You are on page 1of 132

Copyright Notice

©FORESEC Academy (International Learning Service)

All rights reserved. No part of this publication may be reproduced, distributed, or transmit-
ted in any form or by any means, including photocopying, recording, or other electronic or
mechanical methods, without the prior written permission of the publisher, except in the
case of brief quotations embodied in critical reviews and certain other noncommercial
uses permitted by copyright law. For permission requests, write to the publisher, ad-
dressed “Attention: Permissions Coordinator,” at the address below.

i
FOREWORD

This book is the result of my learning some


principles of Security and wanting to share
these principles with others. This simple
guide will help any generation if they take
time to read, listen, and learn.  Nobody
knows how long they will journey in this
life. Nevertheless, if we could learn a few
basic principles before starting off, we
could make the journey with fewer head-
aches and disappointments in ourselves.

Hopefully, anyone who reads this book will


take heed to these simple truths and apply
them to their lives before their journey be-
gins. Those who have already started can
also gain insight and make appropriate ad-
justments. These are some of the insights
that I have gained along my path

ii
MODULE 1
“The supreme art of war is
Information Security to subdue the enemy with-
Management out fighting.”
– Tsun Zu
Because this new concept covers a broader range of issues,
Introduction to the Management of In-
from the protection of data to the protection of human re-
formation Security sources, information security is no longer the sole responsi-
bility of a discrete group of people in the company; rather, it
is the responsibility of every employee, and especially man-
Chapter Overview
agers.

The opening chapter establishes the foundation for under-


Organizations must realize that information security funding
standing the field of Information Security. This is accom-
and planning decisions involve more than just technical man-
plished by explaining the importance of information technol-
agers:
ogy and defining who is responsible for protecting an organi-
zation’s information assets. In this chapter the student will
Rather, the process should involve three distinct groups of
come to know and understand the definition and key charac-
decision makers, or communities of interest:
teristics of information security as well as the come to recog-
nize the characteristics that differentiate information security
Information security managers and professionals
management from general management.

Information technology managers and professionals


Chapter Objectives
Nontechnical business managers and professionals
When you complete this chapter, you will be able to:
These communities of interest fulfill the following roles:
Recognize the importance of information technology and un-
derstand who is responsible for protecting an organization’s The information security community protects the organiza-
information assets tion’s information assets from the many threats they face.

Know and understand the definition and key characteristics The information technology community supports the busi-
of information security ness objectives of the organization by supplying and support-
ing information technology appropriate to the business’
Know and understand the definition and key characteristics needs.
of leadership and management
The nontechnical general business community articulates
Recognize the characteristics that differentiate information and communicates organizational policy and objectives and
security management from general management allocates resources to the other groups.

INTRODUCTION

Information technology is the vehicle that stores and trans-


WHAT IS SECURITY?
ports information—a company’s most valuable resour-
ce—from one business unit to another.
Understanding the technical aspects of information security
requires that you know the definitions of certain information
But what happens if the vehicle breaks down, even for a little
technology terms and concepts.
while?

In general, security is defined as “the quality or state of be-


As businesses have become more fluid, the concept of com-
ing secure—to be free from danger.”
puter security has been replaced by the concept of informa-
tion security.

4
Security is often achieved by means of several strategies
usually undertaken simultaneously or used in combination
with one another.

Specialized areas of security

Physical security, which encompasses strategies to protect


people, physical assets, and the workplace from various
threats including fire, unauthorized access, or natural disas-
ters

Personal security, which overlaps with physical security in


the protection of the people within the organization
CIA Triangle

Operations security, which focuses on securing the organiza-


The C.I.A. triangle - confidentiality, integrity, and availability -
tion’s ability to carry out its operational activities without in-
has expanded into a more comprehensive list of critical char-
terruption or compromise
acteristics of information.

Communications security, which encompasses the protec-


tion of an organization’s communications media, technology, NSTISSC Security Model
and content, and its ability to use these tools to achieve the
organization’s objectives The NSTISSC Security Model provides a more detailed per-
spective on security.
Network security, which addresses the protection of an or-
ganization’s data networking devices, connections, and con- While the NSTISSC model covers the three dimensions of
tents, and the ability to use that network to accomplish the information security, it omits discussion of detailed guide-
organization’s data communication functions lines and policies that direct the implementation of controls.

Information security includes the broad areas of information Another weakness of using this model with too limited an
security management, computer and data security, and net- approach is to view it from a single perspective.
work security.
NSTISSC Security Model
At the heart of the study of information security is the con-
cept of policy. Policy, awareness, training, education, and
technology are vital concepts for the protection of informa-
tion and for keeping information systems from danger.

Key Concepts of Information Security

5
Confidentiality Identification

Confidentiality of information ensures that only those with An information system possesses the characteristic of identi-
sufficient privileges may access certain information. When fication when it is able to recognize individual users. Identifi-
unauthorized individuals or systems can access information, cation and authentication are essential to establishing the
confidentiality is breached. To protect the confidentiality of level of access or authorization that an individual is granted.
information, a number of measures are used:
Authentication
Information classification
Authentication occurs when a control provides proof that a
Secure document storage user possesses the identity that he or she claims.

Application of general security policies Authorization

Education of information custodians and end users After the identity of a user is authenticated, a process called
authorization provides assurance that the user (whether a
Integrity person or a computer) has been specifically and explicitly
authorized by the proper authority to access, update, or de-
Integrity is the quality or state of being whole, complete, and lete the contents of an information asset.
uncorrupted. The integrity of information is threatened when
it is exposed to corruption, damage, destruction, or other Accountability
disruption of its authentic state. Corruption can occur while
information is being compiled, stored, or transmitted. The characteristic of accountability exists when a control pro-
vides assurance that every activity undertaken can be attrib-
Availability uted to a named person or automated process. For example,
audit logs that track user activity on an information system
Availability is the characteristic of information that enables provide accountability.
user access to information without interference or obstruc-
tion and in a required format. A user in this definition may be WHAT IS MANAGEMENT?
either a person or another computer system. Availability
does not imply that the information is accessible to any user; Management is the process of achieving objectives using a
rather, it means availability to authorized users. given set of resources.

Privacy To make the information security process more effective, it is


important to understand certain core principles of manage-
The information that is collected, used, and stored by an or- ment.
ganization is to be used only for the purposes stated to the
data owner at the time it was collected. This definition of pri- A manager is “someone who works with and through other
vacy does focus on freedom from observation (the meaning people by coordinating their work activities in order to ac-
usually associated with the word), but rather means that infor- complish organizational goals.”
mation will be used only in ways known to the person provid-
ing it. A manager has many roles to play within organizations, in-
cluding the following:

Informational role: Collecting, processing, and using informa-


tion that can affect the completion of the objective

6
Interpersonal role: Interacting with superiors, subordinates, Integrity – being of sound moral fiber and good ethical worth
outside stakeholders, and other parties that influence or are
influenced by the completion of the task Judgment – using sound personal decision making to deter-
mine effective and appropriate solutions
Decisional role: Selecting from among alternative ap-
proaches, and resolving conflicts, dilemmas, or challenges. Justice – being impartial and fair in exercising authority

The Difference between Leadership and Management Knowledge – possessing a base of information gained
through experience or education
The distinction between a leader and a manager arises in the
execution of organizational tasks. The leader influences em- Loyalty – expressing open support and faithfulness to one’s
ployees so that they are willing to accomplish objectives. He organization and fellow employees
or she is expected to lead by example and demonstrate per-
sonal traits that instill a desire in others to follow. In other Tact – dealing with a situation without undue personal bias
words, leadership provides purpose, direction, and motiva- or creating offense
tion to those that follow.
Unselfishness – performing duties by placing the welfare of
By comparison, a manager administers the resources of the others and the accomplishment of the mission first
organization.
Action plan for improvement of leadership abilities:

Know yourself and seek self-improvement.

Be technically and tactically proficient.


Characteristics of a Leader
Seek responsibility and take responsibility for your actions.
What makes a good leader?
Make sound and timely decisions.
Bearing – appearance and how one carries oneself
Set the example.
Courage – proceeding in the face of adversity
Know your [subordinates] and look out for their well-being.
Decisiveness – making and expressing decisions in a clear
and authoritative manner Keep your subordinates informed.

Dependability – performing and completing tasks in a reli- Develop a sense of responsibility in your subordinates.
able and predictable manner
Ensure the task is understood, supervised, and accom-
Endurance – withstanding mental, physical, and emotional plished.
hardship
Build the team.
Enthusiasm – displaying sincere interest in and exuberance
for the accomplishment of tasks Employ your [team] in accordance with its capabilities.

Initiative – identifying and accomplishing tasks in the ab- Be…Know…Do…


sence of specific guidance

7
As a leader you must BE a person of strong and honorable
character; committed to professional ethics; an example of
individual values; and able to resolve complex ethical dilem-
mas. You must KNOW the details of your situation, the stan-
dards to which you work, yourself, human nature, and your
team. You must DO by providing purpose, direction, and mo-
tivation to your teams.

Behavioral Types of Leaders

There are three basic behavioral types of leaders: the auto-


cratic, the democratic, and the laissez-faire.

Autocratic leaders reserve all decision-making responsibility


for themselves, and are more “do as I say” types of manag-
ers.

The democratic leader works in the opposite way, typically


seeking input from all interested parties, requesting ideas Planning
and suggestions, and then formulating a position for which
they seek the support of a majority opinion. The process that develops, creates, and implements strate-
gies for the accomplishment of objectives is called planning.
While both autocratic and democratic leaders tend to be There are three levels of planning:
action-oriented, the laissez-faire leader tends to sit back and
allow the process to develop as it goes, only making minimal Strategic planning occurs at the highest levels of the organi-
decisions to avoid bringing the process to a complete halt. zation and for a longer period of time, usually five or more
years.
Characteristics of Management
Tactical planning focuses on production planning and inte-
Two basic approaches to management exist: grates organizational resources at a level below the entire
enterprise and for an intermediate duration (such as one to
Traditional management theory uses the core principles of five years).
planning, organizing, staffing, directing, and controlling
(POSDC). Operational planning focuses on the day-to-day operation of
local resources, and occurs in the short or immediate term.
Popular management theory categorizes the principles of
management into planning, organizing, leading, and control-
ling (POLC).

8
Planning Control Tools

The general approach to planning begins with the creation of There are four categories of control tools:
strategic plans for the entire organization.
Information control tools.
To better understand the planning process, an organization
must thoroughly define its goals and objectives. Financial control tools.

Project management is the management of all aspects of a Operational control tools.


project from inception, through organization and start-up,
task completion, and eventual wrap-up. Behavioral control tools

Organization

The principle of management dedicated to the structuring of


resources to support the accomplishment of objectives.

Organizing tasks requires determining what is to be done, in


what order, by whom, by which methods, and according to
what timeline.

Leadership

As noted earlier, leadership encourages the implementation


of the planning and organizing functions. It includes supervis-
ing employee behavior, performance, attendance, and atti-
tude. Leadership generally addresses the direction and moti-
vation of the human resource.

Control

Monitoring progress toward completion, and making neces-


Solving Problems
sary adjustments to achieve the desired objectives, requires
the exercise of control. In general, the control function
Step 1: Recognize and Define the Problem
serves to assure the organization of the validity of the plan.

Step 2: Gather Facts and Make Assumptions


The controlling function also determines what must be moni-
tored as well as applies specific control tools to gather and
Step 3: Develop Possible Solutions
evaluate information.

Step 4: Analyze and Compare the Possible Solutions

Step 5: Select, Implement, and Evaluate a Solution

9
Feasibility Analyses: sary to support the design, creation, and implementation of
information security strategies, as they exist within the IT
To review economic feasibility, you compare the costs and planning environment
benefits of possible solutions.
Several types of InfoSec plans exist:
To review technological feasibility, you address the organiza-
tion’s ability to acquire the technology needed to implement incident response planning,
a candidate solution.
business continuity planning,
To review behavioral feasibility, you assess a candidate solu-
tion according to the likelihood that subordinates will adopt disaster recovery planning,
and support a solution, rather than resisting it.
policy planning,
To review operational feasibility, you assess the organiza-
tion’s ability to integrate a candidate solution into its current personnel planning,
business processes.
technology rollout planning,
Principles of Information Security Management
risk management planning, and
Because information security management is charged with
taking responsibility for a specialized program, certain char- security program planning including education, training and
acteristics of its management are unique to this community awareness.
of interest.
Policy
The extended characteristics of information security are
known as the six Ps. The set of organizational guidelines that dictates certain be-
havior within the organization is called policy.
Planning
In InfoSec, there are three general categories of policy:
Policy
General program policy (Enterprise Security Policy)
Programs
An issue-specific security policy (ISSP)
Protection
System-specific policies (SSSPs)
People
Programs
Project Management
Specific entities managed in the information security do-
main.

A security education training and awareness (SETA) program


InfoSec Planning
is one such entity.

Planning as part of InfoSec management is an extension of


Other programs that may emerge include a physical security
the basic planning model discussed earlier in this chapter.
program, complete with fire, physical access, gates, guards,
Included in the InfoSec planning model are activities neces-
and so on.

10
Protection Discussion Topics

The protection function is executed via a set of risk manage- What is the defining difference between computer security
ment activities, including risk assessment and control, as and information security?
well as protection mechanisms, technologies, and tools.

Each of these mechanisms represents some aspect of the


management of specific controls in the overall information ANSWER: The focus on all levels of management, not only
security plan. the technical professionals.

People

People are the most critical link in the information security Why can we argue that information security is really an appli-
program. As discussed in the Viewpoint section, it is impera- cation of social science?
tive that managers continuously recognize the crucial role
that people play in the information security program.

This aspect of InfoSec includes security personnel and the ANSWER: It relies on altering human behavior and making
security of personnel, as well as aspects of the SETA pro- members of the organization aware of the new expected be-
gram mentioned earlier. haviors.

Project Management

The final component is the application of thorough project


management discipline to all elements of the information se-
curity program.

This effort involves identifying and controlling the resources


applied to the project, as well as measuring progress and
adjusting the process as progress is made toward the goal.

11
Key Terms Manager

Accountability Network security

Authentication Objective

Authorization Operations security

Availability Organization

C.I.A. triangle Personal security

Communications security Physical security

Confidentiality Planning

Control Policy

Control tools Privacy

Decisional role

File hashing

General business community

Goal

Hash value

Identification

Information security community

Information security or InfoSec

Information technology community

Informational role

Integrity

Interpersonal role

Leadership

Management

12
MODULE 2
“Appear weak when you are
Security Planning strong, and strong when
you are weak”
– Tsun Zu
Planning for Security

Chapter Overview

In this chapter, the reader will come to recognize the impor-


tance of planning and learn the principal components of or-
ganizational planning as well as gaining an understanding of
the principal components of information security system im-
plementation planning as it functions within the organiza-
tional planning scheme.

Chapter Objectives

When you complete this chapter, you will be able to:

The major components of a strategic plan include the vision


Recognize the importance of planning and describe the prin-
statement, mission statement, strategy, and a series of hierar-
cipal components of organizational planning.
chical and departmental plans.

Know and understand the principal components of informa-


Developing the organizational plan for information security
tion security system implementation planning as it functions
depends upon the same planning process.
within the organizational planning scheme.

Since the information security community of interest seeks


Introduction
to influence the broader community in which it operates, the
effective information security planner should know how the
In general, a successful organization depends on proper or-
organizational planning process works so that participation
ganizational planning.
in the process can yield meaningful results.

In a setting where there are continual constraints on re-


The dominant means of managing resources in modern or-
sources, both human and financial, good planning enables
ganizations, planning is the enumeration of a sequence of
an organization to make the most out of the resources at
action steps intended to achieve specific goals, and then
hand.
controlling the implementation of these steps.

Planning usually involves groups and organizational proc-


Planning provides direction for the organization’s future.
esses internal or external to the organization. They can in-
clude employees, management, stockholders, other outside
Organizational planning should be undertaken using a top-
stakeholders, the physical environment, the political and le-
down process in which the organization’s leaders choose the
gal environment, the competitive environment, and the tech-
direction and initiatives that the entire organization should
nological environment.
pursue.

The primary goal of the organizational planning process is


the creation of detailed plans: systematic directions on how
to meet the organization’s objectives. This is accomplished
with a process that begins with the general end ends with
the specific.

