Information Security Program
Information Security Program
The security program consists of controls, processes, and practices to increase the
resilience of the computing environment and ensure that risks are known and handled
in an effective manner.
Outcomes - should be the realization of the strategy, goals, and objectives of the
organization.
The ISP is the process that allows an organization to design, build, deploy,
modify, manage, monitor & maintain security systems until they are retired.
The security charter gives the security manager authority to design and operate the
program, but accountability is shared between the security manager and the
executive leadership team and board of directors.
Scope of a program - defines the boundaries and what parts of the organization are
to be included and subject to information security governance and policy.
• Policy
• Standards
There are six objectives that ALL Information Security Programs should achieve:
1. Strategic alignment
2. Risk management
3. Value delivery
4. Resource management
5. Performance measurement
6. Assurance process integration
===================
Defining objectives = identifying forces driving business need(s) --> GAP ANALYSIS
IS IMPORTANT HERE...
The Information Security Manager is responsible for establishment of the ISP scope
Remember the impacts of challenges & constraints as you develop the ISP
_
|T| echnology
|A| rchitecture
|P| eople
|P| rocess
_
===================
Approaches include:
Classification vs Categorization -
Who should decide on data classification? The individual who owns the data should
decide on the classification, and it should be reviewed at a minimum annually.
1. Break corporate structure down into business units & rate each unit based
on value to the business (REVENUE); done by senior management
===================
=======================================================
| Business View | Contextual Architecture |
|======================|================================|
| Architect's View | Conceptual Architecture |
|======================|================================|
| Designer's View | Logical Architecture |
|======================|================================|
| Constructor's View | Physical Architecture |
|======================|================================|
| Technician's View | Component Architecture |
|======================|================================|
| Manager's View | Management Architecture |
|======================|================================|
Strategy & Planning --> Design --> Implement --> Manage & Measure
Technology Architecture - The logical software and hardware capabilities that are
required to support the deployment of business, data, and application services.
This includes IT infrastructure, middleware, networks, communications, processing,
and standards.
1. Business
2. Information Systems – Application
3. Information Systems – Data
4. Technology
In each case, develop the Baseline and Target Architecture and analyze gaps.
Technology Architecture - The logical software and hardware capabilities that are
required to support the deployment of business, data, and application services.
This includes IT infrastructure, middleware, networks, communications, processing,
and standards.
https://www.zachman.com/about-the-zachman-framework
While the Zachman model allows an organization to peer into cross sections of an IT
environment that supports business processes, the model DOES NOT convey the
relationships between IT systems.
Data flow diagrams (DFD) are used instead to depict information flows. A DFD can
begin as a high-level diagram, where the labels of information flows are expressed
in business terms. Written specifications about each flow can accompany the DFD;
these specifications would describe the flow in increasing levels of detail, all
the way to field lengths and communication protocol settings.
Audience Perspectives:
• Executive
• Business Management
• Architect
• Engineer
• Technician
• Enterprise
Components:
Framework Core
Framework Implementation Tiers
Framework Profile
THE RISK MANAGEMENT FRAMEWORK PROVIDES A PROCESS THAT INTEGRATES SECURITY & RISK
MANAGEMENT ACTIVITIES INTO THE SYSTEM DEVELOPMENT LIFE CYCLE.
Risk-Based Approach -
Prepare carries out essential activities at the organization, mission and business
process, and information system levels of the enterprise to help prepare the
organization to manage its security and privacy risks using the Risk Management
Framework.
2. Categorize Step -
Categorize the system and the information processed, stored, and transmitted by
that system based on an impact analysis (*1).
3. Select Step -
Select an initial set of baseline security controls for the system based on the
security categorization; tailoring and supplementing the security control baseline
as needed based on organization assessment of risk and local conditions.
4. Implement Step -
Implement the security controls and document how the controls are deployed within
the system and environment of operation.
