Security Standard PPT - 3
Security Standard PPT - 3
This family of standards provide security requirements These regulations are broad and can fit a wide range
ISO 27000 Family (International around the maintenance of information security of businesses. All businesses can use this family of
Organization for Standardization) management systems (ISMS) through the regulations for assessment of their cybersecurity
implementation of security controls. practices.
It protects the healthcare of people who are transitioning Any organization that handles healthcare data. That
HIPAA (Health Insurance Portability
between jobs or are laid off. Simplifies the healthcare includes, but is not limited to, doctor’s offices,
and Accountability Act)
process by shifting to electronic data. It also protects the hospitals, insurance companies, business associates,
privacy of individual patients. and employers.
The Act/standard What it Regulates Company Affected
PCI-DSS
A set of 12 regulations designed to reduce fraud
(Payment Card Industry Data Security Companies handling credit card information.
and protect customer credit card information.
Standard)
SOX This act requires companies to maintain financial records U.S. public company boards, management, and public
(Sarbanes-Oxley Act) for up to seven years. accounting firms.
ITAR
Controls the sale of defense articles and defense services Anyone who produces or sells defense items and
(International Traffic in Arms
(providing critical military or intelligence capability). defense services.
Regulations)
COPPA
The online collection of personal information about
(Children’s Online Privacy Protection Any Person or entity under U.S. jurisdiction.
children under 13 years of age.
Rule)
5 step approach on risk management
• Establish risk management framework
• Identify risks
• Analyse risks
• Evaluate risk
• Select risk treatment option
Formal Methodology
• Consistent – It needs to be objective and not subject to individuals’ choices or priorities
• Valid – It should not hinder/block the business operations
• Comparable – The results should be comparable, and can be replicated or stepped-up/down
Risks • IP
• Hard copies etc.
• CIA analysis of each asset
• Identification of Asset and Risk owner
Analyze the risk
Vulnerability X Threat
Map the vulnerabilities and threats in the Likelihood v/s Impact matrix for risk analysis
Risk Calculation
• Numeric impact gives
likelihood
Risk level 5 Risk level 6 Risk level 7 Risk level 8 Risk level 9
you the actual risk levels
Risk level 4 Risk level 5 Risk level 6 Risk level 7 Risk level 8 • Understand the risk
taking ability of the
organisation
Risk level 3 Risk level 4 Risk level 5 Risk level 6 Risk level 7
• Classify the risk – in 3/5
or more levels
Risk level 2 Risk level 3 Risk level 4 Risk level 5 Risk level 6 depending on
• Money
Risk level 1 Risk level 2 Risk level 3 Risk level 4 Risk level 5 • Time
• Compliance
• Brand value etc
impact
Risk Assessment Scale
Evaluation of risk
➢ Compare the risk with predetermined
levels of accepted risk
3 5 6
2 4 5
1 2 3
Important
➢ Prioritize risks
Risk treatment options
Modify – patching/back-ups
Share – insurance, third party risk
• Preventive Controls – are intended to minimize the likelihood of an incident occurring. For
example, a user account management process, restricting server room access to
authorized personnel, configuring appropriate rules on a firewall or implementing an
access control list on a file share.
• Detective Controls – are intended to identify when an incident has occurred. For example,
review of server or firewall security logs or Intrusion Detection System (IDS) alerts.
• Corrective Controls – are intended to fix information system components after an incident
has occurred. For example, data backups, SQL transaction log shipping or business
continuity and disaster recovery plans.
CONTROLS IDENTIFICATION AND
ASSESSMENT
• A control can reduce the risk by
reducing the likelihood of an event, the
impact, or both.
• Typically deterrent and preventive
controls reduce the likelihood of a risk
eventuating whereas,
• detective and corrective controls reduce
the impact should it eventuate.
Incident management (ISO27001 Annex A.16)
Security incident management is the process of:
• identifying,
• managing,
• recording and
• analyzing
security threats or incidents in real-time.
A security incident can be anything from an active
threat to an attempted intrusion to a successful
compromise or data breach. Policy violations and
unauthorized access to data such as health,
financial, social security numbers, and personally
identifiable records are all examples of security
incidents.
Incident management best practices
Implement these best practices to develop a comprehensive security incident management plan:
•Develop a security incident management plan and supporting policies that include Guidance on how incidents are
detected, reported, assessed, and responded to. Have a checklist ready for a set of actions based on the threat.
Continuously update security incident management procedures as necessary, particularly with lessons learned from
prior incidents.
•Establish an incident response team (IRT) including clearly defined roles and responsibilities. Your incident response
team should include functional roles within the IT/security department as well as representation for other
departments such as legal, communications, finance, and business management or operations.
•Develop a comprehensive training program for every activity necessary within the set of security incident
management procedures. Practice your security incident management plan with test scenarios on a consistent basis
and make refinements as need be.
Incident management best practices
•After any security incident, perform a post-incident analysis to learn from your successes and failures and
adjust your security program and incident management process where needed.
In some situations, collecting evidence and analyzing forensics is a necessary component of incident response.
For these circumstances, you’ll want the following in place:
•A policy for evidence collection to ensure it is correct and sufficient – or, when applicable, will be accepted in
the court of law.
•The ability to employ forensics as needed for analysis, reporting, and investigation.
•Team members who have experience and training in forensics and functional techniques.
