CISM Exam Guide
CISM Exam Guide
CISM Exam Guide
CISM
Exam Guide
Updated for the
15th Edition Review Manual
Phil Martin
Copyright © 2018. All rights reserved. Except as permitted under the
Copyright Act of 1976, no part of this publication may be reproduced or
distributed in any form or by any means, or stored in a database or retrieval
system, without the prior written permission of the publisher.
ISBN 978-1-98068-442-8
Essential CISM
Contents
CONTENTS
FIGURES
TABLES
ABOUT THE EXAM
HOW TO USE THIS BOOK
SECTION 1: THE BASICS
CHAPTER 1: SECURITY CONCEPTS
CHAPTER 2: GOVERNANCE, GOALS, STRATEGIES, POLICIES, STANDARDS AND
PROCEDURES
CHAPTER 3: STRATEGY
CHAPTER 4: RISK APPETITE, TOLERANCE AND CAPACITY
CHAPTER 5: ANALYSIS OF RISK
CHAPTER 6: CONTROLLING THREATS AND RISK
CHAPTER 7: CONTROLS AND COUNTERMEASURES
CHAPTER 8: ALE, RTO, RPO, SDO, MTO, MTD AND AIW
CHAPTER 9: BCP, DRP AND BIA
CHAPTER 10: BUSINESS CONTINUITY AND DISASTER RECOVERY
CHAPTER 11: TESTING INCIDENT RESPONSE, BUSINESS CONTINUITY PLANS AND
DISASTER RECOVERY PLANS
CHAPTER 12: ROLES, RESPONSIBILITIES, RACI AND SKILLS
CHAPTER 13: DUE DILIGENCE AND DUE CARE
CHAPTER 14: SECURITY PRINCIPLES
CHAPTER 15: KGIS, KPIS, KRIS AND CSFS
CHAPTER 16: TECHNOLOGIES
CHAPTER 17: STANDARDS AND FRAMEWORKS
CHAPTER 18: CULTURE
CHAPTER 19: METRICS
CHAPTER 20: CURRENT STATE, DESIRED STATE AND THE GAP IN-BETWEEN
CHAPTER 21: INFORMATION SECURITY INFRASTRUCTURE AND ARCHITECTURE
CHAPTER 22: CLOUD COMPUTING
CHAPTER 23: METRICS DEVELOPMENT
CHAPTER 24: BUSINESS MODEL FOR INFORMATION SECURITY (BMIS)
SECTION 2: THE FOUR DOMAINS
CHAPTER 25: INFORMATION SECURITY GOVERNANCE – OVERVIEW
CHAPTER 26: INFORMATION SECURITY GOVERNANCE – THE GOAL
CHAPTER 27: INFORMATION SECURITY GOVERNANCE – THE STRATEGY
CHAPTER 28: INFORMATION SECURITY GOVERNANCE – WHO DOES WHAT
CHAPTER 29: INFORMATION SECURITY GOVERNANCE – RESOURCES THAT HELP
CHAPTER 30: INFORMATION SECURITY GOVERNANCE – CONSTRAINTS THAT HURT
CHAPTER 31: INFORMATION SECURITY GOVERNANCE – THE ACTION PLAN
CHAPTER 32: INFORMATION SECURITY GOVERNANCE – METRICS AND
MONITORING
CHAPTER 33: INFORMATION SECURITY GOVERNANCE – WHAT SUCCESS LOOKS
LIKE
CHAPTER 34: INFORMATION RISK MANAGEMENT – OVERVIEW
CHAPTER 35: INFORMATION RISK MANAGEMENT – THE GOAL
CHAPTER 36: INFORMATION RISK MANAGEMENT – THE STRATEGY
CHAPTER 37: INFORMATION RISK MANAGEMENT – WHO DOES WHAT
CHAPTER 38: INFORMATION RISK MANAGEMENT – RESOURCES THAT HELP
CHAPTER 39: INFORMATION RISK MANAGEMENT – CONSTRAINTS THAT HURT
CHAPTER 40: INFORMATION RISK MANAGEMENT – THE ACTION PLAN
CHAPTER 42: INFORMATION RISK MANAGEMENT – WHAT SUCCESS LOOKS LIKE
CHAPTER 43: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – OVERVIEW
CHAPTER 44: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – THE GOAL
CHAPTER 45: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – THE STRATEGY
CHAPTER 46: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – WHO DOES WHAT
CHAPTER 47: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – RESOURCES THAT HELP
CHAPTER 48: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – CONSTRAINTS THAT HURT
CHAPTER 49: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – THE ACTION PLAN
CHAPTER 50: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – METRICS AND MONITORING
CHAPTER 51: INFORMATION SECURITY PROGRAM DEVELOPMENT AND
MANAGEMENT – WHAT SUCCESS LOOKS LIKE
CHAPTER 52: INFORMATION SECURITY INCIDENT MANAGEMENT – OVERVIEW
CHAPTER 53: INFORMATION SECURITY INCIDENT MANAGEMENT – THE GOAL
CHAPTER 54: INFORMATION SECURITY INCIDENT MANAGEMENT – THE STRATEGY
CHAPTER 55: INFORMATION SECURITY INCIDENT MANAGEMENT – WHO DOES
WHAT
CHAPTER 56: INFORMATION SECURITY INCIDENT MANAGEMENT – RESOURCES
THAT HELP
CHAPTER 57: INFORMATION SECURITY INCIDENT MANAGEMENT – CONSTRAINTS
THAT HURT
CHAPTER 58: INFORMATION SECURITY INCIDENT MANAGEMENT – THE ACTION
PLAN
CHAPTER 59: INFORMATION SECURITY INCIDENT MANAGEMENT – METRICS AND
MONITORING
CHAPTER 60-: INFORMATION SECURITY INCIDENT MANAGEMENT – WHAT
SUCCESS LOOKS LIKE
ACRONYMS
DEFINITIONS
INDEX
Figures
Figure 1: Goals, Strategies, Policies, Standards, Procedures and Guidelines
Figure 2: Optimizing Risk Costs
Figure 3: Qualitative Impact Matrix
Figure 4: Semiquantitative Matrix
Figure 5: Information Security Relationships
Figure 6: Control Types and Effect
Figure 7:Techniques Implemented in Relation to RTOs and RPOs
Figure 8: COBIT 5 Principles
Figure 9: COBIT 5 Enterprise Enablers
Figure 10: Overview of the Process Assessment Model
Figure 11: TOGAF Architecture Development Cycle
Figure 12: Characteristics of CMMI Maturity Levels
Figure 13: Balanced Scorecard Dimensions
Figure 14: How Cultures are Created
Figure 15: Common Framework Layers
Figure 16: Enterprise Architecture Domains
Figure 17: Classic Architecture vs. Cloud Computing
Figure 18: Cloud Computing Deployment Models
Figure 19: 'as a Service' Offerings
Figure 20: Cloud Computing Risk Map
Figure 21: Business Model for Information Security
Figure 22: Governance Relationships
Figure 23: Information Security Strategy Development Participants
Figure 24: Prevalent Standards and Frameworks
Figure 25: Relationship of Governance Elements
Figure 26: Components of Security Metrics
Figure 27: The IT Risk Management Life Cycle
Figure 28: Top Layer of Business Risk Structure
Figure 29: Critical Function Layer of Business Risk Structure
Figure 30: Aligning Assets to the Critical Layer Function
Figure 31: Asset Vulnerabilities
Figure 32: Combined Impact Risk Structure
Figure 33: Risk Analysis Framework
Figure 34: Factor analysis of information risk (FAIR)
Figure 35: Risk Scenario Structure
Figure 36: PDCA Methodology
Figure 37: Strategic Goals, CSFs, KPIs and Key Actions
Figure 38: Disconnect of Responsibilities with Outsourced Providers
Figure 39: Continuous Risk Management Steps
Figure 40: Steps to Information Security Program Development
Figure 41: Incident Response Plan Process Flow
Figure 42: Incident Management Life Cycle Phases
Tables
Table 1: Basic Recovery Tests and Categories
Table 2: A RACI Example
Table 3: Roles and Responsibilities RACI Matrix
Table 4: Security Content and Application
Table 5: Security Incident Roles and Responsibilities
About the Exam
The CISM, or Certified Information Security Manager Certification, is one of
the most recognized credentials for information security managers and has
been awarded to more than 27,000 professionals to-date.
Beyond passing the exam, a CISM Certification requires a minimum of five
years of experience in information security, and a minimum of two years of
experience as an information security manager. If you have a CISA or CISSP
certification, or a post-graduate degree in information security or other
related field, then you are eligible to substitute two years of work experience.
Finally, you will be required to and agree and comply with the ISACA’s
Code of Professional Ethics and the CISM Continuing Education Policy.
The exam cost between $625 and $750. If you pay to register as a member
with ISACA, you can receive a discount. ISACA offers a free self-assessment
exam with 50 questions to test your readiness for the actual exam. You can
register for the CISM exam on the ISACA website. The day of the test you
must bring a photo ID and the admissions ticket provided after you register.
The CISM exam is given twice per year in June and December. The test will
take four hours and includes 200 total questions, giving you just over one
minute per question. You are awarded 4 points per each correctly answered
question, and a minimum score of 450, or roughly 113 correct questions, is
required to pass the test.
Once you pass the test and have the score in-hand, you can submit your
CISM application to get your certification. This requires proof of five years
of experience of work, with signed verification from your employers.
There is only a 50-60% first time pass rate, so study the material repeatedly
and take multiple assessment tests prior to taking the plunge.
How to Use This Book
If you have tried to read the official CISM Review Manual, then you know
what a coma feels like. This book has boiled down the contents into a concise
and easily-readable format, purposefully avoiding those $100 sentences that
take 2 minutes to decipher.
Some simple rules on text formatting…
Underlined and italicized text:
This is a term you should memorize.
Bold text:
This is a concept you should remember.
Normal text:
This is to help you understand the two above. Read this part at
least once, and revisit as often as you need.
This book is divided into two sections. Section 1 covers basic CISM concepts
that are covered in more than one domain. Section 2 covers each of the four
CISM domains.
So, let’s start with the basics!
Governance
In a nutshell, governance is the act of creating a plan on how a company will
achieve a goal and then making sure everyone executes that plan.
Governance is the responsibility of the board and company executives. These
folks at the top might delegate a lot of the footwork, but they are ultimately
responsible to ensure the plan is properly implemented. A core tenant of
governance is that the people tasked with it must have the authority to
enforce it. After all, what good does it do to have the responsibility of
something if you don’t have the authority to make it happen?
Goal
A goal is the result we want to achieve. Let’s say we want to colonize Mars -
the goal might be to establish a Martin outpost with 100 settlers. A few years
ago, this would be an outlandish idea, but in the era of Elon Musk, anything
is possible!
Now, how do we reach our goal? We need a strategy!
Strategy
A strategy is a plan of action to achieve our goal. Using our Mars example,
our strategy might be:
1) Build a spaceship shaped like a huge Tesla Roadster
2) Fill it with colonists
3) Launch it to Mars without anyone knowing what we’re really up to
A strategy doesn’t have to tell us how we’re going to carry out each step, or
how long it will take, or the problems we might face along the way. It just
lays out a road map of how we are going to reach our goal. If we’re honest
with ourselves, most of us would want to dive right in at this point and start
designing a spaceship. But if we do that without some kind of guiding
principles, things will wind up as a hot mess. For example, how do we buy
the Vibranium needed to build the spaceship? How do we ship it to our
facilities? How do we keep people from finding out that our Tesla Roadster is
filled with colonists? The answer is that we need to create policies to provide
guidance.
Policy
A policy is a high-level statement of what senior management expects and
will dictate the direction in which we are heading. In mature organizations,
policies are well-developed and remain unchanged for a long time.
A good example for securing information about our spaceship-building
activities is the following policy covering access control: “Spaceship design
information shall be controlled in a manner that prevents unauthorized
access.” The policy doesn’t say how, or what technology to use, it just
describes what needs to happen.
You can think of a policy as part of an organization’s ‘constitution’ – written
words that define how an organization operates. If a policy cannot be traced
back to strategy elements, something went wrong – either the strategy is
incomplete, or the policy is just flat out wrong. The policy we just described
can be linked directly to our third strategy element, “Launch it to Mars
without anyone knowing what we’re really up to”. By keeping that
information from unauthorized eyes, the policy carries out the strategy.
Most organizations today have an incoherent mish-mash of information
security policies born out of reaction to incidents as they occur. There is
seldom any mapping back to an actual strategy. This is unfortunate, as
policies are one of the primary elements of governance. Not only does this
reflect a lack of strategy, it also is indicative of a lack of governance in
general.
At times, we may encounter the need to create a sub-policy to address a need
separate from the bulk of the organization. For example, one business unit is
engaging with an outside party that has some very unique and specific
requirements. Rather than adopt those unique policies across the enterprise, a
sub-policy is created for this one unit.
A good policy will exhibit several attributes, which are:
Constraints
Constraints are factors that work against efficiency, and typically include the
following ten:
Risk appetite = 5%
Risk capacity = 7%
Risk tolerance = (7% - 5%) = 2%
Now, risk tolerance is not correct – yet. It is actually expressed as a deviation
from the risk appetite, so the value is actually (2%/5%) = .4, or a 40%
deviation from risk appetite. Risk tolerance is a 40% deviation.
If risk appetite plus risk tolerance is ever more than risk capacity, then
something went wrong. The level of risk must always be equal to or lower
than the risk capacity.
A final term to note: risk acceptance occurs when an organization decides
that no action is required for a specific risk – it is willing to suffer the
consequences instead of expending resources to mitigate it.
Defining these risk values – appetite, capacity and tolerance - is crucial if we
hope to arrive at reasonable goals. It is also necessary if we expect to have
solid criteria by which risk acceptability will be measured.
Before continuing, we need to introduce another term called a control.
Basically, a control is something put into effect to reduce risk. For example,
let’s say the threat of fire is too great, meaning that the risk of fire exceeds
our risk tolerance. In this case, we can install some sprinkler systems to
reduce the likelihood of fire, bringing the risk of fire down below our risk
tolerance level. That sprinkler system is a control. While it reduces risk, it
also costs money to implement.
Figure 2 illustrates the relationships between risk, control and the cost of a
control. The only way to decrease costs due to a negative incident is to
increase the level of controls, which increases upfront control costs. If we
decrease the level of controls, we can save money now but the cost after an
incursion will go up. The sweet spot is where those two lines cross,
representing a happy compromise where our total costs – upfront control
costs plus costs after an incident - will be the lowest. But, without a clear idea
of what ‘acceptable risk’ is, it will be exceedingly difficult to know if a given
sweet spot is acceptable, or where it even lives.
Let’s go back to our sprinkler example to drive this point home. If the cost of
fire damage is expected to be $100K and we do not put a control in-place,
then our costs after an incident will be $100K. We save a lot of money by not
buying a sprinkler system up-front, but we pay for it in the end when a fire
breaks out. On the other hand, if we pay $100K for a sprinkler system we
may have prevented a fire, but we really didn’t do any good – we’re still out
$100K. The sweet spot is probably going to be when we pay $50K for a
cheaper sprinkler system. Maybe it doesn’t completely prevent a fire, but it
will definitely reduce the amount of damage. And, on the off chance we
never have a fire, we just saved ourselves $50K!
Risk is a very complex subject and is extremely difficult to nail down with
any real level of precision. We must keep several truths in mind:
1) If there is risk associated with taking some kind of action, there is
also risk associated with not taking that action.
2) Mitigating one risk will almost always increase another risk, or
perhaps even create another risk.
3) Risk always carries a cost, whether it is controlled or not.
An important factor to consider is something called business interruption
insurance, which is an insurance policy the organization purchases to cover
itself in the event that we exceed our RTO. We go into more detail later, but
RTO is our recovery time objective, or the maximum amount of time we have
to get our business back up and running after an incident before our business
goes belly up. If we are unable to be up and running by our RTO limit, we
will be in bad shape and business interruption insurance would kick in. Let’s
say we have a $1 million insurance policy with a $10K deductible, and the
policy costs us $50K each year. If we ever have an incident that exceeds our
RTO, the insurance company would pay us up to $1 million after taking out
the $10K deductible.
We could also justify spending up to $50K on controls to mitigate the risk
and not purchase the insurance, as long as we are willing to accept a $10K
residual risk. Residual risk is the amount of risk left over after we have
mitigated a risk. Mitigation does not mean we entirely eliminate risk – it just
means we decrease the level of risk so that it is at or less than our risk
appetite.
For a given risk, there are usually multiple options that will all mitigate the
risk to some extent. However, some will be costlier than others, and so we
must be careful to evaluate and choose the lowest cost option that will
mitigate the risk to an acceptable level. Arriving at the best decision will
usually be an iterative process as we run through various possibilities until
the best choice is identified.
The information security manager must understand that technical controls
such as firewalls or intrusion detection systems (IDS) are just one dimension
that should be considered. Physical, process and procedural controls may
actually be more effective and less costly than a technical control. For
example, we could use biometric scanners and keycard readers to protect an
asset in our local facility that experiences heavy foot traffic, but perhaps
simply moving the asset to an off-site location that almost no one visits
would achieve the same level of protection. In this case a physical control
achieves the same protection as a technical control, but at a much lower cost.
Chapter 5: Analysis of Risk
Risk analysis is the act of identifying the level for a risk, understanding its
nature, and determining potential consequences. During this time, we also
determine the effectiveness of existing controls and how well each mitigates
their assigned risk. The following five actions take place during this activity:
Semiquantitative Analysis
A semiquantitative analysis uses the same approach as a qualitative analysis,
but instead of using categories to represent levles of risk, a numerical value is
employed. This value is not representative of anything in the real world – it
simply represents a relative value among risks, with a higher number
representing more risk. If this approach is used, it must be noted that the
differences in numerical value may not represent relative severity between
each risk. For example, suppose we assigned a value of 4 to risk of fire, and a
value of 5 to theft. If the magnitude of the numbers are to be taken at face-
value, we might assume that the risk of theft is only slightly higher than the
risk of fire, but in reality theft might be three times as likely to happen as fire.
