mon - am - 3 - hare-brown isms

Upload: scorpion0411

Post on 05-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    1/27

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    2/27

    ISO 27001:2005 HISTORY

    2005 New ISO 17799:2005 &ISO 27001:2005 released

    2002 BS 7799-2 alignedand revised

    ISO 17799:2005 renamed to ISO27002:2005 in 2007 no change todocument until next revision

    1999 New issue of BS 7799 Part 1 & 2

    Dec 2000 BS 7799-1 reviewed andbecame ISO 17799:2000

    1998 BS 7799 Part 2

    Guide and standard aligned

    Formed and registered as an ISMS System Wherearewenow? ISO

    27000

    Principles

    &

    Vocabulary

    ISO27001 ISMSRequirements(BS7799Part2) ISO27002 ControlsGuidance(ISO17799:2005)

    arGuidance only

    ISO27003 ISMSImp ementationGui e ines ISO27004 ISMSMeasurementsandMetrics(soon) ISO27005 ISMSRiskManagement ISO27006 GuidelinesforAccreditation

    Standard started in 1992 when BSI had been approached by certain industry sectors with concerts overpotential problems and security issues with electronic systems. Sept 1993 Code of Practice published

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    3/27

    STRATEGIC BENEFITS OF ISO 27001

    Improved effectiveness of Information Security

    Ownership by Senior Management

    Corporate Governance & Compliance

    Structured a roach Global acceptance International Standard

    Gives an independent review of ISMS

    Improved marketing image and customer expectation

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    4/27

    ISO 27001 Today (number of certificates)

    Source: htt ://www.iso27001certificates.com

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    5/27

    MEASUREMENT OF BUSINESS BENEFITS

    anage r s own

    Provide tan ible evidence to auditors

    Streamlined process of monitoring ISMS effectiveness

    Reduction of security incidents over time Better root cause analysis of incidents / events

    -

    Increased awareness of information security

    Improvement in accountability

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    6/27

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    7/27

    PDCA model applied to the ISMS process

    EstablishtheISMSInterested Interested

    Parties Parties

    ACT

    DO

    CONTINUAL

    improvetheISMS

    operatedtheISMS

    Information

    Monitor&

    review

    the

    secur yrequirements

    &

    ex ectations

    Managedinformation

    securityISMS

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    8/27

    PDCA OVERVIEW

    Establish ISMS policy, objectives, processes and procedures relevant to

    mana in risk and im rovin information securit to deliver results in

    accordance with an organizations overall policies and objectives.

    Do (implement and operate the ISMS) Implement and operate the ISMS policy, controls, processes and

    procedures. Check (monitor and review the ISMS)

    Assess and, where applicable, measure process performance againstpo cy, o ec ves an prac ca exper ence an repor e resu s o

    management for review.

    Take corrective and preventive actions, based on the results of the

    internal ISMS audit and management review or other relevantinformation, to achieve continual improvement of the ISMS.

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    9/27

    PDCA - KEY AREAS

    ,must continue to support the ISMS through the

    Monitor

    Improve

    o ac eve comp ance on a year y as s ev ence

    of the above process must be shown

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    10/27

    What does the ISMS include?

    Policies and Standards

    r ni i n r r

    Planning Activities

    espons es

    Practices Procedures

    Resources

    Guidelines

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    11/27

    ISMS OVERVIEW

    EXCOSTATEMENTEXECUTIVE TEAM

    SECURITYPOLICY

    IS

    STANDARDSEND USERS IT TEAMS

    USER

    GUIDELINES

    INSTALL&

    CONFIG

    GUIDES

    PROCEDURES

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    12/27

    ISMS DETAILED VIEW / IMPLEMENTATION

    Exec Statement 1 PagerHigh level security statement defining the

    AUA/EAUA

    ExecutiveSecurity

    Statement UserGuidelines

    Companys security ethic and posture, willinclude a statement of support from the CEO

