SlideShare una empresa de Scribd logo
1 de 36
Building the Framework for a
Culture of Security

A Short Primer for Developing Security Policies




                                                     1
                                             3/28/2009
Introduction for Policy
 The foundation of an effective information
  security program
   – Source for standards, processes,
     procedures, and lower level policy
 Definitions:
   – Policy: high level goals and objectives
   – Standard: mandatory language supporting
     policy
   – Process: implements a policy or standard
   – Procedure: implements a process
   – Guidelines: recommendations                      2
                                              3/28/2009
Agenda
    Policy Framework

    Trust and Trust Models

    Culture

    Policy Design Process

    Policy

    –   Requirements
    –   Structure
    –   Major policies
    –   Elements and Sample
                                      3
                              3/28/2009
Overview - A Security Policy
Framework
    Policies define appropriate behavior.

    Policies set the stage in terms of what tools and

    procedures are needed.
    Policies communicate a consensus.

    Policies provide a foundation for HR action in

    response to inappropriate behavior.
    Policies may help prosecute cases.

                                         Awareness
                                                     AUP   Lapto
                                                           p
                                         Remot
                                                           Email
                                         e
                                                     VP
                                         Access
                                                     N
                                                                     4
                                                             3/28/2009
Who and What to Trust
    Trust is a major principle underlying the

    development of security policies.
    Initial step is to determine who gets access.

    Deciding on level of trust is a delicate

    balancing act.
    – too much trust may lead to eventual security
      problems
    – too little trust may make it difficult to find and
      keep employees
    How much should you trust resources or

    people?
                                                                   5
                                                           3/28/2009
Possible Trust Models
    Trust everyone all of the time:

    – easiest to enforce, but impractical
    – one bad apple can ruin the whole barrel
    Trust no one at no time:

    – most restrictive, but also impractical
    – difficult to staff positions
    Trust some people some of the time:

    – exercise caution in amount of trust given
    – access is given out as needed
    – technical controls are needed to ensure trust is
      not violated
                                                                 6
                                                         3/28/2009
Why the Political Turmoil?
    People view policies as:

    – an impediment to productivity
    – measures to control behavior
    People have different views about the need

    for security controls.
    People fear policies will be difficult to follow

    and implement.
    Policies affect everyone within the

    organization.

                                                               7
                                                       3/28/2009
Who Should Be Concerned?
    Users - policies will affect them the most.

    System support personnel - they will be

    required to implement, comply with and
    support the policies.
    Managers - they are concerned about

    protection of data and the associated cost of
    the policy.
    Company lawyers and auditors - they are

    concerned about company reputation,
    responsibility to clients/customers.

                                                            8
                                                    3/28/2009
The Policy Design Process
    Choose the policy development team.

    Designate a person or “body” to serve as

    the official policy interpreter.
    Decide on the scope and goals of the policy.

    Scope should be a statement about who is

    covered by the policy.
    Decide on how specific to make the policy.

    – not meant to be a detailed implementation plan
    – don’t include facts which change frequently
                                                               9
                                                       3/28/2009
The Policy Design Process
    A sample of people affected by the policy

    should be provided an opportunity to review
    and comment.
    A sampling of the support staff effected by

    policy should have an opportunity to review
    it.
    Incorporate policy awareness as a part of

    employee orientation.
    Provide a refresher overview course on

    policies once or twice a year.
                                                         10
                                                  3/28/2009
Basic Policy Requirements
    Policies must:

    – be implement able and enforceable
    – be concise and easy to understand
    – balance protection with productivity
    Policies should:

    –   state reasons why policy is needed
    –   describe what is covered by the policies
    –   define contacts and responsibilities
    –   discuss how violations will be handled
                                                          11
                                                   3/28/2009
Level of Control
    Security needs and culture play major role.

    Security policies MUST balance level of

    control with level of productivity.
    If policies are too restrictive, people will find

    ways to circumvent controls.
    Technical controls are not always possible.

    You must have management commitment

    on the level of control.

                                                               12
                                                        3/28/2009
Policy Structure
  Dependent on company size and goals.

