the whole/hole of security a consultants perspective august 25, 2004 potomac consulting group don...

24
The Whole/Hole of Security A Consultant’s Perspective August 25, 2004 Potomac Consulting Group Don Philmlee , CISSP

Upload: mary-gomez

Post on 26-Mar-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

The Whole/Hole of SecurityA Consultant’s Perspective

August 25, 2004Potomac Consulting Group

Don Philmlee , CISSP

Page 2: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Potomac Consulting Group

www.potomac.com

Don Philmlee - [email protected]

Page 3: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

What this section will cover

• Perceived vs. Real Threats

• What your firm can do

• Assessing assets and risk

• What are some firms doing?

Page 4: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Perception vs. RealityPerception Reality

Good security is achieved by using the right technology.

Good security is achieved by good policies, procedures, educated users, understanding your assets and your risks as well as technology.

Our real security problem comes from external sources

Most security problems come from within – employees.

Our client information cannot be at risk. Our security has to be 100%.

Using a computer is a matter of accepting risk – the question is how much risk is acceptable and how well can it be minimized.

Page 5: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Cautions

• More out there then your firm can contend with

• Don’t buy into fear mongering

• Easy to squander a security budget

Page 6: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Security PerceptionsPerception Reality

User “Security is not my responsibility. “

Users are at the very heart how a firm’s security is implemented and can be the cause of success or failure of security controls.

IT We do what we can, but we don’t get the money or support to lock everything down.

You don’t have to lock everything down tight, just the assets that are most valuable and at the most risk. Mgmt often provides little guidance here.

Mgmt Security is handled by my IT department. We did an audit two years ago and came up clean.

Security is a mgmt issue and should be driven from the top down. Mgmt needs to know what security controls are in effect now.

Page 7: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

What can you do?

• Security is attainable

• Organize your response

• Follow the concepts of Due Care / Due Diligence

• Security should be driven by management not the technicians

• Defend only what you need to

• Integrate your people, process and technology

Page 8: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Visualize Your Security Layers

Page 9: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Assess Your Systems

• Identify what does your firm values most:– Email– Document stores– Personnel database– Remote access– Client extranet– Etc.

Page 10: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Quantify Your Assets

• Assign a financial value to each asset. eg:– Cost to Build– Cost to Protect– Value to Competition– Cost to Recover

Page 11: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Evaluate Potential Risks

• Realistically decide what are the likely problems you may face. eg: – Hurricane– Terrorist attack– Hacker– Disgruntled employee– (basic disaster recovery planning)

Page 12: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Classic Risk Assessment

• Determine a quantitative value of qualitative assets.

• This is one approach to valuation using the CIA triad:

Confidentiality Integrity Availability Value

Email 3 2 3 8

Client files 3 2 1 6

Lit Supp DB 3 1 2 6

Recruiting DB

2 1 1 4

High= 3

Medium= 2

Low= 1

Page 13: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Now, Create a Plan of Action• Administrative Controls

– Security Policies & Procedures– Security Awareness Training

• Technical Controls– Quality Passwords– Workstation Lockdown– Etc.

• Physical Controls– Intrusion Detection– Locks– Etc.

Page 14: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP
Page 15: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Security is NOT a one-time effort

• Systems are dynamic

• Evaluate the implementation

• Vulnerability scanning

• External 3rd party assessments

Page 16: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Regularly Review Asset Security

• Just as financial systems are audited regularly, information systems should be audited on a regular basis as well

• Should be done once or twice a year or as technology changes are made

Page 17: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

What are Most Firms Doing?

• Pay too much attention to the external problems

• Not enough attention to internal problems

• Not making security a management process.

Page 18: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Often Ignored Problems

• Workstation Lockdown

• Workstation Standardization

• Quality Passwords

• Laptop Security

• Home Networks

• Poorly done Security Policies

• Little or no Security Awareness Training

Page 19: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Workstation Lockdown / Standards

• Workstations should be Business Computers NOT Personal Computers

• Effective, but not popular

• Users download from the Internet

• Spyware has become a big problem

• Root Kits / Trojans / Worms

Page 20: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Quality Passwords

• Passwords are the keys to the kingdom

• First layer of user security

• They are NOT often taken seriously

• Use passphrases not passwords

• 8 character passwords are good, but 15 (or more) character passwords are better

Page 21: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Laptop Security

• Hotels / Home Networks

• Dsniff / webspy / spectorsoft / wireless sniffers

• Personal Firewalls (XP SP2)

• Encrypted Files (EFS)

Page 22: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Conclusions

• Security is an attainable goal

• Security has fast become a priority

• Challenge is to determine the best and most appropriate solution for your needs.

• Integrate your people, process and technology into security

• Security needs become part of your firm’s culture

Page 23: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Resources

• SANS Institute – www.sans.org

• CERT – www.cert.org

• CISecurity – www.cisecurity.org

• Microsoft – www.microsoft.com/security

Page 24: The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP

Questions?

Potomac Consulting Group

www.potomac.com

Don Philmlee, [email protected]