14
Random Widget Works will be the preferred manufacturer of
choice for every business’s widget equipment needs, with an
RWW widget in every machine they use.
Components of Organizational Planning
Values
Mission

By establishing a formal set of organizational principles, stan-


The mission statement explicitly declares the business of the
dards, and qualities in a values statement, as well as bench-
organization, as well as its intended areas of operations. It is,
marks for measuring behavior against these published val-
in a sense, the organization’s identity card.
ues, an organization makes its conduct and performance
standards clear to its employees and the public.
The mission statement must explain what the organization
does and for whom.
Microsoft has a formal employee values statement published
on their Web site.
Random Widget Works, Inc. designs and manufactures qual-
ity widgets and associated equipment and supplies for use in
RWW values commitment, honesty, integrity and social re-
modern business environments.
sponsibility among its employees, and is committed to pro-
viding its services in harmony with its corporate, social, legal
The Information Security Department is charged with identify-
and natural environments.
ing, assessing, and appropriately managing risks to Company
X’s information and information systems. It evaluates the op-
The mission, vision, and values statements together provide
tions for dealing with these risks, and works with depart-
the philosophical foundation for planning, and also guide the
ments throughout Company X to decide upon and then im-
creation of the strategic plan.
plement controls that appropriately and proactively respond
to these same risks. The Department is also responsible for
developing requirements that apply to the entire organization
as well as external information systems in which Company X
participates [these requirements include policies, standards,
and procedures]. The focal point for all matters related to in-
formation security, this Department is ultimately responsible
for all endeavors within Company X that seek to avoid, pre-
vent, detect, correct, or recover from threats to information
or information systems.

Vision

In contrast to the mission statement, which expresses what


the organization is, the vision statement expresses what the
organization wants to become.

Vision statements therefore should be ambitious; after all,


they are meant to express the aspirations of the organization
and to serve as a means for visualizing its future.

The vision statement is the best-case scenario for the organi-


zation’s future.

15
Strategy

Strategy, or strategic planning, is the basis for long-term di-


rection for the organization.

Strategic planning in general guides organizational efforts,


and focuses resources toward specific, clearly defined goals,
in the midst of an ever-changing environment.

“In short, strategic planning is a disciplined effort to produce


fundamental decisions and actions that shape and guide
what an organization is, what it does, and why it does it, with
a focus on the future.”

Planning for the Organization

After an organization develops a general strategy, it creates


an overall strategic plan by extrapolating that general strat-
egy into specific strategic plans for major divisions.

Each level of each division translates those objectives into


more specific objectives for the level below.

However, in order to execute this broad strategy and turn


statement into action, the executive team must first define
individual responsibilities.

16
Planning Levels

Once the organization’s overall strategic plan is translated


into strategic goals for each major division or operation,
such as the Information Security group, the next step is to
translate these strategies into tasks with specific, measur-
able, achievable and time-bound objectives.

Strategic planning then begins a transformation from gen-


eral, sweeping statements toward more specific and applied
objectives.

Tactical planning has a shorter focus than strategic planning,


usually one to three years.

Tactical planning breaks down each applicable strategic goal


into a series of incremental objectives.

Managers and employees use the operational plans, which


are derived from the tactical plans, to organize the ongoing,
day-to-day performance of tasks.

The operational plan includes clearly identified coordination


activities across department boundaries, communications
requirements, weekly meetings, summaries, progress re-
ports, and associated tasks.

17
Planning and the CISO Make the process continuous.

The first priority of the CISO and information security man- Provide meaning.
ager should be the structure of a strategic plan.
Be yourself.
While each organization may have its own format for the de-
sign and distribution of a strategic plan, the fundamental ele- Lighten up and have some fun.
ments of planning are the same.

Elements of a strategic plan

Introduction by the President of the Board or CEO

Executive Summary

Mission Statement and Vision Statement

Organizational Profile and History

Strategic Issues and Core Values

Program Goals and Objectives

Management/Operations Goals and Objectives

Appendices (optional) (strengths, weaknesses, opportunities


and threats (SWOT) analyses, surveys, budgets etc).”

Some additional tips for planning include:

Create a compelling vision statement that frames the evolv-


ing plan, and acts as a magnet for people who want to make
a difference.

Embrace the use of a balanced scorecard approach, which


demands the use of a balanced set of measures and cause
& effect thinking.

Deploy a draft high level plan early, and ask for input from
stakeholders in the organization.

Make the evolving plan visible.

Make the process invigorating for everyone.

Be persistent.

18
Planning for Information Security Implementa-
tion

The CIO and CISO play important roles in translating overall


strategic planning into tactical and operational information
security plans information security.

The CISO plays a more active role in the development of the


planning details than does the CIO.

The job description for the Information Security Department


Manager from Information Security Roles and Responsibili-
ties Made Easy is:

Creates a strategic information security plan with a vision for


the future of information security at Company X (utilizing
evolving information security technology, this vision meets a The bottom-up approach can begin as a grass-roots effort in
variety of objectives such as management's fiduciary and which systems administrators attempt to improve the secu-
legal responsibilities, customer expectations for secure mod- rity of their systems.
ern business practices, and the competitive requirements of
the marketplace) The key advantage to this approach is the technical exper-
tise of the individual administrators, since they work with in-
Understands the fundamental business activities performed formation systems on a daily basis.
by Company X, and based on this understanding, suggests
appropriate information security solutions that uniquely pro- Unfortunately, this approach seldom works, as it lacks a num-
tect these activities ber of critical features, such as coordinated planning from
upper management, coordination between departments, and
Develops action plans, schedules, budgets, status reports the provision of sufficient resources.
and other top management communications intended to im-
prove the status of information security at Company X The top-down approach, in contrast, has strong upper man-
agement support, a dedicated champion, usually assured
Once the organization’s overall strategic plan has been trans- funding, a clear planning and implementation process, and
lated into IT and information security departmental objec- the ability to influence organizational culture.
tives by the CIO, and then further translated into tactical and
operational plans by the CISO, the implementation of infor- High-level managers provide resources, give direction, issue
mation security can begin. policies, procedures and processes, dictate the goals and
expected outcomes of the project, and determine who is ac-
Implementation of information security can be accomplished countable for each of the required actions.
in two ways: bottom-up or top-down.
The most successful top-down approach also involves a for-
mal development strategy referred to as the systems devel-
opment life cycle.

For any top-down approach to succeed, however, high-level


management must buy into the effort and provide all depart-
ments with their full support.

19
Such an initiative must have a champion—ideally, an execu- It identifies the problem that the system being developed is
tive with sufficient influence to move the project forward, en- to solve.
sure that it is properly managed, and push for acceptance
throughout the organization. Beginning with an examination of the event or plan that initi-
ates the process, the objectives, constraints, and scope of
Involvement and support of the end users is also critical to the project are specified.
the success of this type of effort.
A preliminary cost/benefit analysis is developed to evaluate
Introduction to the Systems Development Life Cycle the perceived benefits and the appropriate costs for those
benefits.
The general systems development life cycle (SDLC) is a
methodology for the design and implementation of an infor-
mation system in an organization widely used in IT organiza-
tions.

A methodology is a formal approach to solving a problem


based on a structured sequence of procedures. Using a
methodology ensures a rigorous process, and increases the
likelihood of achieving the desired final objective.

The impetus to begin a SDLC-based project may be event-


Analysis
driven, that is, started in response to some event in the busi-
ness community, inside the organization, or within the ranks
The analysis phase begins with the information learned dur-
of employees, customers or other stakeholders. Or it could
ing the investigation phase. This phase assesses the organi-
be plan-driven, that is, the result of a carefully developed
zation’s readiness, its current systems status, and its capabil-
planning strategy.
ity to implement and then support the proposed systems.

At the end of each phase, a structured review or reality


Analysts determine what the new system is expected to do,
check takes place, during which the team and its
and how it will interact with existing systems.
management-level reviewers determine if the project should
be continued, discontinued, outsourced, or postponed until
Logical Design
additional expertise or organizational knowledge is acquired.

In the logical design phase, the information obtained during


the analysis phase is used to create a proposed system-
based solution for the business problem.

Based on the business need, the team selects systems and/


or applications capable of providing the needed services.

Finally, based on all of the above, the team selects specific


types of technical controls that might prove useful when im-
plemented as a physical solution.
Investiga-
tion The logical design is the implementation independent blue-
print for the desired solution.

20
Physical Design

During the physical design phase, the team selects specific


technologies that support the alternatives identified and
evaluated in the logical design.

The selected components are evaluated further as a make-


or-buy decision, then a final design is chosen that integrates
the various required components and technologies.

Implementation

The SecSDLC process involves the identification of specific


In the implementation phase, the organization’s software en-
threats and the risks that they represent, and the subsequent
gineers develop any software that is not to be purchased,
design and implementation of specific controls to counter
and take steps to create integration modules.
those threats and assist in the management of the risk.

These customized elements are tested and documented.


Investigation in the SecSDLC

Users are trained and supporting documentation is created.


The investigation phase of the SecSDLC begins with a direc-
tive from upper management specifying the process, out-
Once all components have been tested individually, they are
comes, and goals of the project, as well as its budget and
installed and tested.
other constraints.

Maintenance
Frequently, this phase begins with the affirmation or creation
of security policies on which the security program of the or-
This phase consists of the tasks necessary to support and
ganization is or will be founded.
modify the system for the remainder of its useful life cycle.

Teams of managers, employees, and contractors are assem-


Periodically, the system is tested for compliance, and the fea-
bled to analyze problems, define their scope, specify goals
sibility of continuance versus discontinuance is evaluated.
and objectives, and identify any additional constraints not
covered in the enterprise security policy.
Upgrades, updates, and patches are managed.

Finally, an organizational feasibility analysis determines


When the current system can no longer support the changed
whether the organization has the resources and commitment
mission of the organization, it is terminated and a new sys-
to conduct a successful security analysis and design.
tems development project is undertaken.

Analysis in the SecSDLC


The Security Systems Development Life Cycle
(SecSDLC)
The development team created during the investigation
phase conducts a preliminary analysis of existing security
The security systems development life cycle (SecSDLC),
policies or programs, along with documented current threats
may differ in several specific activities, but the overall meth-
and associated controls.
odology is the same.

21
This phase also includes an analysis of relevant legal issues It is accomplished by a threat agent that damages or steals
that could affect the design of the security solution. an organization’s information or physical asset.

The risk management task also begins in this stage. An exploit is a technique or mechanism used to compromise
a system.
Risk Management
A vulnerability is an identified weakness of a controlled sys-
Risk management is the process of identifying, assessing, tem in which necessary controls are not present or are no
and evaluating the levels of risk facing the organization, spe- longer effective.
cifically the threats to the organization’s security and to the
information stored and processed by the organization. An attack is the use of an exploit to achieve the compromise
of a controlled system.
“If you know the enemy and know yourself, you need not
fear the result of a hundred battles. If you know yourself but Common attacks include:
not the enemy, for every victory gained you will also suffer a
defeat. If you know neither the enemy nor yourself, you will Malicious code.
succumb in every battle.”
Hoaxes .
To better understand the analysis phase of the SecSDLC,
you should know something about the kinds of threats fac- Back doors.
ing organizations in the modern, connected world of informa-
tion technology (or IT). Password crack.

In this context, a threat is an object, person, or other entity Brute force.


that represents a constant danger to an asset.
Dictionary.
Table 2-1 – Threats to Information Security:
Denial-of-service (DoS) and distributed denial-of-service
(DDoS).

Spoofing.

Man-in-the-middle

Spam.

Mail bombing.

Sniffer.

Social engineering.

Buffer overflow

An attack is a deliberate act that exploits a vulnerability.


Timing.

22
In the logical design phase, team members create and de-
velop the blueprint for security, and examine and implement
key policies that influence later decisions.
The last step in knowing the enemy is to find some method
of prioritizing the risk posed by each category of threat and
In the physical design phase, team members evaluate the
its related methods of attack.
technology needed to support the security blueprint, gener-
ate alternative solutions, and agree upon a final design.
This can be done by adopting threat levels from an existing
study of threats, or by creating your own categorization of
Between the of logical and physical design phases, a secu-
threats for your environment based on scenario analyses.
rity manager may seek to use established security models to
guide the design process.
To manage risk, you must identify and assess the value of
your information assets.
Security models provide frameworks for ensuring that all ar-
eas of security are addressed; organizations can adapt or
This iterative process must include a classification and cate-
adopt a framework to meet their own information security
gorization of all of the elements of an organization’s systems:
needs.
people, procedures, data and information, software, hard-
ware and networking elements.
One of the design elements of the information security pro-
gram is the information security policy of the organization.
The next challenge in the analysis phase is to review each
information asset for each threat it faces and create a list of
Management must define three types of security policy:
the vulnerabilities.

General or security program policy,


As the analysis phase continues, the next task is to assess
the relative risk for each of the information assets.
Issue-specific security policies and

We accomplish this by a process called risk assessment or


Systems-specific security policies.
risk analysis.

Another integral part of the information security program to


Risk assessment assigns a comparative risk rating or score
be designed is the security education and training (SETA) pro-
to each specific information asset.
gram.

Risk management is the part of the analysis phase that identi-


The SETA program consists of three elements: security edu-
fies vulnerabilities in an organization’s information systems
cation, security training, and security awareness.
and takes carefully reasoned steps to assure the confidential-
ity, integrity, and availability of all the components in the or-
The purpose of SETA is to enhance security by
ganization’s information system.

Improving awareness of the need to protect system re-


sources;

Design in the SecSDLC developing skills and knowledge so computer users can per-
form their jobs more securely and
The design phase actually consists of two distinct phases,
the logical design and the physical design. building in-depth knowledge, as needed, to design, imple-
ment, or operate security programs for organizations and sys-
tems.”

23
As the design phase continues, attention turns to the design Physical resources include people, hardware, and the sup-
of the controls and safeguards used to protect information porting system elements and resources associated with the
from attacks by threats. management of information in all its states, transmission,
storage, and processing.
There are three categories of controls:
Implementation in the SecSDLC
Managerial controls address the design and implementation
of the security planning process and security program man- The security solutions are acquired, tested, implemented,
agement. Management controls also addresses risk manage- and tested again.
ment and security controls reviews.
Personnel issues are evaluated and specific training and edu-
Operational Controls cover management functions and lower cation programs conducted.
level planning, such as disaster recovery and incident re-
sponse planning. Operational controls also address person- Perhaps the most important element of the implementation
nel security, physical security and the protection of produc- phase is the management of the project plan.
tion inputs and outputs.
The major steps in executing the project plan are
Technical Controls address those tactical and technical is-
sues related to designing and implementing security in the planning the project,
organization. Here the technologies necessary to protect in-
formation are examined and selected. supervising the tasks and action steps within the project
plan, and
Another element of the design phase is the creation of essen-
tial preparedness documents. wrapping up the project plan.

Contingency planning (CP) is the entire planning conducted Information security is a field with a vast array of technical
by the organization to prepare for, react to and recover from and non-technical requirements.
events that threaten the security of information and informa-
tion assets in the organization, and the subsequent restora- The project team should consist of a number of individuals
tion to normal business operations. who are experienced in one or multiple requirements of both
the technical and non-technical areas.
Incident response planning (IRP) is the planning process as-
sociated with the identification, classification, response, and The champion
recovery from an incident.
The team leader
Disaster recovery planning (DRP) is the planning process as-
sociated with the preparation for and recovery from a disas- Security policy developers
ter, whether natural or man-made.
Risk assessment specialists
Business continuity planning (BCP) is the planning process
associated with ensuring that critical business functions con- Security professionals
tinue if a catastrophic incident or disaster occurs.
Systems administrators
As the design phase progresses, attention now focuses on
physical security, which addresses the design, implementa- End users.
tion, and maintenance of countermeasures that protect the
physical resources of an organization.

24
Just as each potential employee and potential employer look GIAC
for the best fit, each organization should examine the op-
tions possible for staffing of the information security func- SCP
tion.
ICSA
First, the entire organization must decide how to position
and name the security function within the organization. Security +

Second, the information security community of interest must CISM


plan for the proper staffing (or adjustments to the staffing
plan) for the information security function.

Third, the IT community of interest must understand the im-


Maintenance and Change in the SecSDLC
pact of information security across every role in the IT func-
tion and adjust job descriptions and documented practices
Once the information security program is implemented, it
accordingly.
must be operated, properly managed, and kept up to date
by means of established procedures.
Finally, the general management community of interest must
work with the information security professionals to integrate
If the program is not adjusting adequately to the changes in
solid information security concepts into the personnel man-
the internal or external environment, it may be necessary to
agement practices of the organization.
begin the cycle again.

It takes a wide range of professionals to support a diverse


While a systems management models is designed to man-
information security program
age and operate systems, a maintenance model is intended
to complement a systems management model and focus or-
Chief Information Officer (CIO)
ganizational effort on system maintenance.

Chief Information Security Officer (CISO)


External monitoring.

Security Managers Internal monitoring. .

Security Technicians Planning and risk assessment.

Data Owners Vulnerability assessment and remediation

Data Custodians Readiness and review.

Data Users Vulnerability assessment

Many organizations seek professional certification so that One of the maintenance issues that must be planned in the
they can more easily identify the proficiency of job appli- SecSDLC is the systems management model that will be
cants: used. The ISO management model is a five-area approach
that provides structure to the administration and manage-
CISSP ment of networks and systems. These five areas are:

SSCP Fault management

25
Configuration and name management used but difficult to determine who is using them, at which
point, accounting management begins to overlap with per-
Accounting management formance management, which is addressed in the next sec-
tion. With accounting management you begin to determine
Performance management optimal points of systems use as indicators for upgrade and
improvement. Auditing is the process of reviewing the use of
Security management a system, not to determine its performance, but to determine
if misuse or malfeasance has occurred.