So just be careful how you use the results.
Typical minimum and maximum values for impact range from 1 representing
no impact to a value of 5 representing a failure or downsizing of the
organization. The values for likelihood range from 1 meaning rare to a value
of 5 representing frequent, or that the event happens on a regular basis. The
risk probability can be calculated using the following formula:
risk = impact x likelihood
For example, if a risk had a major impact of 3 and a likelihood of unlikely or
2, then the resulting risk would be 6. Figure 4 shows an example of a
semiquantitative matrix.
Quantitative Analysis
In a quantitative analysis numbers are assigned to both impact and
likelihood. Unlike a semiquantitative analysis where a relative value is
sufficient, the accuracy of these numbers in a quantitative analysis is very
important. Some type of formula is designed to calculate a resulting
consequence for each risk, usually expressed in terms of:
Monetary
Technical
Operational
Human impact
Value at Risk
A different approach that is required in some financial sectors is called value
at risk, or VAR, and has shown some promise for information security
management. For this approach to work, we have to a lot of historical data
that is very accurate. We won’t say much more about this approach.
Operationally Critical Threat Asset and Vulnerability Evaluation
(OCTAVE)
Another approach to risk assessment is called the operationally critical threat
asset and vulnerability evaluation, or OCTAVE. OCTAVE is great when we
need a well-established process to identify, prioritize and manage information
security risk, and contains three phases.
Phase 1 locates all assets and builds a threat profile for each.
Phase 2 locates all network paths and IT components required for
each asset, and then figures out how vulnerable those components
are.
Phase 3 assigns risk to each asset and decides what to do about it.
Other Risk Analysis Methods
Some of the more common alternatives to the options we have discussed are
the following seven.
Fire
Electrical failure
Heating
Ventilating
Air conditioning, or HVAC, failures
Information system and software issues
Telecommunication failures
Gas or water leakage
With proper planning, most of these threats can be managed adequately, with
the possible exceptions of advanced persistent threats or zero-day
vulnerabilities (we’ll discuss both of those in just a moment).
The third type of threat is man-made that results from man-made actions.
Examples are:
Internal Threats
Employees are one of the greatest sources of man-made threats. One way to
mitigate this threat is to apply need-to-know and least privilege access to
prevent access to assets, but this is not a perfect solution, as someone will
always have access. The typical malicious insider is a current or former
employee, contractor or business partner who has or had authorized access to
an organization’s network, system or data and intentionally caused harm to
the organization. The first step to mitigate internal threats is with the hiring
process itself by reviewing references and background checks. When hiring,
the employee should be required to sign a nondisclosure agreement (NDA)
and be advise of the organization’s ethics and policies.
Thereafter, employees should be periodically reminded of those policies.
Keeping employees content with their job position goes a long way to
mitigating internal risks. An employee who has recently been demoted or
bypassed for a promotion may pose an increased risk.
When employment has ended, the employee must return all organizational
assets to prevent unauthorized access in the future. Access credentials should
be disabled immediately prior to the employee’s departure.
External Threats
Anytime a network is present, or an organization has a physical presence of
any kind, external threats are real. Some examples are:
Criminal acts
Data corruption
Disease (epidemic)
Espionage
Facility flaws, such as burst water pipes
Fire
Flooding
Hardware flaws
Industrial accidents
Lost assets
Mechanical failures
Power surges
Utility failures
Sabotage
Seismic activity
Severe storms
Software errors
Supply chain interruption
Terrorism
Theft
A zero-day vulnerability is a weakness that is so new a fix is not yet
available. Many times, the only recourse is to disable the system or process
exhibiting the weakness until a fix is available. The ‘zero-day’ name comes
from the risk that an attacker will exploit the vulnerability immediately after
discovery before anyone is aware of its existence.
An advanced persistent threat (APT) is a skilled external attacker who is
willing to invest considerable time and resources into bypassing an
organization’s network and system security controls. APTs may be sponsored
by governments, organized crime or competitors. Typical APT attacks have
the following life cycle:
Intelligence agencies
Criminal groups
Terrorist groups
Activist groups
Armed forces
An emerging threat consists of mounting evidence that something ‘hinky’ is
going on in the organization’s network and systems. This may be unusual
system activity, repeated alarms, slow system or network performance, or
new activity (or excessive activity) in logs. Often, logs will contain advanced
warning of a coming threat, but is overlooked because no one paid attention
to it.
Since technology is almost always built with functionality in-mind and
rushed to market, it is a core source of vulnerabilities. In fact, it is not too
uncommon to discover that new software itself is a threat agent because the
authors had malicious intent. Bring your own device (BYOD) where
employees are allowed to use their personal devices on the corporate network
can be a cost-savings boon to companies, but it brings a substantial increase
of risk with it, so be careful with this tempting trend. On the flip side, a
security posture that focuses on rejection of new technology will completely
fail in short order, so a compromise is essential.
Vulnerabilities
A vulnerability, sometimes called a ‘weakness’ is not a yes or no proposition
– we can’t say an asset is vulnerable or not. Pretty much everything is
vulnerable to something, it is simply a matter of degree. NIST SP 800-30
provides a list of vulnerabilities to consider as well as predisposing
conditions – scenarios which may lead to the rapid or unpredictable
emergence of new vulnerabilities.
Estimating the degree of vulnerability can be carried out by testing or by
using estimates from subject matter experts. It is important to communicate to
management the uncertainty in estimates by using either ranges or
distributions – by doing so we can inform management on unlikely
maximums and likely values.
Be careful not to overplay weaknesses of a single control if it is part of a very
effective mitigation approach when combined with one or more other
controls. For example, a legacy system may have a very weak password
protection mechanism, but if the system is only accessible from a single
physical workstation locked away in a high-security room, it is probably not
worth worrying about. Automated scanning of IT systems can serve as a
leading indicator of vulnerabilities, but process and performance weaknesses
are tougher to uncover.
Vulnerabilities can be grouped into the following categories:
Network vulnerabilities
Physical access
Applications and web-facing services
Utilities
Supply chains
Processes
Equipment
Cloud computing
Internet of Things (IoT)
Some typical examples of vulnerabilities include:
Defective software
Improperly configured hardware/software
Inadequate compliance enforcement
Poor network design
Uncontrolled or defective processes
Inadequate governance or management
Insufficient staff
Lack of knowledge to support users or applications
Lack of security functionality
Lack of proper maintenance
Poor choice of passwords
Transmission of unprotected communications
Lack of redundancy
Poor management communications
Vulnerability management is part of the incident management capability, and
represents the proactive identification, monitoring and repair of any
weakness.
Risk, Likelihood and Impact
We have already defined risk as the likelihood that a threat agent will exploit
a vulnerability combined with the damage that could result. If we were to put
it into a formula, it would be:
risk = (likelihood of vulnerability exploitation) x (amount of damage)
But risk can be expressed as an equation:
risk = threats X vulnerabilities X consequences
If threats, vulnerabilities or consequences increase, then so does risk. We
almost always view risk as a negative thing. Believe it or not, there is such as
‘positive risk’ – we just normally call it an opportunity. The risk in this case
is the risk that we might not take advantage of it.
A risk is the likelihood that a threat agent will exploit a vulnerability
combined with the damage that could result. For example, if an Intrusion
Detection System, or IDS, is not implemented on your network, then the risk
of an attack going unnoticed goes up
Probability is the likelihood that a threat will exploit a vulnerability, which is
itself a measure of frequency – how often an event might occur. When
identifying risk, likelihood is used to calculate the level of risk based on the
number of events, combined with the impact that may occur in a given time
period, usually a year. The likelihood combined with the magnitude of the
impact is used to determine ALE (which we will discuss up in a few
chapters). The greater the frequency, the greater the likelihood, the and the
greater the risk.
For example, on the anniversary of its founding, nation states often
experience elevated levels of attacks from foreign countries. Anti-American
countries love to launch attacks on July 4th. So, the probability of a threat
exploiting a vulnerability goes up during this time period. But since ALE is
the annualized loss expectancy, we spread that increased likelihood over the
span of one year.
Determining likelihood requires us to consider the following factors:
a. If the risk has a low likelihood but high impact, transfer (or
share) the risk
b. If we can’t transfer the risk, then we must:
i. Avoid the risk by terminating the activity that is
causing the risk
ii. If we can’t avoid the risk and the benefits are very
high, accept the risk
iii. If we reach this point, we need to start over and
choose a valid option!
Control Methods
Controls can implement a procedural, technical or physical method.
A procedural control, sometimes called an administrative control or
managerial control, is anything that oversees or reports on a process and
includes the procedures and operations of that process. This includes policies,
procedures, balancing accounts, employee development and compliance
reporting.
A technical control, sometimes called a logical control, always contains
some type of technology whether it is hardware or software – usually a
combination of both. Examples include firewalls, intrusion detection systems,
passwords and antivirus software. A technical control requires one or more
administrative controls to operate correctly. Most security failures can be
attributed to failures of management, and we need to remember that
management problems do not have a technical solution. Therefore, we need
to be careful about being too reliant on technological controls.
A physical control can physically restrict access to a facility or hardware.
Such controls require maintenance and monitoring, and there should be a way
to react to an alert if the control provides one. Examples are locks, fences and
closed-circuit TV.
Countermeasures
When a control is deployed to counter a specific threat known to exist, it is
called a countermeasure. A countermeasure will be more effective at
countering the specific threat, but as a side-effect will be less efficient than
more general controls. As an example, a firewall is a general control that is
not implemented for a specific threat, while a countermeasure might be using
a router to segment specific systems into their own subnet for added security.
Countermeasures are not necessarily less cost-effective as they usually are
targeted to reduce the cost of any harmful event. Our radiation shield is very
targeted to a specific threat, and while it is very costly, the mission would
certainly not succeed without it.
A countermeasure may often be a new control, but often it is applied as an
enhancement to an existing control. For example, if a new version of an email
scam is uncovered, a spam filter may be enhanced to detect that specific
threat. Security programs must be nimble enough to roll out countermeasures
quickly, often with a special process that bypasses the normal procedures.
However, this exception path must ensure that all change management and
approval processes still take place, even if it is after the fact.
A countermeasure may be preventative, detective or corrective, or any
combination of the three, but are not recognized by ISO 27001 (which is
discussed later) as they address a specific threat. A countermeasure can be
expensive not only in terms of cost, but also because it may distract from core
security operations. Their use should be authorized only after careful
consideration and justification.
We must keep in mind that controls are not the only way to implement
security. In some cases, we can simply reengineer a process or modify an
architecture. Something else to be aware of – at times risk mitigation can
actually reduce business opportunities and will be counterproductive. Some
risks are worth living with when only financial considerations are being
looked at. Ultimately, the goal of information security is to assure that
business goals are achieved. Security for the sake of security is useless.
As a valid example of ignoring risk, suppose a business decides to expand
into manufacturing shoes, where we might encounter the risk of the glue not
holding the shoe together. We calculate this would result in a potential loss of
$15 per pair due to returned merchandise. But, if we make $20 per pair, it’s
well worth the risk. Just because some risks cannot be mitigated doesn’t
mean the business venture is not worthwhile.
Control Design Considerations
With the current regulatory environment, which is heavy on rules and light on
forgiveness, the best approach to identifying and selecting controls is a top-
down, risk-based approach. Top-down so that we don’t leave gaps, and risk-
based because control goals will be defined by the amount of acceptable risk
the organization has. This means that the overall objective for any control is
both its goal and the metrics used to measure how well it has achieved the
goal. Normally, reaching the goal of a control will actually involve using a
combination of different types of controls, such as physical, technical and
administrative. For example, a technical firewall will require some physical
protection and oversight by an administrative control.
The cost of the control is one of the most important considerations, but there
are others that factor in, such as:
Impacts on productivity
Inconvenience to users
Training costs
Operation costs
Maintenance and testing costs
User acceptance
Cultural and ethical acceptability
Legal and regulatory requirements
Adaptability to changing risk
Scalability
Ability to monitor
Ability to provide notifications
Robustness
Resilience
Reliability
Ease of testing
Self-testing capability
Acceptable failure mode (when it fails, what ode does it default
to?)
Tamper resistance
Control Strategies
An overall strategy to follow when selecting controls is to:
If it is preventative or detective
If it is manual or automated
If it has formal or ad-hoc
A formal control has documentation reflecting its procedures and how well it
has been maintained.
Control Recommendations
Beyond determining a control’s strength, the following checklist should be
used when selecting controls:
The effectiveness
Compatibility with other systems, processes and controls
Relevant regulation and legislation
Organizational policy and standards
Organizational structure and culture
Operational impact
Safety and reliability
Control recommendations are provided as an input to the risk treatment
process, which evaluates, prioritizes and implements the controls.
Physical and Environmental Controls
Physical security is of special concern as a violation in this area can render
other controls completely useless. For example, suppose we have a great
access control mechanism in place to prevent unauthorized individuals from
logging into an application and looking at sensitive payroll information. But,
if someone can simply walk up to the database server, plug in a USB drive
and copy the data off, what good is that access control? Physical security
forms the basis for all other security.
Some methods to prevent this scenario are the following:
Identification badges
Authentication devices such as smart cards
Security cameras
Security guards
Fences
Lighting
Locks
Sensors
Environmental controls are a specialized type of physical controls dealing
with facility capabilities that allow us to host computer equipment. These
include:
Air conditioning
Water drainage
Fire suppression
If an organization has facilities dispersed over a large geographical area, it
may be necessary for the security manager to delegate on-site responsibilities
to local employees.
Control Technology Categories
We have already discussed control categories such as deterrent, detective,
corrective, preventative and compensating. But now we are going to discuss
different control technology categories. Obviously, this will apply only to
controls falling under the technical method, as opposed to administrative and
physical methods. So be careful to not get confused between the various ways
in which we group controls.
Control technologies will fall in one of three technology categories – native,
supplemental or support.
Native control technologies are out-of-the-box capabilities, and we can start
using them immediately without any type of additional work beyond
configuration. For example, a web server usually comes with the ability to
enforce authentication, log access attempts and provide TLS encryption. All
of these controls are said to be native to the web server. In the spirit of
segregation of duties, most native controls are configured and operated by IT,
not by information security staff. Some devices that will always have some
level of native controls include:
Servers
Databases
Routers
Switches
While native controls come out-of-the-box, a supplemental control
technology is added on to an information system after the fact. As a result,
supplemental controls tend to be more specialized and are therefore often
operated by security specialists. However, it usually is of some benefit to
share oversight of these technologies between the information security and IT
groups. Some examples of supplemental controls are:
Recovery Operations
When an organization must fail over to an alternate site, the team that is
responsible for that move is also responsible for returning operation to the
original site when it is ready. As soon as that secondary move has ready, the
team notifies the business continuity leader, who then declares normalcy and
gives the OK to move operations back. There are some scenarios in which the
original site will never be made operational again within an acceptable
timeframe, and so the decision must be made to either make the alternate site
the permeant site, or to choose a third site to become the permanent site.
Choosing a third site is most often the case when the original site is no longer
viable, and the company is using a third-party’s facility for backup
operations.
During moves such as these, it is important that information assets continue
to be protected. If the security manager does not feel the assets can be secure
the entire time, he should execute a risk assessment and create a plan to
mitigate risk as much as possible. During the crisis, any lessons learned, and
gaps identified should be documented and recorded for future actions.
Recovery Strategies
Choosing the correct recovery strategy will be the one that address probable
events, and best achieves an acceptable recovery time at a reasonable cost.
The total cost of the recovery process is a combination of the following:
Mission
Strategies and goals
Senior management approval
The organization’s approach to incident response
Who the key-decision makers are
How communication will be carried out
Metrics for measuring incident response capability
A road map for maturing capabilities
How the program fits into the overall organizational structure
Supplies
The incident response plan must include provisions to ensure continued
delivery of supplies that are essential to continued operations. Easy to follow
hard copies of all procedures that can be easily followed by both employees
and contract personnel should be stored at the recovery site. A supply of
special forms, such as invoice or order forms, should also be secured at an
off-site location.
Communication Networks
The plan must contain details of the telecommunication networks required to
restore operations, and this should be given a high priority.
Telecommunications are not only susceptible to the same disasters as data
centers, but also to special events such as cut cables. The local provider is
normally not required to provide backup services, so redundant paths must be
planned. Uninterruptible power supplies, or UPSs, are useful for providing
backup power sources for these networks.
Some telecommunications to consider are:
While fault-tolerant systems are great at mitigating risk, they are also very
costly. If the RPO and RTO can be a little more flexible, we can save quite a
bit of money by implementing a high-availability storage solution. In this
configuration, we still have two systems, but only one is in active use and the
second is not necessarily kept up to date in real-time. Instead, when the
primary storage system fails, the application is restarted and uses the
secondary storage system. This results in some down time, but it can be only
a few seconds. It may also result in the loss of a small amount of data –
whatever data was collected since the last time the two systems synchronized.
Insurance
The incident response plan should include information about insurance
policies the company has taken out regarding general coverage, cyber
insurance or IT-related insurance. Insurance covering information systems
cover a variety of scenarios and should be customized to an organization’s
unique environment. Keep in mind that it is very rare to take out a policy
against failing to comply with a legal or regulatory requirement, or some
other violation of law. Specific coverages include the following ten.
Identifying gaps
Verifying assumptions
Testing timelines
Determining the effectiveness of strategies
Evaluating the performance of personnel
Determining the accuracy and currency of plan information
Testing should be carried out:
A skill represents the training, expertise and experience an individual has for
a given role and must be considered when populating a RACI matrix.
Consultants possessing the needed skills are often a very effective solution
for short-term projects.
