29
Managing Information Security Risks Ken M. Shaurette, CISSP, CISA, CISM, IAM Information Security Solutions Manager MPC Security Solutions TechFest December 2003

Cobit 2

Embed Size (px)

DESCRIPTION

cobit

Citation preview

Page 1: Cobit 2

Managing Information Security Risks

Ken M. Shaurette, CISSP, CISA, CISM, IAMInformation Security Solutions Manager

MPC Security Solutions

TechFestDecember 2003

Page 2: Cobit 2

Agenda• Why Security? • Information Assets• Threats• Vulnerabilities• Dynamic Security Methodology• Risk Management• MPC Security Solutions Delivers

Page 3: Cobit 2

• Legislation and community pressure • Inappropriate use leads to

disciplinary action.• Protecting critical infrastructures.

(InfraGard, DHS)• Liability?• Its simply a good idea!

Why Security?

Page 4: Cobit 2

Regulations Touch Everyone!

Source: Forrester / Giga Group GigaTel, Michael Rasmussen, Director of Research, Information Security, July 22, 2003.

Page 5: Cobit 2

Once upon a time….

Page 6: Cobit 2

Then things started to get a little ugly….

Page 7: Cobit 2

Security used to be easy to understand

• Payroll Office….– Lock on door– Lock on file cabinet– Audits

Equal Reasonable Security

Page 8: Cobit 2

• Active Directory, x.500, NDS, Shadow Passwords• VPN, PPTP, Telnet, SSH, IPSEC, Encryption• Wireless, Fiber, ATM, T1, DS3, Dial-up, Cell, PDA• PKI, Kerberos, DES, DES3, SHA, CHAP, PAP• Client Server, Mainframe, ASP, Web Services• Thin Client, Thick Client, Skinny Client, Tall Client• Terminal Server, Distance Learning• HTTPS, SSL

Security is now a little more complex

Page 9: Cobit 2

You know more than you think…

• Information Security is about Information• Technology is a piece of the puzzle• You should not have to master technology in

order to manage risk

Page 10: Cobit 2

The “Good” News

• Technology has become easier and easier to implement

– Anyone can install a server– Anyone can install a network– Anyone can bring up a web server– Anyone can get connected (in lots of ways)

Page 11: Cobit 2

The “Bad” News

• Technology has become easier and easier to implement

– Anyone can install a server– Anyone can install a network– Anyone can bring up a web server– Anyone can get connected (in lots of ways)

Page 12: Cobit 2

What are we securing against?

• Identity Theft• Privacy issues• Copyright issues• Hijacking of

resources• Liability• Regulations

Page 13: Cobit 2

Information Assets

Which does your organization have?– Records about special programs– Resident’s information– Financial information– Health information– Statistical information

Page 14: Cobit 2

Information Assets

How do you identify value?– Accounting / “book value”– Intrinsic value / Replacement Cost– Formal quantifiable methods

(BCP/DRP)– “Gut feel”

Page 15: Cobit 2

The “Best” News

• There is hope!

Page 16: Cobit 2

Information Assets

• What is worth protecting?– Confidentiality (keeping secrets)– Integrity (tamper-proofing)– Availability (there when you need it)

• Why protect?– Community expectations– Regulatory requirements– Perception– Liability

Page 17: Cobit 2

Information Assets

How do you protect?– “Classification” (secret, top secret,

unclassified)– Policies ( separation of duties,

appropriate use)– “Security Awareness training” – “Common Sense” or “Second

Thought” approach

Page 18: Cobit 2

Information Assets

How much do you spend on protection?– Is it based on the value of the information?– Is it based on the number and likelihood of

threats?– Are vulnerabilities accounted for?– How much is enough protection? – Is Return on Investment (ROI)

Expected or Required?

Page 19: Cobit 2

Threats - Motive• What is the nature of a threat?

– Confidentiality (learning secrets)– Integrity (tampering with data)– Availability (denial of service)

• Who poses a threat to the organization?– Terrorists– Former employees– Unhappy residents– Hackers

Page 20: Cobit 2

Vulnerabilities• Absence or weakness of a safeguard

– Safeguard’s reduce likelihood of expected loss from a threat

– Can be well known, such as an IIS patch– Can be unknown, such as a design error

• Type of vulnerabilities– Technical– Non-technical

Page 21: Cobit 2

Could any of these Occur?• Sexual Harassment or stalking performed

using your Computers?• Email Threats to Residents, Officials,

Politicians?• Community questions about how their tax

money is being used.• Community asks how computer systems

are being wasted?

Page 22: Cobit 2

`

"What Are The Short Falls?”

Perform Gap

Analysis

Dynamic Security Infrastructure

"What Is Our Security Policy?”"Implement!"

"How Do We Get There?"

"Experience Feedback"

Compliance

Reporting

Compliance

Reporting

Strategy

Definition

Strategy

Definition

Security

Architecture

Security

Architecture

Deploy

Solutions

Deploy

Solutions

Periodic Re-evaluation

"Where Are We Today?"

"Where Do We Need to Be?"

BaselineCurrentSecurity

BaselineCurrentSecurity

New Risks, LegislationSecurity Requirements

New Risks, LegislationSecurity Requirements

Page 23: Cobit 2

Security Risk Management

• Understand value of information• Understand the threats• Understand vulnerabilities and

corresponding safeguards• Invest wisely in appropriate safeguards

that reduce the impact of threats. • Emergency preparedness

Page 24: Cobit 2

Risk Mitigation• Understand security risk• Understand technology• Accept Risk

– Documentation of risk acceptance is a form of mitigation.

• Defer or transfer risk– Insurance

• Mitigate risk– Technology can mitigate risk

Page 25: Cobit 2

How Can MPC Help?

• Services– Information Security Operational

Planning (ISOP)– Information Security Assessment

Project (SA)– Security Policy Review and Writing– Security Risk Management Program

Page 26: Cobit 2

How Can MPC Help?

• Services– Network Perimeter Security Sweep

(NPSS)– Internal Network Security Sweep (INSS)– Secure Network Operations Center

(RSMC) for monitoring network, (IDS or Firewall)

Page 27: Cobit 2

How Can MPC Help?• Technology

– Monitoring/Auditing Tools, workstation usage and measure license, and Computer utilization; (5th Column)

– Access Controls, (wireless, active directory, NDS, multiple factor authentication); (Novell, Microsoft)

– Filtering & Proxy Tools; (Websense)– Firewalls; (PIX, Cyberguard)

Page 28: Cobit 2

How Can MPC Help?

• Technology– Intrusion Detection/Prevention

(Host and Network)– Application Gateways– IP Video Surveillance– Secure Network Infrastructure Design– Wireless Technology

Page 29: Cobit 2

Thank You!