Performance Management. Because many information secu-


rity technical controls are implemented on common IT proc-
essors, they are affected by the same factors as most
computer-based technologies. It is therefore important to
monitor the performance of security systems and their under-
lying IT infrastructure to determine if they are effectively and
efficiently doing the job they were implemented to do. Some
information security control systems, such as Internet usage
monitors that look for inappropriate use of Internet re-
sources, operate as pass-by devices.

Security Program Management. Once an information secu-


rity program is functional it must be operated and managed.
The ISO five-area framework provides some structure for a
management model; however, it focuses on ensuring that
various areas are addressed, rather than guiding the actual
Fault Management. Involves identifying and addressing conduct of management. In order to assist in the actual man-
faults in the applied information security profile and then ad- agement of information security programs, a formal manage-
dressing them. Also, the monitoring and resolution of user ment standard can provide some insight into the processes
complaints. and procedures needed. This could be based on the
BS7799/ISO17799 model or the NIST models described ear-
Configuration and Change Management. The administration
lier.
of various components involved in the security program as
well as changes in the strategy, operation, or components of
the information security program.

Accounting and Auditing Management involves chargeback


accounting, and systems monitoring. Chargeback account-
ing happens when organizations internally charge their de-
partments for system use. While chargebacks are seldom
used today, certain kinds of resource usage are commonly
tracked—such as those on a computing system (like a server
or a desktop computer) or human effort-hours—to recover IT
costs from non-IT units of the organization. Accounting man-
agement involves monitoring the use of a particular compo-
nent of a system. In networking, this monitoring may simply
determine which users are using which resources. However,
in security, it may be easy to track which resources are being

26
Comparing the SDLC and the SecSDLC

Table 2-2:

27
Key Terms Joint Application Development (JAD)

Logical design phase

Maintenance phase
Analysis phase

Managerial controls
Attack

Methodology
Bottom-up approach

Mission statement
Business continuity planning (BCP)

Operational controls
Champion

Penetration testing
Chief Information Officer (CIO)

Physical design phase


Chief Information Security Officer (CISO)

Physical security
Contingency planning (CP)

Plan-driven
Control

Red teams
Data custodians

Risk analysis
Data owners

Risk assessment
Data users

Risk management
Disaster recovery planning (DRP)

Safeguard
Ethical hackers

Security education, training, and awareness (SETA)


Event-driven

Security Managers
Exploit

Security systems development life cycle (SecSDLC)


Feasibility analysis

Security technicians
Implementation phase

Strategy
Incident response planning (IRP)

Structured review
Information security policy

Systems development life cycle (SDLC)


Investigation phase

Technical controls

28
Threat

Threat agent

Tiger teams

Top-down approach

Values statement

Vision statement

Vulnerability

White-hat hackers

29
MODULE 3 “Supreme excellence con-
Contingency Planning sists of breaking the en-
emy's resistance without
fighting”
– Tsun Zu
Planning for Contingencies What Is Contingency Planning?

The overall planning for unexpected events is called contin-


gency planning (CP).

Chapter Overview CP is the process by which organizational planners position


their organizations to prepare for, detect, react to, and re-
The third chapter of the book will articulate the need for con- cover from events that threaten the security of information
tingency planning and explore the major components of con- resources and assets, both human and artificial.
tingency planning. In this chapter, the reader will learn how
to create a simple set of contingency plans using business The main goal of CP is the restoration to normal modes of
impact analysis and prepare and execute a test of contin- operation with minimum cost and disruption to normal busi-
gency plans. ness activities after an unexpected event.

CP Components
Chapter Objectives
Incident response plan (IRP) focuses on immediate response
When you complete this chapter, you will be able to:
to an incident.

Understand the need for contingency planning


Disaster recovery plan (DRP) focuses on restoring operations
at the primary site after disasters occur.
Know the major components of contingency planning

Business continuity plan (BCP) facilitates establishment of


Create a simple set of contingency plans, using business im-
operations at an alternate site, until the organization is able
pact analysis
to either resume operations back at their primary site or se-
lect a new primary location.
Prepare and execute a test of contingency plans

To ensure continuity across all of the CP processes during


Understand the unified contingency plan approach
the planning process, contingency planners should:

Introduction
Identify the mission- or business-critical functions.

This chapter focuses on planning for the unexpected event, Identify the resources that support the critical functions.
when the use of technology is disrupted and business opera-
tions come close to a standstill. Anticipate potential contingencies or disasters.

“Procedures are required that will permit the organization to Select contingency planning strategies.
continue essential functions if information technology sup-
port is interrupted.” Implement selected strategy.

On average, over 40% of businesses that don't have a disas- Test and revise contingency plans.
ter plan go out of business after a major loss.

31
ganization—with little or no disruption to business opera-
tions.

Four teams of individuals are involved in contingency plan-


When a threat becomes a valid attack, it is classified as an
ning and contingency operations:
information security incident if:

The CP team
It is directed against information assets

The incident recovery (IR) team.


It has a realistic chance of success

The disaster recovery (DR) team


It threatens the confidentiality, integrity, or availability of infor-
mation resources and assets
The business continuity plan (BC) team

It is important to understand that IR is a reactive measure,


Contingency Planning
not a preventative one.

NIST describes the need for this type of planning as follows:


During the incident

“These procedures (contingency plans, business interruption


First, planners develop and document the procedures that
plans, and continuity of operations plans) should be coordi-
must be performed during the incident.
nated with the backup, contingency, and recovery plans of
any general support systems, including networks used by
These procedures are grouped and assigned to individuals.
the application. The contingency plans should ensure that
interfacing systems are identified and contingency/disaster
The planning committee drafts a set of function-specific pro-
planning coordinated.”
cedures.

Components of Contingency Planning


After the incident

Incident Response Plan


Once the procedures for handling an incident are drafted,
planners develop and document the procedures that must
The incident response plan (IRP) is a detailed set of proc-
be performed immediately after the incident has ceased.
esses and procedures that anticipate, detect, and mitigate
the impact of an unexpected event that might compromise
Separate functional areas may develop different procedures.
information resources and assets.

Before the incident


In CP an unexpected event is called an incident.

Finally, the planners draft a third set of procedures, those


An incident occurs when an attack (natural or man-made)
tasks that must be performed to prepare for the incident.
impacts information resources and/or assets, whether
through actual damage or the act of successfully attacking.
These procedures include the details of the data backup
schedules, disaster recovery preparation, training schedules,
Incident response (IR), then, is a set of procedures that com-
testing plans, copies of service agreements, and business
mence when an incident is detected.
continuity plans, if any.

The IRP is usually activated when an incident causes mini-


Preparing to Plan
mal damage—according to criteria set in advance by the or-

32
Planning for an incident and the responses to it requires a Unusual system crashes.
detailed understanding of the information systems and the
threats they face. Probable indicators:

The IR planning team seeks to develop a series of pre- Activities at unexpected times.
defined responses which will guide the team and information
security staff through the steps needed for responding to an Presence of new accounts.
incident.
Reported attacks.
Pre-defining incident responses enables the organization to
react quickly and effectively to the detected incident without Notification from IDS.
confusion or wasted time and effort.
Definite indicators:
The IR team consists of professionals capable of handling
the information systems and functional areas affected by an Use of dormant accounts.
incident.
Changes to logs.
Each member of the IR team must know his or her specific
role, work in concert with each other, and execute the objec- Presence of hacker tools.
tives of the IRP.
Notifications by partner or peer.
Incident Detection
Notification by hacker.
The challenge for every IR team is determining whether an
event is the product of routine systems use or an actual inci- Occurrences of Actual Incidents:
dent.
Loss of availability.
Incident classification is the process of examining a possible
incident, or incident candidate, and determining whether or Loss of integrity.
not it constitutes an actual incident.
Loss of confidentiality.
Initial reports from end users, intrusion detection systems,
host- and network-based virus detection software, and sys- Violation of policy.
tems administrators are all ways to track and detect incident
candidates. Violation of law.

Careful training in the reporting of an incident candidate al- Incident Response


lows end users, the help desk staff, and all security person-
nel to relay vital information to the IR team.

Possible indicators:

Presence of unfamiliar files.

Presence or execution of unknown programs or processes.

Unusual consumption of computing resources.

33
Once an actual incident has been confirmed and properly Documenting an Incident
classified, the IR team moves from the detection phase to
the reaction phase. As soon as an incident has been confirmed and the notifica-
tion process is underway, the team should begin to docu-
In the incident response phase, a number of action steps ment it.
taken by the IR team and others must occur quickly and may
occur concurrently. The documentation should record the who, what, when,
where, why and how of each action taken while the incident
These steps include notification of key personnel, the assign- is occurring.
ment of tasks, and documentation of the incident.
This documentation serves as a case study after the fact to
Notification of Key Personnel determine if the right actions were taken, and if they were
effective.
As soon as the IR team determines that an incident is in pro-
gress, the right people must be immediately notified in the It can also prove the organization did everything possible to
right order. deter the spread of the incident.

An alert roster is a document containing contact information Incident Containment Strategies


on the individuals to be notified in the event of an actual inci-
dent. One of the most critical components of IR is to stop the inci-
dent or contain its scope or impact. Incident containment
There are two ways to activate an alert roster: strategies vary depending on the incident, and on the
amount of damage caused by the incident.
Sequentially
Incident containment strategies focus on two tasks:
Hierarchically
stopping the incident and
The alert message is a scripted description of the incident
and consists of just enough information so that each re- recovering control of the systems
sponder knows what portion of the IRP to implement without
impeding the notification process. The IR team can stop the incident and attempt to recover
control by means of several strategies:
Not everyone is on the alert roster, only those individuals
who must respond to a specific actual incident. Disconnect the affected communication circuits.

During this phase, other key personnel not on the alert ros- Dynamically apply filtering rules to limit certain types of net-
ter, such as general management, must be notified of the inci- work access.
dent.
Disabling compromised user accounts
This notification should occur only after the incident has
been confirmed, but before media or other external sources Reconfiguring firewalls to block the problem traffic
learn of it.
Temporarily disabling the compromised process or service
It is up to the IR planners to determine in advance whom to
notify and when, and to offer guidance about additional notifi- Taking down the conduit application or server
cation steps to take.
Stopping all computers and network devices

34
Incident Escalation Restore the services and processes in use. Compromised
(and interrupted) services and processes must be examined,
At some point in time the incident may increase in scope or cleaned, and then restored.
severity to the point that the IRP cannot adequately handle
the event. Continuously monitor the system.

Each organization will have to determine, during the busi- Restore the confidence of the members of the organization’s
ness impact analysis, the point at which the incident be- communities of interest.
comes a disaster.
After Action Review
The organization must also document when to involve out-
side response, as discussed in other sections. Before returning to routine duties, the IR team must conduct
an after-action review, or AAR.
Incident Recovery
The after-action review is a detailed examination of the
Once the incident has been contained, and system control events that occurred from first detection to final recovery.
regained, incident recovery can begin.
All team members review their actions during the incident
The IR team must assess the full extent of the damage in or- and identify areas where the IR plan worked, didn’t work, or
der to determine what must be done to restore the systems. should improve.

The immediate determination of the scope of the breach of Law Enforcement Involvement
confidentiality, integrity, and availability of information and
information assets is called incident damage assessment. When an incident violates civil or criminal law, it is the organi-
zation’s responsibility to notify the proper authorities.
Those who document the damage must be trained to collect
and preserve evidence, in case the incident is part of a crime Selecting the appropriate law enforcement agency depends
or results in a civil action. on the type of crime committed.

Once the extent of the damage has been determined, the Federal
recovery process begins:
State
Identify the vulnerabilities that allowed the incident to occur
and spread. Resolve them. Local

Address the safeguards that failed to stop or limit the inci- Involving law enforcement agencies has both advantages
dent, or were missing from the system in the first place. In- and disadvantages.
stall, replace or upgrade them.
Law enforcement agencies are usually much better equipped
Evaluate monitoring capabilities (if present). Improve detec- at processing evidence, obtaining statements from wit-
tion and reporting methods, or install new monitoring capa- nesses, and building legal cases.
bilities.
However, involving law enforcement can result in loss of con-
Restore the data from backups. trol of the chain of events following an incident, including the
collection of information and evidence, and the prosecution
of suspects.

35
Disaster Recovery Clear delegation of roles and responsibilities.

Disaster recovery planning (DRP) is the preparation for and Execution of the alert roster and notification of key person-
recovery from a disaster, whether natural or man made. nel.

In general, an incident is a disaster when: Clear establishment of priorities.

the organization is unable to contain or control the impact of Documentation of the disaster.
an incident, or
Inclusion of action steps to mitigate the impact of the disas-
the level of damage or destruction from an incident is so se- ter on the operations of the organization.
vere the organization is unable to quickly recover.
Inclusion of alternative implementations for the various sys-
The key role of a DRP is defining how to reestablish opera- tems components, should primary versions be unavailable.
tions at the location where the organization is usually lo-
cated. Crisis Management

Disaster Classifications Crisis management is a set of focused steps that deal primar-
ily with the people involved taken during and after a disaster.
A DRP can classify disasters in a number of ways.
The DR team works closely with the crisis management team
The most common method is to separate natural disasters, to assure complete and timely communication during a disas-
from man-made disasters. ter.

Another way of classifying disasters is by speed of develop- The crisis management team “is responsible for managing
ment. the event from an enterprise perspective and covers the fol-
lowing major activities:
Rapid onset disasters
Supporting personnel and their loved ones during the crisis
Slow onset disasters
Determining the event's impact on normal business opera-
Planning for Disaster tions and, if necessary, making a disaster declaration

To plan for disaster, the CP team engages in scenario devel- Keeping the public informed about the event and the actions
opment and impact analysis, and thus categorizes the level being taken to ensure the recovery of personnel and the en-
of threat each potential disaster poses. terprise

When generating a disaster recovery scenario, start first with Communicating with major customers, suppliers, partners,
the most important asset – people. regulatory agencies, industry organizations, the media, and
other interested parties.”
Do you have the human resources with the appropriate or-
ganizational knowledge to restore business operations? Two key tasks of the crisis management team are:

The DRP must be tested regularly so that the DR team can Verifying personnel status.
lead the recovery effort efficiently.
Activating the alert roster.
The key points the CP team must build into the DRP include:

36
Responding to the Disaster The determining factor is usually cost.

When a disaster strikes and the DRP is activated, actual In general there are three exclusive-use options:
events can at times outstrip even the best of plans.
hot sites,
To be prepared, the CP team should incorporate a degree of
flexibility into the DRP. warm sites, and

If the physical facilities are intact, the DR team should begin cold sites,
the restoration of systems and data to work toward full opera-
tional capability. and three shared-use options:

If the organization’s facilities are destroyed, alternative ac- timeshare,


tions must be taken until new facilities can be acquired.
service bureaus, and
When a disaster threatens the viability of an organization at
the primary site, the disaster recovery process becomes a mutual agreements.
business continuity process.
Exclusive Use Options
Business Continuity Planning
Hot Sites: A fully configured computer facility, with all serv-
Business continuity planning ensures that critical business ices, communications links, and physical plant operations.
functions can continue if a disaster occurs.
Warm Sites: Provides many of the same services and op-
Unlike the DRP, which is usually managed by the IT commu- tions of the hot site, but typically software applications are
nity of interest, the business continuity plan (BCP) is most either not included, or not installed and configured.
properly managed by the CEO of an organization.
Cold Sites: Provides only rudimentary services and facilities.
The BCP is activated and executed concurrently with the
DRP when the disaster is major or long term and requires
fuller and complex restoration of information and information
resources.

While the BCP reestablishes critical business functions at an


alternate site, the DRP team focuses on the reestablishment
of the technical infrastructure and business operations at the
primary site.

The identification of critical business functions and the re-


sources to support them is the cornerstone of BCP, as these
functions are the first that must be reestablished at the alter-
nate site.

Continuity Strategies

A CP team can choose from several continuity strategies in


its planning for business continuity.

37
Shared Use Options Putting a Contingency Plan Together

Timeshares: Operates like an exclusive use site, but is The CP team should include:
leased with a business partner or other organization.
Champion.
Service Bureaus: A service agency that, for a fee, provides
physical facilities during a disaster. Project manager.

Mutual Agreements: A mutual agreement is a contract be- Team members.


tween two organizations for each to assist the other in the
event of a disaster. Business managers

Specialized alternatives: Information technology managers

rolling mobile site Information security managers.

externally stored resources Business Impact Analysis

Off-Site Disaster Data Storage The Business impact analysis (BIA) provides the CP team
with information about systems and the threats they face,
To get any of these sites up and running quickly, the organiza- and is the first phase in the CP process.
tion must be able to move data into the new site’s systems.
The BIA is a crucial component of the initial planning stages,
Options include: as it provides detailed scenarios of the impact each potential
attack can have on the organization.
Electronic vaulting - The bulk batch-transfer of data to an
off-site facility. One of the fundamental differences between a BIA and the
risk management process is that risk management focuses
Remote Journaling - The transfer of live transactions to an on identifying the threats, vulnerabilities, and attacks to deter-
off-site facility. mine what controls can protect the information.

