Lecture 4 Cyber Security Plans and Policies
Lecture 4 Cyber Security Plans and Policies
Lecture 4 Cyber Security Plans and Policies
Cyber Security
Lecture 4:
Cyber Security Plans and Policies
Learning Objectives
• Identify the roles in organizations that are active in planning
• Explain strategic organizational planning for information security
• Explain the principal components of Info. Sec system implementation planning in the
organizational planning scheme
• Recognize the importance of security policies
• Understand the various policies and the rationale for them
• Know what elements go into good policies
• Create policies for network administration
• Evaluate and improve existing policies
• Developing Information Security Policy
• Policy Development and Implementation using the SDLC
2
The Role of Planning
• Successful organizations utilize planning
• Planning involves:
Representatives of the three communities of interest
Individuals internal and external to the organization
Employees
Management
Outside stakeholders
4
The Mission Statement
• A mission statement explicitly declares the business of the
organization and its intended areas of operations.
• The mission statement explains what the organization does and for
whom
• Example: Random Widget Works designs and manufactures quality widgets and
associated equipment and supplies for use in modern business environments.
5
Vision Statement
• The vision statement expresses where the organization wants to go, while the
mission statement describes how it wants to get there.
• Taken together, the mission, vision, and values statements provide the
philosophical foundation for planning and guide the creation of the strategic
plan.
6
Values Statement
• By establishing a formal set of organizational principles and qualities in a
values statement, as well as benchmarks for measuring behavior against
these published values, an organization makes its conduct and performance
standards clear to its employees and the public.
7
Strategic Planning - Discussion
9
Top-down Strategic Planning
Operational Planning –
• used by managers and employees to
organize the ongoing, day-to-day
performance of tasks
• includes clearly identified coordination
activities across department
boundaries such as:
communications requirements
weekly meetings
Summaries
progress reports
13
Planning and the CISO
• The priority of the Chief Information Security Officer (CISO) and the
InfoSec management team should be the structure of a strategic plan.
• While each organization may have its own format for the design and
distribution of a strategic plan, the fundamental elements of planning
are the same for all types of enterprises.
14
Typical Strategic Plan Elements
• The basic components of a typical organizational-level strategic plan
include:
1. Executive Summary
2. Mission, Vision and Values Statements
3. Organizational Profile and History
4. Strategic Issues and Challenges
5. Organizational Goals and Objectives
6. Major Business Units (or Products/Services) Goals and Objectives
7. Appendices (as applicable) – market analyses, internal/external
surveys, budgets, and R&D projections.
15
Tips For Planning
1. Articulate a comprehensive and meaningful vision statement that shares the
organizations intent, to attract others to join in the effort to achieve that goal.
2. Try to bring a sense of logical analysis of the objectives and what has been
accomplished; for example, by using tools to track outcomes against intentions
to measure effects against prior actions.
3. Work from an overarching plan that has been developed with the input from
key stakeholders.
4. Seek transparency in planning to make planning changes understandable by
stakeholders.
5. Make planning a process that engages everyone involved to work toward the
common objectives
16
Tips For Planning (Cont. )
6. Stick with the process over times since results may not always be achieved as
quickly as intended.
7. Develop consistent and repeatable methods of planning that are adopted as
part of the organization’s culture.
8. Explain what is being done so that stakeholders understand the intentions of
the process.
9. Use processes that fit the organization’s culture.
10. Make the process as engaging as possible so that participants are not
overwhelmed and feel put upon by the required actions.
17
Planning for InfoSec Planning
• CIO and CISO play important roles in translating overall strategic planning into tactical and
operational InfoSec plans.
• CIO
translates strategic plan into departmental and InfoSec objectives.
Ensure that the various IT functional areas in the organization provide broad support
for the plan.
• CISO
translates InfoSec objectives into tactical and operational objectives.
Reports to CIO.
Convince the CIO of the priorities of the InfoSec program, both within and outside of
the IT function.
18
Implementing the Security Program using
the SecSDLC
• Scaled up the SDLC approach to support the design, implementation and
maintenance of an entire security program.
• The SecSDLC process involves the identification of specific threats and the risks
that they represent as well as the subsequent design and implementation of
specific controls to counter those threats and manage the risk.
19
The benefits:
20
SecSDLC Waterfall Methodology
21
Investigation Phase
for SecSDLC
• Identifies problem to be solved
23
Analysis in the SecSDLC
• In analysis phase, the team studies the documents
from the investigation phase.