 One large document or several small ones?
   – smaller documents are easier to maintain/update
 Some policies appropriate for every site, others are
  specific to certain environments.
 Some key policies:
  –acceptable use
  –remote access
  –information protection
  –perimeter security
  –baseline host/device security
                                                                13
                                                         3/28/2009
MAJOR POLICIES
    Acceptable Encryption
                                 DMZ Equipment
                              
    Application Service
                                 Extranet
                              
    Providers
                                  Host Security
                              
    Acceptable User

                                  Lab Security
                              
    Acquisition

                                  Anti-Virus
                              
    Assessment
    Audit                         Router/Switch
                             
    Risk Assessment
                                 Wireless
                              
    Information Sensitivity       Communications

    Password
                                 Remote Access
                              
    Laptop Security
                                 VPN
                              

                                                          14
                                                   3/28/2009
The Acceptable Use Policy
  Discusses and defines the appropriate

  use of the computing resources.
 Users should be required to read and
  sign AU policy as part of the account
  request process.
 A key policy that all sites should have.




                                                    15
                                             3/28/2009
Some Elements
    Should state responsibility of users in terms

    of protecting information stored on their
    accounts.
    Should state if users can read and copy files

    that are not their own, but are accessible to
    them.
    Should state level of acceptable usage for

    electronic mail, internet news and web
    access.
    Should discuss acceptable non-business uses

    of the resources.
                                                           16
                                                    3/28/2009
Remote Access Policy
    Outlines and defines acceptable methods of

    remotely connecting to the internal network.
    Essential in large organization where

    networks are geographically dispersed and
    even extend into the homes.
    Should cover all available methods to

    remotely access internal resources:
    –   dial-in (SLIP, PPP)
    –   isdn/frame relay
    –   telnet/ssh access from internet
    –   cable modem/vpn/DSL
                                                          17
                                                   3/28/2009
Some Elements
 Should define who can have remote access.
 Should define what methods are allowed for
  remote access.
 Should discuss who is allowed to have high-
  speed remote access such as ISDN, frame
  relay or cable modem.
  – extra requirements
  – appropriate use
 Should discuss any restrictions on data that
  can be accessed remotely.

                                                        18
                                                 3/28/2009
Information Protection Policy
    Provides guidelines to users on the

    processing, storage and transmission of
    sensitive information.
    Main goal is to ensure information is

    appropriately protected from modification or
    disclosure.
    May be appropriate to have new employees

    sign policy as part of their initial orientation.
    Should define sensitivity levels of

    information.
                                                               19
                                                        3/28/2009
Some Elements
    Should define who can have access to

    sensitive information.
    – need-to-know.
    – special circumstances
    – non-disclosure agreements
 Should define how sensitive information is to
  be stored and transmitted (encrypted,
  archive files, uuencoded, etc).
 Should define on which systems sensitive
  information can be stored.
                                                         20
                                                  3/28/2009
Some Elements
    Should discuss what levels of sensitive

    information can be printed on physically
    insecure printers.
    Should define how sensitive information is

    removed from systems and storage devices:
    – degaussing of storage media
    – scrubbing of hard drives
    – shredding of hardcopy output
    Should discuss any default file and directory

    permissions defined in system-wide
    configuration files.
                                                           21
                                                    3/28/2009
The Perimeter Security Policy
  Describes, in general, how perimeter

  security is maintained.
 Describes who is responsible for
  maintaining it.
 Describes how hardware and software
  changes to perimeter security devices
  are managed and how changes are
  requested and approved.

                                                 22
                                          3/28/2009
Some Elements
    Should discuss who can obtain privileged

    access to perimeter security systems.
    Should discuss the procedure to request a

    perimeter device configuration change and
    how the request is approved.
    Should discuss who is allowed to obtain

    information regarding the perimeter
    configuration and access lists.
    Should discuss review cycles for perimeter

    device system configurations.
                                                        23
                                                 3/28/2009
Virus Protection and
Prevention Policy
    Provides baseline requirements for the use

    of virus protection software.
    Provides guidelines for reporting and

    containing virus infections.
    Provides guidelines for several levels of virus

    risk.
    Should discuss requirements for scanning

    email attachments.
    Should discuss policy for the download and

    installation of public domain software.
                                                             24
                                                      3/28/2009
Virus Protection and
Prevention Policy
  Should discuss frequency of virus data

  file updates.
 Should discuss testing procedures for
  installation of new software.