Database shadowing - The storage of duplicate online The BIA assumes that these controls have been bypassed,
transaction data, along with the duplication of the databases have failed, or are otherwise ineffective, and that the attack
at the remote site to a redundant server. was successful.

The CP team conducts the BIA in the following stages:

Threat attack identification

Business unit analysis

Attack success scenarios

Potential damage assessment

Subordinate plan classification

38
Threat Attack Identification and Prioritization a related plan must be developed or identified from among
existing plans already in place.
An organization that has followed the risk management proc-
ess will have already identified and prioritized threats facing Each attack scenario end case is categorized as disastrous
it. or not.

For the BIA, these organizations need only update the threat Attack end cases that are disastrous find members of the
list and add one additional piece of information, the attack organization waiting out the attack, and planning to recover
profile. after it is over.

An attack profile is a detailed description of the activities that Combining the DRP and the BCP
occur during an attack.
Because the DRP and BCP are closely related, most organi-
Business Unit Analysis zations prepare them concurrently, and may combine them
into a single document.
The second major BIA task is the analysis and prioritization
of business functions within the organization. Such a comprehensive plan must be able to support the rees-
tablishment of operations at two different locations; one im-
Attack Success Scenario Development mediately at an alternate site, and one eventually back at the
primary site.
Next the BIA team must create a series of scenarios depict-
ing the impact of an occurrence of each threat on each func- Therefore, although a single planning team can develop the
tional area. combined DRP/BRP, execution requires separate teams.

Attack profiles should include scenarios depicting a typical A Sample Disaster Recovery Plan
attack, including its methodology, the indicators of attack,
and the broad consequences. Name of agency.

Then attack success scenarios with more detail are added to Date of completion or update of the plan and test date.
the attack profile, including alternate outcomes—best, worst,
and most likely. Agency staff to be called in the event of a disaster:

Potential Damage Assessment Emergency services to be called (if needed) in event of a dis-
aster
From these detailed scenarios, the BIA planning team must
estimate the cost of the best, worst, and most likely out- Locations of in-house emergency equipment and supplies.
comes by preparing an attack scenario end case.
Sources of off-site equipment and supplies.
This will allow you to identify what must be done to recover
from each possible case. Salvage Priority List.

Related Plan Classification Agency Disaster Recovery Procedures

Once the potential damage has been assessed, and each Follow-up Assessment
scenario and attack scenario end case has been evaluated,

39
Testing Contingency Plans

Once problems are identified during the testing process, im-


provements can be made, and the resulting plan can be re-
lied on in times of need.

There are five testing strategies that can be used to test con-
tingency plans:

Desk Check

Structured walkthrough

Simulation

Parallel testing

Full interruption

Continuous Improvement

As a closing thought, just as in all organizational efforts, itera-


tion results in improvement.

A formal implementation of this methodology is a process


known as continuous process improvement (CPI).

Each time the organization rehearses its plans, it should


learn from the process, improve the plans, and then rehearse
again.

Through the constant evaluation and improvement, the or-


ganization continues to move forward, and continually im-
proves upon the process, so that it can strive for an im-
proved outcome.

40
Key Terms Parallel testing

Project manager

Rapid-onset disasters
After-action review

Remote journaling
Alert message

Scenarios
Alert roster

Sequential roster
Attack profile

Service bureau
Attack scenario end case

Simulation
Business continuity planning (BCP)

Slow-onset disaster
Business Impact Analysis (BIA)

Structured walk-through
Champion

Team members
Cold site

Timeshare
Contingency planning (CP)

Warm site
Crisis management

Database shadowing

Desk check

Electronic vaulting

Full-interruption

Hierarchical roster

Hot site

Incident candidate

Incident classification

Incident damage assessment

Mutual agreement

41
MODULE 4
“Victorious warriors win
Security Policy first and then go to war,
while defeated warriors go
to war first and then seek
to win”
– Tsun Zu
Chapter Overview Your primary responsibility is to set the information resource
security policy for the organization with the objectives of re-
duced risk, compliance with laws and regulations and assur-
In this chapter, readers will learn to define information secu-
ance of operational continuity, information integrity, and confi-
rity policy and understand its central role in a successful in-
dentiality.”
formation security program. Research has shown that there
are three major types of information security policy and the
chapter will explain what goes into each type as the reader Why Policy?
learns how to develop, implement, and maintain various
types of information security policies. A quality information security program begins and ends with
policy.

Chapter Objectives
Properly developed and implemented policies enable the in-
formation security program to function almost seamlessly
When you complete this chapter, you will be able to:
within the workplace.

Define information security policy and understand its central


Although information security policies are the least expen-
role in a successful information security program
sive means of control to execute, they are often the most dif-
ficult to implement.
Recognize the three major types of information security pol-
icy and know what goes into each type
Some basic rules must be followed when shaping a policy:

Develop, implement, and maintain various types of informa-


Policy should never conflict with law
tion security policies

Policy must be able to stand up in court, if challenged


Introduction
Policy must be properly supported and administered
This chapter focuses on information security policy:
“All policies must contribute to the success of the organiza-
what it is, tion.

how to write it, Management must ensure the adequate sharing of responsi-
bility for proper use of information systems.
how to implement it, and
End users of information systems should be involved in the
how to maintain it. steps of policy formulation.”

Policy is the essential foundation of an effective information The Bulls-eye Model


security program.
Bulls-eye model layers:
“The success of an information resources protection pro-
gram depends on the policy generated, and on the attitude Policies—the outer layer in the bull’s-eye diagram
of management toward securing information on automated
systems. Networks—where threats from public networks meet the or-
ganization’s networking infrastructure
You, the policy maker, set the tone and the emphasis on how
important a role information security will have within your
agency.

43
Systems—includes computers used as servers, desktop
computers, and systems used for process control and manu-
facturing systems

Applications—includes all applications systems

“…policies are important reference documents for internal


audits and for the resolution of legal disputes about manage-
ment's due diligence [and] policy documents can act as a
clear statement of management's intent…”

Policy, Standards, and Practices


For policies to be effective they must be:
Policy is “a plan or course of action, as of a government, po-
litical party, or business, intended to influence and determine properly disseminated
decisions, actions, and other matters”.
read
A standard is a more detailed statement of what must be
done to comply with policy. understood

Practices, procedures and guidelines explain how employ- agreed-to


ees will comply with policy.
Policies require constant modification and maintenance.

In order to produce a complete information security policy,


management must define three types of information security
policy:

Enterprise information security program policy

Issue-specific information security policies

Systems-specific information security policies

44
Enterprise Information Security Policy Reference to Other Information Technology Standards and
Guidelines - Outlines lists of other standards that influence
…sets the strategic direction, scope, and tone for all of an and are influenced by this policy document.
organization’s security efforts.
Example EISP - CCW
… assigns responsibilities for the various areas of informa-
tion security. Protection of Information: Information must be protected in a
manner commensurate with its sensitivity, value, and critical-
… guides the development, implementation, and manage- ity.
ment requirements of the information security program.
Use of Information: Company X information must be used
EISP Elements only for the business purposes expressly authorized by man-
agement.
Most EISP documents should provide:
Information Handling, Access, and And Usage: Information is
An overview of the corporate philosophy on security a vital asset and all accesses to, uses of, and processing of,
Company X information must be consistent with policies and
Information on the structure of the information security or- standards.
ganization and individuals that fulfill the information security
role Data and Program Damage Disclaimers: Company X dis-
claims any responsibility for loss or damage to data or soft-
Fully articulated responsibilities for security that are shared ware that results from its efforts to protect the confidentiality,
by all members of the organization integrity, and availability of the information handled by com-
puters and communications systems.
Fully articulated responsibilities for security that are unique
to each role within the organization Legal Conflicts: Company X information security policies
were drafted to meet or exceed the protections found in ex-
Components of the EISP isting laws and regulations, and any Company X information
security policy believed to be in conflict with existing laws or
Statement of Purpose - Answers the question “What is this regulations must be promptly reported to Information Secu-
policy for?” Provides a framework for the helps the reader to rity management.
understand the intent of the document.
Exceptions to Policies: Exceptions to information security
Information Technology Security Elements - Defines informa- policies exist in rare instances where a risk assessment ex-
tion security. amining the implications of being out of compliance has
been performed, where a standard risk acceptance form has
Need for Information Technology Security - Provides informa- been prepared by the data Owner or management, and
tion on the importance of information security in the organiza- where this form has been approved by both Information Se-
tion and the obligation (legal and ethical) to protect critical curity management and Internal Audit management.
information whether regarding customers, employees, or
markets. Policy Non-Enforcement: Management's non-enforcement
of any policy requirement does not constitute its consent.
Information Technology Security Responsibilities and Roles -
Defines the organizational structure designed to support in- Violation of Law: Company X management must seriously
formation security within the organization. consider prosecution for all known violations of the law.

45
Revocation of Access Privileges: Company X reserves the Address specific technology-based systems
right to revoke a user's information technology privileges at
any time. Require frequent updates

Industry-Specific Information Security Standards: Company Contain an issue statement on the organization’s position on
X information systems must employ industry-specific infor- an issue.
mation security standards.
ISSP topics could include:
Use of Information Security Policies and Procedures: All
Company X information security documentation including, Electronic mail
but not limited to, policies, standards, and procedures, must
be classified as “Internal Use Only,” unless expressly created Use of the Internet and the World Wide Web
for external business processes or partners.
Specific minimum configurations of computers to defend
Security Controls Enforceability: All information systems se- against worms and viruses
curity controls must be enforceable prior to being adopted
as a part of standard operating procedure. Prohibitions against hacking or testing organization security
controls

Home use of company-owned computer equipment

Issue-Specific Security Policy


Use of personal equipment on company networks

A sound issue-specific security policy provides detailed, tar- Use of telecommunications technologies
geted guidance to instruct all members of the organization in
the use of technology based systems. Use of photocopy equipment

The ISSP should begin with an introduction of the fundamen- Components of the ISSP
tal technological philosophy of the organization.
Statement of Purpose
This serves to protect both the employee and the organiza-
tion from inefficiency and ambiguity. Scope and Applicability

An effective ISSP: Definition of Technology Addressed

Articulates the organization’s expectations about how the Responsibilities


technology-based system in question should be used
Authorized Access and Usage of Equipment
Documents how the technology-based system is controlled
and identifies the processes and authorities that provide this User Access
control
Fair and Responsible Use
Serves to indemnify the organization against liability for an
employee’s inappropriate or illegal system use Protection of Privacy

Every organization’s ISSP should:

46
Prohibited Usage of Equipment

Disruptive Use or Misuse

Criminal Use

Offensive or Harassing Materials

Copyrighted, Licensed or other Intellectual Property

Other Restrictions

Systems Management

Management of Stored Materials

Employer Monitoring

Virus Protection
Implementing ISSP
Physical Security
Common approaches for creating and managing ISSPs in-
Encryption clude:

Violations of Policy Create a number of independent ISSP documents, each tai-


lored to a specific issue
Procedures for Reporting Violations
Create a single comprehensive ISSP document that aims to
Penalties for Violations cover all issues

Policy Review and Modification Create a modular ISSP document that unifies policy creation
and administration, while maintaining each specific issue’s
Scheduled Review of Policy requirements.

Procedures for Modification

Limitations of Liability

Statements of Liability

Other Disclaimers

47
of people in the organization in ways that support the secu-
rity of information.

Any technology that affects the confidentiality, integrity or


availability of information must be assessed to evaluate the
tradeoff between improved security and restrictions.

Before management can craft a policy informing users what


they can do with the technology and how they may do it, it
might be necessary for system administrators to configure
and operate the system.

The recommended approach is the modular policy, which


Technical Specifications SysSPs
provides a balance between issue orientation and policy
management.
While a manager may work with a systems administrator to
create managerial policy as specified above, the system ad-
System-Specific Policy
ministrator may need to create a different type of policy to
implement the managerial policy.
Systems-Specific Policies (SysSPs) frequently do not look
like other types of policy.
Each type of equipment has its own type of policies, which
are used to translate the management intent for the technical
They may often be created to function as standards or proce-
control into an enforceable technical approach.
dures to be used when configuring or maintaining systems.

There are two general methods of implementing such techni-


SysSPs can be separated into two general groups, manage-
cal controls, access control lists and configuration rules.
ment guidance and technical specifications, or they may be
written like the example noted above to combine these two
types of SysSP content into a single policy document.

Access Control Lists

Access control lists (ACLs) include the user access lists, ma-
trices, and capability tables that govern the rights and privi-
leges of users.

ACLs can control access to file storage systems, object bro-


kers or other network communications devices.

A capability table is a similar method that specifies which


subjects and objects users or groups can access. It clearly
identifies which privileges are to be granted to each user or
Management Guidance SysSPs
group of users.

Created by management to guide the implementation and


These specifications are frequently complex matrices, rather
configuration of technology as well as address the behavior
than simple lists or tables.

48
The level of detail and specificity (often called granularity)
may vary from system to system, but in general ACLs enable
administrations to restrict access according to user, com-
puter, time, duration, or even a particular file.

In general ACLs regulate:

Who can use the system

What authorized users can access

When authorized users can access the system

Where authorized users can access the system from

How authorized users can access the system

Restricting what users can access, e.g. printers, files, com- In some systems, capability tables are called user profiles or
munications, and applications. user policies.

Administrators set user privileges, such as: Configuration Rules

Read Configuration rules are the specific configuration codes en-


tered into security systems to guide the execution of the sys-
Write tem when information is passing through it.

Create Rule policies are more specific to the operation of a system


than ACLs, and may or may not deal with users directly.
Modify
Many security systems require specific configuration scripts
Delete telling the systems what actions to perform on each set of
information they process.
Compare

Copy

49
Guidelines for Policy Development

It is often useful to view policy development as a two-part


project.

The first project designs and develops the policy (or redes-
igns and rewrites an outdated policy), and the second estab-
lishes management processes to perpetuate the policy
within the organization.

The former is an exercise in project management, while the


latter requires adherence to good business practices.

The Policy Project

Like any IT project, a policy development or re-development


project should be well planned, properly funded, and aggres-
sively managed to ensure that it is completed on time and
within budget.

When a policy development project is undertaken, the pro-


ject can be guided by the SecSDLC process.

Investigation Phase

During the Investigation phase the policy development team


should complete the following activities:

Combination SysSPs Obtain support from senior management

It is not uncommon for an organization to create a single Support and active involvement of IT management, specifi-
document that combines elements of both the Management cally the CIO.
Guidance and the Technical Specifications SysSPs.
The clear articulation of goals
While this can be somewhat confusing to those who will use
the policies, it is very practical to have the guidance from The participation of the correct individuals from the communi-
both perspectives in a single place. ties of interest affected by the recommended policies.

Care should be taken to articulate the required actions care- The team must include representatives from Legal, Human
fully as the procedures are presented. Resources and end-users of the various IT systems covered
by the policies.

The team will need a project champion with sufficient stature


and prestige to accomplish the goals of the project.

50
The team will also need a capable project manager to see Professional consultants.
the project through to completion.
Make certain the policies are enforceable.
A detailed outline of the scope of the policy development pro-
ject, and sound estimates for the cost and scheduling of the Policy distribution is not always as straightforward as you
project. might think.

Analysis Phase Effective policy is written at a reasonable reading level, and


attempts to minimize technical jargon and management ter-
The Analysis phase should include the following activities: minology.

A new or recent risk assessment or IT audit documenting the


current information security needs of the organization.

The gathering of many key reference materials—including


any existing policies—in addition to the items noted above.

Design Phase

The Design phase should include the following activities:

A design and plan for how the policies will be distributed and
how verification of the distribution to members of the organi-
zation will be accomplished.

Specifications for any automated tool used for the creation


and management of policy documents.

Revisions to feasibility analysis reports based on improved


costs and benefits as the design is clarified.

Implementation Phase

In the Implementation phase the policy development team


will see to the writing the policies.

Resources available include:

The Web

Government sites

Maintenance Phase
Professional literature.

During the maintenance phase, the policy development team


Several authors
monitors, maintains, and modifies the policy as needed to

Peer networks.

51
ensure that it remains effective as a tool to meet changing Convince management that it is advisable to have docu-
threats. mented information security policies.

The policy should have a built-in mechanism via which users Identify the top management staff who will be approving the
can report problems with the policy, preferably anonymously. final information security document and all influential review-
ers.
The Information Security Policy Made Easy Approach
(ISPME) Collect and read all existing internal information security
awareness material and make a list of the included bottom-
Gathering Key Reference Materials line messages.

Defining A Framework For Policies Conduct a brief internal survey to gather ideas that stake-
holders believe should be included in a new or updated infor-
Preparing A Coverage Matrix mation security policy.

Examine other policies issued by your organization such as


those from Human Resources management, to identify pre-
vailing format, style, tone, length, and cross-references.

Identify the audience to receive information security policy


materials and determine whether they will each get a sepa-
rate document or a separate page on an intranet site.

Determine the extent to which the audience is literate, com-


puter knowledgeable, and receptive to security messages.