Why do we even bother defining this? Because it is important to be able to
map a person’s ability to carry out a responsibility in a clear way. This will
allow us to identify training that needs to happen before the person is allowed
to take on a given responsibility. If a particular skill is difficult to acquire and
the need for that skill is temporary, then we have just stumbled upon a prime
candidate for relying on an external provider.
When we have identified specific responsibilities for a given position, the
required skills should be reflected in formal employment agreements, which
should then be heavily referenced when screening applicants.
Chapter 13: Due Diligence and Due Care
Due diligence and due care are two closely related concepts, but we need to
understand the difference between them. In short:
Due diligence is shown when we purposefully try and discover things that
can go wrong
Due care is shown when we act to ensure those things don’t go wrong
Just keep this in-mind: due diligence (discovery) always comes first, because
we can’t show due care (act) if we don’t know what to do.
The opposite of due diligence is ‘lazy’, ‘haphazard’ or ‘being careless’. By
not taking the time to discover if something can go wrong, when it should be
obvious to anyone with half a brain that there is some level of risk, we are
guilty of not exercising due diligence.
The opposite of due care is ‘being negligent’. In this case we know there is
risk, but we refuse to do anything about it.
Some people can easily get confused by the concept of ‘accepting’ risk. “Isn’t
that the same thing as being negligent, or not exercising due care?” they
might ask. The answer is ‘no’, and here is why – instead of ignoring a risk as
we do when not exercising due care, we have purposefully and intentionally
decided not to act and to accept the consequences if that risk is exploited.
Now, if that risk does wind up being exploited, it may turn out that we get
sued because we made a terrible decision not to mitigate that risk, but you
cannot claim that we did not exercise due care.
In summary – we carry out due diligence by discovering risks, and then we
exercise due care by either avoiding, accepting, transferring or mitigating
those risks.
Companies will often take out insurance to protect board members in case of
a breach, but those policies will almost always contain a clause that requires
senior management to have exercised due care, or the breach will not be
covered. Beyond that, federal regulations such as the Sarbanes-Oxley Act
(SOX) state that if a company is listed on a US stock exchange, it must
maintain an audit committee with an acceptable level of experience and
competence – often made up of the board’s own members. In this case, the
goal is to ensure that financial statements are kept up-to-date and are factual.
Security is enforced through both technical and procedural controls, and the
security manager must stay in close contact with this committee.
As security governance is being increasingly recognized as a necessary
burden for any company, a number of corporate rating organizations have
been formed. A grade is assigned to each company based on the impacts and
consequences of past security compromises. This in effect forces businesses
to carry out due care in order to avoid a low rating, which almost always is
associated with a loss in company value.
Chapter 14: Security Principles
When a security expert mentions CIA, they are not talking about some
shadowy government agency. CIA is an acronym for confidentiality, integrity
and availability.
Confidentiality prevents unauthorized disclosure of information. Loss of
confidentiality can result from both intentional and accidental events. The
resulting damage can result in fines, loss of reputation, loss of security, law
suits and other negative impacts. For example, if word gets out that SpaceX
has launched secret spaceships to Mars, we have lost confidentiality.
Integrity refers to the ability to protect information from improper
modification. If unauthorized or accidental changes are made to data or an IT
system, then we have lost integrity. If this is not corrected, and the data or
system remains in use, the impact could get even worse. Integrity could also
be the first step of an attack that then compromises confidentiality or
availability. As an example, if we send encrypted communication packets to
Martian colonists, but Facebook intercepts them and replaces the contents
with ‘fake news’, then we have lost integrity.
Availability is a measure of how accessible an IT system or process is to its
end users. If users are not able to get to data or applications when needed, it
will almost always result in loss of productivity as well. For example (yes,
again!), if we lose radio contact with our intrepid colonists because of a
power outage, then we no longer have availability of those systems.
In addition to those three, there are two others that are closely related –
authentication and nonrepudiation.
Authentication is the action of proving who we claim we are, usually by the
three classic methods:
The first principle – meeting stakeholder needs – illustrates the need for the
organization to balance achieving business goals while managing risk and
resources.
The second principle – covering the enterprise end-to-end – highlights that
governance from the top must include all parts of the business, including IT.
COBIT 5 does not focus only on IT, but looks at information and
technologies as assets right along with tangible assets such as warehouses or
inventory.
The third principle – applying a single, integrated framework – recognizes
that a successful framework must play nicely with other frameworks and
standards. For example, COBIT 5 aligns well with the ISO 27000 series.
The fourth principle – enabling a holistic approach – reveals the fact that an
effective and efficient governance of enterprise IT requires a holistic
approach, meaning it must consider multiple components interacting with
each other. To help with this, COBIT 5 defines seven enablers – ‘things’ that
help us reach our goals. They are:
The information systems phase describes the as-is and to-be for
data and applications, and conducts a gap analysis
The technology architecture phase describes the as-is and to-be
for technology, and conducts a gap analysis
The opportunities and solutions phase creates the strategy to go
from as-is all the way through to-be
The migration planning phase creates an implementation road
map, which includes costs, benefits and risks
The implementation governance phase makes sure that the
implementation matches the architecture
The architecture change management phase ensures the
architecture remains current and responds to needs as they arise,
which feeds back into the architecture vision phase
The central requirements management block makes sure that all
projects are based on business requirements, and that requirements
are validated against the architecture
Balanced Scorecard
The balanced scorecard is a management system that helps organizations to
create clear goals and translate them into action. It provides feedback around
both internal processes and external outcomes, thereby moving from an
academic exercise into something real and actionable.
This approach uses four perspectives:
OCTAVE
The Operationally Critical Threat Asset and Vulnerability Evaluation, or
OCTAVE, is another approach to risk assessment. OCTAVE is great when we
need a well-established process to identify, prioritize and manage information
security risk, and contains three phases:
Phase 1 locates all assets and builds a threat profile for each.
Phase 2 locates all network paths and IT components required for
each asset, and then figures out how vulnerable those components
are.
Phase 3 assigns risk to each asset and decides what to do about it.
ITIL
The Information Technology Infrastructure Library, or ITIL, is a set of
detailed practices for managing IT services with a special focus on aligning
those services with the needs of business.
Chapter 18: Culture
Every company has a unique culture, even if no one recognizes it, and it can
be defined as the beliefs and resulting behaviors that are expected and are
viewed as normal within the company. Cultures will emerge, either
accidentally or purposefully – but you can’t avoid having one. Creating a
security-aware culture is only possible if individuals perform their jobs in a
way that protects information assets. Everyone – from the top to the bottom -
should be able to quickly articulate how information security relates to their
role(s). For this to happen, the security manager must actively foster
communications, participate in committees and projects, and make sure that
end user needs are met. This requires ‘soft skills’ above and beyond those
required by security. In other words, an effective security manager must be
able to build relationships and foster collaborative attitudes with other
employees and departments. If done properly, the security department can
quickly answer questions such as “What’s in it for me?” and “Why should I
care?”.
How do you know if your organization has a successful security culture?
That’s easy – look for these four clues:
1) Other departments routinely include information security
representatives in their internal projects without you having to prod
them
2) Users know how to identify and report incidents
3) People know who the security manager is
4) People can tell you their role in protecting information security
Culture is comprised of seven things:
Organizational behavior
How people influence the organization’s structure so that work
can get done
Attitudes
Norms
How well teams work together
The existence or lack of turf wars
Geographic dispersion
The single most element that impacts culture is the experience and belief of
each person in an organization. Every organization has a culture whether it
has been purposefully defined or simply emerged as the reflection of
leadership. It is absolutely critical that an information security manager not
focus solely on the technical and administrative aspects, but also foster a
desire in the entire department for softer skills such as relationship
management.
There is a predictable pattern to the creation of culture, consisting of five
steps as shown in Figure 14:
Provide structure
Serve as a road map
Ensure strategic alignment
Support the business strategy
Implement security policies and strategies
Ensure traceability back to business requirements and goals
Provide a level of abstraction over technologies
Establish a common language for information security
Allow many contributors to work together
There are several architectural approaches that have been developed over the
years, and they can be grouped into three categories:
If you take a private cloud and allow a select few other companies to access
it, it becomes a community cloud. Private networks between multiple
companies are examples of this model.
If an application is hosted across the Internet and is publicly accessible, it is
in the public cloud. This represents the majority of SaaS applications.
The last model, a hybrid model, is achieved when a private cloud connects
across the public Internet into another application. This is the model normally
chosen when companies want to host their custom applications in the public
cloud but need to maintain a constant connection between employees and the
application.
Overtime, new classes of services have evolved using the ‘as a Service’
model. These are shown in Figure 19.
Authentication
Authorization
Single Sign-On (SSO)
Tokenization
Logging
Notification and alerts
Malware detection and prevention
Information as a Service, or IaaS – not to be confused with Infrastructure as a
Service – builds on big data and takes it one step further. Whereas big data
provides the processing power to sift through data and answer a question,
IaaS only requires you to ask the question – it takes care of the analysis itself.
Integration Platform as a Service, or IPaaS, comes into play when a hybrid
cloud model is used. Because systems in a hybrid model are accessed across
company boundaries and into the public cloud, connecting systems and
applications together while maintaining a cohesive IT approach can be
daunting. IPaaS by providing a virtual environment on which to host all of
these systems.
Computer forensics can be a tricky proposition unless you have the right
tools, which are often very expensive, and the experience needed to analyze
and store evidence that will hold up in court. Forensics as a Service, or
FRaaS, provides those tools and optionally the needed expertise.
Advantages of Cloud Computing
Some have compared the advent of cloud computing to the introduction of
the personal computer or even the Internet. However, there is one big
difference – personal computers and the Internet took decades to develop, but
cloud computing has popped up and made its way into everyday use over the
course of just a few years. Let’s discuss a few of the reasons why that is so.
First of all, by using cloud-based resources that can scale up or down at a
moment’s notice, we have a virtually unlimited resource pool to draw from
whenever we need to. Add to that the ability to pay for only what we use, and
the value proposition goes through the roof.
Secondly, companies operate on two types of expenditures – capital and
operational. Capital expenditures are not favored for a variety of reasons, but
that is how money spent on hardware and software is categorized. On the
other hand, if we take that same money and pay for cloud-hosted solutions,
then we can claim it is an operational expenditure since we are not actually
purchasing anything. Not only that, but we can ‘dip our toes in the water’ and
try out new capabilities without having to spend huge amounts of money.
Add to that the ability to quickly implement new solutions, and we have the
makings of a major win-win.
Next, because we can scale up at any time, our applications become that
much more performant, responsive and scalable basically for free. All of
those adjectives – performant, responsive, scalable and most of all, free - are
things IT managers love to hear.
Another advantage is the ease with which we can upgrade software versions
and apply patches. Without going into a lot of explanation, virtualization and
virtual images are behind that.
And finally, cloud services such as Amazon’s AWS or Microsoft’s Azure are
famously redundant with fail-over data centers located around the globe. This
takes resiliency to a whole new level.
Unfortunately, all of this high-praise does come at a cost in terms of
increased risk. Due to the inherent nature of intentionally hiding the
complexity of hosting cloud services, we also have to deal with a lack of
transparency on the CSP’s side. If we were to host data in our own data
center, the data owner would have full access to and knowledge about that
data. When we store this data in the cloud, we rarely have any type of
knowledge of where the data is stored and in what manner. As a result,
certain types of data and processes should not be stored in the cloud
regardless of the economics due to increased security risks.
Another factor to consider when dealing with global cloud providers is that
our data may now cross jurisdictional boundaries without us even knowing it.
That could get us in real trouble if regulatory offices hear about it and decide
to enforce some rather stiff penalties.
One last negative note about security and CSPs. The availability of audit logs
will almost certainly be a challenge to overcome, and the actual level of
secure controls being implemented will more than likely be completely
invisible to the customer.
If you take all of the above advantages and disadvantages together along with
both the cloud and deployment models, we can come up with a two-
dimensional matrix to help us map and describe the risk/benefit discussion.
This is shown in Figure 20.
To help with the selection of a CSP, there are a number of frameworks
available for us to use that are built specifically for cloud providers, such as
the CSA Cloud Control Matrix and the Jericho Forum Self-Assessment
Scheme.
Chapter 23: Metrics Development
When it comes down to it, we can ask three simple questions to help us
design meaningful metrics:
The most important thing to note here is how security goals align with
business goals. The business strategy not only leads to business goals but
provides an input into the risk management and information security strategy
block as well. Note also how both the current and desired state of security
feeds into that block as well. While not clearly shown here, the
organization’s appetite for risk acts as a constant constraint over the entire
process. Be sure to note all ‘Strategy Inputs’ which are:
ISO 9001
Six Sigma
NIST publications
Information Security Forum (ISF) publications
US Federal Information Security Modernization Act (FISMA)
It may be useful to use a combination of different approaches as a way to
cross-check goals and make sure that all elements have been considered.
Policies, Standards and Guidelines
We have already discussed procedures, standards and guidelines in Section 1,
but there are a couple of points we need to point out that will help us be
successful.
First, a standard dictate how we measure procedures, processes or systems to
see if they meet requirements. We can use three types of measurements:
Using Controls
When developing an information security strategy, controls are the primary
components we deal with. If you recall, a control mitigates a risk, and can be
technical, physical or procedural. COBIT focuses on IT controls, which
represents most controls required in organizations. But information security
managers must be aware that controls must be developed for non-IT
processes as well. This includes physical information (such as hardcopies) in
terms of marking, handling and storage. Environmental issues such as
physical security are important so that systems are not simply stolen as
opposed to being compromised.
Using Technologies
Technologies are the cornerstone of an effective security strategy. However,
there is no technology that can compensate for management, cultural or
operational problems, and the information security manager should never rely
on technology to overcome those deficiencies. An effective defense requires
a combination of policies, standards and procedures to be properly melded
with technology.
People Are Expensive
The majority of security incidents are not technological in nature - they are
the result of people. The most costly and damaging compromises are usually
caused by insider activities, whether intentional or accidental. That is why the
first defense in this area is to try and ensure the trustworthiness and integrity
of new and existing employees. Limited background checks can provide
some insight into a person’s negative characteristics, but laws (particularly in
Europe) put a limit on how deep these checks can go. The extent of
background checks should be proportional to the criticality and sensitivity of
the roles an individual will be expected to perform. Policies and standards
should be developed to ensure background checks are properly carried out.
Attention must be paid to theft not only to reduce loss, but because small
occurrences may be an indicator of something much larger going on.
Monitoring of email can be a great tool for detecting malicious or dangerous
behavior, but the information security manager must be sure to remain in
compliance with laws by providing sufficient notice of these activities to
employees and ensuring the notice has been acknowledged.
The Org Chart
When developing a security strategy in organizations with an inflexible
structure, you can expect to encounter resistance as various factions perceive
the changes to be a threat to their authority or autonomy. If senior
management can foster a more flexible attitude to organizational changes,
security management becomes much easier.
We have already mentioned previously that there is an inherent conflict
between IT and security in terms of priority. In other words, the goals of
availability are sometimes at odds with the goals of security. This is an
organizational issue, so we bring it up here as a reminder.
When an organization is spread across multiple geographical locations, we
can choose two different approaches – centralized or decentralized. A
centralized approach will require all locations to fall under a single
organization-wide security umbrella, while a decentralized approach allows
each location to manage their own security as each see fit. There are pros and
cons for each.
A centralized approach is the preferred method, because it provides the best
alignment across all business units and ensures the same quality of training
and responsibilities.
A decentralized approach works well for multinational companies with
locations in different countries or legal jurisdictions. Because the various
local laws will be different, allowing each location to manage its own
security overcomes this. For example, some countries may not allow business
data to be stored or processed outside of their national boundaries.
Additionally, some countries will collect taxes for software or hardware used
within their jurisdiction, regardless of where it physically exists.
A decentralized method also works well for companies who have grown by
acquisition of other entities over time, with each acquisition still operating
fairly independently. For this scenario, it is not unusual for each entity to
have its own IT group and hardware and software infrastructure. Separate
policies and procedures may also be in-place for each entity. However, there
may be an advantage to creating a single set of enterprise-wide security
policies, but let each entity implement its own standards and procedures as it
sees fit.
A final advantage with a decentralized approach is that security
administrators are usually closer to the users and understand local issues
better. They can often react quicker to access change requests or security
incidents.
The Human Factor
Training, education and awareness is vital to a security strategy because it
addresses one of the most fundamental weaknesses – the human factor. A
recurring security awareness program reinforces the importance of
information security to employees and is required by law in some
jurisdictions. In most organizations, most personnel are not aware of security
policies and standards unless a robust awareness program is put into place.
Broadening and deepening the skills of security personnel through training
can greatly improve security effectiveness. The hard part is figuring out what
skills need to be taught. Finding good security people is difficult and is
getting harder. Some companies attempt to compensate by hiring
overqualified people, but this only results in a high turnover rate or
substandard performance due to boredom. Instead, training existing
employees is a much more cost-effective approach. However, that training
must be targeted to the organization’s unique way of doing business.
Audits
An audit, which may be internal or external, is used to determine information
security deficiencies in terms of controls and compliancy and is one of the
essential resources in development of a strategy. The focus is usually on
people, processes and technology.
Internal audits in larger companies are usually carried out by an internal
auditing committee, reporting to either an executive or the board. In smaller
organizations the information security manager or an information security
officer may perform the audit.
External audits are usually conducted by the finance department, and often
the results do not make it back to information security. That is why it is
important for the information security manager to maintain a good working
relationship with finance.
Because of increasing regulation, many companies are required to
periodically file various audit reports to regulatory agencies. These reports
are sometimes a goldmine when it comes to informing us on the performance
of information security, and so making the results available to the
information security manager should be part of security strategy
considerations.
Compliance Enforcement
It is important to develop procedures for handling security violations as part
of the security strategy. The biggest problem with enforcement is lack of buy-
in from management, so that must be a priority for the information security
manager. If management buy-in is achieved, and the organization values
openness and trust, the simplest approach to compliance is that of self-
reporting. For this to happen, everyone must understand that security is in
their own best interest.