                                                  25
                                           3/28/2009
Password Policy
    Provides guidelines for how user level and

    system level passwords are managed and
    changed.
    Discusses password construction rules.

    Provides guidelines for how passwords are

    protected from disclosure.
    Discusses application development

    guidelines for when passwords are needed.
    Discusses the use of SNMP community

    strings and pass-phrases.
                                                        26
                                                 3/28/2009
Other Important Policies
    A policy which addresses forwarding of

    email to offsite addresses.
    A policy which addresses wireless networks.

    A policy which addresses baseline lab

    security standards.
    A policy which addresses baseline router

    configuration parameters.
    A policy which addresses requirements for

    installing devices on a dirty network.
                                                         27
                                                  3/28/2009
Security Procedures
    Policies only define quot;whatquot; is to be

    protected.
    Procedures define quot;howquot; to protect

    resources and are the mechanisms to
    enforce policy.
    Procedures define detailed actions to take

    for specific incidents.
    Procedures provide a quick reference in

    times of crisis.
    Procedures help eliminate the problem of a

    single point of failure (e.g., an employee
    suddenly leaves or is unavailable in a time of        28
    crisis).                                       3/28/2009
Configuration Management
Procedure
    Defines how new hardware/software is

    tested and installed.
    Defines how hardware/software changes are

    documented.
    Defines who must be informed when

    hardware and software changes occur.
    Defines who has authority to make

    hardware and software configuration
    changes.
                                                       29
                                                3/28/2009
Data Backup and Off-site
Storage Procedures
    Defines which file systems are backed up.

    Defines how often backups are performed.

    Defines how often storage media is rotated.

    Defines how often backups are stored off-

    site.
    Defines how storage media is labeled and

    documented.


                                                         30
                                                  3/28/2009
Incident Handling Procedure
    Defines how to handle anomaly investigation

    and intruder attacks.
    Defines areas of responsibilities for members

    of the response team.
    Defines what information to record and

    track.
    Defines who to notify and when.

    Defines who can release information and the

    procedure for releasing the information.
    Defines how a follow-up analysis should be

    performed and who will participate.                    31
                                                    3/28/2009
Recap
  Policies are a crucial part of the

  infrastructure.
 Trust is frequently an issue.
 Key policies:
    – acceptable use policy - remote access policy
    – information protection policy
    – perimeter security management policy
 Key procedures:
    – CM procedure
    – incident handling procedure
                                                            32
                                                     3/28/2009
Seven Keys
    to Successful Employee
Involvement in Security Policies



                                      33
                               3/28/2009
Understanding is key

    Training is essential

    Small statements are not only beautiful, but

    memorable
    Buy-ins come from ut-offs

    Failures, breaches or mistakes have

    consequences
    Always ask for input

    Create a “neighborhood watch” mentality


                                                          34
                                                   3/28/2009
Where to Get More Information
It is difficult to find general resources for business
oriented policies. Many companies consider their
security policies to be sensitive information.

Template

Any other ideas?
   – Training, books, articles, electronic sources

                                                                35
                                                         3/28/2009
Questions?
             Thank you

              Break

      Increasing Awareness
        to Improve Security


                                     36
                              3/28/2009

Más contenido relacionado

La actualidad más candente

Best practices in NIPS - Brighttalk - January 2010
Best practices in NIPS - Brighttalk - January 2010Best practices in NIPS - Brighttalk - January 2010
Best practices in NIPS - Brighttalk - January 2010EQS Group
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010EQS Group
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_securitySerious_SamSoul
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 

La actualidad más candente (14)

Best practices in NIPS - Brighttalk - January 2010
Best practices in NIPS - Brighttalk - January 2010Best practices in NIPS - Brighttalk - January 2010
Best practices in NIPS - Brighttalk - January 2010
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Final2[1]
Final2[1]Final2[1]
Final2[1]
 