25
Design elements
• Information security policy
• Management must define
General security policy
Issue-specific security policy
Systems-specific security policy
• SETA - Security education, training and awareness program contains
Security education
Security training
Security awareness
• The design phase continues with the formation of the Controls and Safeguards:
• Managerial controls
• Operational controls
• Technical controls 26
Managerial Control
• Address the design, scope and implementation of the security
planning process & security program
27
Operational Controls
• Manages functions and lower-level planning
Disaster recovery
Incident response planning
Personal security
Physical security
Protection of production inputs and output
28
Technical Controls
• Addresses tactical issues &
technical issues related to design
and implementing security.
29
Contingency planning
• Another element of the design phase is the creation of contingency
planning.
30
Physical security
• In design phase, physical security needs to be addressed.
31
• Acquire, test, implement, and
Implementation retest security solutions.
32
Management of the Project Plan
33
Project Team
• Should consist of individuals experienced in one
or multiple technical and nontechnical areas.
• Organizations should examine the options for staffing the information security
function
36
Why policy?
• Policy is the essential foundation of an effective information security
program.
• The success of any information security program lies in policy
development.
• In 1989, the National Institute of Standards and Technology (NIST)
addresses this point as:
38
Why policy?
Policy may be difficult to implement. The following guidelines can help
in the formulation of IT policy as well as InfoSec policy:
39
What is a Cybersecurity Policy?
• Cybersecurity policy: Document that states how an organization plans
to protect its information assets and information systems and ensure
legal and regulatory compliance
• Asset: A resource with a value
• Information asset: Any information item, regardless of storage format,
that represents value to the organization
• Examples: Customer data, employee records, IT information, reputation, and
brand
Policies define what you can do and not do, whereas the other
documents focus on the how.
41
Policy, Standards, and Practices
43
Defining User Policies
• System misuse is a major issue for organizations
• Effective user policies must be clear and specific
• User policies must cover these areas:
• Passwords
• Internet use
• Email usage
• Installing/uninstalling software
• Instant messaging
• Desktop configuration
• Bring your own device (BYOD)
• Variations: CYOD, COPE, COBO
44
Defining System Administration Policies
Organizations must clearly define system administration
policies
• New employees
• Access to resources and applications
• Computer security and acceptable use policies
• Departing employees
• Terminate logins, accounts, and access to all systems
• Obtain facility keys and search former employee’s workstation
• Change requests
• Monitor access to resources
• Software, hardware, and website changes
45
Security Breaches
• Most networks will experience a security breach
• Types of breaches include:
• Virus infection
• Quarantine and isolate infected machine(s); scan and clean
• DoS attacks
• Use firewall logs or IDS to locate the source of the attack
• Intrusion by a hacker
• Copy logs of affected systems and scan all systems
• Log incidents and notify appropriate personnel
46
Defining Access Control
• Trade-offs must be made between access and security
• Least privileges – each person is given the minimum
system access necessary to perform their job
• Implicit deny – all users are implicitly denied access to
network resources until an administrator explicitly grants
them
• Other important access control concepts include:
• Separation of duties
• Job rotation
• Mandatory vacations
47
Development Policies
• Flawed code will result in security breaches
• All programming code must be checked for
backdoors/Trojan horses
• Buffers must have error handling implemented
• Communications must adhere to guidelines
• Code that opens ports must be documented
• Input should be filtered to prevent attacks
• Vendors should document that there are no security
flaws in its code
48
Standards, Guidelines, and Procedures
• These documents relate to and support policies
• Standard – statement of desired level of operation
• Guideline – suggestion about how to achieve standard
• Procedure – instructions on how to handle issues
• Data classification
• Public information – no restrictions on who can view
• Private information – intended for internal use only
• DoD clearances
• Confidential, secret, top secret, and top secret SCI
49
Disaster Recovery
• Disaster – any event that significantly disrupts an
organization’s operations
• Documents that prepare for disasters include:
• Disaster recovery plan (DRP)
• Plan to return business to normal operations after disaster
• Business continuity plan (BCP)
• Plan to get minimal business functions back up and running
• Impact analysis
• States the damage to your organization that a given disaster might
cause
50
Disaster Recovery (cont.)
• Disaster recovery and business continuity standards
• ISO 27035 – detecting, reporting, responding to incidents
• NIST 800-61 – guidance on incidence response teams, response
procedures, and related items
• Fault tolerance – three primary backup types:
• Full – backup of all changes
• Differential – all changes since last full backup
• Incremental – all changes since previous backup
51
Guidelines for Effective Policy
For policies to be effective and legally defensible, they must be
properly:
1. Developed using industry-accepted practices, and formally
approved by management (Development)
2. Distributed using all appropriate methods (Dissemination)
3. Read by all employees (Review)
4. Understood by all employees (comprehension)
5. Formally agreed to by act or affirmation (compliance)
6. Uniformly applied and enforced (uniform enforcement)
52
Developing Information Security Policy
• View policy development as three-part project:
• First part – designed and written
• Second part - review and formally approve the document
• Third part - perpetuate the policy within the organization.