Prioritization of compliance issues must be executed, as some issues must
experience 100% compliance while others may not be as important. For
example, keeping unauthorized people out of the control room at a nuclear
reactor facility is probably much more important than making sure office
computers are always locked before you walk away.
Threat and Vulnerability Assessments
For the next few paragraphs, keep in mind that threats are constant and
always with us, while vulnerabilities come and go as policies and technology
change. For example, on the California coast the threat from earthquakes is a
given, but if we move offices to a building that has been constructed to be
particularly resistant to earthquake damage, the vulnerability could be
mitigated enough that we no longer have to worry about it.
Threat assessments are routinely implemented as part of an overall risk
assessments. However, those threat assessments have real value by
themselves as part of strategy development because we need to understand
the various options and related costs to make good decisions. The best cost-
effective choice will be made when we analyze threat and vulnerabilities
separately.
Additionally, strategy should consider viable threats even if we are not aware
of a specific vulnerability, whereas risk assessments will discard those threats
because testing does not reveal a current vulnerability. For example,
espionage by a competitor is always a threat. But, if we do not have
competitors known to be overly unethical, a risk assessment will decide
espionage is so unlikely that we do not need to address it. However, our
strategy should probably take that into account in case we have a low-cost
opportunity to mitigate it. The bottom line is that policy development should
map to a threat profile, instead of specific vulnerabilities.
When hearing the term ‘vulnerability assessment’, people often think of an
automated scan against existing IT infrastructure. However, for strategy
development that approach is not even close to being thorough enough.
Instead we must also test elements such as procedures, practices,
technologies, facilities, service level agreements, and legal and contractual
requirements. Processes and facilities are the most vulnerable components
but are usually the ones seldom looked at due to the difficulty in performing
assessments. The development of a security strategy is a great reason to
perform these vulnerability assessments.
Risk Assessment and Management
Both threat and vulnerability assessments are extremely useful in developing
a security strategy, but an overall risk assessment is really needed if we are to
do a comprehensive job. A formal assessment of risk starts with listing the
viable threats facing us, including environmental and physical threats, along
with technological. Examples of physical and environmental threats might be
flood, fire, earthquake or a health pandemic. Examples of technological
threats might be malicious software, system failures or attacks (internal and
external).
The second step is the risk identification phase, where we estimate the
likelihood each threat will occur and how big of an impact each might make.
The third step is to determine the extent of organizational weaknesses and
exposure to threats. Here we take three things – threat frequency, threat
magnitude and organization vulnerability – and determine the level of that
risk. Then we can calculate the ALE, or annualized loss expectancy.
To arrive at the frequency and magnitude for a given threat, we can use both
our own organization’s experience as well as the experiences of like
organizations. Special attention must be paid to frequency, even if magnitude
is not that large, because small numbers can add up quickly.
Insurance
Insurance is a viable resource to consider during strategy development for
risks such as rare, high-impact events. Examples are floods, hurricanes, fire,
embezzlement and lawsuits. There are three types of insurance:
Legal
Compliance
Audit
Procurement
Insurance
Disaster recovery
Physical security
Training
Project office
Human resources
These departments are usually not very well integrated in terms of assurance
functions, and any strategy must include preventing gaps or overlaps between
them.
Chapter 30: Information Security Governance –
Constraints That Hurt
Governance of Third-Party Relationships
Third-parties may include the following entities:
Service providers
Outsourced operations
Trading partners
Merged or acquired organizations
Some of the challenges include the following four:
Let’s discuss the differences between IT security and information security for
a second. IT security is all about how to keep information secure using
technology. Information security is concerned not only with that, but also
with information that might be overhead in an elevator conversation, or
perhaps that is faxed to the wrong number. IT security is a subset of
information security, but governance of each is completely separate – this
will become clearer as we go.
Figure 25 illustrates the relationships between IT, information security,
controls, architecture and other components of a governance framework.
Let’s walk through how governance elements interact with each other, and
what dependencies exists.
First, senior management must set the goals for both IT and information
security separately, meaning that they are governed independently. We’re
going to discuss why in a few minutes, but just know that those are two very
different roles with competing priorities. IT goals almost always center
around performance – how much up-time systems have, how fast they work,
how responsive IT staff are to trouble tickets, etc. So, senior management
defines high-level performance-based goals and gives them to the IT
manager.
Meanwhile, senior management also decides how much risk they are willing
to tolerate with the organization’s information, and how to mitigate (reduce)
that risk if it is too much. Those goals are given to the information security
manager. So now we have two tracks operating in parallel – IT and
information security. Both tracks now follow the exact same eight steps –
outcomes, requirements, objectives, strategy, road map, policies, standards
and procedures. Each track at this point is a mirror of the other. Let’s follow
those eight steps.
First, lower management defines outcomes that will meet senior
management’s direction. Second, then come up with requirements that if met,
will result in the outcomes they desire. Third, goals, or objectives, are defined
based on those requirements, and fourth, a strategy is developed to meet
those goals. The fifth step includes creating a road map illustrating when and
how specific goals will be met. A road map is simply a timeline of when
goals will be delivered. The remaining three steps are where we develop
policies, standards and procedures that will allow them to successfully
execute the road map. All this feeds into an operational architecture across
the entire organization.
We should note that information security strategy, road map, policies and
standards all flow into their IT counterpart steps. For example, the
information security road map is used as an input into the IT road map, and
information security policies are used as an input for IT policies. As a result,
the information security strategy will have a direct impact on IT strategy,
because IT systems fall under the information security umbrella, even though
they must act independently to some extent.
It’s also important to note that an output of the information security road
map, policies and standards steps feed into defining what controls will be
used. The controls feed into the physical architecture, which also feeds into
the operational architecture right along with procedures.
If you may recall, we previously listed the six outcomes for security
governance. As a refresher, they were:
Strategic alignment
Effective risk management
Value delivery
Resource optimization
Performance measurement
Assurance process integration (convergence)
Probabilities of penetration
A list of exposures that must be mitigated
Value at Risk (VAR)
Return on Security Investment (ROSI)
Annual Loss Expectancy (ALE)
The last three – VAR, ROSI and ALE – are the most useful as they can be
employed as justification for expending resources and carrying out certain
activities.
It has become apparent over the past decade that the lack of useful metrics in
information security has really held back effective management. Four major
efforts have been carried out to provide guidance in this are:
So, how exactly do we capture usable security metrics? It turns out that there
four steps – each building on the one before – that we can climb and wind up
with great metrics. Figure 26 shows the four components in a stacked model.
Starting at the bottom, we have Strong Upper-Level Management Support.
Without this, the rest of the organization will not see security as valuable and
will therefore not buy into it. Additionally, funding and other resources will
be extremely difficult to obtain if the drive for better security does not come
directly from upper management.
Once we have senior management support, we can move to the second block,
Practical Security Policies and Procedures. This stresses the need for
realistic policies and procedures along with the authority needed to enforce
them. Those policies and procedures must be reachable and provide useful
security by using the correct controls. Without procedures, there is little hope
of collecting useful metrics.
Once policies and procedures are in-place, we can execute the third block,
Quantifiable Performance Metrics. This represents IT security performance
goals, which should be easy to capture. Repeatability over time is a key
attribute of these metrics.
The final block, Results-Oriented Metrics Analysis, means that we must
consistently perform a periodic analysis of the metrics data collected in the
third block. Accurate data must be a priority with all stakeholders for this to
succeed.
In summary, if we have strong support from upper management, we will be
able to implement the right policies and procedures., which will give us the
right quantifiable metrics. All we have to do then is to analyze the results, but
we have to make sure to perform this analysis on a recurring basis for it to be
of value.
It is very important that metrics are put in-place during the implementation of
a governance program, not afterwards. KGIs and KPIs are metrics we use to
decide if our milestones or goals are being met. Because the implementation
of various aspects of governance will usually be carried out in projects, we
can use standard project measurements to gather our governance metrics,
such as slipping milestones or goals, budget performance and achieving the
agreed upon timeline.
Measuring How Well We align with Strategic Goals
We have already stressed how important it is that security goals align with
business goals. As a result, it would be very difficult to measure success if we
don’t keep those business goals in mind at all times. And if we are going to
be cost-conscious, which all organizations should be, we cannot accurately
keep tabs on our security cost performance without measuring it against our
business goal cost performance. In other words, we shouldn’t be spending
more money on security than the goals they protect are worth.
The best way we can ensure that security and business goals are aligned is to
make sure our security goals are defined in business terms. For example, we
could have a security goal that states, “We must provide a three-layer
defense-in-depth solution on all database servers.” That leaves a lot of
questions, such as “Why would we do that? Does it really matter? Can I
justify the cost?”. Instead, couch the goal in business terms of “We must
provide reasonable protection against competitors obtaining our core list of
customers.” Now the conversation becomes “Oh, let’s put in a three-layer
defense-in-depth protocol in order to meet that goal.”
Not only does such an approach make it so much easier to understand, but it
also allows us to ensure that what we build can be tracked back to a real need.
Let’s say that we purchase a series of firewalls as a technical control to meet
our requirement above. It goes something like:
An objective
A scope
A list of constraints
An approach
A result
Let’s walk through those components and describe each.
The review objective is what the security manager hopes to get out of the
review. For example, a useful objective might be to determine if an Internet-
facing application can really be exploited using a known vulnerability.
Scope ties the objective to the systems or processes being looked at. In the
example above, scope would tell us which infrastructure, people and
processes are fair game. If we find it hard to define scope, then perhaps we
need to revisit the objective.
A constraint is a boundary restricting what the reviewer can do or have
access to. In our example, perhaps the reviewer is only able to access the
system at night to prevent downtime during business hours. Or perhaps, the
reviewer is not allowed to have internal knowledge of the network. In either
case, the constraint might render the review meaningless, so they are
important to call out.
There might very well be multiple ways in which we can achieve the
objective. In our example, we might choose to assume an attacker is unable to
login, which means they will have to find alternative ways to steal data – the
lack of credentials would be listed as a constraint. Or, we can provide
credentials to a penetration testing team, so they can focus on other areas
once logged in – in this case scope would include the credentials. Each option
is considered a different approach, with a specific set of activities to be
carried out. Regardless of the selected approach, it must achieve the objective
while remaining within scope and obeying the identified constraints.
Finally, the result lets us know if the review objective was reached. Or,
another way of putting it is to simply answer the question ‘Is it secure?’ If we
can’t answer that question with a high degree of confidence, then we have no
choice but to declare the review incomplete. Suppose the tester could not
login using the provided credentials – in this case we would not have been
able to test functionality that is only accessible after logging in.
Just How Secure Is it?
Just like a security review, an audit has the same five components –
objective, scope, approach, constraints and a result. However, with an audit
the result is expressed as a level of ‘effectiveness’ that measures how well a
given control meets the stated objectives. For example, whereas a security
review might result in a pass/fail score, an audit result might be categorized
as low effectiveness, medium effectiveness or high effectiveness. Or, it might
even give it a numerical score.
An audit will result in documentation called ‘work papers’, that does three
things:
COBIT
The Standard of Good practice for information Security
ISO 27001 and 27002, which are specific to IT security
For example, COBIT has a very wide scope, while the ISO 27000 series is
specific to IT security only.
While some security managers view auditors as a necessary evil, they can in
fact be a great ally. Aside from the fact that an auditor can provide an
objective assessment of security, audit results can often be used to emphasize
much-needed actions to senior management. However, this will never be
effective unless the security manager ensures that the necessary time and
resources are dedicated to audit activities.
Technology Needs Some Special Love
Security programs will usually leverage multiple technologies, with newer
organizations using more modern solutions. The technologies that older
organizations employ will usually be constrained by their legacy
architectures, but there should still be multiple sets of alternatives available.
The age of a system should never be a reason to not implement a security
program – it just changes what that program looks like. For example, it may
not be worthwhile to implement strong passwords on a 40-year old system,
since we will probably have a tough time finding someone who knows how
to program it. Instead, we should restrict access to that system using physical
controls. But not protecting that system is simply not OK.
Though information security is comprised of technical, operational and
managerial domains, the technical aspect will most often be the majority of
the work. In fact, the information security manager and security personnel are
usually considered to be the subject matter experts in the entire organization
when it comes to technical security. But, there is a wide range of opinions in
the wild regarding the scope of the information security department as a
whole. For example, on one end of the spectrum we find organizations that
view the information security program as simply setting high-level policies.
At the other end, an organization may expect the information security
program to take complete ownership of specific pieces of the infrastructure.
As a result, the technology skills that a security manager is expected to
possess will differ based on how the organization views the information
security program’s responsibilities.
Regardless of the expected technology skills, the security manager must
understand security architecture, control implementation principles and the
security processes and mechanisms that are most commonly implemented.
Additionally, a successful security manager needs to be able to address the
following four security areas:
Normal monitoring
Audit reports
Security reviews
Vulnerability scans
Due diligence work
Because of the tight relationship between policies and standards, compliance
is concerned that processes and procedures fully align with both unless an
exception has been made. While an audit simply provides a snapshot of
compliance in time, compliance enforcement is a never-ending activity, and
is normally shared across the entire organization.
Because the information security program is concerned with compliance
enforcement across the organization, it should be audited itself to determine
compliance with applicable standards and regulations. The results of this
audit should be expressed in terms of risk, mitigating factors and acceptable
control objectives.
Assessment of Risk and Impact
Vulnerability Assessment
All information systems should be continuously monitored using automated
means to detect vulnerabilities. Part of this activity should be to look for
unexpected changes to technical systems. For example, a change to the
registry of a Windows server outside of a maintenance window might
indicate that the server has been compromised. Furthermore, any changes to
systems must be scheduled through a change management system to ensure
unauthorized changes do not take place. Ad-hoc changes by a well-meaning
technician have been the source of many vulnerabilities that have magically
‘appeared’.
Threat Assessment
The best approach to detect and mitigate vulnerabilities is to use a
continuous-assessment model. Unfortunately, this approach can be quite
costly and beyond the means of most smaller organizations. In such cases, it
is important that a periodic reassessment of attacker capabilities and exposed
vulnerabilities be executed. Carried out at least once per year, the information
security manager must evaluate all technical and organizational changes,
particularly where an external party is involved. The ability of existing
controls is evaluated against this comprehensive list of vulnerabilities. Threat
sources can include the following five examples:
Technical
Human
Facility-based
Natural and environmental
Pandemic events
For each threat evaluated, the following four aspects should be considered:
If it is real
How likely it is to happen
How large the impact might be
Which systems, operations, personnel and facilities will be
affected
Risk Assessment and Business Impact Analysis
When discussing risk, a BIA does four things:
Personnel performance
Time tracking
Purchasing
Inventory management
Project monitoring and tracking
Budgeting control
Business case development
Project management (this is a not security program management!)
Some technical and operational administrative duties are the following, also
not a comprehensive list:
In our example, Business Unit B is rated as the most important – this rating
usually correlates to revenue generated by the unit, but it could be based on
other attributes instead. This rating should be done by senior management.
The second step is to identify the critical functions across the organization
and note each under the appropriate business unit, as shown in Figure 29. Of
course, when we say, ‘critical function’ we’re referring to whatever tasks are
absolutely required for that business unit to function. Each critical function is
assigned a priority within each business unit. For example, Business Unit A
has two critical functions, and we assign one function a priority of ‘1’ and the
other ‘2’.
Likewise, Business Unit B has two critical functions, and the most important
one is assigned a ranking value of ‘1’, and the other ‘2’. We are not
concerned how critical functions are ranked across all business units – just
within the business unit that requires the function. When the second step has
been completed, it will look very similar to the structure used in a BIA.
Next, we need the required assets and resources for each critical function. We
also must rank all assets and resources within each business unit as shown in
Figure 30.
Assets and resources can contain vulnerabilities, and therefore they represent
a source of risk as shown in Figure 31.
At this point, we can map specific risks all the way up to business operations.
This allows us to easily see where risk originates, particularly when we view
the entire organization map as shown in Figure 32. Using this approach, it is
much easier to prioritize risk.
Risk Assessment
Figure 33 illustrates a standard approach to risk assessment.
COBIT
OCTAVE
NIST 800-39
HB 158-2010
ISO/IEC 31000
ITIL
CRAMM
FAIR
VAR
Identification of Risk
Risk identification is the act of determining the type and nature of viable
threats, and which vulnerabilities might be exploited by each threat – a
vulnerability that can be exploited by a viable threat is a risk. Exposure is the
potential loss when a vulnerability is exploited by a threat.
A viable threat has two factors:
Team-based brainstorming
Flowcharting and modeling
What-if scenarios
Mapping threats to both identified and suspected vulnerabilities
Risk scenarios are created by describing a potential risk event and then
writing down the assets that might be affected. Some examples of risk events
are:
System failure
Loss of key personnel
Theft
Network outages
Power failures
Natural disasters
Each risk scenario should be related to a business goal or impact. Only real
and relevant scenarios should be considered. For example, while it is
technically possible for Canada to invade the U.S., it is highly unlikely.
However, it could be a very real threat that the Canadian government could
pass a law that restricts import of our product – that’s a risk that definitely
should be “what-if’d”. Figure 35 represents inputs that should be considered
when creating scenarios.
Plan-Do-Check-Act
Information security is a great candidate for using something called total
quality management, or TQM. TQM is based on the plan-do-check-act
(PDCA) process as shown in Figure 36.
The components of TQM as carried out with information security are shown
in Figure 37.
Criticality of systems
Sensitivity of information
Significance of applications
Cost of replacement hardware
Availability of backup equipment
Control of physical security may reside with the information security group
or not, but regardless it is the responsibility of the information security
manager to ensure security policies, standards and activities sufficiently
protect those assets. Physical control of access to computing resources should
be determined by the sensitivity of the information being accessed and should
always be on an as-needed basis.