Simon Foley
Simon FoleySimon Foley
Simon Foley
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
FBT Aerospace - SMS
FBT Aerospace - SMSFBT Aerospace - SMS
FBT Aerospace - SMS
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 

Destacado

Современные проекты и планы города Запорожья в жилищно-коммунальном хозяйстве
Современные проекты и планы города Запорожья в жилищно-коммунальном хозяйствеСовременные проекты и планы города Запорожья в жилищно-коммунальном хозяйстве
Современные проекты и планы города Запорожья в жилищно-коммунальном хозяйствеVictoria Best
 
Los Sectores del Aula
Los Sectores del AulaLos Sectores del Aula
Los Sectores del AulaTrujillo9
 
Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...
Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...
Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...OECD Environment
 
Long-term low greenhouse gas emission development strategies, Peter Janoska C...
Long-term low greenhouse gas emission development strategies, Peter Janoska C...Long-term low greenhouse gas emission development strategies, Peter Janoska C...
Long-term low greenhouse gas emission development strategies, Peter Janoska C...OECD Environment
 
MAPS experiences with long-term low greenhouse gas emission development strat...
MAPS experiences with long-term low greenhouse gas emission development strat...MAPS experiences with long-term low greenhouse gas emission development strat...
MAPS experiences with long-term low greenhouse gas emission development strat...OECD Environment
 
2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...
2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...
2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...OECD Environment
 
Node js实践
Node js实践Node js实践
Node js实践myzykj
 
Powerpoint management thème ii icemba 2016
Powerpoint management thème ii icemba  2016Powerpoint management thème ii icemba  2016
Powerpoint management thème ii icemba 2016sciafrique
 
Mapa conceptual de el docente y los programas escolares.
Mapa conceptual de el docente y los programas escolares.Mapa conceptual de el docente y los programas escolares.
Mapa conceptual de el docente y los programas escolares.Alma Carrillo
 
1. kerjasama internasional
1. kerjasama internasional 1. kerjasama internasional
1. kerjasama internasional Umi Pujiati
 
Education system in the UK
Education system in the UKEducation system in the UK
Education system in the UKjulia_martinez
 

Destacado (17)

Современные проекты и планы города Запорожья в жилищно-коммунальном хозяйстве
Современные проекты и планы города Запорожья в жилищно-коммунальном хозяйствеСовременные проекты и планы города Запорожья в жилищно-коммунальном хозяйстве
Современные проекты и планы города Запорожья в жилищно-коммунальном хозяйстве
 
Los Sectores del Aula
Los Sectores del AulaLos Sectores del Aula
Los Sectores del Aula
 
Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...
Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...
Transparency of mitigation - Sweden, Erik Adriansson CCXG GF September 2016 B...
 
Long-term low greenhouse gas emission development strategies, Peter Janoska C...
Long-term low greenhouse gas emission development strategies, Peter Janoska C...Long-term low greenhouse gas emission development strategies, Peter Janoska C...
Long-term low greenhouse gas emission development strategies, Peter Janoska C...
 
MAPS experiences with long-term low greenhouse gas emission development strat...
MAPS experiences with long-term low greenhouse gas emission development strat...MAPS experiences with long-term low greenhouse gas emission development strat...
MAPS experiences with long-term low greenhouse gas emission development strat...
 
2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...
2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...
2016 ENV Ministerial - Michelle Harding - OECD - Taxation on gasoline - Air p...
 
Informe exploracion
Informe exploracionInforme exploracion
Informe exploracion
 
Node js实践
Node js实践Node js实践
Node js实践
 
4 p s_success
4 p s_success4 p s_success
4 p s_success
 
The British education system
The British education systemThe British education system
The British education system
 
Powerpoint management thème ii icemba 2016
Powerpoint management thème ii icemba  2016Powerpoint management thème ii icemba  2016
Powerpoint management thème ii icemba 2016
 
Варикозная болезнь
Варикозная болезньВарикозная болезнь
Варикозная болезнь
 
Maestros afectuosos
Maestros afectuososMaestros afectuosos
Maestros afectuosos
 
Mapa conceptual de el docente y los programas escolares.
Mapa conceptual de el docente y los programas escolares.Mapa conceptual de el docente y los programas escolares.
Mapa conceptual de el docente y los programas escolares.
 
