5
Computers & Security, 18 (1999) 307-311 The Revised Version of BS7799 - So What’s New? Chris Pounder Is the release, in late April, of a revised standard ‘A Code ~$Practirt~ jbr I~~fiw~~i~tiorr Sccurify .~far~qpv~~~t’ (BS7799-1: 1999)’ an itnpor- taut kegtone, a publication which most organizations should read and inwardly digest? Or is the recent publicity about the latect ver- sion of the Code the result of an over-the-top PR strategy which is attempting to re-launch an old standard in a new guise; mutton dressed as lamb, to ~umnmize the point succinctly.This article is intended to help the reader decide between these two extremes. It first explore\ the main changes to the content and then considers the changes m the legislative environment under which the prove- sions of 13S7709 will be interpreted. Changes to the Text of BS7799 Although the first version of the Code specified over 200 controls, it drew particular attention to ten ‘Key Controls’ which were always identified as such in the text; this emphasis gave the impression that a failure to meet any Key Control would be fatal to an organiza- tion’s objective, for example, of seeking accreditation as catisf)Ting the requirements of the Code. The second version of the Code avoids implications like this by carefully avoiding language which is pre- scriptive.Thus, for example, BS7799 takes “the form of guidance and recommendations” for best practice; it should “not be quoted as if it were a specification” for secure processing or as a definitive guide. Nor is there any guarantee that an organization, which implements the security controls identified in the Code, is secure. Nevertheless, nine of the ten Key Controls of the first version do find expression in the new text either as part of the three “essential” controls, or contained within the five controls which are specifically identi- fied as necessary to ensure “common best practice”, or mentioned as a component of eight “critical success factors” \\shich “experience has shown” to be vital to the implementation of good security. In further detail: (a) The three controls “considered to be essential to an organization from a legislative point of view” reflect statutory obligations which are necessary to ensure that any processing is lawful. For example, obligations with respect to protecting intellectual property rights, safeguarding organizational records and data protection and privacy of personal infor- matioii. (b) The five “common best practice” controls which are explicitly identified relate to: the content of security policy document; the allocation of secu- rity responsibilities to staff and managers; the importance of security training; the reporting of security incidents as they arise; and the need for organizations to have a business continuity plan in the event of a catastrophic failure in their infor- mation systems. (c) The eight “critical success factors” are all noii- technical and are directed at management. In most 0167-4048/99$20.00 0 1999 Elsevier Science Ltd. All rights reserved. 307

The revised version of BS7799 — so what's new?

Embed Size (px)

Citation preview

Page 1: The revised version of BS7799 — so what's new?

Computers & Security, 18 (1999) 307-311

The Revised Version of BS7799 - So What’s New? Chris Pounder

Is the release, in late April, of a revised standard ‘A Code ~$Practirt~ jbr I~~fiw~~i~tiorr Sccurify .~far~qpv~~~t’ (BS7799-1: 1999)’ an itnpor-

taut kegtone, a publication which most organizations should read

and inwardly digest? Or is the recent publicity about the latect ver-

sion of the Code the result of an over-the-top PR strategy which

is attempting to re-launch an old standard in a new guise; mutton

dressed as lamb, to ~umnmize the point succinctly.This article is

intended to help the reader decide between these two extremes. It

first explore\ the main changes to the content and then considers

the changes m the legislative environment under which the prove-

sions of 13S7709 will be interpreted.

Changes to the Text of BS7799

Although the first version of the Code specified over

200 controls, it drew particular attention to ten ‘Key Controls’ which were always identified as such in the

text; this emphasis gave the impression that a failure to meet any Key Control would be fatal to an organiza-

tion’s objective, for example, of seeking accreditation

as catisf)Ting the requirements of the Code.

The second version of the Code avoids implications

like this by carefully avoiding language which is pre- scriptive.Thus, for example, BS7799 takes “the form of

guidance and recommendations” for best practice; it

should “not be quoted as if it were a specification” for secure processing or as a definitive guide. Nor is there

any guarantee that an organization, which implements

the security controls identified in the Code, is secure.

Nevertheless, nine of the ten Key Controls of the first

version do find expression in the new text either as part of the three “essential” controls, or contained

within the five controls which are specifically identi- fied as necessary to ensure “common best practice”, or mentioned as a component of eight “critical success factors” \\shich “experience has shown” to be vital to

the implementation of good security. In further detail:

(a) The three controls “considered to be essential to an

organization from a legislative point of view” reflect statutory obligations which are necessary to

ensure that any processing is lawful. For example,

obligations with respect to protecting intellectual

property rights, safeguarding organizational records

and data protection and privacy of personal infor- matioii.

