1©2012 check point software technologies ltd. squashing politics with policy

17
1 ©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

Upload: augustus-whitehead

Post on 27-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

1©2012 Check Point Software Technologies Ltd.

Squashing Politics with Policy

Page 2: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

2©2012 Check Point Software Technologies Ltd.

Agenda

1 Challenges

Foundation for acceptable security2

Why it helps3

Questions / Discussion4

[Restricted] ONLY for designated groups and individuals

Page 3: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

3©2012 Check Point Software Technologies Ltd.

Why do we need security controls?

Protect company and client sensitive information

Protect company image

Save the company money

Protect critical applications that make your company money

Protect critical applications that provide services to the public

Page 4: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

4©2012 Check Point Software Technologies Ltd.

Agenda

1 Challenges

2

Why it helps3

Questions / Discussion4

Foundation for acceptable security

Page 5: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

5©2012 Check Point Software Technologies Ltd.

Challenges with implementing security

Users don’t like change

Users don’t like the idea of freedoms being taken away

Users can feel accused if they are told they are doing something insecure

Security controls can break applications or functions in your IT infrastructure

Security requirements can slow down projects

Page 6: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

6©2012 Check Point Software Technologies Ltd.

Agenda

1 Challenges

Foundation for acceptable security2

Why it helps3

Questions / Discussion4

Page 7: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

7©2012 Check Point Software Technologies Ltd.

Foundation for acceptable security

Develop your Security Policy

Develop Standard Operating Procedures

Develop Implementation and Test Plans

Develop an Approval Process for Policy Exceptions

Develop Procedure for Post Mortem and Root Cause Analysis

Page 8: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

8©2012 Check Point Software Technologies Ltd.

Foundation for acceptable security

Develop your security policy

SHOULD BE THE FOUNDATION OF SECURITY IN YOUR ORGANIZATION

Get this vetted by appropriate parties to be distributed and signed by everyone in your organization

– HR (Especially for web content filtering!!)– Management– CIO, CISO, CTO, Director, etc.

Policy violations must have consequences

Page 9: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

9©2012 Check Point Software Technologies Ltd.

From Scratch?!?!...I don’t have time!

Plenty of free resources sans.org/security-resources/

Page 10: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

10©2012 Check Point Software Technologies Ltd.

Foundation for acceptable security

Develop an approval process for policy exceptions

When exceptions must be made to the policy– Communicate the risk

– Keep a record of someone ELSE accepting the risk. – Someone in your direct chain of reports or someone

designated to accept risk (like a compliance dept.)– Document the exception

Page 11: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

11©2012 Check Point Software Technologies Ltd.

Foundation for acceptable security

Develop Standard Operating Procedures

Things that you do on a daily basis for Due Diligence

These practices are usually more specific to your group within the company

SOPs will change as security threat landscape evolves

Get this vetted and signed by your manager

Page 12: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

12©2012 Check Point Software Technologies Ltd.

Foundation for acceptable security

A thorough test plan will increase the probability of a successful deployment thus increasing user acceptance

Require testing of critical business applications or functions– By business units responsible for such applications

Always include a rollback plan and time to execute the rollback plan

Develop implementation and test plans

Page 13: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

13©2012 Check Point Software Technologies Ltd.

Foundation for acceptable security

Doing this will:– Keep relevant facts of significant outages (Audit, Manager’s

report, etc.)– Avoid misdiagnosis and discourage those from doing it in the

future

Develop Procedure for Post Mortem and Root Cause Analysis

Page 14: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

14©2012 Check Point Software Technologies Ltd.

Agenda

1 Challenges

Foundation for acceptable security2

Why it helps3

Questions / Discussion4

Page 15: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

15©2012 Check Point Software Technologies Ltd.

Why it helps

Increase user acceptance of security

Increase confidence in security controls

Increase user security awareness

Minimize impact of implementing controls

Will breed a professional and happy work environment with more unity among teams

Page 16: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

16©2012 Check Point Software Technologies Ltd.

Agenda

1 Challenges

Foundation for acceptable security2

Why it helps3

Questions / Discussion4

Page 17: 1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy

17©2012 Check Point Software Technologies Ltd.

Questions?