powerpoint presentationhossein/teach… · ppt file · web view · 2008-02-25information security...

51
Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Upload: trinhnhi

Post on 11-Apr-2018

218 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Information Security PolicyEECS 711: Security Management and Audit

Molly CoplenDan Hein

Dinesh Raveendran

Page 2: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Learning Objectives

EECS 711 Chapter 4 Information Security Policy2

• Define Information security policy and understand its central role in a successful information security program

• Recognize the three major types of information security policy and know what goes into each type

• Develop, implement, and maintain various types of information security policies

Page 3: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Introduction

EECS 711 Chapter 4 Information Security Policy3

• The success of any information security program lies in policy development

• Policy is the essential foundation of an effective information security program

• The centrality of information security polices to virtually everything that happens in the information security field

• An effective information security training and awareness effort cannot be initiated without writing information security policies

Page 4: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

NIST–Executive guide to the Protection of Information Resources

EECS 711 Chapter 4 Information Security Policy4

• “The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems. You, the policy maker, set the tone and the emphasis on how important a role information security will have within your agency. Your primary responsibility is to set the information resource security policy for the organization within the objectives of reduced risk, compliance with laws and regulations and assurance of operational continuity, information integrity, and confidentiality.”

Page 5: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Basic Rules in Shaping a Policy

EECS 711 Chapter 4 Information Security Policy5

• Policy should never conflict with law• Policy must be able to stand up in court, if

challenged• Policy must be properly supported and

administered• Example: Enron’s dubious business practices

and misreporting the financial records - Policy of shredding working papers by accountants

Page 6: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Why Policy

EECS 711 Chapter 4 Information Security Policy6

• A quality information security program begins and ends with policy

• Although information security policies are the least expensive means of control to execute, they are often the most difficult to implement

• Policy controls cost only the time and effort that the management team spends to create, approve and communicate them, and that employees spend integrating the policies into their daily activities

• Cost of hiring a consultant is minimal compared to technical controls

Page 7: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Guidelines for IT policy

EECS 711 Chapter 4 Information Security Policy7

• All policies must contribute to the success of the organization

• Management must ensure the adequate sharing of responsibility for proper use of information systems

• End users of information systems should be involved in the steps of policy formulation

Page 8: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Bull’s Eye Model

EECS 711 Chapter 4 Information Security Policy8

• Proven mechanism for prioritizing complex changes

• Issues are addressed by moving from general to specifics

• Focus of systemic solutions instead of individual problems

Page 9: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Bull’s Eye Model (Contd)

EECS 711 Chapter 4 Information Security Policy9

Page 10: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Bull’s Eye Model Layers

EECS 711 Chapter 4 Information Security Policy10

• Policies – the outer layer in the bull’s eye diagram• Networks – the place where threats from public networks meet

the organization’s networking infrastructure; in the past, most information security efforts have focused on networks, and until recently information security was often thought to be synonymous with network security

• Systems – computers used as servers, desktop computers, and systems used for process control and manufacturing systems

• Application – all applications systems, ranging from packed applications such as office automation and e-mail programs, to high-end ERP packages and custom application software developed by the organization

Page 11: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Charles Cresson Wood’s Need for Policy

EECS 711 Chapter 4 Information Security Policy11

…policies are important reference documents for internal audits and for the resolution of legal disputes about management’s due diligence [and] policy documents can act as a clear statement of management’s intent…

Page 12: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy, Standards, and Practices

EECS 711 Chapter 4 Information Security Policy12

• Policy represents the formal statement of the organization’s managerial policy, in case of our focus, the organization’s information security philosophy

• Tradition communities of interest use policy to express their views which then becomes the basis of planning, management and maintenance of the information security profile

• Policies – set of rules that dictate acceptable and unacceptable behavior within an organization

• Policies should not specify the proper operation of equipment or software

Page 13: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy, Standards, and Practices (Contd)

EECS 711 Chapter 4 Information Security Policy13

• Policies must specify the penalties for unacceptable behavior and define an appeals process

• To execute the policy, the organization must implement a set of standards that clarify and define exactly what is inappropriate in the workplace and to what degree the org will stop to act the inappropriate behavior

• Standard – More detailed statement of what must be done to comply with policy

• Technical controls and their associated procedures might be established such that the network blocks access to pornographic websites

Page 14: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

EECS 711 Chapter 4 Information Security Policy14

Policy, Standards, and Practices (Contd)

Page 15: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Type of InfoSec policies

EECS 711 Chapter 4 Information Security Policy15

• Based on NIST Special Publication 800-14, the three types of information security policies are – Enterprise information security program policy– Issue-specific security policies– System-specific security policies

• The usual procedure – First – creation of the enterprise information security policy –

the highest level of policy– Next – general policies are met by developing issue- and

system-specific policies

Page 16: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Enterprise Information Security Policy (EISP)

EECS 711 Chapter 4 Information Security Policy16

• EISP sets the strategic direction, scope, and tone for all of an organization’s security efforts

• EISP assigns responsibilities for the various areas of information security including maintenance of information security policies and the practices and responsibilities of other users.