1. kerjasama internasional
1. kerjasama internasional 1. kerjasama internasional
1. kerjasama internasional
 
Education system in the UK
Education system in the UKEducation system in the UK
Education system in the UK
 
Wedding march(marcha nupcial)
Wedding march(marcha nupcial)Wedding march(marcha nupcial)
Wedding march(marcha nupcial)
 

Similar a Building The Framework For A Culture Of Security

IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
Best Practices Regarding Technology
Best Practices Regarding TechnologyBest Practices Regarding Technology
Best Practices Regarding TechnologyFinancial Poise
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxrobertad6
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Securing & Asuring E Governance Services
Securing & Asuring E Governance ServicesSecuring & Asuring E Governance Services
Securing & Asuring E Governance Servicessubramanian K
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
eAccess-12 roundtable: Case Studies of Implementing BS 88878
eAccess-12 roundtable: Case Studies of Implementing BS 88878eAccess-12 roundtable: Case Studies of Implementing BS 88878
eAccess-12 roundtable: Case Studies of Implementing BS 88878Jonathan Hassell
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochuretrunko
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber DefenseEnergySec
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesVi Tính Hoàng Nam
 

Similar a Building The Framework For A Culture Of Security (20)

IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Best Practices Regarding Technology
Best Practices Regarding TechnologyBest Practices Regarding Technology
Best Practices Regarding Technology
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
 
Jason r mc kinney halfday
Jason r mc kinney halfdayJason r mc kinney halfday
Jason r mc kinney halfday
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Securing & Asuring E Governance Services
Securing & Asuring E Governance ServicesSecuring & Asuring E Governance Services
Securing & Asuring E Governance Services
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
eAccess-12 roundtable: Case Studies of Implementing BS 88878
eAccess-12 roundtable: Case Studies of Implementing BS 88878eAccess-12 roundtable: Case Studies of Implementing BS 88878
eAccess-12 roundtable: Case Studies of Implementing BS 88878
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Information Security
Information SecurityInformation Security
Information Security
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochure
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Building The Framework For A Culture Of Security