The physical location within a facility is important as well. For example,
putting servers in a room prone to flooding is not such a great idea. The
ability to control temperature, humidity and electrical power needs to be
looked at as well. Personal computers with special access should not be
placed in heavily-trafficked areas. Physically locking a device down or
disabling methods for copying data off (such as USB ports and removable
media drives) should be considered. Laptops and other mobile devices are
particularly problematic as they are designed to be taken out of a secure
facility. Encryption of the entire storage disk in such devices is one option to
mitigate the risk of a device being stolen.
Physical media such as optical disks, magnetic disks, USB drives and even
printed hardcopies are as great a risk as online compromises, so they should
be stored in a secure location. The transport and storage of backup media
must be encrypted, particularly if stored at an off-site location. A clean desk
policy in which no cluttered desks are allowed should be enforced in less
secure office spaces. This prevents sticky fingers or wandering eyes from
accessing sensitive information.
Locations that reside in a geographical area prone to earthquakes, flooding,
hurricanes or other natural disasters should be avoided when selecting sites
for facilities. Even if an area is safe geographically but located next to special
risk infrastructure, such as nuclear power plants, airports or chemical
production facilities, then additional consideration must be applied before
selecting it as a site for a facility. Finally, primary and backup facilities
should be located far enough from each other that a single disaster event does
not take out both locations.
Cultural and Regional Variances
It is the job of the information security manager to be aware of local culture
and customs, and how certain actions that may be appropriate in one area
may be deemed offensive or unacceptable to that locale. Any risk from such
an incident must be considered and mitigated if it falls above the acceptable
risk and risk tolerance levels for an organization. Different countries have
varying laws regarding the sharing of personal information, and the
information security manager needs to be aware of those complications. If the
information security manager has any doubts about possible risks, he should
work with the legal and HR departments to identify problems and to come up
with solutions.
Logistics
Because of the need to interact with other business units and people, the
information security manager must consider logistical issues such as
coordinating meetings, development of schedules for recurring procedures,
and managing workload across resources. Fortunately, there are a lot of
online systems to help with this task. However, undergoing logistics training
will go a long way to help the security manager deal with these types of
duties efficiently.
Chapter 40: Information Risk Management – The
Action Plan
Often an organization will have such a level of expertise or experience with a
specific technology that it will reference that technology at the policy level.
For example, transport layer security, or TLS, is so ubiquitous in today’s
world that it is often named in security policies, even though it is only one
way to encrypt data and provide confidentiality.
Another reality that exists is that many organizations have multiple, unrelated
architectures such as a database architecture, server architecture, identity
management, etc. Apart from each other they function well, but if you were
to try and combine them into a single enterprise architecture you would find
the result less than usable. As an analogy, consider different people creating
parts of a car without working with each other – wheels, the engine, seats and
the transmission – all created without each person comparing their blueprint
with others. When it comes time to assemble the vehicle, nothing is really
going to fit together and work. This is why we have architectural frameworks
– to ensure each group carries out their respective tasks underneath a
watchful umbrella of architectural goodness. Examples of these are COBIT,
ITIL and ISO 27001.
Information Security Framework
An information security management framework describes information
security management components and their interactions at a high-level.
‘Components’ would be things like roles, policies, standard operating
procedures (SOPs), security architectures, etc. However, a framework also
facilitates deliverables that are more short-term, such as possible risk
mitigation options, facilitation of conversations with subject matter experts
(SMEs), or ensuring policies are followed. Some other goals a framework
helps with are ensuring that:
Components
The various components of a security management framework can be broken
down into five areas:
Technical
Operational
Management
Administrative
Educational and Informational
Let’s dive into each area one at a time.
Technical Components
For our purposes, ‘technical’ refers to IT systems, which have an owner and a
custodian. The owner is responsible for costs and behavior of the system,
while the custodian is responsible for the day-to-day management of the
system. IT is always the custodian of an IT system, but often the business
unit that requires a system is the owner. Regardless of who it may be, it is
crucial that all systems have an identified owner. Otherwise, there is no one
accountable for ensuring that a system remains compliant with security
policies and that risk is properly addressed. Given that the vast majority of
information resides in systems maintained by IT, that department is a major
focus of an information security framework.
Operational Components
Operational components of a security program are the management and
administrative activities conducted either daily or weekly such as
maintenance of security technologies, security practices and keeping
procedures updated. The information security manager manages these areas,
but since the actual execution usually requires a different department (such as
applying security patches) he will need to work with and provide oversight of
those departments.
Some examples of operational components are:
Credential administration
Security event monitoring
System patching procedures
Change control procedures
Collection of security metrics and reporting
Maintenance of control technologies
Security incident response, investigation and resolution
Retirement and sanitization of hardware
For each operational component, the information security manager will need
to identify the owner and ensure documentation is kept up to date.
Additionally, the security manager must ensure that procedures for
appropriate security-related areas are created and maintained, and that roles
and responsibilities documentation is kept current.
Management Components
While operational components are addressed on a daily or weekly basis,
management components are visited periodically every few months, quarters
or even years. Examples are the development of standards, reviewing
policies, and executing oversight of initiatives or programs.
Management goals shape the security program, which in turn defines what
must be managed. Often, early versions of a security program are too lenient
or strict and the management components must allow for timely modification.
When developing the management components, it is important that proper
oversight from senior management takes place.
Administrative Components
We have discussed to a great extent how the information security
management role needs to provide oversight for other departments, but we
need to keep in mind that information security is itself a department, and so
we can’t ignore all of the normal functions that come along with a group of
people trying to accomplish a mission. This means we need to manage
resources, personnel and the financial aspect of running a business unit.
Rarely does an information security program have a sufficient number of
resources, and so security efforts must be prioritized.
It is not uncommon for the information security manager to experience
pressure to take shortcuts, and if this cannot be handled between the two
departments, the manager needs to escalate it to senior management so that a
decision can be made. Executive management must understand the risks of
moving an initiative ahead without a full security diligence, but they may
ultimately decide to do so. If this happens, the information security manager
should take the first available opportunity to certify the compromised system
or initiatives.
To ensure sufficient resources are available to address incidents as they arise,
the manager must make sure that business units understand that some ad-hoc
conditions may cause a temporary shortage of security resources.
Educational and Informational Components
It is crucial to educate employees and provide training on security awareness
across the organization. The type of material and the target audience can
change how and when this training is carried out. Table 4 provides a brief
list.
Content Application
Security risk and awareness Orientation and initial training
General policies and procedures HR Level
Role-specific training Business unit level
Table 4: Security Content and Application
COBIT 5
ISO 31000 Risk Management
IEC 21010: Risk Management
NIST SP 800-39: Managing Information Security Risk
HB 158-2010: Delivering Assurance based on ISO 31000
ISO/IEC 27005: Information Technology
All of the above have similar requirements, including the following 6
elements.
Initiation
Development or acquisition
Implementation
Operation or maintenance
End of life or disposition
Change management needs to be an area in which the security manager takes
special interest, since it is through change management processes that she
will be able to inject risk assessments and apply the appropriate treatments.
Another approach is to make sure that security implications are part of the
standard practice when making changes. This can be done by requiring all
changes to be accompanied by the results of a risk analysis. In addition, it is a
wise precaution for the security manager to identify where changes are
initiated, funded and deployed. By hooking into these locations, the manager
has a much greater chance at detecting changes as they occur.
Security controls lose their effectiveness over time due to changes in the
systems and processes they are designed to protect, and therefore a periodic
review of all existing controls is absolutely essential to keep a proper security
posture.
Closely related to change management is configuration management, which
is the primary culprit that contribute to security breaches. The main two
reason systems are improperly configured are:
A lack of clear standards or procedures
Shorthanded staff who take shortcuts
If proper documentation exists and the staff is properly trained, but we are
still experiencing poorly configured systems, then we need to take a look at
the time constraints placed on the existing staff. It may be they are so
overworked that they do not have the time to perform the configuration
operations properly.
Release management is the process of rolling out new capabilities or updates
to existing capabilities. The key component for success is proper testing
before deployment. The security manager should ensure that proper
procedures and standards exist to prevent products from being deployed to
the production environment prematurely. Proper monitoring to ensure staff
are following the procedures must also be carried out.
Security Awareness Training and Education
Security can never be addressed solely through technical mechanisms. The
behavioral aspect – meaning the behavior of people – must be addressed as
well through engaging and repeated training. Security awareness programs
should focus on topics such as:
Password selection
Appropriate use of computers
Email safety
Web browsing safety
Social engineering
Since employees are the ones who will be in the best position to recognize
threats that automated mechanisms may miss, they should be taught how to
recognize and escalate security events.
Special attention needs to be paid to the positions that have unlimited data
access. Examples of duties that often require this are:
Computer-based training
Email reminders
Written security policies
Non-disclosure agreements signed by employees
Newsletters, web pages, videos, posters, login reminders
Visible enforcement of security policies
Simulated security incidents
Rewarding employees for reporting suspicious behavior
Job descriptions
Performance reviews
General Rules of Use/Acceptable Use Policy
Some employees are very interested in adhering to good security practices
but would simply rather read a comprehensive summary of everything the
organization expects and requires. By creating a user-friendly summary of
what they should do and should not do to comply with policy, we have an
effective way of reaching these individuals. The policy can detail in everyday
language and in a straight-forward manner all obligations and responsibilities
of everyone. However, we must also make sure that the policy is read and
understood. The policy should be given to all new employees, regardless of
employment status.
The policy normally includes the following elements:
Ethics
Ethics training is usually provided for employees who engage in activities of
a particularly sensitive nature, such as monitoring user activities, performing
penetration testing, or having access to sensitive personal data, such as those
in HR. Additionally, information security personnel must be aware of
potential conflicts of interest or activities. A signed acceptance of the code of
ethics should remain a permanent part of the employee’s records.
Documentation
An important part of a good information security program is ensuring
effective oversight of the creation and maintenance of security-related
documentation. Some document examples are:
Employee time
Contractor and consultant fees
Hardware and software costs
Hardware space requirements
Testing resources
Training costs
Travel
Creation of supporting documentation
Ongoing maintenance
Contingencies for unexpected costs
One area that is the most problematic to estimate are the costs involved with
responding to incidents, because often the need arises to engage with external
resources. The best way to estimate this type of costs is to use historical data
and extrapolate for the coming year. If historical data within the organization
is not available, estimates can be based on information from peer
organizations.
Information Security Problem Management Practices
Problem management is focused on finding the root cause of an emerging
issue. As information systems get updated and are enhanced, it is likely that
security controls will start having problems or stop working altogether. The
security manager will then need to identify the problem and assign a priority
to it. The steps involved are:
Understanding the issue
Defining the problem
Designing an action program
Assigning responsibility
Assigning due dates for resolution
Some type of reporting process needs to track the issue until it is resolved.
At times, the security manager will need to take immediate steps to
implement a secondary control if the primary fails. For example, if a firewall
stops filtering traffic, the security manager might disconnect certain systems
from the network until the firewall has been replaced. Of course, this will
almost certainly result in a business interruption, so the authority to take such
an action would need to be assigned to the security manager before the event
took place.
Vendor Management
External vendors often provide a valuable benefit in either capabilities an
organization does not yet possess, or by providing capabilities at a lower cost
than the organization could provide for itself. Security service providers can
provide a range of functions such as:
Financial viability
Quality of service
Adequate staffing
Adherence to security policies
Right to audit
By monitoring these services, the security manager ensures that risk
introduced by those providers is managed properly.
Program Management Evaluation
The information security manager must periodically reevaluate the
effectiveness of a security program based on changes in organizational
demands, environments and other needs. Or, perhaps the program needs be
reviewed when a new information security manager or CSO is hired. In either
case, the results should be shared with the information security steering
committee or other stakeholders. There are six areas that are critical for
evaluation, which are:
Program objectives
Compliance requirements
Program management
Security operations management
Technical security management
Resource levels
Program Objectives
The first evaluation area, program objectives, deals with ensuring that the
program’s security goals are sound. Here, we need to ensure that there is a
solid security strategy and road map, and that there is well-defined criterion
for acceptable risk. Once we have that established we then need to make sure
that the program’s goals align with governance goals, and that those goals are
SMART. When defining those goals, we need to be sure that they are
developed collaboratively among all stakeholders so that we can reach
consensus. If policies, standards and procedures do not exist, then this is the
time to create them. This is also the time to define whatever metrics we will
be using to measure success.
Compliance Requirements
The second evaluation area, compliance requirements, comes into play if the
purpose of a program is to ensure compliance with a regulatory standard. If
compliance is not a concern, then we can skip this step.
Assuming compliance is needed, then we will first need to determine the
level of compliance we will need to meet. As part of that effort, the program
will need to be examined to see if its components align with the components
required by regulatory standards. Looking at the results from recent audit and
compliance reviews will help with this activity, as will ensuring that there is a
close level of communication between compliance and security groups. Since
policies, standards, procedures and metrics were already covered in the
previous area, program objectives, we simply need to make sure that
compliance requirements are integrated into each of those. Finally, we just
need to examine compliance management technologies in-use, and ensure
that deficiencies are tracked, reported and addressed in a timely manner.
Program Management
The third evaluation area, program management, will reveal the extent of
management support and how comprehensive the existing program is. The
level of management each program contains will vary, but generally
speaking, technical security programs will be light on management, while
programs driven by standards, compliance or governance will have a greater
level of management oversight.
In this area, we need to ensure everyone understands their assigned roles and
responsibilities, including senior management. Information security
responsibilities should be a part of each business manager’s goals, and it
should be reflected in his/her individual performance rating. It should be clear
who is accountable for the program, and that person or group must have
sufficient authority and visibility for the program to succeed.
This evaluation area also covers ensuring that sufficient documentation of the
program exists, and that policies and standards are complete, formally
approved and distributed to the appropriate audiences. Formalizing a steering
committee is covered, as well as ensuring that management regularly
reassesses the program’s effectiveness. Finally, this step ensures that the
metrics defined earlier are regularly collected and reported.
Security Operations Management
The fourth evaluation area, security operations management, looks at how
well a program implements security operational activities. A large part of this
area focuses on standard operating procedures, or SOPs. SOPs are examined
to ensure that they include security requirements and processes, and that
SOPs exist for configuration and access management, systems maintenance,
event analysis and incident response.
Other topics addressed in the security operations area are ensuring proper
segregation of duties, validating that a schedule for regularly performed
activities exists, checking to see if metrics produce meaningful results, and
that there is a path for escalating issues to management so that they will be
resolved.
Technical Security Management
The fifth area, technical security management, covers the technical security
environment and makes sure that systems and security mechanisms have
been implemented properly. A major focus is placed on the implementation
and success of standards. For example, security configuration standards for
network, system and application components are checked, as are standards
for topology, communication protocols and compartmentalization of critical
systems. In addition to validating that they even exist, standards must also
follow high-level policy and requirements, and should be a result of
collaborative efforts. If implemented correctly, standards will be uniformly
implemented, and there will be a process to report exceptions.
Other topics of interest in the technical security management area are
ensuring that key controls are continuously monitored, and that they notify on
failure. Development, test and production environments should be kept
separate, and SoD is properly enforced on systems. Logging must be reliable
and visible, and there should be proper decommissioning processes to prevent
data leakage.
Resource Levels
The final evaluation area is that of resource levels, including financial, human
and technical resources. This area examines current funding levels and makes
sure that the budget and available money line up. This is carried out by
ensuring that resources align with business goals, and that program functions
are prioritized by the amount of money available.
Specific to human resources, the resource level evaluation area will inquire
about the current staffing level to see if existing resources are being fully
utilized. Part of this activity is to ensure that existing resources are adequately
skilled for the roles they are assigned, and to search for low-value tasks that
other resources could carry out. A special consideration is finding out if there
are other HR resources the program is dependent on to succeed.
When it comes to technical resources, this area will ask about any
technologies needed to support information security program goals, and if the
current capacity of those technologies is sufficient for our current and future
needs. The maintenance and replacement of the technology is considered, and
other technologies that could make the program more efficient are examined.
Current State of Incident Response Capability
Most organizations have some sort of capability for reporting incidents, and
the information security manager must identify what this capability is. The
three most common ways to collect this information are by:
What happened
What measures were taken
Results after the plan was executed
The report also contains a list of lessons learned that should be developed
into a plan to change the incident management responses. Activities include:
Senior management
Response and recovery teams
HR
Insurance companies
Backup facilities
Vendors
Customers
The process continues until either the emergency is resolved, or the last alert
notification has been sent.
The exact escalation process will vary based on the level of the emergency
event, which in turn depends on the severity, the number of organizations
affected, and their need to be notified. If email is used for notifications, the
security manager may wish to encrypt such messages as email is sent in clear
text by default.
Help or Service Desk Processes for Identifying Security Incidents
Since help or service desk employees are likely to be the first to receive an
incident report, they should have guidelines on what looks like a typical
request and what is a possible security incident. This also serves to reduce the
risk that the service or help desk will be targeted in a social engineering
attack.
Incident Management and Response Teams
The incident response plan should identify all teams needed to handle the
various activities. It is helpful to create a matrix matching teams to the
activities they are capable of carrying out, as this will assist the response
process in quickly activating the correct teams. There are five common teams
in this matrix:
The emergency action team deals with fires and other emergency
scenarios
The damage assessment team assesses the physical damage and
decides what is a total loss or can be salvaged
The relocation team moves operations from the affected site to
an alternate site, and then back once the original site has been
restored
The security team, often called a CSIRT which is short for
computer security incident response team, takes care of all
security concerns, including monitoring the security of systems
and communications.
The emergency management team coordinates the activities of
all other teams and makes the key decisions
Objectives
Audience
Information resources
Assumptions
Decisions
Typical documentation for risk management should include the following
sections:
A risk register
Consequences and likelihood of compromise
Initial risk rating
Vulnerability to internal/external factors
An inventory of information assets
A risk mitigation and action plan
Monitoring and audit documents
All documentation must be properly versioned so that we can determine what
policies were in effect at any given time.