53
Policy Distribution
• The most common alternatives are hard copy distribution and
electronic distribution.
• Ensure that the policy actually reached the end users
• Hard copy distribution
• Directly distributing a copy to the employee
• Posting in a publicly available location (Bulletin board)
• Electronic distribution
• E-mail
• Newsletter
• Intranet
• Document management systems
54
Policy Reading
• Literacy or language issues – barriers to reading policies
• Visually impaired employees also require additional assistance
• Audio
• Large-type versions of documents
• Simple translations of policy documents
55
Policy Comprehension
• A quote attributed to Confucius states: “Tell me and I forget; show
me and I remember; let me do and I understand.”
• Employee can review a policy; may not ensure that they truly
understand what the policy requires of them.
• Policy documents must be
• Written at reasonable reading level
• Minimal technical jargon and management terminology
• Uses some form of assessment to gauge how well employees
understand the policy’s underlying issues.
• Quizzes
• Other forms of examination
56
Policy Compliance
• Policy compliance means the employee must agree to the policy
• Can an employee refuses to agree to comply with policy?
• not yet been adjudicated in the legal system
• Can be avoided by incorporating policy confirmation statements into
employment contracts, annual evaluations, or other documents
57
Policy Enforcement
• Final component of the design and implementation of effective
policies.
• Policy enforcement must be able to withstand external scrutiny.
58
Policy Development and Implementation using the
SDLC
• A policy development or redevelopment project should be:
• Well planned
• Properly funded
• Aggressively managed to ensure that is completed on time and within
budget
• The policy development project can be guided by the systems
development life cycle (SDLC) process
59
Policy Development and Implementation using the
SDLC
Investigation Phase
• Obtain support from senior management.
• Obtain support and active involvement of IT management,
specifically the CIO.
• Clear articulation of goals.
• Participation of the correct individuals affected by the
recommended policies.
• A detailed outline of the scope of the policy development project
and estimates for the cost and scheduling of the project.
60
Policy Development and Implementation using the
SDLC
Analysis Phase
Should produce the following:
• A new or recent risk assessment or IT audit documenting the
current InfoSec needs of the organization.
• Gathering of key reference materials, including any existing policies.
61
Policy Development and Implementation using the
SDLC
Design Phase
• Drafting of the actual policy document.
• Commonly done by a single author.
• Document should incorporate all specifications and restrictions from
the previous phases.
• Resources at your disposal, including:
• The web
• Government sites
• Professional literature
• Peer networks
• Professional consultants
62
Policy Development and Implementation using the
SDLC
Implementation Phase
• Create a plan to distribute and verify the distribution of the policies
• Members of the organization must explicitly acknowledge that they
have received and read the policy (compliance).
• Attach a cover sheet that states “I have received, read, understood, and
agreed to this policy”.
• A banner screen that displays a brief statement
• Pop-up windows to display end-user license agreements (EULAs)
• Compliance assessment, such as short quiz
• ensures that the policy is properly distributed, read, understood,
and agreed to by those to whom it applies
63
Policy Development and Implementation using the
SDLC
Maintenance Phase
• monitors, maintains, and modifies the policy as needed to ensure
that it remains effective as a tool to meet changing threats.
• users can report problems, preferably anonymously through a Web
form.
• Monitored either by the organization's legal team or a committee assigned.
• make sure that everyone is required to follow the policy equally
• policies are not implemented differently in different areas or hierarchies of
the organization
• uniform enforcement
64
Successful Policy Characteristics
• Endorsed • Adaptable
• Management supports the • The policy can be changed
policy
• Enforceable
• Relevant • Controls that can be used to
• The policy is applicable and support and enforce the
supports the goals of the policy exist
organization
• Inclusive
• Realistic • The policy scope includes all
• The policy makes sense relevant parties
• Attainable
• The policy can be successfully
implemented
67
Summary
• Planning is central to the management of any organization and is based on the
preparation, application, and control of a sequence of action steps to achieve
specific goals.
• Strategic planning lays out the long-term direction to be taken by the organization
and guides organizational efforts.
• InfoSec governance is the process of creating and maintaining the organizational
structures that manage the InfoSec function within an enterprise.
• The traditional SDLC can be adapted to support the specialized implementation of a
security project by using the SecSDLC.
68
Summary
• Technology is not enough to ensure a secure network
• Create clear and specific policies detailing procedures on your network:
• Employee computer resource use
• New employees and outgoing employees
• Access rights
• How to respond to an emergency
• Security of code in applications and websites
• User policies must cover all aspects of how the user is expected to use
company technology and be enforced
• IT staff also needs clearly defined policies
• Developing effective Information Security Policy
• Policy Development and Implementation using the SDLC
69