5. Assess Step -
Assess the security controls using appropriate procedures to determine the extent
to which the controls are implemented correctly, operating as intended, and
producing the desired outcome with respect to meeting the security requirements for
the system.
6. Authorize Step -
7. Monitor Step -
Monitor and assess selected security controls in the system on an ongoing basis
including assessing security control effectiveness, documenting changes to the
system or environment of operation, conducting security impact analyses of the
associated changes, and reporting the security state of the system to appropriate
organizational officials (*3).
Footnotes:
1. Technical
2. Operational
3. Management
4. Administrative
5. Educational/Informative
===================
Security Policy - Direction from senior management (Strategic - Why & What)
Process - A series of related tasks or methods that together turn inputs into
outputs. (Operational - Who & When & Where)
1. Initiation
2. Development/Acquisition
3. Implementation
4. Operation/Maintenance
5. Disposal
=======================
Information Security Program Metrics
|S| pecfic
|M| easurable
|A| ttainable
|R| elavant
|T| ime bounded
1. Strategic alignment
2. Risk management
3. Value delivery
4. Resource management
5. Performance measurement
*** Metrics should be relevant to the organizations operational landscape --- ONE
SIZE FITS ONE
====================
Controls are the means of managing risk, and are implemented to achieve particular
objectives... BUT... We need Policy, Process, Standards & Technology working
together to achieve ensure a successful defense
Control Methods/Categories:
• Physical
• Administrative
• Logical (Technical)
=======================
Controls are the core element of the Information Security strategy implementation &
should be automated to prevent bypass
Access Control
Secure Failure
Least Privilege
Compartmentalization
Segregation/Separation of Duties (SoD)
Transparency
Trust
Zero Trust
SOAR platforms are a collection of software solutions and tools designed to browse
a broad range of sources and collect:
# Security threats
# Data
# Alerts
SOAR tools then analyze this disparate data through a combination of human and
machine learning to understand and prioritize incident response activities.
SOAR solutions can define your incident response procedures for you, by combining a
variety of data tasks including:
# Data gathering
# Case management
# Standardization
# Workflow
# Analytics
1. Orchestration
SOAR solutions can perform much more than ingesting and analyzing alerts from your
SIEM system. SOAR solutions can also ingest and analyze alerts from:
2. Automation
# Process steps
# Decision-making workflow
# Enforcement actions
# Status checking
# Auditing capabilities
3. Response
SOAR tools also include case management modules. These modules are useful in
communicating learnings and delivering threat intelligence, further improving
proactive response times to future attacks.
A few examples of the most common use cases for SOAR are:
# Phishing emails
# Malicious network traffic
# Streamlining vulnerability management
# Meeting service level agreements
# Case management
Defined baseline security controls should be applied for ALL new system
deployments; adequate testing of baselines to ensure compliance is important !!!
==============
Training & security awareness is only effective if it is ongoing and aligned with
the KGIs, KPIs & KRIs established
Training should encompass ALL current employees as well as vendors & suppliers as
appropriate
Ensuring complete training coverage through the use of systems that allow for
tracking and reporting is important
Guess what time it is boys and girls !!! Hint ... ---> GRC is a'comin'
|
|
|
|
v
How about, according to Adam, "that Governance helps to ensure that the decisions
organizations make, having to do with security and risk, are well informed and meet
the stated goals and objectives all the way up and down the management structure."
• Mission - Why does the organization exist? Who does it serve, and through what
products and services?
• Strategy - What are the activities that need to take place so that the
organization’s goals and objectives can be fulfilled?
• Personnel Management
• Sourcing
• Risk Management
• Configuration Management
• Change Management
• Access Management
• Vulnerability Management
• Incident Management
• Business Continuity Planning (BCP)
PLUS:
• Policy - should directly reflect the mission, objectives, and goals of the
overall organization. Answers the "WHY" & "WHAT" questions.
So, what are the MAIN Security Governance Activities and the Results we can
expect???