Decide whether some other awareness efforts must take


place before information security policies are issued.

Making Critical Systems Design Decisions Using ideas from the risk assessment, prepare a list of abso-
lutely essential policy messages that must be communi-
Structuring Review, Approval, And Enforcement Processes cated.

ISPME Checklist If there is more than one audience, match the audiences with
the bottom-line messages to be communicated through a
Perform a risk assessment or information technology audit to coverage matrix. […]
determine your organization's unique information security
needs. Determine how the policy material will be disseminated, not-
ing the constraints and implications of each medium of com-
Clarify what the word “policy” means within your organiza- munication.
tion so that you are not preparing a “standard,” “procedure,”
or some other related material. Review the compliance checking process, disciplinary proc-
ess, and enforcement process to ensure that they all can
Ensure that roles and responsibilities related to information work smoothly with the new policy document.
security are clarified, including responsibility for issuing and
maintaining policies.

52
Determine whether the number of messages is too large to Develop Tests To Determine If Workers Understand Policies
be handled all at one time, and if so, identify different catego-
ries of material that will be issued at different times. Assign Information Security Coordinators

Have an outline of topics to be included in the first document Train Information Security Coordinators
reviewed by several stakeholders.
Prepare And Deliver A Basic Information Security Training
Based on comments from the stakeholders, revise the initial Course
outline and prepare a first draft […]
Develop Application Specific Information Security Policies
Have the first draft document reviewed by the stakeholders
for initial reactions, presentation suggestions, and implemen- Develop A Conceptual Hierarchy Of Information Security Re-
tation ideas. quirements

Revise the draft in response to comments from stakeholders. Assign Information Ownership And Custodianship

Request top management approval on the policy. Establish An Information Security Management Committee

Prepare extracts of the policy document for selected pur- Develop An Information Security Architecture Document
poses.
SP 800-18: Guide for Developing Security Plans
Develop an awareness plan that uses the policy document
as a source of ideas and requirements. The NIST Special Publication 800-18 offers another ap-
proach to policy management.
Create a working papers memo indicating the disposition of
all comments received from reviewers, even if no changes Because policies are living documents that constantly
were made. change and grow.

Write a memo about the project, what you learned, and what These documents must be properly disseminated (distrib-
needs to be fixed so that the next version of the policy docu- uted, read, understood and agreed to), and managed.
ment can be prepared more efficiently, better received by the
readers, and more responsive to the unique circumstances Good management practices for policy development and
facing your organization. maintenance make for a more resilient organization.

Prepare a list of next steps that will be required to implement In order to remain current and viable, policies must have:
the requirements specified in the policy document.
an individual responsible for reviews,
ISPME Next Steps
a schedule of reviews,
Post Polices To Intranet Or Equivalent
a method for making recommendations for reviews, and
Develop A Self-Assessment Questionnaire
an indication of policy and revision date.
Develop Revised user ID Issuance Form
A Final Note on Policy
Develop Agreement To Comply With Information Security
Policies Form

53
Lest you believe that the only reason to have policies is to Discussion Topics
avoid litigation, it is important to emphasize the preventative
nature of policy. Have students perform research on the Internet about Char-
les Cresson Wood. How many books are available from him
Policies exist first, and foremost, to inform employees of and what are their titles? Are they current (when were they
what is and is not acceptable behavior in the organization. published) and do other experts agree that he is an authority
on information security policy?
This is an effort to improve employee productivity, and pre-
vent potentially embarrassing situations. Find the EISP for the state government in which you reside.
How is it the same or different from the EISP recommended
If the organization could not verify that the employee was in by this textbook?
fact properly educated on the policy, as described earlier in
the chapter, the employee could sue the organization for
wrongful termination.

Lawsuits cost money, and the organization could be so finan-


cially devastated that it had to go out of business.

Other employees lose their livelihood, and no one wins.

54
Key Terms

Bull’s eye model

Practice

Procedure

Guideline

Standard

Policy

Enterprise information security policy (EISP)

Issue-specific security policy (ISSP)

System-specific policy (SysSP)

Due diligence

55
MODULE 5
“All warfare is based on de-
Developing Security ception”
Programs – Tsun Zu
Chapter Overview dents have not had the opportunity to read the material in
advance (in some settings, the textbooks are not made avail-
able until the first class meeting), it may be prudent to have a
Chapter 5 will explore the various organizational approaches
general discussion of the topic, with detailed lecture to fol-
to information security and provide an explanation of the
low at the next class meeting. The subject matter can be cov-
functional components of the information security program.
ered in 1.25 to 2.5 hours.
Readers will learn how to plan and staff an organization’s in-
formation security program based on its size and other fac-
tors as well as how to evaluate the internal and external fac-
tors that influence the activities and organization of an infor-
mation security program. As the topic of organizing the infor-
mation security function is expanded upon, the reader will
learn how to identify and describe the typical job titles and
functions performed in the information security program. The
chapter concludes with an exploration of the components of
a security education, training, and awareness program and
describes how organizations create and manage these pro-
grams.

Chapter Objectives

When you complete this chapter, you will be able to:

Recognize and understand the organizational approaches to


information security

List and describe the functional components of the informa-


tion security program

Determine how to plan and staff an organization’s informa-


tion security program based on its size

Evaluate the internal and external factors that influence the


activities and organization of an information security pro-
gram

List and describe the typical job titles and functions per-
formed in the information security program

Describe the components of a security education, training,


and awareness program and understand how organizations
create and manage these programs

Set-up Notes

This chapter could be completed in a single class session, if


there is sufficient time to cover the material. Unless the stu-

57
Lecture Notes and Teaching Tips with
Quick Quizzes

Introduction

Some organizations use the term “security program” to de-


scribe the entire set of personnel, plans, policies, and initia-
tives related to information security.

The term information security program is used here to de-


scribe the structure and organization of the effort that con-
tains risks to the information assets of the organization.
At this size the organization’s approach to security has ma-
Organizing for Security tured, integrating planning and culture into policy, “80% of
organizations say at least some security decisions are
Among the variables that determine how to structure an infor- guided by them.”
mation security program are
Unfortunately, the large organization does not put large
organizational culture amounts into security, with huge numbers of computers and
users.
size
They tend to spend substantially less on security (only about
security personnel budget 5 percent of the total IT budget on average) creating issues
across the organization, especially in the “people” areas.
security capital budget
The very large organization – more than 10,000 computers
“…as organizations get larger in size, their security depart-
ments are not keeping up with the demands of increasingly Security budgets grow faster than IT budgets.
complex organizational infrastructures. Security spending
per user and per machine declines exponentially as organiza- Even with a huge multi-million dollar budget, the average
tions grow, leaving most handcuffed when it comes to imple- amount per user is still smaller than any other type of organi-
menting effective security procedures.” zation.

Security in Large Organizations

The large organization – 1,000 to 10,000 computers

Information security departments in such organizations tend


to form and re-form internal groups to meet long-term chal-
lenges even as they handle day-to-day security operations.

Thus functions are likely to be split into groups in larger or-


ganizations; in contrast, smaller organizations typically cre-
ate fewer groups, perhaps only having one general group
representing the communities of interest.

58
Functions performed by IT groups outside of the information
security area of management control, such as:

Systems security administration

Network security administration

Centralized authentication

Functions performed within the information security depart-


ment as a customer service to the organization and its exter-
nal partners, such as

Risk assessment
“Where small orgs spend more than $5,000 per user on secu-
rity, very large organizations spend about 1/18th of that, Systems testing
roughly $300 per user” originating from 6 percent of the total
IT budget. Incident response

Does a better job in the policy and resource mgmt areas, al- Planning
though “only 1/3 of organizations handled incidents accord-
ing to an IR plan.” Measurement

One recommended approach is to separate the functions Vulnerability assessment


into four areas:
Functions performed within the information security depart-
Functions performed by non-technology business units out- ment as a compliance enforcement obligation, such as
side of the information technology area of management con-
trol, such as: - Legal, - Training Policy

Compliance

Risk management

It remains the CISO’s responsibility to see that information


security functions are adequately performed somewhere
within the organization.

The deployment of full-time security personnel depends on a


number of factors, including sensitivity of the information to
be protected, industry regulations and general profitability.

The more money the company can dedicate to its personnel


budget, the more likely it is to maintain a large information
security staff.

Security in Medium-Sized Organizations

59
The medium sized organization - 100-1,000 computers - Spends disproportionately more on security, almost 20 per-
cent of the total IT budget.
Has a smaller budget (about 11% of the IT budget)
The typical security staff in this organization is usually only
Has about the same sized security staff as the small org, but one person.
a larger need.

The medium org’s security people must rely on help from IT


staff for plans and practices.

… More than two-thirds say all or most of their security deci-


sions are guided by management-approved policies, and 57
percent say that all or most of their responses to incidents
were guided by a predefined IR plan.”
“Their ability to set policy, handle incidents in a regular man-
ner and effectively allocate resources are, overall, worse than Information security in the small org is often the responsibil-
any other group. ity of a single security administrator.

“Considering their size, the number of incidents they recog- Such organizations frequently have little in the way of formal
nize is skyrocketing. policy, planning, or security measures, and they commonly
outsource their Web presence or electronic commerce opera-
“Some 70 percent of them had damages from security tions.
breaches, a 48 percent increase over small organizations.”
Because resources in smaller organizations are often limited,
These organizations may still be large enough to implement the security admin may use freeware or ‘hackerware’ to
the multi-tiered approach to security described previously for lower the costs of assessing and implementing security.
large organizations, though perhaps with fewer dedicated
groups and more functions assigned to each group. Security training and awareness is commonly conducted on
a 1-on-1 basis, with the security admin providing advice to
Medium-sized organizations tend to ignore some security users as needed.
functions—in particular, when the information security depart-
ment cannot staff a certain function and the IT or other de- Any policies are likely to be issue-specific policies.
partment is not encouraged or required to perform that func-
tion in its stead. Formal planning is usually part of the IT planning conducted
by the CIO.
Security in Small Organizations
To their advantage, small organizations avoid some threats
The small organization - 10-100 computers precisely because of their size.

Has a simple, centralized IT organizational model. Threats from insiders are also less likely in an environment
where every employee knows every other employee.

60
Quick Quiz “The manager’s organizational unit will also need a credible
day-to-day relationship with, or a strategic tie-in with, the
What are the variables that determine how to structure an information security function.”
information security program? ANSWER: organizational cul-
ture, size, security personnel budget, security capital budget.

Teaching Tip Be sure to emphasize that most every information


security group will be organized differently. The
examples of relative size and headcounts given
above are not hard and fast rules, rather they are
observed examples.

Placing Information Security within an Organiza-


tion

In large organizations InfoSec is often located within the infor-


mation technology department, headed by the CISO who
reports directly to the top computing executive, or CIO.

By its very nature, an InfoSec program is sometimes at odds


with the goals and objectives of the IT department as a
whole.

Because the goals and objectives of the CIO and the CISO
may come in conflict, it is not difficult to understand the cur-
rent movement to separate information security from the IT
division.

The challenge is to design a reporting structure for the


InfoSec program that balances the needs of each of the com-
munities of interest.

“The ideal middle-level [security] manager should report di-


rectly to the CEO, or as high up on the organizational hierar-
chy as possible.

61
Wood’s

Other Options:

Option 7: Internal Audit

Option 8: Help Desk

Option 9: Accounting and Finance through IT

Option 10: Human Resources

Option 11: Facilities Management

Option 12: Operations

Quick Quiz

What is the challenge when designing a reporting structure


for an InfoSec program? ANSWER: The challenge is to design
a reporting structure for the InfoSec program that balances
the needs of each of the communities of interest.

62
Quick Quiz
Teaching Tip If you have access to the …Made Easy series of
books from Charles Cresson Wood, they make What two documents should be used by the CIO and CISO
excellent classroom examples both here and in
to formulate the mission statement for an InfoSec program?
the chapter that follows on policy. If available,
bring them to class and hand them around as an ANSWER: They should use the vision and missions state-
example. ments of the org’s strategic plans.

Components of the Security Program

The information security needs of any organization are


unique to the culture, size, and budget of that organization.
Teaching Tip A discussion of the three roles (definer, builder
Determining what level the information security program op- and administrator helps to clarify then kinds of
erates on depends on the organization’s strategic plan, and jobs that are present for information security
professionals. Many times, one individual will fill
in particular on the plan’s vision and mission statements.
all the roles (especially in smaller organizations)
but many of the more common job descriptions
The CIO and CISO should use these two documents to for- will tie to one of these three roles.
mulate the mission statement for the information security pro-
gram.

Information Security Roles and Titles

Information security positions can be classified into one of


three types: those that define, those that build, and those
that administer.

“Definers provide the policies, guidelines, and standards […]


They’re the people who do the consulting and the risk as-
sessment, who develop the product and technical architec-
tures. These are senior people with a lot of broad knowl-
edge, but often not a lot of depth.

63
Information Security Roles and Titles An important part of the information security team is the help
desk, which enhances the security team’s ability to identify
”Then you have the builders. They’re the real techies, who potential problems.
create and install security solutions.
When a user calls the help desk with a complaint about his
“Finally, you have the people who operate and administrate or her computer, the network, or an Internet connection, the
the security tools, the security monitoring function, and the user’s problem may turn out to be related to a bigger prob-
people who continuously improve the processes.” lem, such as a hacker, denial-of-service attack, or a virus.

A typical organization has a number of individuals with infor- Because help desk technicians perform a specialized role in
mation security responsibilities. information security, they have a need for specialized train-
ing.

Quick Quiz

What general job functions belong to an InfoSec program?

ANSWER: Chief Information, Security Officer (CISO), Secu-


rity managers, Security administrators and analysts, Security
technicians, and Security staffer.

While the titles used may be different, most of the job func-
tions fit into one of the following:

Chief Information Security Officer (CISO)


Teaching Tip Try to tie in some local organizational examples
Security managers from your institution in a discussion of how
security roles and titles are used. If some students
are employed (or are interns) in the information
Security administrators and analysts security area, ask them to share their examples
with the class.
Security technicians

Security staffer

Integrating Security and the Help Desk

64
Implementing Security Education, Training, and found that the majority of those granting degrees (bachelor’s
or master’s) were in reality, providing computer science or
Awareness Programs
information systems degrees that included a course or two
in information security.
Once the InfoSec program’s place in the organization is es-
tablished, planning for security education, training, and
Developing Information Security Curricula
awareness (SETA) programs begins.

Hybrid information technology/security programs have


The SETA program is designed to reduce the incidence of
emerged to fill the gap created by the lack of guidance from
accidental security breaches by employees, contractors, con-
established curricula bodies.
sultants, vendors, and business partners.

Any institution designing a formal curriculum in information


Awareness, training, and education programs offer two ma-
security must carefully map the expected learning outcomes
jor benefits:
of the planned curriculum to course learning objectives to
establish the body of knowledge to be taught.
They can improve employee behavior.

They enable the organization to hold employees accountable


for their actions.

A SETA program consists of three elements: security educa-


tion, security training, and security awareness.

The purpose of SETA is to enhance security…

By building in-depth knowledge, as needed, to design, imple-


ment, or operate security programs for organizations and sys-
tems

By developing skills and knowledge so that computer users


can perform their jobs while using IT systems more securely

By improving awareness of the need to protect system re-


sources
This knowledge map, which can help potential students as-
Security Education sess information security programs, identifies the skills and
knowledge clusters obtained by the program’s graduates.
Employees within the information security department, not
prepared by their background or experience, may be encour- Creating a knowledge map can be difficult because many
aged to use a formal education method. academics are unaware of the numerous sub-disciplines
within the field of information security, each of which may
A number of institutions of higher learning, including colleges have different knowledge requirements.
and universities, provide formal coursework in information
security. Depth of knowledge is indicated by a level of mastery using
an established taxonomy of learning objectives or a simple
Unfortunately, a recent review of such institutions offering scale such as “understanding → accomplishment → profi-
formal programs in information security or computer security ciency → mastery.”

65
Because many institutions have no frame of reference for There are two methods for customizing training for users.
which skills and knowledge are required for a particular job The first is by functional background:
area, frequently they refer to the certifications offered in that
field. General user

Once the knowledge areas are identified, common knowl- Managerial user
edge areas are aggregated into teaching domains, from
which individual courses can be created. Technical user who can be further divided by

Courses should be designed so that the student can obtain Job category
the required knowledge and skills upon completion of the
program. Job function

The final step is to identify the prerequisite knowledge for Technology product
each class.
The second is by skill level:

Novice

Intermediate

Advanced

Training Techniques

Using the wrong method can actually hinder the transfer of


knowledge and lead to unnecessary expense and frustrated,
poorly trained employees.

Good training programs, regardless of delivery method, take


advantage of the latest learning technologies and best prac-
tices.
Security Training
Recent developments include less use of centralized public
Security training involves providing members of the organiza- courses and more on-site training.
tion with detailed information and hands-on instruction to
enable them to perform their duties securely. “Training is often needed for one or a few individuals, not
necessarily for a large group. “Waiting until there is a large-
Management of information security can wither develop cus- enough group for a class can cost companies lost productiv-
tomized in-house training or outsource all or part of the train- ity.
ing program.
“Other best practices include the increased use of short,
task-oriented modules and training sessions, available dur-
ing the normal work week, that are immediate and consis-
tent.”