• EISP guides the development, implementation, and management requirements of the information security program

• EISP should directly support the mission and vision statements

Page 17: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Integrating an Organization’s Mission and Objectives into the EISP

EECS 711 Chapter 4 Information Security Policy17

• EISP plays a number of vital roles• One of the important role is to state the importance of

InfoSec to the organization’s mission and objectives.• InfoSec strategic planning derives from IT strategic

planning which is itself derived from the organization’s strategic planning

• Policy will become confusing if EISP does not directly reflect the above association

Page 18: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

EISP Elements

EECS 711 Chapter 4 Information Security Policy18

• An overview of the corporate philosophy on security• Information on the structure of the InfoSec

organization and individuals who fulfill the InfoSec role

• Fully articulated responsibilities for security that are shared by all members of the organization

• Fully articulated responsibilities for security that are unique to each role within the organization

Page 19: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Components of a good EISP

EECS 711 Chapter 4 Information Security Policy19

• Statement of Purpose• Information Technology Security Elements• Need for Information Technology Security• Information Technology Security

Responsibilities and Roles• Reference to Other Information Technology

Standards and Guidelines

Page 20: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Issue-Specific Security Policy (ISSP)

EECS 711 Chapter 4 Information Security Policy20

• Provides a common understanding of the purposes for which an employee can and cannot use a technology– Should not be presented as a foundation

for legal prosecution• Protects both the employee and

organization from inefficiency and ambiguity

Page 21: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Effective ISSP

EECS 711 Chapter 4 Information Security Policy21

• Articulates expectations for use of technology-based system

• Identifies the processes and authorities that provide documented control

• Indemnifies the organization against liability for an employee’s inappropriate or illegal use of the system

Page 22: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

ISSP Topics

EECS 711 Chapter 4 Information Security Policy22

• Use of Internet, e-mail, phone, and office equipment

• Incident response• Disaster/business continuity planning• Minimum system configuration requirements• Prohibitions against hacking/testing security

controls• Home use of company-owned systems• Use of personal equipment on company

networks

Page 23: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

ISSP Components

EECS 711 Chapter 4 Information Security Policy23

• Statement of Purpose– Outlines scope and applicability: what is the

purpose and who is responsible for implementation

• Authorized Uses– Users have no particular rights of use, outside

that specified in the policy• Prohibited Uses

– Common prohibitions: criminal use, personal use, disruptive use, and offensive materials

Page 24: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

EECS 711 Chapter 4 Information Security Policy24

• Systems Management– Users relationship to systems management– Outline users’ and administrators’ responsibilities

• Violations of Policy– Penalties specified for each kind of violation– Procedures for (often anonymously) reporting

policy violation• Policy Review/Modification• Limitations of Liability

ISSP Components

Page 25: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

EECS 711 Chapter 4 Information Security Policy25

• Three common approaches for creating/managing ISSP– Create individual independent ISSP documents,

tailored for specific issues– Create a single ISSP document covering all issues– Create a modular ISSP document unifying overall

policy creation/management while addressing specific details with respect to individual issues

ISSP Implementation

Page 26: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

EECS 711 Chapter 4 Information Security Policy26

System Specific Security Policy (SysSPs)

• SysSPs provide guidance and procedures for configuring specific systems, technologies, and applications– Intrusion detection systems – Firewall configuration– Workstation configuration

• SysSPs are most often technical in nature, but can also be managerial– Guiding technology application to enforce higher

level policy (e.g. firewall to restrict Internet access)

Page 27: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Guidelines for Effective Policy

• Developed using industry-accepted practices

• Distributed using all appropriate methods• Reviewed or read by all employees• Understood by all employees• Formally agreed to by act or assertion• Uniformly applied and enforced

EECS 711 Chapter 4 Information Security Policy27

Page 28: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Developing Information Security Policy

• Investigation Phase• Analysis Phase• Design Phase• Implementation Phase• Maintenance Phase

EECS 711 Chapter 4 Information Security Policy28

Page 29: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Investigation Phase

• Support from senior management• Support and active involvement of IT

management• Clear articulation of goals• Participation by the affected communities

of interest• Detailed outline of the scope of the policy

development project

EECS 711 Chapter 4 Information Security Policy29

Page 30: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Analysis Phase

• The analysis phase should produce the following:– A new or recent risk assessment or IT audit

documenting the information security needs of the organization.