    Guidelines 3-5 PagesDescri tive advisories to im rove end user

    -Sign-off statementsfor users to ensure

    they comply to specific

    InformationIS Policy 3-5 Pages

    behaviour, e.g. password guides

    Guiding Principles 50-100+ PagesThis is the core and comprehensive security

    requirements

    HIGHLEVEL

    ecur yPolicy

    standards. This is themain document staff

    will read and sign

    document based on ISO27001. The documentwill follow the ISO standard to define all key security

    requirements

    KNOWLEDGE

    InformationSecurityGuiding

    Principles

    Standards 7-15 PagesExpand specific security

    requirements and controlsto what is expected in a

    DETAILED SECURITYKNOWLEDGE

    SecurityStandard

    SecurityStandard

    SecurityStandard

    specific area

    Procedures / Baselines5-10 Pages

    Security

    Security

    Security

    Security

    Security

    Security

    e ne spec c s eps amust be taken to

    implement a control.Baselines define the

    /Baselines

    /Baselines

    /BaselinesBaselines /Baselines

    /Baselines

    for a system or component

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    13/27

    ISO 27001 STANDARD OVERVIEW

    11 Sections (A5 A15)

    AccessControlOrganisation

    ofInformationSecurity

    SecurityPolicy

    133 ControlsPhysical&

    Environmental

    InformationSecurity

    Security

    Information

    IncidentManagement

    Controlsuman

    ResourcesSecurity

    Systemsacquisition,

    development&maintenance

    Clauses 4 8

    These are the most ComplianceBusiness

    Continuity

    mandatory AssetManagement

    Communications&Operations

    Management

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    14/27

    CLAUSES 4 -8

    The five mandatory requirements of the Standard Information Security Management System (ISMS)

    General requirements

    s a s ng an ma n a n ng e e.g. s ssessmen Documentation requirements (e.g. Policy, Records, Statements, Plans,

    Controls

    Management Responsibility

    Management Commitment (e.g. Chairmans Statement) Resource Management (e.g. Training, Awareness)

    Internal ISMS Audits

    Review Input (.e.g. Audits, Measurement, Meetings, Recommendations)

    Review Out ut e. . U date Risk Treatment Plan Action Plan

    ISMS Improvement

    Continual ImprovementThis is the most

    Corrective Action

    Preventive Action

    important clause

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    15/27

    CONTROLS

    and Controls

    29 Control Objectives Each has a detailed summary

    o e o ec ve o e con ro

    133 Controls Each control has a summary ofimplementation advice

    ISO 27002:2007 give guidance notes for each control

    The list is not exhaustive and additional controls canbe added

    The ISMS process allows you to define which

    applicable have to be justified.

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    16/27

    A PERSPECTIVE ON CONTROLS

    Securit Polic ITPolicies RiskAssessment&Risk

    SecurityProcedures,

    Business

    ContinuityPlans,SecurityIm rovementPlans Business

    TreatmentManagement

    Process,HumanResourceProcess SOA Selection

    Objectives,ManagementReviews

    Process,MediaHandlingProcess

    OperationalControls TechnicalControls

    OperationalProcedures,Chan eControl Problem PatchMana ement Malware

    Management,CapacityManagement,Release

    Mana ement

    Backu

    Secure

    Control,IDS/IPSMonitoring&Handling,Firewalls,

    ContentFilterinDisposal,Equipmentoffsite

    ACHIEVING COMPLIANCE (OVERVIEW)

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    17/27

    ACHIEVING COMPLIANCE (OVERVIEW)

    DefinetheSco eoftheAudit(Sco in Stud )

    CarryoutGAPanalysisofcurrentcontrolsDuring the process an initialinterview will take place with

    the BSI auditor by this stage

    Identifyinformationassets&identifyvulnerabilities&threats

    you should have a good planand identified and completedthe SoA

    Determineriskandestablishrisktreatment

    plan(Risk

    Management)

    PrepareStatementofApplicabilityanddefinesecurityimprovementprogram

    Startto

    implement

    the

    ISMS

    Test

    and

    Review

    FullImplementation&Rollout OperatetheISMS

    Audit&Compliance

    QCC PROCESS TO COMPLIANCE

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    18/27

    QCC PROCESS TO COMPLIANCE

    InitialScope,NDA,

    PresentationQuestionnaire DocumentGathering

    Statementof

    GAPAnalysisRiskAssessmentpp ca ty o

    InitialvisitbyAuditor(DesktopReview)

    Stage1 Stage2 ProjectTask Stage3 DocumentImplementation

    Framework

    Sheet/ProjectRisk

    Table

    Update&Control

    Implementation

    Stage4 OperatetheSta e

    Com liance

    Timeframe for

    on or,

    Review,Improve FullAudit

    the organisational state

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    19/27

    BSI COMPLIANCE ROUTE

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    20/27

    BSI COMPLIANCE ROUTE

    Stage1

    .

    Stage2 Upon

    contacting

    BSI,

    we

    will

    provide

    an

    estimate

    of

    costs

    and

    timescales

    for

    formal

    assessment.

    Stage3 SubmitaformalapplicationtoBSI.