66
Delivery Methods Step 5: Administer the program.

Selection of the training delivery method is not always based Step 6: Maintain the program.
on the best outcome for the trainee. Often other factors —
budget, scheduling, and needs of the organization —come Step 7: Evaluate the program.
first.
Security Awareness
One-on-One
One of the least frequently implemented, but most effective
Formal Class security methods is the security awareness program.

Computer-Based Training (CBT) Security awareness programs: (1) set the stage for training
by changing organizational attitudes to realize the impor-
Distance Learning/Web Seminars tance of security and the adverse consequences of its fail-
ure; and (2) remind users of the procedures to be followed.
User Support Group
When developing an awareness program, there are certain
On-the-Job Training important ideas to keep in mind:

Self-Study (Noncomputerized) Focus on people both as part of the problem and as part of
the solution.
Selecting the Training Staff
Refrain from using technical jargon; speak the language the
To provide employee training, an organization can use a local users understand.
training program, a continuing education department, or an-
other external training agency. Use every available venue to access all users.

Alternatively, it can hire a professional trainer, a consultant, Define at least one key learning objective, state it clearly, and
or someone from an accredited institution to conduct on-site provide sufficient detail and coverage to reinforce the learn-
training. ing of it.

It can also organize and conduct training in-house using its Keep things light; refrain from “preaching” to users.
own employees.
Don’t overload the users with too much detail or too great a
Implementing Training volume of information.

While each organization develops its own strategy based on Help users understand their roles in InfoSec and how a
the techniques discussed above, the following seven-step breach in security can affect their jobs.
methodology generally applies:
Take advantage of in-house communications media to de-
Step 1: Identify program scope, goals, and objectives. liver messages.

Step 2: Identify training staff. Make the awareness program formal; plan and document all
actions.
Step 3: Identify target audiences.
Provide good information early, rather than perfect informa-
Step 4: Motivate management and employees. tion late.

67
The Ten Commandments of InfoSec Awareness Training Awareness can take on different forms for particular audi-
ences.
Information security is a people, rather than a technical, is-
sue. A security awareness program can use many methods to de-
liver its message.
If you want them to understand, speak their language.
Effective security awareness programs need to be designed
If they cannot see it, they will not learn it. with the recognition that people tend to practice a tuning out
process (acclimation).
Make your point so that you can identify it and so can they.
For this reason, awareness techniques should be creative
Never lose your sense of humor. and frequently changed.

Make your point, support it, and conclude it. Developing Security Awareness Components

Always let the recipients know how the behavior that you re- Many security awareness components are available at little
quest will affect them. or no cost. Others can be very expensive if purchased exter-
nally.
Ride the tame horses.
Security awareness components include the following items:
Formalize your training methodology.
Videos
Always be timely, even if it means slipping schedules to in-
clude urgent information. Posters and banners

Employee Behavior and Awareness Lectures and conferences

Security awareness and security training are designed to Computer-based training


modify any employee behavior that endangers the security
of the organization’s information. Newsletters

Security training and awareness activities can be under- Brochures and flyers
mined, however, if management does not set a good exam-
ple. Trinkets (coffee cups, pens, pencils, T-shirts)

Employee Accountability Bulletin boards

Effective training and awareness programs make employees


accountable for their actions.

Dissemination and enforcement of policy become easier


when training and awareness programs are in place.

Demonstrating due care and due diligence can help indem-


nify the institution against lawsuits.

Awareness Techniques

68
The Security Newsletter A security poster series can be a simple and inexpensive
way to keep security on people’s minds.
A security newsletter is the most cost-effective way to dis-
seminate security information. Professional posters can be quite expensive, so in-house
development may be the best solution.
Newsletters can be in the form of hard copy, e-mail, or
intranet-based.

Topics can include threats to the organization’s information


assets, schedules for upcoming security classes, and the
addition of new security personnel.

The goal is to keep the idea of information security upper-


most in users’ minds and to stimulate them to care about
security.

Keys to a good poster series:

Varying the content and keeping posters updated

Keeping them simple, but visually interesting

Making the message clear

Newsletters might include:


Providing information on reporting violations

Summaries of key policies


The Trinket Program

Summaries of key news articles


Trinkets may not cost much on a per-unit basis, but they can
be expensive to distribute throughout an organization.
A calendar of security events, including training sessions,
presentations, and other activities
Several types of trinkets are commonly used:

Announcements relevant to information security


Pens and pencils

How-To’s
Mouse pads

The Security Poster


Coffee mugs

69
Plastic cups Spend time promoting your site.

Hats One final recommendation is to place your Web site on the


intranet.
T-shirts
Security Awareness Conference/Presentations
The messages trinket programs impart will be lost unless re-
inforced by other means. Another means of renewing the information security mes-
sage is to have a guest speaker or even a mini-conference
dedicated to the topic—perhaps in association with Com-
puter Security Day - November 30.

Quick Quiz

What is a SETA program? ANSWER: It is the Security Education Training


and Awareness program.

Information Security Awareness Web Site

Organizations can establish Web pages or sites dedicated to


promoting information security awareness.

As with other SETA awareness methods, the challenge lies in


Teaching Tip Try to acquire example trinkets from SETA
updating the messages frequently enough to keep them
programs. These can often be found at trade
fresh. shows, or by calling on local representatives of
software and hardware vendors. If you can get a
The latest and archived newsletters can reside on the Web sufficient quantity for the members of the class,
students usually get a great deal of enjoyment
site, along with press releases, awards, and recognitions.
from ‘something for nothing’ and this can be used
to emphasize the value of these types of
Some tips on creating and maintaining an educational Web programs. Your own campus may have such a
site are provided here: program in place and be able to send a
representative to your class to make a
presentation.
See what’s already out there.

Plan ahead.

Keep page loading time to a minimum.

Discussion Topics
Seek feedback.

Assume nothing and check everything.

70
Collectively write job descriptions for one or a few of the Key Terms
roles on an information security program for your institution.

As a group, review the organization chart for your campus


information security program (or if there is none, a local busi-
ness organization). How is it similar to the examples in the Due care
text? How is it different?
Due diligence

Security education, training, and awareness (SETA)

Security newsletter

Security poster

Trinket program

71
MODULE 6
“Let your plans be dark and
Security Management impenetrable as night, and
Models & Practices when you move, fall like a
thunderbolt”
– Tsun Zu
Chapter Overview

In this chapter, readers will learn the components of the


dominant information security management models, includ-
ing U.S. government-sanctioned models, and how to custom-
ize them for a specific organization’s needs. This knowledge
will be extended as readers learn how to implement the fun-
damental elements of key information security management
practices and gain an understanding of emerging trends in
the certification and accreditation of U.S. federal IT systems.

Chapter Objectives

When you complete this chapter, you will be able to:

Upon completion of this material you should be able to:

Select from the dominant information security management


models, including U.S. government sanctioned models, and
customize them for your organization’s needs

Implement the fundamental elements of key information se-


curity management practices

Follow emerging trends in the certification and accreditation


of U. S. Federal IT systems

Set-up Notes

This chapter could be completed in a single class session, if


there is sufficient time to cover the material. Unless the stu-
dents have not had the opportunity to read the material in
advance (in some settings, the textbooks are not made avail-
able until the first class meeting), it may be prudent to have a
general discussion of the topic, with detailed lecture to fol-
low at the next class meeting. The subject matter can be cov-
ered in 1.25 to 2.5 hours.

73
Lecture Notes and Teaching Tips with It is intended to provide a common basis for developing or-
ganizational security standards and effective security man-
Quick Quizzes agement practice and to provide confidence in inter-
organizational dealings.”
Introduction
Volume 2 provides information on how to implement Volume
To create or maintain a secure environment, one must design 1 (17799) and how to set up an Information Security Manage-
a working security plan and then implement a management ment Structure (ISMS).
model to execute and maintain the plan.

This may begin with the creation or validation of a security


framework, followed by an information security blueprint that
describes existing controls and identifies other necessary
security controls.

A framework is the outline of the more thorough blueprint,


which is the basis for the design, selection, and implementa-
tion of all subsequent security controls.

Introduction

To design a security blueprint, most organizations draw from


established security models and practices.

Security Management Models

A security model is a generic blueprint offered by a service


organization.

One way to create the blueprint is to look at what other or-


ganizations have done (benchmarking).

One way to select a methodology is to adapt or adopt an ex-


isting security management model or set of practices.
ISO/IEC 17799 1 Drawbacks
BS 7799 Part 1
The global information security community has not defined
One of the most widely referenced and often discussed secu- any justification for a code of practice as identified in the
rity models is Information Technology – Code of Practice for ISO/IEC 17799
Information Security Management, which was originally pub-
lished as British Standard BS 7799. ISO/IEC 17799 lacks “the necessary measurement precision
of a technical standard”
The purpose of ISO/IEC 17799 is to “give recommendations
for information security management for use by those who There is no reason to believe that ISO/IEC 17799 is more use-
are responsible for initiating, implementing or maintaining ful than any other approach
security in their organization.
ISO/IEC 17799 is not as complete as other frameworks

74
ISO/IEC 17799 is perceived to have been hurriedly prepared, Communications and Operations Management objectives
given the tremendous impact its adoption could have on in- are:
dustry information security controls
Ensure the correct and secure operation of information proc-
The Ten Sections of ISO/IEC 17799/27001 essing facilities

Organizational Security Policy is needed to provide manage- Minimize the risk of systems failures
ment direction and support for information security.
Protect the integrity of software and information
Organizational Security Infrastructure objectives include:
Maintain the integrity and availability of information process-
Manage information security within the company ing and communication

Maintain the security of organizational information process- Ensure the safeguarding of information in networks and the
ing facilities and information assets accessed by third parties protection of the supporting infrastructure

Maintain the security of information when the responsibility Prevent damage to assets and interruptions to business ac-
for information processing has been outsourced to another tivities
organization
Prevent loss, modification or misuse of information ex-
Asset Classification and Control is needed to maintain appro- changed between organizations
priate protection of corporate assets and to ensure that infor-
mation assets receive an appropriate level of protection.

Personnel Security objectives are: System Access Control objectives in this area include:

Reduce risks of human error, theft, fraud or misuse of Control access to information
facilities
Prevent unauthorized access to information systems
Ensure that users are aware of information security
threats and concerns, and are equipped to support Ensure the protection of networked services
the corporate security policy in the course of their nor-
mal work Prevent unauthorized computer access

Minimize the damage from security incidents and mal- Detect unauthorized activities
functions and learn from such incidents
Ensure information security when using mobile computing
Physical and Environmental Security objectives include: and telecommunication networks

Prevent unauthorized access, damage and interference to System Development and Maintenance objectives include:
business premises and information
Ensure security is built into operational systems
Prevent loss, damage or compromise of assets and interrup-
tion to business activities Prevent loss, modification or misuse of user data in applica-
tion systems
Prevent compromise or theft of information and information
processing facilities

75
Protect the confidentiality, authenticity and integrity of infor-
mation

Ensure IT projects and support activities are conducted in a


secure manner

Maintain the security of application system software and


data

Business Continuity Planning to counteract interruptions to


business activities and to critical business processes from
the effects of major failures or disasters.

Compliance objectives include:

Avoid breaches of any criminal or civil law, statutory, regula-


tory or contractual obligations and of any security require-
ments

Ensure compliance of systems with organizational security


policies and standards
The Security Management Index and ISO 17799/27001
Maximize the effectiveness of and minimize interference to/
from the system audit process One way to determine how closely an organization is comply-
ing with ISO 17799 is to take the Human Firewall Council’s
BS 7799 Part 2: survey, the Security Management Index (SMI).

Part 2 of BS 7799 provides implementation details using a The SMI asks 35 questions over the 10 domains of the ISO
Plan-Do-Check-Act cycle. standard.

“This survey gathers metrics on how organizations manage


security and enables information security officers to bench-
mark their practices against those of other organizations.

The survey has been developed according to ISO 17799 in-


ternational security standards to reflect best practices from a
global perspective.

The Security Management Index survey will help you meas-


ure your security management practices compared to other
organizations in your industry and peer group.”

76
The Human Firewall Council recommends: SP 800-14, Generally Accepted Security Principles &
Practices
Familiarize yourself with the 10 categories of security man-
agement. SP 800-18, Guide for Developing Security Plans

Benchmark your organization’s security management prac- SP 800-26, Security Self-Assessment Guide-IT Systems
tices by taking the survey.
SP 800-30, Risk Management for Information Technology
Evaluate your results in each category to identify strengths
Systems
and weaknesses.

NIST SP 800-12
Examine the suggestions for improvement in each category
in this report.
SP 800-12 is entitled The Computer Security Handbook, and
is an excellent reference and guide for the routine manage-
Use your SMI results to gain support for improving security.
ment of information security.

RFC 2196 Site Security Handbook


It provides little guidance, however, on design and implemen-
tation of new security systems; use it as a supplement to
The Security Area Working Group within the IETF has cre-
gain a deeper understanding in the background and terminol-
ated RFC 2196.
ogy.

The Security Area Working Group acts as an advisory board


800-12 also lays out the NIST philosophy on security man-
for the protocols and areas developed and promoted
agement by identifying 17 controls organized into three cate-
through the Internet Society.
gories:

RFC 2196: Site Security Handbook does provide a good


The Management Controls section addresses security topics
functional discussion of important security issues and pro-
that can be characterized as managerial.
vides an overview of five basic areas of security, along with
development and implementation details.
The Operational Controls section addresses security controls
that focus on controls that are, broadly speaking, imple-
There are chapters on such important topics as security poli-
mented and executed by people (as opposed to systems).
cies, security technical architecture, security services, and
security incident handling.
The Technical Controls section focuses on security controls
that the computer system executes.
The architecture chapter begins with a discussion of the im-
portance of security policies, and expands into an examina-
NIST Special Publication 800-14
tion of services, access controls, and other relevant areas.

NIST SP800-14, subtitled Generally Accepted Principles and


NIST Security Models
Practices for Securing Information Technology Systems, de-
scribes best practices and provides information on com-
NIST documents have two notable advantages:
monly accepted information security principles that can di-
rect the security team in the development of a security blue-
They are publicly available at no charge; and they have been
print.
available for some time and thus have been broadly re-
viewed by government and industry professionals.

SP 800-12, Computer Security Handbook

77
It also describes the philosophical principles that the security Principle 7. Implement layered security (Ensure no single
team should integrate into the entire information security point of vulnerability).
process, expanding upon the components of SP 800-12.
Principle 8. Implement tailored system security measures to
The more significant points made in NIST SP 800-14 are meet organizational security goals.
as follows:
Principle 9. Strive for simplicity.
Security Supports the Mission of the Organization.
Principle 10. Design and operate an IT system to limit vulner-
Security is an Integral Element of Sound Management. ability and to be resilient in response.

Security Should Be Cost-Effective Principle 11. Minimize the system elements to be trusted.

Systems Owners Have Security Responsibilities Outside Principle 12. Implement security through a combination of
Their Own Organizations. measures distributed physically and logically.

Security Responsibilities and Accountability Should Be Made Principle 13. Provide assurance that the system is, and con-
Explicit. tinues to be, resilient in the face of expected threats.

Security Requires a Comprehensive and Integrated Ap- Principle 14. Limit or contain vulnerabilities.
proach.
Principle 15. Formulate security measures to address multi-
Security Should Be Periodically Reassessed. ple overlapping information domains.

Security is Constrained by Societal Factors. Principle 16. Isolate public access systems from mission criti-
cal resources.
It enumerates 33 principles for Securing Information Technol-
ogy Systems: Principle 17. Use boundary mechanisms to separate comput-
ing systems and network infrastructures.
Principle 1. Establish a sound security policy as the “founda-
tion” for design. Principle 18. Where possible, base security on open stan-
dards for portability and interoperability.
Principle 2. Treat security as an integral part of the overall
system design. Principle 19. Use common language in developing security
requirements.
Principle 3. Clearly delineate the physical and logical security
boundaries governed by associated security policies. Principle 20. Design and implement audit mechanisms to de-
tect unauthorized use and to support incident investigations.
Principle 4. Reduce risk to an acceptable level.
Principle 21. Design security to allow for regular adoption of
Principle 5. Assume that external systems are insecure. new technology, including a secure and logical technology
upgrade process.
Principle 6. Identify potential trade-offs between reducing
risk and increased costs and decrease in other aspects of Principle 22. Authenticate users and processes to ensure ap-
operational effectiveness. propriate access control decisions both within and across
domains.