  • 1. Building the Framework for a Culture of Security A Short Primer for Developing Security Policies 1 3/28/2009
  • 2. Introduction for Policy  The foundation of an effective information security program – Source for standards, processes, procedures, and lower level policy  Definitions: – Policy: high level goals and objectives – Standard: mandatory language supporting policy – Process: implements a policy or standard – Procedure: implements a process – Guidelines: recommendations 2 3/28/2009
  • 3. Agenda Policy Framework  Trust and Trust Models  Culture  Policy Design Process  Policy  – Requirements – Structure – Major policies – Elements and Sample 3 3/28/2009
  • 4. Overview - A Security Policy Framework Policies define appropriate behavior.  Policies set the stage in terms of what tools and  procedures are needed. Policies communicate a consensus.  Policies provide a foundation for HR action in  response to inappropriate behavior. Policies may help prosecute cases.  Awareness AUP Lapto p Remot Email e VP Access N 4 3/28/2009
  • 5. Who and What to Trust Trust is a major principle underlying the  development of security policies. Initial step is to determine who gets access.  Deciding on level of trust is a delicate  balancing act. – too much trust may lead to eventual security problems – too little trust may make it difficult to find and keep employees How much should you trust resources or  people? 5 3/28/2009
  • 6. Possible Trust Models Trust everyone all of the time:  – easiest to enforce, but impractical – one bad apple can ruin the whole barrel Trust no one at no time:  – most restrictive, but also impractical – difficult to staff positions Trust some people some of the time:  – exercise caution in amount of trust given – access is given out as needed – technical controls are needed to ensure trust is not violated 6 3/28/2009
  • 7. Why the Political Turmoil? People view policies as:  – an impediment to productivity – measures to control behavior People have different views about the need  for security controls. People fear policies will be difficult to follow  and implement. Policies affect everyone within the  organization. 7 3/28/2009
  • 8. Who Should Be Concerned? Users - policies will affect them the most.  System support personnel - they will be  required to implement, comply with and support the policies. Managers - they are concerned about  protection of data and the associated cost of the policy. Company lawyers and auditors - they are  concerned about company reputation, responsibility to clients/customers. 8 3/28/2009
  • 9. The Policy Design Process Choose the policy development team.  Designate a person or “body” to serve as  the official policy interpreter. Decide on the scope and goals of the policy.  Scope should be a statement about who is  covered by the policy. Decide on how specific to make the policy.  – not meant to be a detailed implementation plan – don’t include facts which change frequently 9 3/28/2009
  • 10. The Policy Design Process A sample of people affected by the policy  should be provided an opportunity to review and comment. A sampling of the support staff effected by  policy should have an opportunity to review it. Incorporate policy awareness as a part of  employee orientation. Provide a refresher overview course on  policies once or twice a year. 10 3/28/2009
  • 11. Basic Policy Requirements Policies must:  – be implement able and enforceable – be concise and easy to understand – balance protection with productivity Policies should:  – state reasons why policy is needed – describe what is covered by the policies – define contacts and responsibilities – discuss how violations will be handled 11 3/28/2009
  • 12. Level of Control Security needs and culture play major role.  Security policies MUST balance level of  control with level of productivity. If policies are too restrictive, people will find  ways to circumvent controls. Technical controls are not always possible.  You must have management commitment  on the level of control. 12 3/28/2009
  • 13. Policy Structure Dependent on company size and goals.   One large document or several small ones? – smaller documents are easier to maintain/update  Some policies appropriate for every site, others are specific to certain environments.  Some key policies: –acceptable use –remote access –information protection –perimeter security –baseline host/device security 13 3/28/2009
  • 14. MAJOR POLICIES Acceptable Encryption  DMZ Equipment  Application Service  Extranet  Providers Host Security  Acceptable User  Lab Security  Acquisition  Anti-Virus  Assessment Audit Router/Switch   Risk Assessment  Wireless  Information Sensitivity Communications  Password  Remote Access  Laptop Security  VPN  14 3/28/2009
  • 15. The Acceptable Use Policy Discusses and defines the appropriate  use of the computing resources.  Users should be required to read and sign AU policy as part of the account request process.  A key policy that all sites should have. 15 3/28/2009
  • 16. Some Elements Should state responsibility of users in terms  of protecting information stored on their accounts. Should state if users can read and copy files  that are not their own, but are accessible to them. Should state level of acceptable usage for  electronic mail, internet news and web access. Should discuss acceptable non-business uses  of the resources. 16 3/28/2009
  • 17. Remote Access Policy Outlines and defines acceptable methods of  remotely connecting to the internal network. Essential in large organization where  networks are geographically dispersed and even extend into the homes. Should cover all available methods to  remotely access internal resources: – dial-in (SLIP, PPP) – isdn/frame relay – telnet/ssh access from internet – cable modem/vpn/DSL 17 3/28/2009