REMEMBER that the organization’s senior management team is responsible for seeing
to it that information systems necessary to support business operations will be
adequately protected.
• Risk management
• Process improvement
• Event identification
• Incident response
• Improved compliance
• Metrics
• Resource management
• Increased trust
• Improved reputation
Planning
Designing
Implementation
Testing & Integration
Maintenance
Waterfall & Agile are two of the best known development methodologies:
agile/Agile:
Practices involve discovering requirements and developing solutions through the
collaborative effort of self-organizing and cross-functional teams and their
customer(s)/end user(s). It advocates adaptive planning, evolutionary development,
early delivery, and continual improvement, and it encourages flexible responses to
change.
DevOps/DevSecOps/integrated product team - A combination of participants from
various functional areas (development, productions/operations, security, quality
assurance, management, etc.) involved in the overall development effort, intended
to ensure all functional and nonfunctional requirements are met during
software/system development
While it is very difficult to find an acceptable definition of just what DevOps is,
DevOps aims at shorter development cycles, increased deployment frequency, and more
dependable releases, in close alignment with business objectives.
Core concepts:
CI/CD are two DevOps best practices as they tackle the misalignment between
developers and operational team. With the presence of automation, developers can
release changes and new features more frequently, while operation teams have better
overall stability.
In a CI practice, developers build, run, and test code on their own workstations
before committing code to the version control repository. After changes are made to
the repository, a chain of events is put into motion.
A typical first step in this chain is to build the latest version of source code.
If unit testing succeeds, the build is deployed to test environments where system
tests are performed (usually using automated tests).
The team is notified about the status of this process, and a report is delivered to
provide details, such as build number, defects, and the number of tests.
Picks up where continuous integration ends. While CI is the process to build and
test automatically, CD deploys all code changes in a build to the testing or
staging environment.
As tests can fail at any level and environment, CI/CD must include a feedback
channel to quickly report failures to developers.
Step 2: If the current build succeeded, reset the workstation with the
build’s configuration.
Step 3: Build and test locally to ensure the update does not break any
functionality. If successful, commit new changes.
Step 5: If the build fails, stop and fix errors on local workstations. Go
back to Step 3.
Phase 1: Commit
When developers complete a change, they commit the change to the repository.
Phase 2: Build
Source code from the repository is integrated into a build.
Phase 4: Deploy
The built version is delivered to production.
IT Service Management (ITSM) - the set of activities that ensures the delivery of
IT services is efficient and effective, through active management and the
continuous improvement of processes. ITSM consists of several distinct activities:
• Service desk
• Incident management
• Problem management
• Change management
• Configuration management
• Release management
• Service-level management
• Financial management
• Capacity management
• Service continuity management
• Availability management
Service Desk = Single Point of Contact for ALL communication with customers
Problem = incident that has become systemic without becoming a known error
a. Normal
b. Standard / Pre-Authorized
c. Emergency
Gate Process - each step of the process undergoes formal review and approval before
the next step is allowed to begin
Change management - should have a formal cycle, in the same manner as the SDLC.
# Configuration Identification
# Baselines
# Change Control
# Configuration Status Accounting
# Configuration Audits and Reviews
2. Broad Network Access - Capabilities are available over the network and
accessed through standard mechanisms that promote use by heterogeneous thin or
thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).
3. Public Cloud - provisioned for open use by the general public. It may be
owned, managed, and operated by a business, academic, or government organization,
or some combination of them. It exists on the premises of the cloud provider.