Training and Awareness
People will probably always be the number one security risk due to either
accidents or malicious intent. Training and awareness programs are the most
effective methods to combat this top risk but must be targeted to different
audiences. End-user information security training should include the
following:
Authentication
Logging
Role-based access
Data transmission confidentiality, such as encryption
The information security manager should use both internal and external
resources to ensure secure coding practices and logic during software
development.
Just before deploying a new system, there are a series of steps that should be
followed:
Regulatory compliance
Security incidents increasing in frequency and cost
Concern over damage to reputation
Compliance with Payment Card Industry Data Security Standard
(PCI DSS), which is not a governmental agency by the way – it is
purely commercial
Goals that may increase risk
Chapter 45: Information Security Program
Development and Management – The Strategy
Scope and Charter of an Information Security Program
It is up to the information security manager to define scope, responsibilities
and the charter for the information security department. Unlike general
technical responsibilities, don’t expect to find an abundance of
documentation on this matter.
Coming into a new environment, the best approach is to first understand what
those above expect, followed with an abundance of documentation of those
expectations and agreement with management that the documentation is
indeed accurate. We also need to understand where in the chain of command
the information security function fits – who the position reports directly to all
the way to the executives or board, and what positions report to the
information security manager. This will serve to highlight potential conflicts
and set the stage for future relationships that will need to be well-managed.
The conflicts should be discussed with management to identify how they will
be dealt with going forward.
The information security department largely exists to regulate internal
behavior, and therefore it should not report up through those it is supposed to
regulate. Information security managers who report up through technology or
operational management tend to be much less effective.
If new to an existing position, it is likely that the former manager took on
responsibilities that were not fully documented or known. This is a clear sign
that the previous manager was effective due to being persuasive and
influential rather than relying on a defined and documented process. If
possible, the former manager should remain available for a short while to
allow his or her successor to discover these little ‘nuggets of opportunity’.
The subject of security is often politically charged, so the information
security manager must be aware of the organization’s culture. Success may
hang more on the information security manager’s ability to develop the right
relationships than on any given area of expertise. The current state of security
must be determined at the same time, usually by executing a BIA.
Figure 40 shows the steps in developing an information security program –
the flow is pretty much self-explanatory. Note that most of the listed steps
must be executed by the information security manager.
CMMI levels
KGIs
KPIs
KRIs
Business balanced scorecard (BSC)
Six Sigma quality indicators
ISO 9001 quality indicators
COBIT 5 PAM
While there are different ways to determine how effective a security program
is over time, the most important thing is to be consistent. One approach is to
regularly conduct risk assessments and track how they change over time. Or,
we can use scanning and penetration testing to evaluate our progress,
although this really only covers a single dimension of overall security.
Another approach is to hook into change management activities, so changes
can be evaluated and addressed.
Most monitoring will be implemented using technical controls, but training
help desk personnel can be a great asset as many attacks will start with a
social engineering aspect, and this can provide advanced warning of a
pending event.
While it may not be apparent, effective monitoring is a crucial part of the
budgeting process. Senior management is always on the lookout for cost-
cutting measures or to shift money to the best ROI they can find. By agreeing
on the correct KPIs from the beginning, it will be obvious if a given security
program should continue to be funded.
Measuring Information Security Management Performance
Measuring success is not just about metrics, though – while metrics are the
end result, a security manager must know how to implement processes and
mechanisms that produce useful metrics. Measuring success consists of the
following three steps:
1) Defining measurable goals
2) Tracking the most appropriate metrics
3) Periodically analyzing those results so we know where to make
adjustments
Measuring Information Security Risk and Loss
It is impossible to address all risk in a system while not impacting some level
of usability. Likewise, it is not possible to deliver the optimum user
experience without impacting security. There must be a compromise in the
middle where both aspects are considered to be acceptable. Achieving this
balance can be reached in a number of ways. There are three approaches we
can use to measure our success against loss prevention and risk management.
The technical vulnerability management approach examines the number of
technical or operational vulnerabilities in a given system during a reporting
period, and then looks to see how effective we have been in resolving them.
The risk management approach looks at the number of risks identified
within a given reporting period, and then looks at how each was avoided,
accepted, transferred or mitigated.
The loss prevention approach looks at the amount of losses incurred during a
reporting period, and how many were preventable.
All three of these approaches result in a quantitative measurement. We can
also take a qualitative approach by asking the following questions:
Strategic alignment
Risk management
Value delivery
Resource management
Performance measurement
Assurance process integration
Let’s go through each outcome individually.
Strategic Alignment
Strategic alignment refers to the degree that security goals align with
business goals. This requires frequent interaction with business owners so
that we can understand their plans and goals. Topics to discuss include:
IT department
Internal audit
HR department
Legal department
Physical security
Risk management
Insurance department
PR department
Sales and marketing
Senior management
Compliance officer
Privacy officer
When an incident occurs, it is due to the failure or absence of a control, and
security staff must act quickly. We usually think of incident management as
the actions that take place during this time. However, the full scope of
incident management are all actions taken before, during and after an
incident. Those actions should all be designed with five goals in mind:
1) Provide a way to minimize the impact
2) Provide enough information so we can make the right decisions
3) Maintain or restore continuity of enterprise services
4) Provide a defense against subsequent attacks
5) Provide additional deterrence through technology, investigation
and prosecution
Events deserving of an incident management response can be technical
attacks, accidents, mistakes or the failure of a system or process. Any type of
incident that can disrupt the normal operation of the business must be
considered by the information security manager. Just like risk management,
risk assessments and BIAs form the basis for how we prioritize the protection
of resources and how we carry out response activities.
The more we use information systems, the more important it becomes on how
effective we are at incident management. There are multiple factors that
compound this need. For example, the overall impact from security incidents
is on the rise, as is the failure of existing security controls. Legal and
regulatory mandates require increased security vigilance. The sophistication
and capabilities of for-profit and nation-state attackers is growing, and they
are using more and more zero-day attacks.
Incident Response Concepts
Let’s cover some key concepts related to incident management.
Incident handling is a service that covers all processes or tasks associated
with handling events and incidents. It involves four functions:
Strategic Alignment
To ensure that incident management’s goals are aligned with the
organization, the following components should be examined.
Risk Management
Incident management is the last line of defense for cost-effective risk
management. When all prevention efforts fail, incident management steps in
to handle the fallout. To deliver value, incident management must seamlessly
integrate with business processes and the BCP. It must provide a greater
ability to manage risk and provide assurance to stakeholders, and it must
become part of an organization’s overall strategy to protect critical functions
and assets.
Objectives
Some goals of incident management are to detect and diagnose incidents
quickly and accurately. This should be followed by activities that contain and
minimize damage so that affected services can be restored. Determination of
the root cause of an incident is central to this process, and the job is not
complete until we have implemented improvements to prevent a recurrence
of the incident and documented and reported the entire event properly.
In short, the goal of incident management is to prevent incidents from
becoming problems, and problems from becoming disasters. Figure 42
illustrates the steps to effectively handle incidents.
Responsibilities
Related to incident management, the responsibilities for the information
security manager can be divided into three areas - before an incident happens,
while an incident is underway, and after the incident has been handled.
Responsibilities before an incident occurs include the development of
incident management and response plans and ensuring that both technical and
administrative solutions are handled properly – all while taking care of
budgeting and development. Maintaining response readiness is crucial, but
we need to strike a balanced posture between operational and security
processes.
Responsibilities while an incident is underway include handling and
coordinating incident response activities, making sure the damage and losses
do not escalate out of control, and recovering quickly by notifying the correct
people to begin the recovery process.
Post-incident responsibilities for the security manager include decreasing the
likelihood of recurrence and dealing with legal and law-enforcement issues.
The information security manager will need to define exactly what constitutes
a security incident. It is fairly obvious that security incidents should include
malicious code attacks, DoS and DDoS attacks, and social engineering
attacks. Surveillance and espionage activities, as well as hoaxes, should be
added to the list as well. Some less-obvious incidents cover unauthorized
access to IT or information resources and unauthorized changes to systems,
network devices or information. Many times, a ‘malicious’ incident actually
turns out to be the result of human error. In fact, there are normally twice as
many incidents caused by human error as those cause by external breaches.
Senior Management Commitment
To gain senior management support for incident management activities, a
business case can be easily created that shows an effective incident
management response can be more cost-effective than trying to implement
controls for all possible risks. This may allow the business to set a higher
level of acceptable risk, thereby lowering mitigation costs.
An incident management team normally is comprised of four roles, which are
the information security manager, steering committee, dedicated team
members and virtual team members. The information security manager will
usually lead the team. The steering committee is usually called the security
steering group, or SSG, which serves as an escalation point for the team and
approves exceptions to normal activities. Because the breadth of systems the
incident management team must cover is wide, it is usually more cost-
effective to populate the team with part-time virtual members as opposed to
dedicated personnel.
There are four different incident response team models to choose from. We
can use the central IRT model in which we have only one team. This is best-
suited for smaller organizations. For larger organizations, we might choose to
use the distributed IRT model, which supports multiple teams, each
responsible for a different logical or physical segment of the infrastructure.
Or, we can choose to employ the coordinating IRT model, in which we have
multiple distributed teams that manage and implement responses but rely
upon a single central team providing all guidance and policy decisions.
Finally, we could simply choose to outsource at least a portion of the security
team using the outsourced IRT model.
If there are virtual team members, these usually will be restricted to business
representatives, legal staff, communications staff, or other non-core roles.
The permanent members will normally be incident handlers, investigators,
forensics experts and IT and physical security.
Roles and Responsibilities
Table 5 lists all roles and responsibilities related to security incident
activities.
Position Roles Responsibilities
Security steering group Highest structure of 1. Takes responsibility for overall
an organization’s incident management and response
functions related to concept
information security 2. Approves IMT charter
3. Approves exceptions/deviations
4. Makes final decisions
Information security manager IMT leader and 1. Develops and maintains incident
main interface to management and response capability
SSG 2. Effectively manages risk and
incidents
3. Performs proactive and reactive
measures to control information risk
level
Incident response manager IRT leader 1. Supervises incident response tasks
2. Coordinates resources to effectively
perform incident response tasks
3. Takes responsibility for successful
execution of IRP
4. Presents incident response report
and lessons learned to SSG members
Incident handler IMT/IRT team 1. Performs incident response tasks to
member contain exposures from an incident
2. Documents steps taken when
executing the IRP
3. Maintains chain of custody and
observes incident handling procedures
for court purposes
4. Writes incident response report and
lessons learned
Investigator IMT/IRT team 1. Performs investigative tasks for a
member specific incident
2. Finds root cause of an incident
3. Writes report of investigative
findings
IT security specialist IMT/IRT team 1. Performs complex and in-depth IT
member; subject security-related tasks as part of the
matter expert in IT IRP
security 2. Performs IT security assessment
and audit as a proactive measure and
part of vulnerability management
Business managers Business function 1. Makes decisions on matter related
owners; information to information assets and systems
assets and system when an incident happens, based on
owners IRT/IMT recommendations
2. Provides clear understanding of
business impact in BIA process or IRP
IT specialists/representatives Subject matter 1. Provide support to IMT/IRT when
expert in IT services resolving an incident
2.Maintain information systems in
good condition per company policy
and good practices
Legal representative Subject matter 1. Ensures that incident response
expert in legal actions and procedures comply with
legal and regulatory requirements
2.Acts as the liaison to law
enforcement and outside agencies
HR Subject matter 1. Provides assistance in incident
expert in HR area management or response when there is
a need to investigate an employee
suspected of causing an incident
2. Integrates HR policy to support
incident management or response
PR representative Subject matter 1. Provides controlled communication
expert in PR area to internal and external stakeholders to
minimize any adverse impact to
ongoing incident response activities
and protect the organization’s brand
and reputation
2. Provides assistance to IMT/IRT in
communication issues, thus allowing
the team to focus on critical issues
Skills
The set of skills that IRT members need to possess can be divided into two
groups – personal and technical. Let’s cover the personal skills first.
One primary personal skill is communication, in both directions – speaking
and listening. Communications can take many forms, including email,
documentation, notifications and policies and procedures. Members need to
be good listeners in order to get all of the necessary details related to an
incident. This applies to both in what is being said as well as what is not
being said, and the targeted audiences include:
Audits
Put simply, audits are performed to make sure an organization is in
compliance with policies, standards and procedures. Internal audits are
usually carried out by an employed specialist, while external audits are
executed by a third party. While most external audits are a result of proving
compliance with some type of legal or regulatory rule, they are sometimes
required by a business partner.
Related to incident management, an audit can validate that we should not be
compromised if an event happens and that we will remain in compliance. It
can also show the presence of gaps in response plans.
Outsourced Security Providers
If an organization outsources both IT operations and incident management to
the same vendor, there may be some advantages due to tighter integration
between the two. The information security manager should consider several
things when partially or fully outsourcing security functions. The
organization’s incident number should be matched to the vendor’s incident
number, and the organization’s change management workflow should be tied
with the vendor’s. A periodic review of incidents should also be performed
with the vendor.
Chapter 57: Information Security Incident
Management – Constraints That Hurt
There are no overtly valuable constraints that need to be pointed out for this
domain.
Chapter 58: Information Security Incident
Management – The Action Plan
The plan for implementation is really handled in the other sections for this
domain, so we will skip this chapter.
Chapter 59: Information Security Incident
Management – Metrics and Monitoring
Some common KPIs for incident management are the total number of
reported incidents, the total number of detected incidents, the number of days
without a reported incident, and the average time to resolve. Both KPIs and
KGIs must be well-defined and agreed to by relevant stakeholders.
Chapter 60-: Information Security Incident
Management – What Success Looks Like
How do we know when we have a good incident management solution in
place? When the following seven statements are true:
Authentication
The act of verifying the identity (i.e., user, system)
Authorization
Access privileges granted to a user, program or process, or the act of granting
those privileges
Availability
Information that is accessible when required by the business process now and
in the future
Backup center
An alternate facility to continue IT/IS operations when the primary data
processing (DP) center is unavailable
Baseline security
The minimum security controls required for safeguarding an IT system based
on its identified needs for confidentiality, integrity and/or availability
protection
Benchmarking
A systematic approach to comparing an organization’s performance against
peers and competitors in an effort to learn the best ways of conducting
business. Examples include benchmarking of quality, logistic efficiency and
various other metrics.
Bit
The smallest unit of information storage; a contraction of the term “binary
digit”; one of two symbols “0" (zero) and “I” (one) that are used to represent
binary numbers
Bit copy
Provides an exact image of the original and is a requirement for legally
justifiable forensics
Bit-stream image
Bit-stream backups, also referred to as mirror image backups, involve the
backup of all areas of a computer hard disk drive or other type of storage
media. Such backups exactly replicate all sectors on a given storage device
including all files and ambient data storage areas.
Botnet
A large number of compromised computers that are used to create and send
spam or viruses or flood a network with messages such as a denial-of-service
attack
Brute force attack
Repeatedly trying all possible combinations of passwords or encryption keys
until the correct one is found
Business case
Documentation of the rationale for making a business investment, used both
to support a business decision on whether to proceed with the investment and
as an operational tool to support management of the investment through its
full economic life cycle
Computer forensics
The application of the scientific method to digital media to establish factual
information for judicial review. This process often involves investigating
computer systems to determine whether they are or have been used for illegal
or unauthorized activities. As a discipline, it combines elements of law and
computer science to collect and analyze data from information systems (cg,
personal computers, networks, wireless communication and digital storage
devices) in a way that is admissible as evidence in a court of law.
Confidentiality
The protection of sensitive or private information from unauthorized
disclosure
Configuration management
The control of changes to a set of configuration items over a system life cycle
Content filtering
Controlling access to a network by analyzing the contents of the incoming
and outgoing packets and either letting them pass or denying them based on a
list of rules. Differs from packet filtering in that it is the data in the packet
that are analyzed instead of the attributes of the packet itself (e. g,
source/target IP address, transmission control protocol [TCP] flags).
Contingency plan
A plan used by an organization or business unit to respond to a specific
systems failure or disruption
Continuous monitoring
The process implemented to maintain a current security status for one or
more information systems or for the entire suite of information systems on
which the operational mission of the enterprise depends.
The process includes: 1) the development of a strategy to regularly evaluate
selected IS controls/metrics, .2) recording and evaluating IS-relevant events
and the effectiveness of the enterprise in dealing with those events, 3)
recording changes to IS controls, or changes that affect IS risks, and 4)
publishing the current security status to enable information-sharing decisions
involving the enterprise.
Control
The means of managing risk, including policies, procedures, guidelines,
practices or organizational structures which can be of an administrative,
technical, management or legal nature
Control center
Hosts the recovery meetings where disaster recovery operations are managed
Controls policy
A policy defining control operational and failure modes (e.g., fail secure, fail
open, allowed unless specifically denied, denied unless specifically
permitted)
Corporate governance
The system by which enterprises are directed and controlled. The board of
directors is responsible for the governance of their enterprise. It consists of
the leadership and organizational structures and processes that ensure the
enterprise sustains and extends strategies and objectives.
COSO
Committee of Sponsoring Organizations of the Treadway Commission. Its
report “Internal Control-Integrated Framework” is an internationally accepted
standard for corporate governance. See WWW. coso.org.
Cost-benefit analysis
A systematic process for calculating and comparing benefits and costs of a
project, control or decision
Countermeasures
Any process that directly reduces a threat or vulnerability
Criticality
A measure-of the impact that the failure of a system to function as required
will have on the organization
Criticality analysis
An analysis to evaluate resources or business functions to identify their
importance to the organization, and the impact if a function cannot be
completed or a resource is not available
Cryptographic algorithm
A well-defined computational procedure that takes variable inputs, including
a cryptographic key, and produces an output
Cryptographic strength
A measure of the expected number of operations required to defeat a
cryptographic mechanism
Cryptography
The art of designing, analyzing and attacking cryptographic schemes
Cyclical redundancy check (CRC)
A method to ensure that data have not been altered after being sent through a
communication channel
Damage evaluation
The determination of the extent of damage that is necessary to provide for an
estimation of the recovery time frame and the potential loss to the
organization
Data classification
The assignment of a level of sensitivity to data (or information) that results in
the specification of controls for each level of classification. Levels of
sensitivity of data are assigned according to predefined categories as data are
created, amended, enhanced, stored or transmitted. The classification level is
an indication of the value or importance of the data to the organization.