78
Principle 23. Use unique identities to ensure accountability. NIST Special Publication 800-26

Principle 24. Implement least privilege. Management Controls

Principle 25. Do not implement unnecessary security mecha- 1. Risk Management


nisms.
2. Review of Security Controls
Principle 26. Protect information while being processed, in
transit, and in storage. 3. Life Cycle Maintenance

Principle 27. Strive for operational ease of use. 4. Authorization of Processing (Certification and Accredita-
tion)
Principle 28. Develop and exercise contingency or disaster
recovery procedures to ensure appropriate availability. 5. System Security Plan

Principle 29. Consider custom products to achieve adequate Operational Controls


security.
6. Personnel Security
Principle 30. Ensure proper security in the shutdown or dis-
posal of a system. 7. Physical Security

Principle 31. Protect against all likely classes of “attacks.” 8. Production, Input/Output Controls

Principle 32. Identify and prevent common errors and vulner- 9. Contingency Planning
abilities.
10. Hardware and Systems Software
Principle 33. Ensure that developers are trained in how to
develop secure software. 11. Data Integrity

NIST Special Publication 800-18 12. Documentation

NIST SP 800-18 - A Guide for Developing Security Plans for 13. Security Awareness, Training, and Education
Information Technology Systems, provides detailed methods
for assessing, designing, and implementing controls and 14. Incident Response Capability
plans for various sized applications.
Technical Controls
SP 800-18 serves as a guide for the activities described in
this chapter, and for the overall information security planning 15. Identification and Authentication
process.
16. Logical Access Controls
It includes templates for major application security plans.
17. Audit Trails

79
NIST SP 800-26 - Security Self-Assessment Guide for Infor-
mation Technology Systems describes seventeen areas that
span managerial, operational and technical controls.

The 17 areas listed are the core of the NIST security manage-
ment structure.

NIST Special Publication 800-30

NIST SP 800-30 - Risk Management Guide for Information


Technology Systems provides a foundation for the develop-
ment of an effective risk management program, containing
both the definitions and the practical guidance necessary for
assessing and mitigating risks identified within IT systems.

The ultimate goal is to help organizations to better manage


IT-related mission risks.

Quick Quiz

What is a security blueprint? ANSWER: It is the basis for the


design, selection, and implementation of all subsequent se-
curity controls.

The purpose for ISO/IEC 17799? ANSWER: Its purpose is to


give recommendations for information security management
for use by those who are responsible for initiating, implement-
ing or maintaining security in their organization.

Teaching Tip The NIST Publication list can be a bit daunting


for students. Be sure to spend extra time using the
names of the various pubs rather than relying
solely on the numbers. The names are fairly
descriptive and can help students recall what is in
the various documents.

80
Security Management Practices information systems while demonstrating fiscal responsibility
and ensuring information access.
In information security, two categories of benchmarks are
used: standards of due care/due diligence, and best prac- Companies with best practices may not be the best in every
tices. area; they may only have established an extremely high qual-
ity or successful security effort in one area.
Best practices include a sub-category of practices—called
the gold standard—that are general regarded as “the best of VISA International Security Model
the best.”
Another example of best practices is the VISA International
Standards of Due Care/Due Diligence Security Model.

When organizations adopt minimum levels of security for a VISA has developed two important documents that improve
legal defense, they may need to show that they have done and regulate its information systems:
what any prudent organization would do in similar circum-
stances; this is known as a standard of due care. The “Security Assessment Process” document contains a
series of recommendations for the detailed examination of
Implementing controls at this minimum standard, and main- an organization’s systems with the eventual goal of integra-
taining them, demonstrates that an organization has per- tion into the VISA systems.
formed due diligence.
The “Agreed Upon Procedures” document outlines the poli-
Due diligence requires that an organization ensure that the cies and technologies used to safeguard security systems
implemented standards continue to provide the required that carry the sensitive cardholder information to and from
level of protection. VISA systems.

Failure to support a standard of due care or due diligence The Gold Standard
can expose an organization to legal liability, provided it can
be shown that the organization was negligent in its applica- Best business practices are not sufficient for organizations
tion or lack of application of information protection. that prefer to set the standard by implementing the most pro-
tective, supportive, and yet fiscally responsible standards
Best Security Practices they can. They strive toward the gold standard, a model level
of performance that demonstrates industrial leadership, qual-
Security efforts that seek to provide a superior level of per- ity, and concern for the protection of information.
formance in the protection of information are referred to as
best business practices or simply best practices. The implementation of gold standard security requires a
great deal of support, both in financial and personnel re-
Some organizations refer to these as recommended prac- sources.
tices.
Selecting Best Practices
Security efforts that are among the best in the industry are
referred to as best security practices Choosing which recommended practices to implement can
pose a challenge for some organizations.
These practices balance the need for information access
with the need for adequate protection. Best practices seek In industries that are regulated by governmental agencies,
to provide as much security as possible for information and government guidelines are often requirements.

81
For other organizations, government guidelines are excellent ful attack is viewed as an organizational failure, and is kept
sources of information about what other organizations are secret, insofar as possible.
required to do to control information security risks, and can
inform their selection of best practices. However, more and more security administrators are joining
professional associations and societies like ISSA and sharing
Selecting Best Practices their stories and lessons learned.

When considering best practices for your organization, con- An alternative to this direct dialogue is the publication of les-
sider the following: sons learned.

Does your organization resemble the identified target organi- Baselining


zation of the best practice?
A baseline is a “value or profile of a performance metric
Are you in a similar industry as the target? against which changes in the performance metric can be use-
fully compared.”
Do you face similar challenges as the target?
Baselining is the process of measuring against established
Is your organizational structure similar to the target? standards. In InfoSec, baselining is the comparison of secu-
rity activities and events against the organization’s future per-
Are the resources you can expend similar to those called for formance.
by the best practice?
Baselining can provide the foundation for internal benchmark-
Are you in a similar threat environment as the one assumed ing, as information gathered for an organization’s first risk
by the best practice? assessment becomes the baseline for future comparisons.

Microsoft has published a set of best practices in security at The Gartner group offers twelve questions as a self assess-
its Web site: ment for best security practices.

Use antivirus software People:

Use strong passwords 1) “Do you perform background checks on all employ-
ees with access to sensitive data, areas, or access points?
Verify your software security settings
2) “Would the average employee recognize a security
Update product security issue?

Build personal firewalls 3) “Would they choose to report it?

Back up early and often 4) “Would they know how to report it to the right people?

Protect against power surges and loss Processes:

Benchmarking and Best Practices Limitations 5) “Are enterprise security policies updated on at least
an annual basis, employees educated on changes, and con-
The biggest problem with benchmarking in information secu- sistently enforced?
rity is that organizations don’t talk to each other; a success-

82
6) “Does your enterprise follow a patch/update manage- Quick Quiz
ment and evaluation process to prioritize and mediate new
security vulnerabilities? What are the two important documents VISA developed that
improve and regulate its information systems ? ANSWER: The
7) “Are the user accounts of former employees immedi- “Security Assessment Process” and the “Agreed Upon Pro-
ately removed on termination? cedures.”

8) “Are security group representatives involved in all


stages of the project life cycle for new projects?

Technology:

9) “Is every possible route to the Internet protected by a


properly configured firewall?

10) “Is sensitive data on laptops and remote systems en-


crypted?

11) “Do you regularly scan your systems and networks,


using a vulnerability analysis tool, for security exposures?

12) “Are malicious software scanning tools deployed on


all workstations and servers?”

83
Emerging Trends in Certification and Accredita- More complete, reliable, information for authorizing offi-
cials—leading to better understanding of complex IT sys-
tion
tems and associated risks and vulnerabilities—and therefore,
more informed decisions by management officials
In security management, accreditation is the authorization of
an IT system to process, store, or transmit information.
Greater availability of competent security evaluation and as-
sessment services
It is issued by a management official and serves as a means
of assuring that systems are of adequate quality.
More secure IT systems within the federal government”

It also challenges managers and technical staff to find the


This project is also designed to promote development of:
best methods to assure security, given technical constraints,
operational constraints, and mission requirements.
A standardized process for certifying and accrediting Federal
information systems including the critical infrastructure of the
Certification is “the comprehensive evaluation of the techni-
United States
cal and non-technical security controls of an IT system to
support the accreditation process that establishes the extent
Minimum security controls for Federal information and IS
to which a particular design and implementation meets a set
supporting confidentiality, integrity, and availability
of specified security requirements.”

Techniques and procedures for verifying the effectiveness of


Organizations pursue accreditation or certification to gain a
security controls for Federal IS
competitive advantage, or to provide assurance or confi-
dence to customers.
Robust, automated tools supporting the certification and ac-
creditation process
SP 800-37

Public and private sector assessment organizations capable


Guidelines for the Security Certification and Accreditation of
of providing cost effective, high quality, certification services
Federal IT systems. NIST promotes a new System Certifica-
tion and Accreditation Project designed to:

Develop standard guidelines and procedures for certifying


and accrediting federal IT systems including the critical infra-
structure of the United States

Define essential minimum security controls for federal IT sys-


tems

Promote the development of public and private sector as-


sessment organizations and certification of individuals capa-
ble of providing cost effective, high quality, security certifica-
tions based on standard guidelines and procedures

The specific benefits of the security certification and accredi-


tation (C&A) initiative include:

More consistent, comparable, and repeatable certifications


of IT systems

84
800-37 focuses on a three-step security controls selection As in earlier NIST documents, especially SP 800-18, security
process: controls are broken into the three familiar general classes of
security controls - management, operational, and technical.
Step 1: Characterize the System
New to the certification and accreditation criteria is the con-
Step 2: Select the Appropriate Minimum Security Controls cept of critical elements, initially defined in SP 800-26.
for the System
Critical elements represent “important security-related focus
Step 3: Adjust Security Controls Based On System Exposure areas for the system with each critical element addressed by
and Risk Decision one or more security controls.”

Systems Are Certified To One of Three Levels As technology evolves so will the set of security controls, re-
quiring additional control mechanisms.
“Security Certification Level 1 - The Entry-Level Certification
Appropriate For Low Priority (Concern) Systems.

“Security Certification Level 2 - The Mid-Level Certification


Quick Quiz
Appropriate For Moderate Priority (Concern) Systems.

What is a community of interest? ANSWER: A grouping


“Security Certification Level 3 - The Top-Level Certification
within an organization that tends to act in concert to achieve
Appropriate For High Priority (Concern) Systems.
similar objectives.

SP 800-53 - Minimum Security Controls for Federal IT Sys-


tems

SP 800-53 is part two of the Certification and Accreditation


project.

Its purpose is to “establish a set of standardized, minimum


security controls for IT systems addressing low, moderate,
and high levels of concern for confidentiality, integrity, and
availability.”

85
Key Terms

Accreditation

Baseline

Benchmark

Best business practice

Best security practice (BSP)

Blueprint

Certification

Due diligence

Framework

Gold standard

Management controls

Operational controls

Recommended practice

Security Management Index (SMI)

Security model

Standard of due care

Technical controls

86
MODULE 7
“Strategy without tactics is
Risk Management the slowest route to vic-
tory. Tactics without strat-
egy is the noise before de-
feat”
– Tsun Zuj
Chapter Overview

Chapter 7 defines risk management and its role in the organi-


zation and allows the reader to begin using risk management
techniques to identify and prioritize risk factors for informa-
tion assets. The risk management model presented here al-
lows the assessment of risk based on the likelihood of ad-
verse events and the effects on information assets when
events occur. The chapter concludes with a brief discussion
on how to document the results of risk identification.

Chapter Objectives

When you complete this chapter, you will be able to:

Define risk management and its role in the organization

Begin using risk management techniques to identify and pri-


oritize risk factors for information assets

Assess risk based on the likelihood of adverse events and


the effects on information assets when events occur

Begin to document the results of risk identification

Set-up Notes

This chapter could be completed in a single class session, if


there is sufficient time to cover the material. Unless the stu-
dents have not had the opportunity to read the material in
advance (in some settings, the textbooks are not made avail-
able until the first class meeting), it may be prudent to have a
general discussion of the topic, with detailed lecture to fol-
low at the next class meeting. The subject matter can be cov-
ered in 1.25 to 2.5 hours.

88
Lecture Notes and Teaching Tips with This means identifying, examining, and understanding the
threats facing the organization’s information assets.
Quick Quizzes
Managers must be prepared to fully identify those threats
Introduction that pose risks to the organization and the security of its in-
formation assets.
Information security departments are created primarily to
manage IT risk. Risk management is the process of assessing the risks to an
organization’s information and determining how those risks
Managing risk is one of the key responsibilities of every man- can be controlled or mitigated.
ager within the organization.
Accountability for Risk Management
In any well-developed risk management program, two formal
processes are at work: All communities of interest must work together to:

risk identification and assessment Evaluating the risk controls

risk control Determining which control options are cost-effective

Risk Management Acquiring or installing the appropriate controls

“If you know the enemy and know yourself, you need not Overseeing processes to ensure that the controls remain ef-
fear the result of a hundred battles. fective

“If you know yourself but not the enemy, for every victory Identifying risks, which includes:
gained you will also suffer a defeat.
Inventory information assets
“If you know neither the enemy nor yourself, you will suc-
cumb in every battle.” Classifying/organizing assets

Sun Tzu Assigning information asset value

Knowing Ourselves Identifying threats to the cataloged assets

This means identifying, examining and understanding the in- Pinpointing vulnerable assets by tying specific threats to spe-
formation and how it is processed, stored, and transmitted. cific assets

Armed with this knowledge, they can then initiate an in- Assessing risks, which includes:
depth risk management program.
Determining likelihood of attacks on vulnerable systems by
Risk management is a process, which means the safeguards specific threats
and controls that are devised and implemented are not
install-and-forget devices. Assessing relative risk facing information assets, so risk man-
agement and control activities can prioritize
Knowing the Enemy
Calculating the risks to which assets are exposed in their cur-
rent setting

89
Reviewing controls for identified vulnerabilities and says to
control the risks that the assets face

Documenting the findings of risk identification and assess-


ment

Summarizing the findings, which involves stating the conclu-


sions of the analysis stage of risk assessment in preparation
for moving into the stage of controlling risk by exploring
methods to mitigate risk

Quick Quiz

What are the two formal processes within a risk manage-


ment program? ANSWER: Risk identification and assess-
ment and risk control.

What is risk management? ANSWER: Risk management is a proc-


ess, which means the safeguards and controls that are de-
vised and implemented are not install-and-forget devices.

90
Risk Identification Identifying Hardware, Software, and Network Assets

Risk identification begins with the process of self- Whether automated or manual, the inventory process re-
examination. quires a certain amount of planning.

At this stage, managers identify the organization’s informa- Most importantly, you must determine which attributes of
tion assets, classify them into useful groups, and prioritize each of these information assets should be tracked.
them by their overall importance.
That determination will depend on the needs of the organiza-
Creating an Inventory of Information Assets tion and its risk management efforts, as well as the prefer-
ences and needs of the information security and information
The risk identification process begins with the identification technology communities.
of information assets, including people, procedures, data
and information, software, hardware, and networking ele- When deciding which attributes to track for each information
ments. asset, consider the following list of potential attributes:

This step should be done without pre-judging the value of Name


each asset; values will be assigned later in the process.
IP address

MAC address

Asset type

Serial number

Manufacturer name

Manufacturer’s model or part number

Software version, update revision, or FCO number

Physical location

Logical location

Controlling entity

Identifying People, Procedures, and Data Assets

Responsibility for identifying, describing, and evaluating


these information assets should be assigned to managers
who possess the necessary knowledge, experience, and
judgment.

91
As these assets are identified, they should be recorded via a Classifying and Categorizing Assets
reliable data-handling process like the one used for hard-
ware and software. Once the initial inventory is assembled, you must determine
whether its asset categories are meaningful to the organiza-
People tion’s risk management program.

Position name/number/ID The inventory should also reflect the sensitivity and security
priority assigned to each information asset.
Supervisor name/number/ID
A classification scheme should be developed that catego-
Security clearance level rizes these information assets based on their sensitivity and
security needs, i.e. confidential, internal, and public.
Special skills
Each of these classification categories designates the level
Procedures of protection needed for a particular information asset.

Description Some asset types, such as personnel, may require an alterna-


tive classification scheme that would identify the information
Intended purpose security processes used by the asset type.

Software/hardware/networking elements to which it is tied Classification categories must be comprehensive and mutu-
ally exclusive.
Location where it is stored for reference
Assessing Values for Information Assets
Location where it is stored for update purposes
As each information asset is identified, categorized, and clas-
Data sified, a relative value must also be assigned to it.

Classification Relative values are comparative judgments made to ensure


that the most valuable information assets are given the high-
Owner/creator/manager est priority when managing risk.

Size of data structure Which information asset is the most critical to the success of
the organization?
Data structure used
Which information asset generates the most revenue?
Online or offline
Which information asset generates the highest profitability?
Location
Which information asset is the most expensive to replace?
Backup procedures
Which information asset is the most expensive to protect?

Which information asset’s loss or compromise would be the


most embarrassing or cause the greatest liability?

92
As you might expect, the U.S. military classification scheme
relies on a more complex categorization system than the
schemes of most corporations.