A strong security incident management process is imperative for reducing recovery costs, potential liabilities,
and damage to the victim organization. Organizations should evaluate and select a suite of tools to improve
visibility, alerting, and actionability regarding security incidents.
Business Continuity
(ISO27001 Annex A.17)
• Business continuity is about having a plan to deal
with difficult situations, so your organization can
continue to function with as little disruption as
possible. It is an organization's ability to ensure
operations and core business functions are not
severely impacted by a disaster or unplanned
incident that take critical systems offline.
•Business Recovery: The purpose of business recovery planning is to ensure that your critical business processes can be
recovered in the event of an emergency. Your plan will document the actions, including temporary workarounds, that will
be necessary to keep critical functions operational until IT applications, systems, facilities, or personnel are again
available.
•IT Recovery: IT recovery planning refers to the development of plans and strategies for the recovery of your technology,
including actions that will be necessary to restore critical IT applications and systems.
•Crisis Management: Crisis Management refers to a specific plan that details how your organization will manage a crisis
event, as well as to an internal organizational unit (the Crisis Management Team) that will manage that event.
Continual Process Risk Management
(CPRM)
1. Risk Identification
•Asset Identification: Catalog all information assets, including
hardware, software, data, and personnel.
•Threat Identification: Recognize potential threats such as
cyber-attacks, natural disasters, and insider threats.
•Vulnerability Identification: Determine weaknesses in
systems, processes, and controls that could be exploited by 2. Risk Analysis
threats. •Likelihood Assessment: Estimate the probability of identified
threats exploiting vulnerabilities.
•Impact Assessment: Determine the potential consequences on
the organization if threats materialize.
3. Risk Evaluation
•Risk Level Determination: Calculate risk levels by
combining the likelihood and impact assessments.
•Risk Prioritization: Rank risks based on their severity to 4. Risk Treatment
focus resources on the most critical areas. •Risk Avoidance: Implement measures to eliminate risk sources
or conditions.
•Risk Reduction: Apply controls to reduce the likelihood or impact
of risks.
•Risk Sharing: Transfer risks to third parties (e.g., through
insurance or outsourcing).
•Risk Acceptance: Acknowledge and accept the risks when their
levels are within organizational tolerance.
5. Monitoring and Review
•Continuous Monitoring: Regularly monitor risk factors and
controls to ensure their effectiveness.
•Incident Management: Track security incidents and near-
misses to learn and improve.
•Review and Update: Periodically review and update the risk
management processes and ISMS based on changes in the
environment, emerging threats, and new vulnerabilities.
6. Communication and Consultation
•Stakeholder Engagement: Involve all relevant stakeholders in
the risk management process to ensure comprehensive
coverage and buy-in.
•Reporting: Provide regular updates to management and
stakeholders on the status of ISMS risks and controls.
7. Documentation and Evidence
•Risk Registers: Maintain detailed records of identified
risks, assessments, and treatment plans.
•Audit Trails: Keep logs and documentation to support
audits and demonstrate compliance with standards like
ISO/IEC 27001.
8. Continuous Improvement
•Feedback Loops: Use feedback from monitoring, reviews, and
audits to improve risk management practices.
•Training and Awareness: Continuously educate employees
about risks and the importance of adhering to ISMS policies and
procedures.
Best Practices for CPRM in ISMS
Integration with
Business Processes
Cross-functional Collaboration:
•Risk Assessment Tools: Employ automated tools for risk assessments to enhance efficiency, accuracy, and repeatability. These tools
can help identify, analyze, and evaluate risks more effectively.
•Continuous Monitoring Systems: Implement systems for continuous monitoring of network activities, vulnerabilities, and incidents
to detect and respond to threats in real-time.
•Incident Management Systems: Use automated incident management systems to track, manage, and report security incidents and
breaches.
Continuous Improvement
•Feedback Mechanisms: Establish feedback loops from monitoring, audits, and incident reports to continuously improve risk
management practices.
•Regular Training and Awareness: Conduct regular training sessions and awareness programs to educate employees about
information security risks and best practices.
•Lessons Learned: Analyze incidents and near-misses to extract lessons learned and integrate these insights into the risk
management process.
Best Practices for CPRM in ISMS
Documentation and Evidence
•Comprehensive Risk Registers: Maintain detailed risk registers that document identified risks, assessments, and
treatment plans. This ensures traceability and accountability.
•Audit Trails: Keep detailed logs and documentation of all risk management activities. This is essential for audits and
demonstrating compliance with standards.
Stakeholder Engagement
•Regular Communication: Keep stakeholders informed about the status of risks and the measures taken to mitigate them.
Regular updates and reports help in maintaining transparency.
•Involvement in Decision Making: Involve key stakeholders in the risk management decision-making process to ensure
their concerns and insights are considered.
Risk Culture
•Promote a Security-first Culture: Foster a culture where security is a priority for everyone in the organization. This
includes leadership support and encouraging employees to take ownership of security.
•Encourage Reporting: Create an environment where employees feel comfortable reporting potential security risks and
incidents without fear of retribution.
Best Practices for CPRM in ISMS
Policy and Procedure Management
•Clear Policies: Develop clear and concise information security policies and procedures. Ensure they are easily accessible and
understood by all employees.
•Regular Reviews: Regularly review and update policies and procedures to keep them relevant and effective in the face of new
threats and regulatory changes.