(b) The five “common best practice” controls which

are explicitly identified relate to: the content of security policy document; the allocation of secu-

rity responsibilities to staff and managers; the

importance of security training; the reporting of security incidents as they arise; and the need for organizations to have a business continuity plan in

the event of a catastrophic failure in their infor- mation systems.

(c) The eight “critical success factors” are all noii- technical and are directed at management. In most

0167-4048/99$20.00 0 1999 Elsevier Science Ltd. All rights reserved. 307

Page 2: The revised version of BS7799 — so what's new?

The Revised Version of BS7799 - So What’s New?/Chris Pounder

cases, they amplify the common best practice con- trols identified above. However, one critical success factor, to “evaluate performance in information security management”, for example by measuring compliance with a particular procedure or policy, was identified as a Key Control of the 1995 Code.

(d) Only one Key Control identified in the first ver- sion of BS7799 has been ‘relegated’ as such; this related to preventing the spread of computer virus- es. The new Code, instead, identifies such anti- virus controls as an important component in the need for an organization to protection itself against alI varieties of unauthorized or malicious software, of which a computer virus is but one example.

Another major change is that the emphasis on “IT” in the 1995 Code has been replaced by one which stress- es “information” or “information processing”. This is more than a semantic change; it means that the secu- rity provisions of the 1999 Code are to be extended, for example, to information in non-automated files. In a sense, therefore, the new text begins to serve the requirements of the Data Protection Act 1998 which, unlike the 1984 Act, does not distinguish between automated and non-automated files, and which also contains a very broad definition of “processing” (uny operation, whether automated or non-automated, which is performed on personal data). For many orga- nizations, which provide services that are dependent on the collection of manually-based case files (for example, social services and immigration), amending security policies and practices beyond electronically processed data will not be a trivial affair.

The result is also to make BS7799 effectively inde- pendent of technology; for example, the section on information exchange identifies controls which are relevant to the transfer of databases via the Internet und to simple exchanges of information in a telephone conversation. Consequently the Code becomes more applicable to a wider number of situations where information security is a potential problem in its most general sense.

In addition, the applicability of the Code has been enhanced by the removal of references specific to the

UK. For example, unlike the first version, there is no mention of the eight Principles of the UK’s Data Protection Act, or reference to specific provisions of the Computer Misuse Act 1990, the Companies Act 1985 or the Copyright, Designs and Patents Act 1988. In their place are references to general legislative obli- gations so that BS7799 will be “more internationally applicable”.

A criticism often levelled at the first version of BS7799 was that it gave little guidance on how to select, apart from the obligatory Key Controls, the security controls which were most likely to be rele- vant to a particular set of circumstances.The new ver- sion of BS7799 now follows the practice adopted by most information security practitioners and provides details on the prior need for “a methodical assessment of security risks” and an approach which minimizes those risks so identified. BS7799 then notes that once the risk analysis is completed, the Code can help to provide “examples of common approaches” to the controls necessary to achieve particular security objectives.

Two sections of the Code have been substantially re- worked. For instance the section on “Computer and Network Management” of the 1995 Code has been renamed as “Computer and Operations Manage- ment”, where the word “operations” covers every aspect of information processing. For example, text has been added to help secure other forms of electronic messaging (e.g. mobile computing, voice mail) as well as non-automated forms of disclosure (e.g. by use of phone, postal services or fax machines).

The text on access control has also been changed to reflect the development of E-commerce and the Internet applications. For instance, the brief paragraphs on encryption and authentication of the first version of the Code have been significantly extended to include additional detailed sections on cryptographic policy, digital signatures and key management techniques.

In addition the Code contains security controls which are relevant to electronic mail, output validation, covert channels and Trojan code and provides new paragraphs on homeworking or teleworking. Given

308

Page 3: The revised version of BS7799 — so what's new?

Computers & Security, Vol. 18, No. 4

that that the latter is becoming a burgeoning industry, the Code covers the need to extend existing security

policies and procedures so that they identify when

remote connection can occur, by whom and to what

databases, and to the controls necessary to cover those

circumstances when matters go awry.