Data custodian
The individual(s) and/or department(s) responsible for the storage and
safeguarding of computerized data
Data Encryption Standard (DES)
An algorithm for encoding binary data. it is a secret key cryptosystem
published by the National Bureau of Standards (NBS), the predecessor of the
US National Institute of Standards and Technology (NIST). DES and its
variants have been replaced by the Advanced Encryption Standard (AES).
Data integrity
The property that data meet with a priority expectation of quality and that the
data can be relied on
Data leakage
Siphoning out or leaking information by dumping computer files or stealing
computer reports and tapes
Data leak protection (DLP)
A suite of technologies and associated processes that locate, monitor and
protect sensitive information from unauthorized disclosure
Data mining
A technique used to analyze ex1stmg information, usually with the intention
of pursuing new avenues to pursue business
Data normalization
A structured process for organizing data rate tables in such a way that it
preserves the relationships among the data
Data owner
The individual(s), normally a manager or director, who has responsibility for
the integrity, accurate reporting and use of computerized data
Data warehouse
A generic term for a system that stores, retrieves and manages large volumes
of data. Data warehouse software often includes sophisticated comparison
and hashing techniques for fast searches, as well as advanced filtering.
Decentralization
The process of distributing computer processing to different locations within
an organization
Decryption key
A digital piece of information used to recover plain text from the
corresponding cipher text by decryption
Defense in depth
The practice of layering defenses to provide added protection. Defense in
depth increases security by raising the effort needed in an attack. This
strategy places multiple barriers between an attacker and an organization’s
computing and information resources.
Degauss
The application of variable levels of alternating current for the purpose of
demagnetizing magnetic recording media. The process involves increasing
the alternating current field gradually from zero to some maximum value and
back to zero, leaving a very low residue of magnetic induction on the media.
Degauss loosely means: to erase.
Demilitarized zone (DMZ)
A screened (firewalled) network segment that acts as a buffer zone between a
trusted and untrusted network. A DMZ is typically used to house systems
such as web servers that must be accessible from both internal networks and
the Internet.
Denial-of-service (DOS) attack
An assault on a service from a single source that floods it with so many
requests that it becomes overwhelmed and is either stopped completely or
operates at a significantly reduced rate
Digital certificate
A process to authenticate (or certify) a party’s digital signature; carried out by
trusted third parties
Digital code signing
The process of digitally signing computer code to ensure its integrity
Disaster declaration
The communication to appropriate internal and external parties that the
disaster recovery plan is being put into operation
Disaster notification fee
The fee the recovery site vendor charges when the customer notifies them
that a disaster has occurred, and the recovery site is required. The fee is
implemented to discourage false disaster notifications.
Disaster recovery plan (DRP)
A set of human, physical, technical and procedural resources to recover,
within a defined time and cost, an activity interrupted by an emergency or
disaster
Disaster recovery plan desk checking
Typically, a read-through of a disaster recovery plan without any real actions
taking place. Generally involves a reading of the plan, discussion of the
action items and definition of any gaps that might be identified.
Disaster recovery plan walk-through
Generally a robust test of the recovery plan requiring that some recovery
activities take place and are tested. A disaster scenario is often given and the
recovery teams talk through the steps they would need to take to recover. As
many aspects of the plan should be tested as possible.
Discretionary access control (DAC)
A means of restricting access to objects based on the identity of subjects
and/or groups to which they belong. The controls are discretionary in the
sense that a subject with a certain access permission is capable of passing that
permission (perhaps indirectly) on to any other subject.
Disk mirroring
The practice of duplicating data in separate volumes on two hard disks to
make storage more fault tolerant. Mirroring provides data protection in the
case of disk failure because data are constantly updated to both disks.
Distributed denial-of-service (DDoS) attack
A denial-of-service (DOS) assault from multiple sources
Domain name system (DNS)
A hierarchical database that is distributed across the Internet that allows
names to be resolved into IP addresses (and vice versa) to locate services
such as web and email servers
Dual control
A procedure that uses two or more entities (usually persons) operating in
concert to protect a system resource so that no single entity acting alone can
access that resource
Due care
The level of care expected from a reasonable person of similar competency
under similar conditions
Due diligence
The performance of those actions that are generally regarded as prudent,
responsible and necessary to conduct a thorough and objective investigation,
review and/or analysis
Dynamic Host Configuration Protocol (DHCP)
A protocol used by networked computers (clients) to obtain IP addresses and
other parameters such as the default gateway, subnet mask and IP addresses
of domain name system (DNS) servers from a DHCP server. The DHCP
server ensures that all IP addresses are unique (e.g., no IP address is assigned
to a second client while the first client’s assignment is valid [its lease has not
expired]). Thus, IP address pool management is done by the server and not by
a human network administrator.
Fail-over
The transfer of service from an incapacitated primary component to its
backup component
Fail safe
Describes the design properties of a computer system that allow it to resist
active attempts to attack or bypass it
Fall-through logic
An optimized code based on a branch prediction that predicts which way a
program will branch when an application is presented
Firewall
A system or combination of systems that enforces a boundary between two or
more networks typically forming a barrier between a secure and an open
environment such as the Internet
Flooding
An attack that attempts to cause a failure in a system by providing more input
than the system can process properly
Forensic Copy
An accurate bit-for-bit reproduction of the information contained on an
electronic device or associated media, whose validity and integrity has been
verified using an acceptable algorithm
Forensic examination
The process of collecting, assessing, digital evidence to assist in the
identification of an offender and the method of compromise
Guideline
A description of a particular way of accomplishing something that is less
prescriptive than a procedure
Harden
To configure a computer or other network device to resist attacks
Hash function
An algorithm that maps or translates one set of bits into another (generally
smaller) so that a message yields the same result every time the algorithm is
executed using the same message as input. It is computationally infeasible for
a message to be derived or reconstituted from the result produced by the
algorithm or to find two different messages that produce the same hash result
using the same algorithm.
Help desk
A service offered via telephone/Internet by an organization to its clients or
employees that provides information, assistance and troubleshooting advice
regarding software, hardware or networks. A help desk is staffed by people
who can either resolve the problem on their own or escalate the problem to
specialized personnel. A help desk is often equipped with dedicated customer
relationship management (CRM) software that logs the problems and tracks
them until they are solved.
Honeypot
A specially configured server, also known as a decoy server, designed to
attract and monitor intruders in a manner such that their actions do not affect
production systems
Hot site
A fully operational offsite data processing facility equipped with hardware
and system software to be used in the event of a disaster
Hypertext Transfer Protocol (HTTP)
A communication protocol used to connect to servers on the World Wide
Web. Its primary function is to establish a connection with a web server and
transmit hypertext markup language (HTML), extensible markup language
(XML) or other pages to the client browsers.
Identification
The process of verifying the identity of a user, process or device, usually as a
prerequisite for granting access to resources in an information system
Impact analysis
A study to prioritize the criticality of information resources for the
organization based on costs (or consequences) of adverse events. In an
impact analysis, threats to assets are identified and potential business losses
determined for different time periods. This assessment is used to justify the
extent of safeguards that are required and recovery time frames. This analysis
is the basis for establishing the recovery strategy.
Incident
Any event that is not part of the standard operation of a service and that
causes, or may cause, an interruption to, or a reduction in, the quality of that
service
Incident handling
An action plan for dealing with intrusions, cybertheft, denial-of-service
attack, fire, floods, and other security-related events. It is comprised of a six-
step process: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned.
Incident response
The response of an enterprise to a disaster or other significant event that may
significantly affect the enterprise, its people or its ability to function
productively. An incident response may include evacuation of a facility,
initiating a disaster recovery plan (DRP), performing damage assessment and
any other measures necessary to bring an enterprise to a more stable status.
Information security
Ensures that only authorized users (confidentiality) have access to accurate
and complete information (integrity) when required (availability)
Information security governance
The set of responsibilities and practices exercised by the board and executive
management with the goal of providing strategic direction, ensuring that
objectives are achieved, ascertaining that risks are managed appropriately and
verifying that the enterprise’s resources are used responsibly
Information security program
The overall combination of technical, operational and procedural measures,
and management structures implemented to provide for the confidentiality,
integrity and availability of information based on business requirements and
risk analysis
Integrity
The accuracy, completeness and validity of information
Internal controls
The policies, procedures, practices and organizational structures designed to
provide reasonable assurance that business objectives will be achieved, and
undesired events will be prevented or detected and corrected
Internet protocol
Specifies the format of packets and the addressing scheme
Internet service provider (ISP)
A third party that provides individuals and organizations access to the
Internet and a variety of other Internet-related services
Interruption window
The time the company can wait from the point of failure to the restoration of
the minimum and critical services or applications. After this time, the
progressive losses caused by the interruption are excessive for the
organization.
Intrusion detection
The process of monitoring the events occurring in a computer system or
network to detect signs of unauthorized access or attack
Intrusion detection system (IDS)
Inspects network and host security activity to identify suspicious patterns that
may indicate a network or system attack
Intrusion prevention system (IPS)
Inspects network and host security activity to identify suspicious patterns that
may indicate a network or system attack and then blocks it at the firewall to
prevent damage to information resources
IP Security (IPSec)
A set of protocols developed by the Internet Engineering Task Force (IETF)
to support the secure exchange of packets
ISO/IEC 15504
ISO/IEC 15504 Information Technology-Process assessment.
ISO/IEC 15504 provides a framework for the assessment of processes. The
framework can be used by organizations involved in planning, managing,
monitoring, controlling and improving the acquisition, supply, development,
operation, evolution and support of products and services.
ISO/IEC 17799
Originally released as part of the British Standard for Information Security in
1999 and then as the Code of Practice for Information Security Management
in October 2000, it was elevated by the International Organization for
Standardization (ISO) to an international code of practice for information
security management. This standard defines information’s confidentiality,
integrity and availability controls in a comprehensive information security
management system. The latest version is ISO/IEC 17799:2005.
ISO/IEC 27001
An international standard, released in 2005 and revised in 2013, that defines a
set of requirements for an information security management system. Prior its
adoption by the ISO, this standard was known as BS 17799 Part 2, which was
originally published in 1999
ISO/IEC 27002
A code of practice that contains a structured list of suggested information
security controls for organizations implementing an information security
management system. Prior to its adoption by ISO/IEC, this standard existed
as BS 77799.
ISO/I EC 31000
ISO 31000:22009 Risk Management-Principles and guidelines.
Provides principles and generic guidelines on risk management. It is industry-
and sector-agnostic and can be used by any public, private or community
enterprise, association, group or individual.
IT governance
The responsibility of executives and the board of directors; consists of the
leadership, organizational structures and processes that ensure that the
enterprise’s IT sustains and extends the organization’s strategies and
objectives
IT steering committee
An executive management-level committee that assists the executive in the
delivery of the IT strategy, oversees day-to-day management of IT service
delivery and IT projects and focuses on implementation aspects
IT strategic plan
A long-term plan (i.e., three- to five-year horizon) in which business and IT
management cooperatively describe how IT resources contribute to the
enterprise’s strategic objectives (goals)
IT strategy committee
A committee at the level of the board of directors to ensure that the board is
involved in major IT matters and decisions. The committee is primarily
accountable for managing the portfolios of IT-enabled investments, IT
services and other IT resources. The committee is the owner of the portfolio.
Key goal indicator (KGI)
A measure that tells management, alter the fact, whether an IT process has
achieved its business requirements; usually expressed in terms of information
criteria
Key performance indicator (KPI)
A measure that determines how well the process is performing in enabling
the goal to be reached. A KPI is a lead indicator of whether a goal will likely
be reached, and a good indicator of capability, practices and skills. It
measures an activity goal, which is an action that the process owner must
take to achieve effective process performance.
Key risk indicator (KRI)
A subset of risk indicators that are highly relevant and possess a high
probability of predicting or indicating important risk
Least privilege
The principle of allowing users or applications the least amount of
permissions necessary to perform their intended function
Nonrepudiation
The assurance that a party cannot later deny originating data; that is, it is the
provision of proof of the integrity and origin of the data and can be verified
by a third party. A digital signature can provide nonrepudiation.
Offline files
Computer file storage media not physically connected to the computer;
typically tapes or tape cartridges used for backup purposes
Open Shortest Path First (OSPF)
A routing protocol developed for IP networks. It is based on the shortest path
first or link state algorithm.
Open Source Security Testing Methodology
An open and freely available methodology and manual for security testing
Outcome measure
Represents the consequences of actions previously taken; alien referred to as
a lag indicator. An outcome measure frequently focuses on results at the end
of a time period and characterizes historical performance. It is also referred to
as a key goal indicator (K01) and is used to indicate whether goals have been
met. Can be measured only after the fact and, therefore, is called a lag
indicator.
Packet
Data unit that is routed from source to destination in a packet- switched
network. A packet contains both routing information and Port data.
Transmission Control Protocol/Internet Protocol (TCP/IP) is such a packet-
switched network.
Packet filtering
Controlling access to a network by analyzing the attributes of the incoming
and outgoing packets, and either letting them pass or denying them based on
a list of rules
Packet sniffer
Software that observes and records network traffic
Packet switched network
Individual packets follow their own paths through the network from one
endpoint to another and reassemble at the destination.
Partitions
Major divisions of the total physical hard disk space
Passive response
A response option in intrusion detection in which the system simply reports
and records the problem detected, relying on the user to take subsequent
action
Password cracker
A tool that tests the strength of user passwords searching for passwords that
are easy to guess. It repeatedly tries words from specially crafted dictionaries
and often also generates thousands (and in some cases, even millions) of
permutations of characters, numbers and symbols.
Penetration testing
A live test of the effectiveness of security defenses through mimicking the
actions of real-life attackers
Personally Identifiable Information (PII)
Information that can be used alone or with other sources to uniquely identify,
contact or locate a single individual
Pharming
This is a more sophisticated form of a man-in-the-middle (MITM) attack. A
user’s session is redirected to a masquerading web site. This can be achieved
by corrupting a domain name system (DNS) server on the Internet and
pointing a URL to the masquerading web site’s IP address.
Phishing
This is a type of electronic mail (email) attack that attempts to convince a
user that the originator is genuine, but with the intention of obtaining
information for use in social engineering. Phishing attacks may take the form
of masquerading as a lottery organization advising the recipient or the user’s
bank of a large win; in either case, the intent is to obtain account and personal
identification number (PIN) details. Alternative attacks may seek to obtain
apparently innocuous business information, which may be used in another
form of active attack.
Platform as a Service (PaaS)
Offers the capability to deploy onto the cloud infrastructure customer-created
or acquired applications that are created using programming languages or
tools supported by the provider
Policy
Overall intention and direction as formally expressed by management
Port
A hardware interface between a CPU and a peripheral device. Can also refer
to a software (virtual) convention that allows remote services to connect to a
host operating system in a structured manner.
Privacy
Freedom from unauthorized intrusion or disclosure of information of an
individual
Private key
A mathematical key (kept secret by the holder) used to create digital
signatures and, depending on the algorithm, to decrypt messages or files
encrypted (for confidentiality) with the corresponding public key
Procedure
A document containing a detailed description of the steps necessary to
perform specific operations in conformance with applicable standards.
Procedures are defined as part of processes.
Proxy server
A server that acts on behalf of a user. Typically, proxies accept a connection
from a user, decide as to whether or not the user or client IP address is
permitted to use the proxy, perhaps perform additional authentication, and
then complete a connection to a remote destination on behalf of the user.
Public key
In an asymmetric cryptographic scheme, the key that may be widely
published to enable the operation of the scheme
Reciprocal agreement
Emergency processing agreements among two or more organizations with
similar equipment or applications. Typically, participants promise to provide
processing time to each other when an emergency arises.
Recovery action
Execution of a response or task according to a written procedure
Recovery point objective (RPO)
Determined based on the acceptable data loss in case of a disruption of
operations. It indicates the earliest point in time to which it is acceptable to
recover data. It effectively quantifies the permissible amount of data loss in
case of interruption.
Recovery time objective (RIO)
The amount of time allowed for the recovery of a business function or
resource after a disaster occurs
Redundant Array of Inexpensive Disks (RAID)
Provides performance improvements and fault-tolerant capabilities, via
hardware or software solutions, by writing to a series of multiple disks to
improve performance and/or save large files simultaneously
Redundant site
A recovery strategy involving the duplication of key information technology
components, including data or other key business processes, whereby fast
recovery can take place
Request for proposal (RFP)
A document distributed to software vendors requesting them to submit a
proposal to develop or provide a software product
Residual risk
The remaining risk after management has implemented risk response
Resilience
The ability of a system or network to resist failure or to recover quickly from
any disruption, usually with minimal recognizable effect
Risk mitigation
The management and reduction of risk through the use of countermeasures
and controls
Risk tolerance
The acceptable level of variation that management is willing to allow for any
particular risk while pursuing its objective
Risk transfer
The process of assigning risk to another organization, usually through the
purchase of an insurance policy or outsourcing the service
Robustness
The ability of systems to withstand attack, operate reliably across a wide
range of operational conditions and to fail gracefully outside of the
operational range
Role-based access control
Assigns users to job functions or titles. Each Job function or title defines a
specific authorization level
Root cause analysis
A process of diagnosis to establish origins of events, which can be used for
learning from consequences, typically of errors and problems
Rootkit
A software suite designed to aid an intruder in gaining unauthorized
administrative access to a computer system
Secret key
A cryptographic key that is used with a secret key (symmetric) cryptographic
algorithm, that is uniquely associated with one or more entities and is not
made public. The same key is used to both encrypt and decrypt data. The use
of the term “secret” in this context does not imply a classification level, but
rather implies the need to protect the key from disclosure.