    Stage4

    BSIwillundertakeadesktopreviewoftheRiskAssessment,Policy,Scope,StatementofApplicabilityandProcedures.Thiswillthenidentifyanyweaknessesandomissionsinyourmanagementsystemthatneedtoberesolved.

    Sta e BSIwillthenconductanonsiteassessmentandmakerecommendations.

    Onsuccessfulcompletionoftheaudit,acertificateofregistrationisissuedwhichclearly

    identifies

    the

    Scope

    of

    the

    Information

    Security

    Management

    System.

    This

    certificate

    remains

    Stage6 validforthreeyearsandissupportedbyroutineassessmentvisitsthroughout.

    CASE STUDY

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    21/27

    CASE STUDY

    Wanted ISO 27001 to:

    Distinguish themselves from the competition

    - ay esource o suppor n a ve

    Project Management Applying Perspective and some Coal-Face work

    Scope: IT Function

    wo oca ons

    Statement of Applicability to reflect appropriately

    CASE STUDY PROBLEMS

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    22/27

    CASE STUDY - PROBLEMS

    Resources Missing an Information Security Officer

    Found it hard to dedicate some time to the ro ect

    Documentation development

    .

    Too much in the heads of key staff rather than on paper

    Gap vs Risk Analysis

    Need to be two distinct sets: no prob with Gap but why

    then Risk??? Identification of critical assets

    Policies

    - , ,no enforcement

    CASE STUDY SOLUTIONS

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    23/27

    CASE STUDY - SOLUTIONS

    Resources QCC provided virtual Information Security Officer

    Pro ect Mana ement booked solid da s out

    Documentation development

    integrate properly.

    Gap vs Risk Analysis

    QCC undertook Gap Analysis Facilitated a Worksho for Risk Anal sis used OCTAVE

    Policies

    and officially adopted, disseminated and enforced

    OVERVIEW OF EACH CONTROL

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    24/27

    OVERVIEW OF EACH CONTROL

    ControlA6 Internalon ro 5 ecur y o cy

    Toprovidemanagement

    Organisation

    directionand

    support

    for

    informationsecurityinaccordancewithbusiness

    informationsecurity

    within

    theorganisation,takinginto

    requirementsandrelevantlawsandregulations.

    accountt enee so ot internalandexternalparties.

    ControlA7 AssetManagementControlA8 HumanResource

    Security

    Todeliverappropriatelevelsof Toensurethatstaff,duringem lo ment,after

    informationreceivesalevelofprotectionthatisappropriateto

    terminationandduringchangeofemployment,are

    itsnee s.

    securityprocess.

    OVERVIEW OF EACH CONTROL

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    25/27

    OVERVIEW OF EACH CONTROL

    ControlA Ph sical& ControlA10 CommunicationsEnvironmentalSecurity

    Tosecurebuildings,locations

    &OperationsManagement

    andequipment

    in

    such

    away

    as

    topreventunauthorisedphysicalaccess dama eandinterference

    treatedproperly,

    backed

    up

    correctlyandhandledsecurely

    totheorganisationsassets,premisesandinformation.

    tot e g eststan ar savailable..

    ControlA11 AssetControlControlA12 Information

    SystemsAcquisition&

    Tocontrolaccessto Toensurethatsecurityisan, ,

    applications.Preventingunauthorisedaccess,

    informationsystem.Securingapplications,filesand

    inter erence,

    amagean

    t e t. re ucing

    vu nera i ities.

    OVERVIEW OF EACH CONTROL

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    26/27

    OVERVIEW OF EACH CONTROL

    ControlA1 Information ControlA1 BusinessSecurityIncidentManagement

    ContinuityManagement

    Tocounteractinterru tionsto

    eventsand

    weaknesses

    are

    communicatedconsistentlyinabusiness

    activities

    and

    to

    protect

    criticalbusinessprocessesfromtheeffectsofma orfailuresof

    mannera ow ngt me ycorrectiveactiontobetaken.

    informationsystemsordisastersandtoensuretheirtimelyresumption.

    ControlA15 Compliance

    Toavoidbreachesofanylaw,regu a onorcon rac ua

    obligations.Toensurecompliancewithoutadverse

    affectson

    Information

    Security.

  • 7/31/2019 Mon - Am - 3 - Hare-Brown ISMS

    27/27

    - w

    MSc CISSP CISA CITP MBCS

    [email protected]

    +44 (0)207 353 9000

    www.qccis.com

    Copyright QCC InformationSecurity Ltd. 2008 V1.0a dated 28 Jul 08