Several other parts of BS7799 has been amended or

substantially altered; for example:

(a) The text on the valuation and importance of assets

has been augmented; for example, to have regard to the security classifications used by other organiza- tions when their data are exchanged. However,

BS7799 also reminds readers that such asset classi-

fication systems can easily become “cumbersome”, “uneconomic” or “impractical”. In addition, con-

cept of information classification has been extend-

ed to include labels which indicate the integrity of data or its availability.

(b) The description of the security issues associated

with third party access has been substantially

extended. This includes details which should be considered for being specified in third party con-

tracts and in outsourcing contracts.

(c) The section on business continuity management (a “common best practice” control) been restructured

and extended to put more emphasis on manage-

ment processes. For example, procedures associated with the production of tested business continuity

plans and a commitment towards maintenance of

such plans.

Changes to the Legislative Environment Under Which BS7799 Will Operate

The constitutional reforms, implemented by the UK’s

new Labour Government, have profoundly changed

the environment under which the new version of BS7799 will operate.These changes, which encompass the Data Protection Act 1998, the Human Rights Act 1998 and the draft Freedom of Information Bill (pub- lished in May), will eventually mean that compliance

with the Code will form part of an organization’s

defence mechanisms.

The reason for this can be explained simply. In sum-

mary, compliance with BS7790 will nor tangy that an

organization is compliant with its many legal obliga-

tions; however, failure to consider US7799 seriously could harm its defence in cases where the poor or lax

security of information becomes an issue. Opponents

wishing to prove their case can be expected to use any

discrepancy from the controls identified as BS7799 as

useful ammunition in proving that an organization IYJS

negligent of its security obligations.

The legislation which is likely to provide US7799 with

its biggest boost is the Data Protection Act 1998 since this Act introduces several new, explicit security

requirement?. For example, the Act requires the level

of securit) offered by an outsourcing party to be a fac- tor in the choice of that party, and for contractual

arrangemcsnts with such parties to contain specific

security guarantees which must be ‘ludited.

In anticipation of this change, the l>ats Protection

Registrar has been considering US7799 in the context of assessing an organization’s response to its statutory

security obligations. For example, in a document enti-

tled “Z~$~vnation Senrvit)) - A Consdtntion Pap”, issued at the end of 1997, the Registrar noted that “At

the top end of the risk spectrum” (e.g. particularly seti- sitive processing operations such as those involving health records), “it may be appropriate to require for-

mal compliance with British Standard BS7790”. Thi5

indicates, at the very least, that in any future investiga- tion, the IIata Protection Commissioner of the 1998

Act, is likely to take into account an organization’s

attitude (the Data Controller’s attitude, to use the cor- rect data protection jargon) towards BS7709.

So it is worth exploring the relationship between data

protection and BS7799 in detail. Firstly, the Data Controller could well be under a new obligation to

register security details, by means of a statement which describes their baseline security.This arises by virtue of Section 1X(2)(b) of the Act, which requires those Data Controllers who must give (or who volunteer to give) registration details to the I>ata Protection

309

Page 4: The revised version of BS7799 — so what's new?

The Revised Version of BS7799 - So What’s New?/Chris Pounder

Commissioner, to include “a general description of

measures to be taken for the purpose of complying with the seventh data protection principle”. This

description of security will not be in the public domain

as the Act carefully excludes them from the list of reg-

istrable particulars which can be inspected by the pub-

lic (Section 19(2)).

However, such details do permit the Commissioner to

begin to assess, independently, the state of security

compliance adopted by a Data Controller. If the Controller’s registration is found to be inadequate (per-

haps following a complaint associated with a breach of

security such as an unauthorized disclosure of person-

al data), then the Commissioner has powers to obtain further details about the security procedures associated

with the processing (via an Information Notice;

Section 43). In worst cases, if the Data Controller were judged to have registered misleading security details

which did not, in practice, apply to the processing, then the Controller could face prosecution.

In other words, Data Controllers must anticipate that

the adequacy of their internal security procedures

associated with the processing of personal data, and the related management and contractual arrangements,

can become the subject of independent scrutiny. What Controllers do in practice will be assessed against what

they have stated they do in theory, and in making this assessment, the Commissioner is likely to refer to

BS7799. If this is the case, then it follows that the

obvious defence is to align controls and procedures

with those recommended in BS7799.

