ISMS at CDC - Oct 2011
ISMS at CDC - Oct 2011
ISMS at CDC - Oct 2011
Presented to Prof. M. Moinuddin Ali Khan and team Institute of Business Management
October 26, 2011
Synopsis
Information security - key driver since inception; Enterprise Security unit established in 2001; Multilayered security approach to ensure faulttolerance; Core depository function certified against ISO 27001; SOC for visibility, control and automation.
CIO
Department Heads
CISO
Enterprise Security
Champion Users
4
Others
Email BlackBerry GL / Payroll IVR, Call Center, Internet
Databases Technologies
10 Enterprise Class Servers 28 TBs of 3 different Ent. Storage
Application Servers
50 + Servers by 3 different vendors
Real-time live data service to NCCPL and all 3 Stock Exchanges Multiple database servers (primary & standby) to support alternate channels Separate Dev / QA / UAT environments
8 offices in 5 cities 3 inter-connected datacenters with data replicated in real-time, and providing connectivity hubs Live connectivity to 100,000 clients
Are systems available when required? Are controls appropriate to the risks? Who is accessing information? Can reliable services be developed?
How are customer details protected? In how many forms are the details available? How is physical security managed? How are vendors managed? Control How is IT service quality? How are service-levels? costs? How is IT security ensured? How is compliance done? How is compliance with legal and regulatory requirements performed? What are links usage? Database / application performance? Capacity management?
Are privileged user activity monitored? How are logs protected? Are logs centrally managed? Tamper proof? How to provide assurance to board?
11 departments, 2 locations Applicable controls 131 out of 133 9 months implementation Certified by SGS / UKAS in Sept 2009
i
Proprietary - Authorized Distribution Only 9
BS 25999
HOW
IBTRM
SCOPE OFCOVERAGE
11
Establish
Implement
Maintain
Monitor
12
Establish
Maintain
Management review Residual risk acceptance Corrective / preventive actions
Monitor
Measure effectiveness Internal audits Vulnerability assessment
13
14
ISMS Framework
Poli cies ISMS Manual Management
Procedures
Operations
15
Open Discussion
Security is an attitude.
16