A.K Sharma, STQC
A.K Sharma, STQC
A.K Sharma, STQC
by A K SHARMA
Additional Director STQC, Department of IT Ministry of Commns. & IT Govt. of India [email protected]
3/10/2014
Objective
Q
To be a key enabler in making Indian IT organisations
achieve compliance with International Quality Standards and
compete globally
3/10/2014
Testing
IT Services
STQC IT Centres
Calibration
Certification
Calibration Laboratories
Training
3/10/2014
STQC Network
Solan Mohali Delhi Jaipur Guwahati Agartala
Countrywide network comprising STQC HQs at New Delhi and 15 subordinate units
Bengaluru
Chennai
ThiruPuram
3/10/2014
Standards formulation
STQC IT
IT Service Management
3/10/2014
3/10/2014
Framework Which is
Flexible Dynamic Effective Covers
to incorporate other best practices (IM, RM, BCM, SLM .) in keeping pace with changing technological infrastructure enough to address Business needs Key issues related to People, Process, Technology
3/10/2014
3/10/2014
10
What is needed?
Management concerns
Market reputation
Business continuity Disaster recovery Business loss Loss of confidential data Loss of customer confidence Legal liability Cost of security
3/10/2014
11
A.12 Access control A.13 Incident Management A.14 Business continuity A.15 Compliance
3/10/2014
12
7.1 resources 7.2 Competence 7.3 Awareness 7.4 Communication 4. Context of the organization 7.5 Documented Information 4.1. Understanding the organisation and its context. 7.5.1 General 4.2. Understand the needs and expectations of 7.5.2 Creating & Updating 7.5.3 Control of documented information interested parties. 8. Operation 4.3. Determining the scope of the ISMS.
4.4 ISMS management system 5. Leadership 5.1 Leadership and commitment 5.2 Policy 5.3 Organization roles, responsibilities and authorities 6. Planning
9.2 Internal Audit 9.3 Management Review 6.1 Actions to address risks and opportunities10. Improvement 10.1 Non Compliance & Corrective action 6.2 ISMS objectives and planning to achieve them
13
6. Planning
6.1 Actions to address risks and opportunities
When planning for the ISMS, the organization shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to
integrate and implement the actions into its ISMS processes evaluate the effectiveness of these actions.
3/10/2014
14
8.
Operations
8.2 Information Security Risk Assessment 8.3 Information Security Risk Treatment
3/10/2014
15
Training
Network review
Training
Policy Review
Risk Analysis
3/10/2014
16
increase reduce
increase
expose
Assets
have
3/10/2014
17
3/10/2014
18
3/10/2014
19
PRINCIPLES
a) b) c) d) e) f) g) h) i) j) k)
Creates value Integral part of organizational processes Part of decision making Explicitly addresses uncertainty Systematic, structured and timely Based on the best available information Tailored Takes human and cultural factors into account Transparent and inclusive Dynamic, iterative and responsive to change Facilitates continual improvement and enhancement of the organization
3/10/2014
20
21
location(s) of operation Past security incidents/ breach data Vulnerability assessment reports Penetration test reports Discussion with stake-holders.
3/10/2014
22
earlier slide Risk assessment tend to be voluminous task and therefore given up in between Risk assessment output matched with known and manageable risks All assets not covered in the risk assessment Risk assessment output either too optimistic (All risks within acceptable limits) or too pessimistic (most assets beyond acceptable risks).
Risk Mitigation Through ISMS Framework 23
3/10/2014
Practical tips
Finalise the RA and RM Procedure
adequate granularity to ensure sufficient resolution in risk for different asset values and their associated threats and vulnerabilities.
Train the concerned groups on this procedure All asset owners to find risks. There may be a common
assets found to have higher risk, it is desirable to have a moderation session along with stakeholders and security co-ordination group before the findings are presented to management.
3/10/2014
24
Summary
Risk Assessment is one of the most important task in
evaluating the security requirements of the organization The Organization need to evolve a suitable Risk Assessment strategy and define the Acceptable Risk Levels. Risk assessment should cover all the assets covered in the scope Risk Assessment is not a once off exercise and has to be periodically done.
3/10/2014
25
THANK YOU
3/10/2014
27
Risk management
The process of identifying, controlling and
minimizing or eliminating security risks (that may affect information systems) for affordable cost. RM includes RA and Risk Treatment.
Transfer
Avoid
Accept
Reduce
Probability
3/10/2014
28
EXTERNAL CONTEXT
The external context can include,
The external context is the external environment in which the organization seeks to achieve its objectives.
the social and cultural, political, legal, regulatory, financial, technological, economic, natural and competitive environment, whether international, national, regional or local; key drivers and trends having impact on the objectives of the organization; and relationships with, perceptions and values of external stakeholders.
3/10/2014
29
EXTERNAL CONTEXT
The external context is the external environment in which the organization seeks to achieve its objectives.
The external context can include, the social and cultural, political, legal, regulatory, financial, technological, economic, natural and competitive environment, whether international, national, regional or local; key drivers and trends having impact on the objectives of the organization; and relationships with, perceptions and values of external stakeholders.
3/10/2014
30
RISK TREATMENT
5.5.1
c) removing the risk source; d) changing the likelihood; e) changing the consequences; f) sharing the risk with another party or parties (including contracts and risk financing); and g) retaining the risk by informed decision.
3/10/2014
31