The key component that makes virtualization possible is the use of a Hypervisor
(Virtual Machine Monitor). Types:
=====================================================================
Service Providers
Outsourced Operations
Trading Partners
Merged & Acquired Enterprises
ALL NEED TO BE TREATED THE SAME ... RISK ASSESSMENT & DOCUMENTED
POLICY/STANDARDS/PROCEDURES & CLEAR RESPONSIBILITY
There will be a "disconnect" between the organization & the outsourced provider
vis-a-vis the assessment & defintion of risk (organization) AND the control
implementation & monitoring (outsourced provider)
---> The controls to be implemented MUST be defined in the
services contract
Do not confuse SOC 1 and SOC 2 with Type 1 and Type 2. Both a SOC 1 and a SOC 2 can
be either a Type 1 or Type 2. The key differences are:
Type 1 reports provide less comfort to the intended audience of the report
and are uncommon
NOTE: The trust services principles and criteria are now referred to as the trust
services criteria, and the principles are now referred to as the trust services
categories (not to be confused with the COSO principles).
SOC 1 reports -
SOC 1 reporting engagements provide user organizations with a strong sense of
comfort about the outsourced services performed by service organizations on their
behalf, which are relevant to their internal controls over financial reporting.
Additional Criteria: SOC 2 reports can also include other suitable criteria,
such as HITRUST, the HIPAA Security Rule and others
The Trust Service Criteria, which SOC 2 are based upon, are modeled around four
broad areas: Policies, Communications, Procedures, and Monitoring.
Audience: Unrestricted and can be used by anyone who has the appropriate
understanding of the subject matter and who would like confidence in the controls
for the service organization
SOC 3 reports can be issued on one or multiple Trust Services principles (security,
availability, processing integrity, confidentiality and privacy) and allow the
organization to place a seal on their website upon successful completion.
=============================
|P| lan
|D| o
|C| heck
|A| ct
Vision --> Strategic Objectives --> CSFs --> KPIs --> Key
actions/changes
Security review - a less formal and less rigorous examination of one or more
controls, processes, or systems to determine their state.
Security audit - a more formal and more rigorous examination of one or more
controls, processes, or systems.
During development of the security program, the Information Security Manager should
use a review prorcess similiar to an audit to assess the program at key points:
Compliance - is the process by which the security manager determines whether the
organization’s information systems, processes, and personnel adhere to applicable
policies, standards, regulations, and other requirements.
NIST SP 800-53A R5 - Security and Privacy Controls for Federal Information Systems
and Organizations is most recent official version.
Audit - a set of activities that determine whether security safeguards are in place
and working properly.
• Purpose - The auditor and the auditee must establish a reason why an audit
is to be performed. --> WHY
• Scope - The auditor and the auditee must also establish the scope of the
audit. --> WHAT
• Risk analysis - The auditor needs to be familiar with the levels of risk
associated with the area(s) being audited. Two different perspectives of risk may
be needed:
b. the absolute level of risk across the entire area(s) being audited
• Audit procedures - The purpose and scope of the audit may help to define
the procedures that will be required to perform the audit
• Resources - The auditor must determine what resources are needed and
available for the audit
• Schedule - The auditor needs to develop an audit schedule that will give
enough time for interviews, data collection and analysis, and report generation
• Audit subject
• Audit objective
• Type of audit
• Pre-audit planning
• Statement of Work (SOW) - describes the audit purpose, scope, duration, and
costs
• Audit procedures
What is Audit Evidence? - the information collected by the auditor during the
audit.
The contents and reliability of the evidence obtained are used by the auditor to
reach conclusions on the effectiveness of controls and control objectives.
The Control Self-Assessment Life Cycle - an iterative life cycle, made up of the
following phases:
• Identify and assess risks - operational risks are identified & analyzed
• Identify and assess controls - if any controls are missing, new controls
are designed
• Awareness training - carried out through every phase of the life cycle to
keep personnel informed about the activities in the various phases
NOTE: The security manager and internal auditor should be involved in control self-
assessments to ensure that the CSA process does not try to remove controls from
processes because their purpose or significance is not correctly understood.
Why is the security policy SOOOOOOOOOO important? - security policy defines the
principles and required actions for the organization to properly protect its assets
and personnel.
The audience for security policy is ALL of the organization’s personnel, and
therefore, security policy must be easily accessible by all personnel.