions• Humans

• Software

Malfunction• Equipment failure

Misuse Attacks

Internal or External Intentional or

unintentional Action or inaction

Page 24: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Impact analysis

Page 25: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Quantitative• Formal

• Numeric

• Monetary

• Statistical

Qualitative• Informal

• Rating

• Gut feeling

• Educated guess

• Delphi method

Page 26: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Impact• What is the asset worth; AV (Asset Value)• How bad would it be; EF (Exposure Factor)• One time loss; SLE (Single Loss Expectancy)• How many times a year; ARO (Annualized Rate of

Occurrence)• How much loss in a year; ALE (Annualized Loss

Expectancy)

AV * EF = SLE; SLE * ARO = ALE

Page 27: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Select Risks with the highest probability and the highest impact potential.

Meteorite to hit the data center would be a low probability with a high impact

Virus would be a high probability with a potential for a high impact

Page 28: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Controls should focus on addressing• High probability attack

• High impact attacks

Consistent implementation Automated and continuously monitored Additional technical activities should be

used to defend systems

Rev1/8/2010

Page 29: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Determine what controls can be used, what the cost associated with each control and recommend controls.

Page 30: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Mitigates the risk ALE before the control ALE after the control Control complexity Cost / Benefit Comparison ROI (Return on

Investment) Hidden costs

• Productivity • Maintenance

Page 31: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Limited resources• Time• Funding• Resources• Personnel

With limited resources choices have to be made about which security controls are most important

A prioritized approach in implementing controls is required

Prioritized by greatest risk first

Rev1/8/2010

Page 32: IT Best Practices for Community Colleges Part 1:  IT Risk Management

How do we prioritize controls Intelligence

• Knowledge of actual attacks

Controls that can prevent know attacks should be given a higher priority

A consensus report has been developed to document 20 critical controls

Rev1/8/2010

Page 33: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Documentation

Page 34: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Documented Risk AssessmentDocumented Risk Assessment

Page 35: IT Best Practices for Community Colleges Part 1:  IT Risk Management

1. System Characterization

2. Threat Identification

3. Vulnerability Identification

4. Control Analysis

5. Likelihood Determination

6. Impact Analysis

7. Risk Determination

8. Control Recommendation

9. Results Document

NIST SP 800-30

Page 36: IT Best Practices for Community Colleges Part 1:  IT Risk Management

36

“State, local, and tribal governments, as well as private sector organizations, are encouraged to use the guidelines, as appropriate." NIST SP 800-100

California Information Security Strategic Plan (OCT 2009)

"...by adopting the National Institute of Standards and Technology (NIST) 800-37 guidelines for certification and accreditation of information systems. Applying NIST guidelines to state government systems will demonstrate California’s leadership in building a resilient, secure, and trustworthy digital infrastructure."

"Establish a California modified version of the NIST 800-30 risk management standard as the risk management standard for all state agencies."

"Establish a California-modified version of the NIST 800-53 recommended security controls within all state agencies."

Page 37: IT Best Practices for Community Colleges Part 1:  IT Risk Management

NIST SP 800-30 Risk Management Guide for IT Systems

Information Technology Standards and Practices for Local Governments, September 2007 By Maze & Associates

California Information Security Strategic Plan (OCT 2009) Cybersecurity and Privacy Concepts, Strategies & Goals Volume 4

Twenty Critical Controls for Effective Cyber Defense: Consensus Audit Guidelines version 2.1, 11 Aug 2009

37

Page 38: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Donald E. HesterCISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+

Maze & Associates

@One / San Diego City College

www.LearnSecurity.org

http://www.linkedin.com/in/donaldehester

http://www.facebook.com/group.php?gid=245570977486

Q&AQ&A

Page 39: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Evaluation Survey LinkEvaluation Survey Link

Help us improve our seminars by filing out a short online evaluation survey at:

http://www.surveymonkey.com/s/10SpIT1

Page 40: IT Best Practices for Community Colleges Part 1:  IT Risk Management

Thanks for attendingFor upcoming events and links to recently archived

seminars, check the @ONE Web site at:

http://onefortraining.org/

IT Best Practices for Community Colleges Part 1: IT Risk Management IT Best Practices for Community Colleges Part 1: IT Risk Management