  • 18. Some Elements  Should define who can have remote access.  Should define what methods are allowed for remote access.  Should discuss who is allowed to have high- speed remote access such as ISDN, frame relay or cable modem. – extra requirements – appropriate use  Should discuss any restrictions on data that can be accessed remotely. 18 3/28/2009
  • 19. Information Protection Policy Provides guidelines to users on the  processing, storage and transmission of sensitive information. Main goal is to ensure information is  appropriately protected from modification or disclosure. May be appropriate to have new employees  sign policy as part of their initial orientation. Should define sensitivity levels of  information. 19 3/28/2009
  • 20. Some Elements Should define who can have access to  sensitive information. – need-to-know. – special circumstances – non-disclosure agreements  Should define how sensitive information is to be stored and transmitted (encrypted, archive files, uuencoded, etc).  Should define on which systems sensitive information can be stored. 20 3/28/2009
  • 21. Some Elements Should discuss what levels of sensitive  information can be printed on physically insecure printers. Should define how sensitive information is  removed from systems and storage devices: – degaussing of storage media – scrubbing of hard drives – shredding of hardcopy output Should discuss any default file and directory  permissions defined in system-wide configuration files. 21 3/28/2009
  • 22. The Perimeter Security Policy Describes, in general, how perimeter  security is maintained.  Describes who is responsible for maintaining it.  Describes how hardware and software changes to perimeter security devices are managed and how changes are requested and approved. 22 3/28/2009
  • 23. Some Elements Should discuss who can obtain privileged  access to perimeter security systems. Should discuss the procedure to request a  perimeter device configuration change and how the request is approved. Should discuss who is allowed to obtain  information regarding the perimeter configuration and access lists. Should discuss review cycles for perimeter  device system configurations. 23 3/28/2009
  • 24. Virus Protection and Prevention Policy Provides baseline requirements for the use  of virus protection software. Provides guidelines for reporting and  containing virus infections. Provides guidelines for several levels of virus  risk. Should discuss requirements for scanning  email attachments. Should discuss policy for the download and  installation of public domain software. 24 3/28/2009
  • 25. Virus Protection and Prevention Policy Should discuss frequency of virus data  file updates.  Should discuss testing procedures for installation of new software. 25 3/28/2009
  • 26. Password Policy Provides guidelines for how user level and  system level passwords are managed and changed. Discusses password construction rules.  Provides guidelines for how passwords are  protected from disclosure. Discusses application development  guidelines for when passwords are needed. Discusses the use of SNMP community  strings and pass-phrases. 26 3/28/2009
  • 27. Other Important Policies A policy which addresses forwarding of  email to offsite addresses. A policy which addresses wireless networks.  A policy which addresses baseline lab  security standards. A policy which addresses baseline router  configuration parameters. A policy which addresses requirements for  installing devices on a dirty network. 27 3/28/2009
  • 28. Security Procedures Policies only define quot;whatquot; is to be  protected. Procedures define quot;howquot; to protect  resources and are the mechanisms to enforce policy. Procedures define detailed actions to take  for specific incidents. Procedures provide a quick reference in  times of crisis. Procedures help eliminate the problem of a  single point of failure (e.g., an employee suddenly leaves or is unavailable in a time of 28 crisis). 3/28/2009
  • 29. Configuration Management Procedure Defines how new hardware/software is  tested and installed. Defines how hardware/software changes are  documented. Defines who must be informed when  hardware and software changes occur. Defines who has authority to make  hardware and software configuration changes. 29 3/28/2009
  • 30. Data Backup and Off-site Storage Procedures Defines which file systems are backed up.  Defines how often backups are performed.  Defines how often storage media is rotated.  Defines how often backups are stored off-  site. Defines how storage media is labeled and  documented. 30 3/28/2009
  • 31. Incident Handling Procedure Defines how to handle anomaly investigation  and intruder attacks. Defines areas of responsibilities for members  of the response team. Defines what information to record and  track. Defines who to notify and when.  Defines who can release information and the  procedure for releasing the information. Defines how a follow-up analysis should be  performed and who will participate. 31 3/28/2009
  • 32. Recap Policies are a crucial part of the  infrastructure.  Trust is frequently an issue.  Key policies: – acceptable use policy - remote access policy – information protection policy – perimeter security management policy  Key procedures: – CM procedure – incident handling procedure 32 3/28/2009
  • 33. Seven Keys to Successful Employee Involvement in Security Policies 33 3/28/2009
  • 34. Understanding is key  Training is essential  Small statements are not only beautiful, but  memorable Buy-ins come from ut-offs  Failures, breaches or mistakes have  consequences Always ask for input  Create a “neighborhood watch” mentality  34 3/28/2009
  • 35. Where to Get More Information It is difficult to find general resources for business oriented policies. Many companies consider their security policies to be sensitive information. Template Any other ideas? – Training, books, articles, electronic sources 35 3/28/2009
  • 36. Questions? Thank you Break Increasing Awareness to Improve Security 36 3/28/2009