Threat
Anything (e.g., object, substance, human) that is capable of acting against an
asset in a manner that can result in harm. A potential cause of an unwanted
incident. (ISO/IEC 13335)
Threat agent
Methods and things used to exploit a vulnerability. Examples include
determination, capability, motive and resources.
Threat analysis
An evaluation of the type, scope and nature of events or actions that can
result in adverse consequences; identification of the threats that exist against
information assets. The threat analysis usually also defines the level of threat
and the likelihood of it materializing.
Threat assessment
The identification of types of threats to which an organization might be
exposed
Threat event
Any event where a threat element/actor acts against an asset in a manner that
has the potential to directly result in harm
Threat model
Used to describe a given threat and the harm it could to do a system if it has a
vulnerability
Threat vector
The method a threat uses to exploit the target
Token
A device that is used to authenticate a user, typically in addition to a user
name and password. A token is usually a device that displays a pseudo
random number that changes every few minutes.
Total cost of ownership (TOC)
Includes the original cost of the computer plus the cost of: software, hardware
and software upgrades, maintenance, technical support, training, and certain
activities performed by users
Transmission Control Protocol (TCP)
A connection-based Internet protocol that supports reliable data transfer
connections
Two-factor authentication
The use of two independent mechanisms for authentication, (e.g., requiring a
smart card and a password); typically, the combination of something you
know, are or have
Uniform resource locator (URL)
The global address of documents and other resources on the World Wide
Web. The first part of the address indicates what protocol to use; the second
part specifies the IP address or the domain name where the resource is
located (e.g., http://www.isaca.org).
Virtual private network (V PN)
A secure private network that uses the public telecommunications
infrastructure to transmit data. In contrast to a much more expensive system
of owned or leased lines that can only be used by one company, VPNs are
used by enterprises for both contracts and wide areas of intranets. Using
encryption and authentication, a VPN encrypts all data that pass between two
Internet points maintaining privacy and security.
Virus signature files
The file of virus patterns that is compared with existing files to determine if
they are infected with a virus or worm
Voice-over IP (VoIP)
Also called IP Telephony, Internet Telephony and Broadband Phone, a
technology that makes it possible to have a voice conversation over the
Internet or over any dedicated Internet Protocol UP) network instead of over
dedicated voice transmission lines
Vulnerability
A weakness in the design, implementation, operation or internal controls in a
process that could be exploited to violate system security
Vulnerability analysis
A process of identifying and classifying vulnerabilities
Warm site
Similar to a hot site, but not fully equipped with all of the necessary hardware
needed for recovery
Web hosting
The business of providing the equipment and services required to host and
maintain files for one or more web sites and provide fast Internet connections
to those sites. Most hosting is “shared,” which means that web sites of
multiple companies are on the same server to share/reduce costs.
Web server
Using the client-server model and the World Wide Web’s Hypertext Transfer
Protocol (HTTP), Web server is a software program that serves web pages to
users.
Wide area network (WAN)
A computer network connecting different remote locations that may range
from short distances, such as a floor or building, to long transmissions that
encompass a large region or several countries
Worm
A programmed network attack in which a self-replicating program does not
attach itself to programs, but rather spreads independently of users’ action
Wi-Fi protected access 2 (WPA2)
The replacement security method for WPA for wireless networks that
provides stronger data protection and network access control. It provides
enterprise and consumer Wi-Fi users with a high level of assurance that only
authorized users can access their wireless networks. Based on the ratified
IEEE 802.1 Ii standard, WPA2 provides government-grade security by
implementing the National Institute of Standards and Technology (NIST)
FIPS 140-2 compliant advanced encryption standard (AES) encryption
algorithm and 802.1X-based authentication.
Index
(ISC)2 90
ACCEPT 44, 173
ACCESS CONTROL 86
ADM 95
ADMINISTRATIVE CONTROL 49
ADVANCED PERSISTENT THREAT 40
ADWARE 88
AESRM 140
AGGREGATED RISK 207
AIW 61
ALE 59, 163
ALLIANCE FOR ENTERPRISE SECURITY RISK MANAGEMENT 140
ALLOWABLE INTERRUPTION WINDOW 61
ALTERNATIVE ROUTING 73
ANNUAL LOSS EXPECTANCY 59, 163
ANNUALIZED RATE OF OCCURRENCE 59
ANTISPAM DEVICE 88
ANTIVIRUS 88
APT 40
ARCHITECTURE CHANGE MANAGEMENT PHASE 97
ARCHITECTURE DEVELOPMENT METHOD 95
ARCHITECTURE VISION PHASE 95
ARO 59
ASSURANCE 16
ASSURANCE INTEGRATION 140
ASSURANCE PROVIDER 273
AUDIT 150
AUTHENTICATE 52, 85
AUTHORIZE 53
AVAILABILITY 85
AVOID 45, 173
BALANCED SCORECARD 98
BASELINE 176
BASELINE SECURITY 228
BAYESIAN ANALYSIS 34
BCP 64
BIA 64
BIASED ASSIMILATION 24
BIASED EVALUATION 24
BIG DATA 112
BMIS 118
BOUNDARIES 147
BOW TIE ANALYSIS 34
BUSINESS ARCHITECTURE PHASE 95
BUSINESS CONTINUITY PLAN 64
BUSINESS IMPACT ANALYSIS 64
BUSINESS INTERRUPTION INSURANCE 29
BUSINESS MODEL FOR INFORMATION SECURITY 118
BUSINESS RESOURCE DEPENDENCY ASSESSMENT 185
BUSINESS VALUE 200
C&C 88
CAPABILITY MATURITY MODEL INTEGRATION 97
CASB 112
CASCADING RISK 207
CENTRAL IRT MODEL 281
CHANGE MANAGEMENT 173
CHECKLIST REVIEW TEST 79
CHIEF INFORMATION OFFICER 136, 137
CHIEF INFORMATION SECURITY OFFICER 135, 137
CHIEF RISK OFFICER 137
CHIEF SECURITY OFFICER 135
CHIEF TECHNOLOGY OFFICER 136
CIO 136, 137
CIS 164
CISO 135
CLOUD ACCESS SECURITY BROKERS 112
CLOUD COMPUTING 109
CLUSTERING 75
CMMI 97
COBIT 90
COBIT 5 145, 163
COBIT 5 FOR INFORMATION SECURITY 90
COBIT 5 PROCESS ASSESSMENT MODEL 93
COLD SITE 69
COMMAND AND CONTROL 88
COMMITTEE OF SPONSORING ORGANIZATIONS OF THE TREADWAY
COMMISSION 90
COMMUNITY CLOUD 111
COMPARTMENTALIZE TO MINIMIZE DAMAGE 53
COMPENSATING CONTROL 48
COMPLIANCE 86, 127
COMPLIANCE ENFORCEMENT 182
CONFIDENTIALITY 85
CONFIRMATION BIAS 24
CONSTRAINTS 25
CONTAGIOUS RISK 209
CONTRACTUAL COMPLIANCE 267
CONTROL 37, 127, 147
CONTROL OBJECTIVES FOR INFORMATION AND RELATED TECHNOLOGIES 90
CONVERGENCE 140
COORDINATING IRT MODEL 281
CORRECTIVE CONTROL 48
COSO 90
COUNTERMEASURE 50
CRITICAL SUCCESS FACTOR 87
CRITICALITY 15
CRO 137
CSF 87
CSO 135
CTO 136
CULTURE 100
DAC 53
DAS 74
DATA STORAGE AND DATA ANALYTICS AS A SERVICE 112
DEFENSE-IN-DEPTH 37, 121
DELPHI METHOD 35
DESIGN 119
DESIRED STATE 103
DETECTIVE CONTROL 48
DETERRENT CONTROL 48
DIRECT ATTACHED STORAGE 74
DISASTER RECOVERY 64
DISASTER RECOVERY AS A SERVICE 111
DISASTER RECOVERY PLAN 64
DISCRETIONARY ACCESS CONTROL 53
DISTRIBUTED IRT MODEL 281
DIVERSE ROUTING 73
DRAAS 111
DRP 64
DUE CARE 83
DUE DILIGENCE 83
DUPLICATE SITE 69
E-DISCOVERY 155
EF 59
EISA 144
EMERGING THREAT 40
ENABLERS 92
ENDOWMENT EFFECT 24
ENFORCEMENT PROCEDURES 182
ENTERPRISE GOVERNANCE 126
ENTERPRISE INFORMATION SECURITY ARCHITECTURE 106, 144
ENTERPRISE RESOURCE PLANNING 180
ENTERPRISE RISK MANAGEMENT 172
ENVIRONMENTAL CONTROLS 56
ERP 180
EVENT TREE ANALYSIS 35
EXPLOIT 37
EXPOSURE 37, 208
EXPOSURE FACTOR 59
FACTOR ANALYSIS OF INFORMATION RISK 207
FAIL SECURE 53
FAIL UNSECURE 53
FAIR 207
FALSE CONSENSUS 24
FAULT TREE ANALYSIS 35
FEDERAL INFORMATION SECURITY MODERNIZATION ACT 90
FIDELITY INSURANCE 152
FIREWALL 88
FIRST-PARTY INSURANCE 152
FISMA 90
FORENSICS AS A SERVICE 113
FORMAL CONTROL 55
FRAAS 113
FULL INTERRUPTION TEST 79
FULL OPERATIONAL TEST 79
GAP ANALYSIS 105, 158, 227
GATEWAY 88
GENERAL CONTROLS 50
GOAL 18
GOALS CASCADE 92
GOVERNANCE 17
GOVERNANCE FRAMEWORKS 159
GRC 127
GROUPTHINK 24
GUIDELINE 21
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT 90
HERDING INSTINCT 24
HIGH-AVAILABILITY 75
HIPAA 90
HOT SITE 69
HYBRID MODEL 111
IAAS 110, 112
IDAAS 112
IDENTITY 52
IDENTITY AS A SERVICE 112
IDS 30, 88
IMPLEMENTATION GOVERNANCE PHASE 97
INCIDENT HANDLING 275
INCIDENT MANAGEMENT 275
INCIDENT RESPONSE 275
INCIDENT RESPONSE PLAN 239, 261
INDEMNITY 187
INFORMATION 125
INFORMATION AS A SERVICE 112
INFORMATION SECURITY GOVERNANCE 125
INFORMATION SECURITY MANAGER 137
INFORMATION SECURITY PROGRAM 251
INFORMATION SECURITY RESOURCE MANAGEMENT 168
INFORMATION SECURITY RESOURCES 168
INFORMATION SYSTEMS PHASE 96
INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY99
INFRASTRUCTURE 106
INFRASTRUCTURE AS A SERVICE 110
INHERENT RISK 46
INTEGRATION PLATFORM AS A SERVICE 112
INTEGRITY 85
INTERDEPENDENCY 43
INTERNAL COMPLIANCE 267
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION
CONSORTIUM, INC. 90
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 90
INTRUSION DETECTION SYSTEM 30, 88
INTRUSION PREVENTION SYSTEM 88
IPAAS 112
IPS 88
IRP 239, 261
ISO 90
ISO/IEC 27004 163
ITIL 99
KEY GOAL INDICATOR 87
KEY PERFORMANCE INDICATOR 87
KEY RISK INDICATOR 87
KGI 87
KILL POINTS 143
KPI 87
KRI 87
LAST-MILE CIRCUIT PROTECTION 74
LAYERED DEFENSE 37
LIFE CYCLE 173
LOAD BALANCING 75
LOGICAL CONTROL 49
LONG-HAUL NETWORK DIVERSITY 73
MAC 53
MALWARE 88
MANAGEMENT 197
MANAGEMENT METRICS 116
MANAGERIAL CONTROL 49
MANDATORY ACCESS CONTROL 53
MARKOV ANALYSIS 35
MAXIMUM TOLERABLE DOWNTIME 61
MAXIMUM TOLERABLE OUTAGE 61
MEASURED POINT 102
MENTAL ACCOUNTING EFFECT 24
METAMETRICS 117
METRIC 102, 147
MIGRATION PLANNING PHASE 96
MIRROR SITE 70
MITIGATE 44, 127, 173
MOBILE SITE 69
MONTE-CARLO ANALYSIS 35
MOTIVATION 43
MTD 61
MTO 61
NAS 74
NATIVE CONTROL TECHNOLOGIES 57
NETWORK AND INTERNET PROTOCOLS 88
NETWORK ATTACHED STORAGE 74
NIST 90
NIST 800-30 136
NIST SP 800-55 164
NONREPUDIATION 85
OCTAVE 34, 99
ONE-WAY HASH 88
OPEN GROUP ARCHITECTURE FRAMEWORK 95
OPERATIONAL METRICS 116
OPERATIONALLY CRITICAL THREAT ASSET AND VULNERABILITY EVALUATION 99
OPPORTUNITIES AND SOLUTIONS PHASE 96
OPTIMISTIC 23
ORGANIZATION 119
OUTSOURCED IRT MODEL 282
OVERCONFIDENCE 23
PAAS 110
PAM 93
PAPER TESTS 79
PARALLEL 79
PDCA 212
PERSONALLY IDENTIFIABLE INFORMATION 205
PHYSICAL CONTROL 50
PII 205
PKI 88
PLAN-DO-CHECK-ACT 212
PLATFORM AS A SERVICE 110
PMO 199
POLICY 18
POLICY EXCEPTION PROCESS 182
POSTTEST PHASE 80
PRA 208
PREDISPOSING CONDITIONS 41
PRELIMINARY PHASE 95
PREPAREDNESS TEST 79
PRETEST PHASE 80
PREVENTATIVE CONTROL 48
PRINCIPLE OF LEAST PRIVILEGE 15
PRIVACY 86
PRIVATE CLOUD 110
PROBABILISTIC RISK ASSESSMENT 208
PROBABILITY 43
PROBLEM MANAGEMENT 234
PROCEDURAL CONTROL 49
PROCEDURE 20, 22
PROCESS REFERENCE MODEL 93
PROCESSES 120, 147
PROJECT MANAGEMENT OFFICE 199
PROXIMITY 43
PUBLIC CLOUD 111
QUALITATIVE 103
QUALITATIVE ANALYSIS 31
QUANTITATIVE 103
QUANTITATIVE ANALYSIS 34
RACI CHART 81
RAID 74
RECIPROCAL AGREEMENT 70
RECOVERY POINT OBJECTIVE 61
RECOVERY TIME OBJECTIVE 60
RED-AMBER-GREEN REPORTS 245
REDUNDANCY 73
REDUNDANT ARRAY OF INEXPENSIVE DISKS 74
REFERENCE ARCHITECTURE 144
REFERENCE POINT 102
REQUIREMENTS MANAGEMENT BLOCK 97
RESIDUAL RISK 29, 46
RESOURCES 25, 119
RESPONSIBILITY 81
RETURN ON SECURITY INVESTMENT 163
RIGHT-TO-AUDIT 187
RIGHT-TO-INSPECT 187
RISK 37, 42, 43, 208
RISK ACCEPTANCE 28
RISK ANALYSIS 31
RISK ANALYSIS PHASE 172
RISK APPETITE 27
RISK CAPACITY 27
RISK EVALUATION PHASE 172
RISK IDENTIFICATION 208
RISK IDENTIFICATION PHASE 172
RISK MANAGEMENT 127, 172
RISK REGISTER 44
RISK TOLERANCE 27
ROLE 81
ROSI 163
ROUTER 88
RPO 61
RTO 60
SAAS 110
SAN 74
SARBANES-OXLEY ACT 90
SDLC 174
SDO 61
SECAAS 111
SECURITY AS A SERVICE 111
SECURITY INFORMATION AND EVENT MANAGER 287
SECURITY PROGRAM 251
SEGREGATION OF DUTIES 15
SELECTIVE RECALL 24
SEMIQUANTITATIVE ANALYSIS 32
SERVICE DELIVERY OBJECTIVE 61
SIEM 287
SIMULATION TEST 79
SINGLE LOSS EXPECTANCY 59
SKILL 44, 82
SLE 59
SMART 102
SOD 15
SOFTWARE AS A SERVICE 110
SOX 90
SPYWARE 89
STAGE GATES 143
STATUS QUO BIAS 23
STATUTORY COMPLIANCE 267
STEERING COMMITTEE 135
STORAGE AREA NETWORK 74
STRATEGIC ALIGNMENT 271
STRATEGIC METRICS 116
STRATEGICALLY ALIGNED 170
STRATEGY 18, 23, 119
STRUCTURED WALKTHROUGH 79
SUPPLEMENTAL CONTROL TECHNOLOGY 57
SUPPORT TECHNOLOGIES 57
SWOT 227
SYSTEM DEVELOPMENT LIFE CYCLE 174
SYSTEM THEORY 118
SYSTEMIC RISK 209
SYSTEMS THINKING 118
TCO 16
TECHNICAL CONTROL 49
TECHNOLOGY 120
TECHNOLOGY ARCHITECTURE PHASE 96
TEST PHASE 80
THE CENTER FOR INTERNET SECURITY 164
THIRD-PARTY INSURANCE 152
THREAT 37
THREAT AGENT 37
TOGAF 95
TOTAL COST OF OWNERSHIP 16
TOTAL QUALITY MANAGEMENT 212
TQM 212
TRANSFER 45, 173
TRANSPARENCY 54
TRUST 54
TRUST NO ONE 54
UNAUTHORIZED DISCLOSURE 15
US NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 90
VALUE AT RISK 34, 163
VALUE DELIVERY 168, 272
VAR 34, 163
VELOCITY 43
VIRTUALIZATION 89
VISIBILITY 44
VOICE RECOVERY 74
VOIP 89
VOLATILITY 43
VULNERABILITY 36
VULNERABILITY MANAGEMENT 42
WARM SITE 69
WIRELESS SECURITY 89
ZERO-DAY VULNERABILITY 40