It will be useful to link the obligations in the Seventh Data Protection Principle (the Principle which is most

relevant to ‘security’ matters) with specific parts of the second edition of BS7799; this is especially the case

since the most important provisions of this Principle are not subject to the phasing-in period which ends in October 2001. In summary the Principle (and its Interpretation) require a Data Controller:

(a) To take “appropriate organizational measures” to secure the data. Such considerations point to the need for some kind of IT security management infrastructure and make it essential that formal

records are kept as proof that security arrangements

were established; proof would be needed if the Data Controller had to demonstrate that it had

taken all reasonable steps to secure the personal data in its care. These aspects are covered in sec-

tions 3 to 5 of BS7799 which deals the need for

“security organization”, a formal “security policy”

and “asset classification and control”.These sections also relate to the main elements of the five “com-

mon best practice” controls and the eight “critical success factors” as identified previously

(b) To “take reasonable steps to ensure the reliability of

any staff of his who have access to the personal

data”. There are three main connotations of the word ‘reliable’: staff can be made ‘reliable’ by train-

ing them in the correct security or data protection

procedures; ‘reliable’ staff are those individuals who

have been vetted, or otherwise approved, prior to being permitted to access personal data (for exam-

ple, by taking up references, checking qualitica-

tions); staff become more ‘reliable’ (for example, in

the processing of personal data by means of a desk- top computer) if the environment in which they

work meets best practice with respect to health and

safety standards (e.g. with respect to the use of VDUs). All these provisions are essentially covered

in a section of the Code devoted to Personnel Security; staff education and training is regarded as

a “common best practice” control.

(c) To take appropriate security measures to guard against all forms of unauthorized processing (for

example, taking measures to guard against unau- thorized access, alteration, use, disclosure, deletion

or destruction of personal data). These aspects are mainly covered in sections 7 to 9 of BS7799 which

deal with physical security, communications and

operations management, and access control. These provisions, as already indicated, extend to tele-

working and all forms of communications between organizations.

(d) To choose suppliers of services (‘Data Processors’ to use the correct data protection jargon) which formally guarantee the expected level of security. The Data Controller must also ensure that agreed

310

Page 5: The revised version of BS7799 — so what's new?

Computers & Security, Vol. 7 8, No. 4

security standards are maintained.These aspects are

covered in detail in paragraphs 4.2 and 4.3 of the

Code which lists over forty considerations (for

example, the involvement of sub-contractors)

which should formally be agreed between

Controller and Processor.

(e) To “ensure a level of security appropriate to . . . the

harm that might result from such unauthorized or

unlawful processing or accidental loss, destruction

or damage as are mentioned in the seventh princi-

ple and (to) the nature of the data being protect-

ed.” This is in harmony with the revised BS7799 which now expressly states that “security require-

ments are identified by a methodical assessment of security risk”.

(4 To take precautions against “accidental loss,

destruction or damage” which can be the outcome of a range of incidents (e.g. theft of a home com-

puter, leaving a laptop on a train, a major fire in a

computer centre). BS7799 devotes a complete sec- tion to business-continuity planning and identifies

it as a “common best practice” control.

Security considerations also arise under the Eighth Principle of the 1998 Act which outlines a number of

conditions which would permit personal data to be

transferred legitimately to another country or territo-

ry. One of these conditions is that Data Controllers

should have regard to “any security measures taken in respect of the data in that country or territory”.

Clearly, therefore, ensuring that the personal data in another country or territory are secured in accordance

with BS7799 will go a long way to meeting this con-

dition. After all, if the Commissioner uses the Code as

a benchmark for the Seventh Principle, it follows that

it will be used as such with respect to the Eighth.

With respect to the Human Rights and Freedom of

Information (FOI) legislation, BS7799 can be expected

to play a more tangential role. For example, the Human

Rights Act requires public bodies to demonstrate that

“Everyone has the right to respect for his private and

family life, his home and his correspondence”. If

breaches of privacy arose from poor security, an argu- ment likely to be raised would be that organization

which was not even adopting basic BS7799 standards

would be showing disrespect. Similarly, suppose a pub-

lic body fails to deliver its services reliably because of

continued unavailability of information. Aggrieved tax-

payers could use the general right of access to records, granted by FOI, to explore why this was a problem.

There again, failure to comply with a British standard

would show that authority in a very poor light.

Concluding Comment So back to the question at the beginning: can the

revised ‘Code of Practice $Y Icformation Security Management (BS7799-1: 1999) be ignored? We11 if your

organization is looking for trouble in the future, I sup-

pose the answer to this question is “yes”.

311