– Gathering of key reference materials – including any existing policies

EECS 711 Chapter 4 Information Security Policy30

Page 31: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Design Phase

• Users or organization members acknowledge they have received and read the policy– Signature and date on a form– Banner screen with a warning

EECS 711 Chapter 4 Information Security Policy31

Page 32: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Implementation Phase

• Policy development team writes policies• Resources:

– The Web– Government sites such as NIST– Professional literature– Peer networks– Professional consultants

EECS 711 Chapter 4 Information Security Policy32

Page 33: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Maintenance Phase

• Policy development team responsible for monitoring, maintaining, and modifying the policy

EECS 711 Chapter 4 Information Security Policy33

Page 34: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Distribution

• Hand policy to employees• Post policy on a public bulletin board• E-mail• Intranet• Document management system

EECS 711 Chapter 4 Information Security Policy34

Page 35: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Reading

• Barriers to employees’ reading policies– Literacy: 14% of American adults scored

“below basic” level in prose literacy– Language: non-English speaking residents

EECS 711 Chapter 4 Information Security Policy35

Page 36: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Comprehension

• Language– At a reasonable reading level– With minimal technical jargon and

management terminology• Understanding of issues

– Quizzes

EECS 711 Chapter 4 Information Security Policy36

Page 37: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Compliance

• Policies must be agreed to by act or affirmation

• Corporations incorporate policy confirmation statements into employment contracts, annual evaluations

EECS 711 Chapter 4 Information Security Policy37

Page 38: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Enforcement

• Uniform and impartial enforcement – must be able to withstand external scrutiny

• High standards of due care with regard to policy management – to defend against claims made by terminated employees

EECS 711 Chapter 4 Information Security Policy38

Page 39: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Automated Tools

• VigilEnt Policy Center – a centralized policy approval and implementation center– Manage the approval process– Reduces need to distribute paper copies – Manage policy acknowledgement forms

EECS 711 Chapter 4 Information Security Policy39

Page 40: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

VigilEnt Policy Center Architecture

EECS 711 Chapter 4 Information Security Policy40

Company IntranetUser Site

VPC Server Administration Site

Users view policies and quizzes.

User information to the company intranet. Policy docs and

quizzes and news items to the Intranet.

Administrators receive policy docs and quizzes.

Administrators publish policy docs and quizzes. VPC server sends published policy docs and quizzes to the server for distribution to the user sites.

Users read policy docs and complete quizzes.

Page 41: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Management

• Policy administrator• Review schedule• Review procedures and practices• Policy and revision dates

EECS 711 Chapter 4 Information Security Policy41

Page 42: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy Administrator

• Policy administrator – Champion– Mid-level staff member– Solicits input from business and

information security communities– Makes sure policy document and

subsequent revisions are distributed

EECS 711 Chapter 4 Information Security Policy42

Page 43: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Review Schedule

• Periodically reviewed for currency and accuracy, and modified to keep current– Organized schedule of review– Reviewed at least annually– Solicit input from representatives of all

affected parties, management, and staff

EECS 711 Chapter 4 Information Security Policy43

Page 44: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Review Procedures and Practices

• Easy submission of recommendations• All comments examined• Management approved changes

implemented

EECS 711 Chapter 4 Information Security Policy44

Page 45: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Policy and Revision Date

• Often published without a date – Legal issue – are employees “complying

with an out-of-date policy• Should include date of origin, revision

dates – don’t use “today’s date” in the document

• Sunset clause (expiration date)

EECS 711 Chapter 4 Information Security Policy45

Page 46: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Information Securities Policy Made Easy Approach

• Gather key reference materials• Develop a framework for policies• Prepare a coverage matrix• Make critical systems design decisions• Structure review, approval, and

enforcement processes

EECS 711 Chapter 4 Information Security Policy46

Page 47: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Information Securities Policy Made Easy Approach

• Next Steps– Post policies – Develop a self-assessment questionnaire– Develop revised user ID issuance forms– Develop agreement to comply with InfoSec

policies form– Develop tests to determine if workers

understand policies

EECS 711 Chapter 4 Information Security Policy47

Page 48: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Information Securities Policy Made Easy Approach

• Next steps (continued)– Assign information security coordinators– Train information security coordinators– Prepare and deliver a basic information

security training course– Develop application-specific information

security policies

EECS 711 Chapter 4 Information Security Policy

48

Page 49: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Information Securities Policy Made Easy Approach

• Next steps (continued)– Develop a conceptual hierarchy of

information security requirements– Assign information ownership and

custodianship– Establish an information security

management committee

EECS 711 Chapter 4 Information Security Policy49

Page 50: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Information Securities Policy Made Easy Approach

• Next steps (continued)– Develop an information security

architecture document– Automate policy enforcement through

policy servers

EECS 711 Chapter 4 Information Security Policy

50

Page 51: PowerPoint Presentationhossein/Teach… · PPT file · Web view · 2008-02-25Information Security Policy EECS 711: Security Management and Audit Molly Coplen Dan Hein Dinesh Raveendran

Final Note

• Policies are a countermeasure to protect assets from threats– Policies exist to inform employees of

acceptable (unacceptable) behavior– Are meant to improve employee productivity

and prevent potentially embarrassing situations

– Communicate penalties for noncompliance

EECS 711 Chapter 4 Information Security Policy51