For most information, the U.S. military uses a five-level classi-


fication scheme as defined in Executive Order 12958:

Unclassified Data:

Sensitive But Unclassified (SBU) Data:

Confidential Data:

Secret Data:

Top Secret Data:

Listing Assets in Order of Importance

The final step in the risk identification process is to list the


assets in order of importance.

This goal can be achieved by using a weighted factor analy-


sis worksheet.

Data Classification Model

Corporate and military organizations use a variety of classifi-


cation schemes.

Data owners must classify the information assets for which


they are responsible.

Data owners must review these classifications periodically to


ensure that the data are still classified correctly and the ac-
cess controls are in place.

For Example:

Public
Security Clearances
For official use only
The other part of the data classification scheme is the per-
Sensitive sonnel security clearance structure, in which each user of an
information asset is assigned an authorization level that indi-
Classified

93
cates the level of information classification he or she can ac- If you assume that every threat can and will attack every in-
cess. formation asset, then the project scope becomes too com-
plex.
Most organizations have developed a set of roles and corre-
sponding security clearances, so that individuals are as- To make the process less unwieldy, each step in the threat
signed authorization levels that correlate with the classifica- identification and vulnerability identification processes is
tions of the of information assets. managed separately and then coordinated at the end.

Beyond a simple reliance on the security clearance of the Identify and Prioritize Threats and Threat Agents
individual is the need-to-know principle.
Each of these threats presents a unique challenge to informa-
Regardless of one’s security clearance, an individual is not tion security and must be handled with specific controls that
allowed to view data simply because it falls within that indi- directly address the particular threat and the threat agent’s
vidual’s level of clearance. attack strategy.

That is, after an individual is granted a security clearance but Before threats can be assessed in the risk identification proc-
before he or she is allowed access to a specific set of data, ess, however, each threat must be further examined to deter-
that person must also meet the need-to-know requirement. mine its potential to affect the targeted information asset.

Management of the Classified Information Asset In general, this process is referred to as a threat assessment.

Managing an information asset includes considering the stor-


age, distribution, portability, and destruction of that informa-
tion asset.

An information asset that has a classification designation


other than unclassified or public must be clearly marked as
such.

Classified documents must be available only to authorized


individuals - locking cabinets, safes, etc.

To maintain the confidentiality of classified documents, man-


agers can implement a clean desk policy.

When copies of classified information are no longer valuable


or too many copies exist, care should be taken to destroy
them properly to discourage dumpster diving.

Vulnerability Assessment
Military Data Classification Cover Sheets

Once you have identified the information assets of the organi-


Threat Identification
zation and documented some threat assessment criteria,
you can begin to review every information asset for each
Any organization typically faces a wide variety of threats.
threat.

94
This review leads to the creation of a list of vulnerabilities
that remain potential risks to the organization.

Vulnerabilities are specific avenues that threat agents can


exploit to attack an information asset.

At the end of the risk identification process, a list of assets


and their vulnerabilities has been developed.

This list serves as the starting point for the next step in the
risk management process—risk assessment.

The goal at this point is to create a method to evaluate the


relative risk of each listed vulnerability.

Quick Quiz

What are the important elements of the risk identification


process? ANSWER: The risk identification process begins
with the identification of information assets, including peo-
ple, procedures, data and information, software, hardware,
and networking elements.

95
Risk Assessment How much would it cost to recover from a successful at-
tack?
Risk is the likelihood of the occurrence of a vulnerability
Which threats would require the greatest expenditure to pre-
Multiplied by vent?

The value of the information asset Which of the aforementioned questions is the most impor-
tant to the protection of information from threats within this
Minus organization?

The percentage of risk mitigated by current controls Percentage of Risk Mitigated by Current Controls

Plus If a vulnerability is fully managed by an existing control, it


can be set aside.
The uncertainty of current knowledge of the vulnerability
If it is partially controlled, estimate what percentage of the
vulnerability has been controlled.

Uncertainty

It is not possible to know everything about every vulnerabil-


ity.

The degree to which a current control can reduce risk is also


subject to estimation error. A factor that accounts for uncer-
Likelihood tainty must always be added to the equations; it consists of
an estimate made by the manager using good judgment and
Likelihood is the overall rating—a numerical value on a de- experience.
fined scale (.1 – 1.0)—of the probability that a specific vulner-
ability will be exploited. Risk Determination

Using the information documented during the risk identifica- For the purpose of relative risk assessment, risk equals likeli-
tion process, you can assign weighted scores based on the hood of vulnerability occurrence times value (or impact) mi-
value of each information asset, i.e. 1-100, low-med-high, nus percentage risk already controlled plus an element of
etc. uncertainty.

Assessing Potential Loss Asset A has a value of 50 and has one vulnerability, which
has a likelihood of 1.0 with no current controls. Your
To be effective, the values must be assigned by asking: assumptions/data are 90% accurate.

Which threats present a danger to this organization’s assets Asset B has a value of 100 and has two vulnerabilities: Vul
in the given environment? #2 has a likelihood of 0.5 with a current control that ad-
dresses 50% of its risk; vul # 3 has a likelihood of 0.1 with no
Which threats represent the most danger to the organiza- current controls. Your assumptions and data are 80% accu-
tion’s information? rate.

96
The resulting ranked list of risk ratings for the three vulner- Types of Access Controls
abilities is as follows:
In lattice-based access controls, users are assigned a matrix
Asset A: Vulnerability 1 rated as 55 = (50 × 1.0) – 0% + 10%. of authorizations for particular areas of access.

Asset B: Vulnerability 2 rated as 35 = (100 × 0.5) – 50% + The matrix contains subjects and objects, and the bounda-
20%. ries associated with each subject/object pair are clearly de-
marcated.
Asset B: Vulnerability 3 rated as 12 = (100 × 0.1) – 0 % +
20%. With this type of control, the column of attributes associated
with a particular object is called an access control list (ACL).
Identify Possible Controls
The row of attributes associated with a particular subject is a
For each threat and its associated vulnerabilities that have capabilities table.
residual risk, create a preliminary list of control ideas.
Non discretionary controls are determined by a central
Three general categories of controls exist: policies, pro- authority in the organization and can be based on roles—
grams, and technical controls. called role-based controls—or on a specified set of tasks—
called task-based controls.
Access Controls
Task-based controls can, in turn, be based on lists main-
Access controls specifically address admission of a user into tained on subjects or objects.
a trusted area of the organization.
Role-based controls are tied to the role that a particular user
These areas can include information systems, physically re- performs in an organization, whereas task-based controls
stricted areas such as computer rooms, and even the organi- are tied to a particular assignment or responsibility.
zation in its entirety.
Discretionary Access Controls (DACs) are implemented at
Access controls usually consist of a combination of policies, the discretion or option of the data user.
programs, and technologies.
The ability to share resources in a peer-to-peer configuration
Types of Access Controls allows users to control and possibly provide access to infor-
mation or resources at their disposal.
Mandatory Access Controls (MACs) are required and are
structured and coordinated with a data classification The users can allow general, unrestricted access, or they
scheme. can allow specific individuals or sets of individuals to access
these resources.
When MACs are implemented, users and data owners have
limited control over their access to information resources.

MACs use a data classification scheme that rates each col-


lection of information.

97
Quick Quiz

What do access controls specifically address? ANSWER:


Access controls specifically address admission of a user into
a trusted area of the organization.

98
Documenting the Results of Risk Assessment

The goal of the risk management process so far has been to


identify information assets and their vulnerabilities and to
rank them according to the need for protection.

In preparing this list, a wealth of factual information about


the assets and the threats they face is collected.

Also, information about the controls that are already in place


is collected.

The final summarized document is the ranked vulnerability


risk worksheet.

Ranked Vulnerability Risk Worksheet

Documenting the Results of Risk Assessment

What should the documentation package look like?

What are the deliverables from this stage of the risk manage-
ment project?

The risk identification process should designate what func-


tion the reports serve, who is responsible for preparing them,
and who reviews them.

Quick Quiz

What is the goal of the risk management process? AN-


SWER: The goal of the risk management process so far has
been to identify information assets and their vulnerabilities
and to rank them according to the need for protection.

99
Key Terms

access control list (ACL)

capabilities table

dumpster diving

lattice-based access control

need-to-know

Programs

Risk management

role-based controls

task-based controls

threat identification

U.S. military classification scheme

100
MODULE 8
“When the enemy is relaxed,
Risk Mitigation make them toil. When full,
starve them. When settled,
make them move”
– Tsun Zu
Chapter Overview

The eighth chapter of the text presents essential risk mitiga-


tion strategy options and opens the discussion of how to
control risk. This will include identifying risk control classifica-
tion categories, using existing conceptual frameworks to
evaluate risk controls, and formulating a cost benefit analy-
sis. Readers will learn how to maintain and perpetuate risk
controls. As a method to contrast the approach presented in
the earlier parts of the chapter, the OCTAVE approach to
managing risk is introduced.

Chapter Objectives

When you complete this chapter, you will be able to:

Understand and select from the risk mitigation strategy op-


tions to control risk

Identify the risk control classification categories

Use existing conceptual frameworks to evaluate risk con-


trols, and formulate a cost benefit analysis

Maintain and perpetuate risk controls

Understand the OCTAVE approach to managing risk, and lo-


cate more detailed information about it if and when neces-
sary

Set-up Notes

This chapter could be completed in a single class session, if


there is sufficient time to cover the material. Unless the stu-
dents have not had the opportunity to read the material in
advance (in some settings, the textbooks are not made avail-
able until the first class meeting), it may be prudent to have a
general discussion of the topic, with detailed lecture to fol-
low at the next class meeting. The subject matter can be cov-
ered in 1.25 to 2.5 hours.

102
Lecture Notes and Teaching Tips with
Quick Quizzes

Introduction

To keep up with the competition, organizations must design


and create a safe environment in which business processes
and procedures can function.

This environment must maintain confidentiality and privacy


and assure the integrity and availability of organizational
data.

These objectives are met via the application of the principles


of risk management.

Quick Quiz

What are the main responsibilities of a proper business envi-


ronment? ANSWER: This environment must maintain confi-
dentiality and privacy and assure the integrity and availability
of organizational data.

103
Risk Control Strategies Mitigation

An organization must choose one of four basic strategies to Mitigation is the control approach that attempts to reduce,
control risks: by means of planning and preparation, the damage caused
by the exploitation of vulnerability.
Avoidance: applying safeguards that eliminate or reduce the
remaining uncontrolled risks for the vulnerability This approach includes three types of plans:

Transference: shifting the risk to other areas or to outside the disaster recovery plan (DRP),
entities
incident response plan (IRP), and

Mitigation: reducing the impact should the vulnerability be


business continuity plan (BCP).
exploited

Mitigation depends upon the ability to detect and respond to


Acceptance: understanding the consequences and accept
an attack as quickly as possible.
the risk without control or mitigation

Avoidance

Avoidance is the risk control strategy that attempts to pre-


vent the exploitation of the vulnerability.

Avoidance is accomplished through:

Application of policy

Application of training and education

Countering threats

Implementation of technical security controls and safeguards

Transference Acceptance

Transference is the control approach that attempts to shift As described above, mitigation is a control approach that
the risk to other assets, other processes, or other organiza- attempts to reduce the impact of an exploited vulnerability.
tions.
In contrast, acceptance of risk is the choice to do nothing to
This may be accomplished by rethinking how services are protect an information asset and to accept the outcome from
offered, revising deployment models, outsourcing to other any resulting exploitation.
organizations, purchasing insurance, or by implementing
service contracts with providers. This control, or lack of control, assumes that it may be a pru-
dent business decision to examine the alternatives and con-
clude that the cost of protecting an asset does not justify the
security expenditure.

104
The only valid use of the acceptance strategy occurs when Risk Control Strategy Selection
the organization has:
Risk control involves selecting one of the four risk control
Determined the level of risk to the information asset strategies for the vulnerabilities present within the organiza-
tion.
Assessed the probability of attack and the likelihood of a suc-
cessful exploitation of a vulnerability If the loss is within the range of losses the organization can
absorb, or if the attacker’s gain is less than expected costs
Approximated the ARO of the exploit of the attack, the organization may choose to accept the
risk.
Estimated the potential loss from attacks
Otherwise, one of the other control strategies will have to be
Performed a thorough cost benefit analysis selected.

Evaluated controls using each appropriate type of feasibility

Decided that the particular asset did not justify the cost of
protection

Quick Quiz

What are the four basic strategies available for controlling


risk? ANSWER: Avoidance: applying safeguards that elimi-
nate or reduce the remaining uncontrolled risks for the vulner-
ability, Transference: shifting the risk to other areas or to out-
side entities, Mitigation: reducing the impact should the vul-
nerability be exploited, Acceptance: understanding the con-
sequences and accept the risk without control or mitiga-
tions.

Some rules of thumb on strategy selection are:

When a vulnerability exists: Implement security controls to


reduce the likelihood of a vulnerability being exercised.

When a vulnerability can be exploited: Apply layered controls


to minimize the risk or prevent occurrence.

When the attacker’s potential gain is greater than the costs


of attack: Apply protections to increase the attacker’s cost,
or reduce the attacker’s gain, using technical or managerial
controls.

When potential loss is substantial: Apply design controls to


limit the extent of the attack, thereby reducing the potential
for loss.

105
Evaluation, Assessment, and Maintenance of Risk Controls Categories of Controls

Once a control strategy has been selected and implemented, Controlling risk by means of avoidance, mitigation, or trans-
the effectiveness of controls should be monitored and meas- ference may be accomplished by implementing controls or
ured on an ongoing basis to determine its effectiveness and safeguards. Controls can be placed into one of four catego-
the accuracy of the estimate of the risk that will remain after ries:
all planned controls are in place.
Control function

Architectural layer

Strategy layer

Information security principle

Quick Quiz

What is risk avoidance? ANSWER: Risk avoidance attempts to prevent


the exploitation of the vulnerability.

106
Control Function Risk controls operate within one or more of the com-
monly accepted information security principles:
Controls designed to defend a vulnerable system are either
preventive or detective. Confidentiality

Preventive controls stop attempts to exploit a vulnerability by Integrity


implementing enforcement of an organizational policy or a
security principle and use a technical procedure, or some Availability
combination of technical means and enforcement methods.
Authentication
Detective controls warn organizations of violations of secu-
rity principles, organizational policies, or attempts to exploit Authorization
vulnerabilities and use techniques such as audit trails, intru-
sion detection, and configuration monitoring. Accountability

Architectural Layer Privacy

Some controls apply to one or more layers of an organiza-


tion’s technical architecture. Possible architectural layering
models may include the following:

Organizational policy
Quick Quiz
External networks
What are the names of the categories in which controls can
Extranets be placed? ANSWER: Control function, Architectural layer,
Strategy layer, Information security principle.
Demilitarized zones

Intranets

Network devices that interface network zones

Systems

Applications

Strategy Layer

Controls are sometimes classified by the risk control strategy


they operate within: avoidance, mitigation, or transference.

Note that the acceptance strategy is not an option since it


involves the absence of controls.

Information Security Principle

107
Feasibility Studies and Cost Benefit Analysis Cost of maintenance

Before deciding on the strategy for a specific vulnerability, all Benefit


readily accessible information about the consequences of
the vulnerability must be explored. Benefit is the value to the organization of using controls to
prevent losses associated with a specific vulnerability.
“What are the advantages of implementing a control as op-
posed to the disadvantages of implementing the control?” The benefit is usually determined by valuing the information
asset or assets exposed by the vulnerability and then deter-
There are a number of ways to determine the advantage or mining how much of that value is at risk and how much risk
disadvantage of a specific control. there is for the asset.

The primary means is to determine the value of the informa- This is expressed as the annualized loss expectancy (ALE).
tion assets that it is designed to protect.
Asset Valuation
Cost Benefit Analysis (CBA)
Asset valuation is the process of assigning financial value or
The criterion most commonly used when evaluating a project worth to each information asset.
that implements information security controls and safe-
guards is economic feasibility. The value of information differs within organizations and be-
tween organizations, based on the characteristics of informa-
Organizations are urged to begin a cost benefit analysis by tion and the perceived value of that information.
evaluating the worth of the information assets to be pro-
tected and the loss in value if those information assets are The valuation of assets involves estimation of real and per-
compromised by the exploitation of a specific vulnerability. ceived costs associated with the design, development, instal-
lation, maintenance, protection, recovery, and defense
This decision-making process is called a cost benefit analy- against loss and litigation.
sis or an economic feasibility study.
Some of the components of asset valuation include:
Cost
Value retained from the cost of creating the information asset
Just as it is difficult to determine the value of information, it
is difficult to determine the cost of safeguarding it. Value retained from past maintenance of the information as-
set
Some of the items that affect the cost of a control or safe-
guard include: Value implied by the cost of replacing the information

Cost of development or acquisition of hardware, software, Value from providing the information
and services
Value acquired from the cost of protecting the information
Training fees
Value to owners
Cost of implementation
Value of intellectual property
Service costs
Value to adversaries

108
Loss of productivity while the information assets are unavail- This information is usually estimated.
able
In most cases, the probability of a threat occurring is usually
Loss of revenue while information assets are unavailable a loosely derived table indicating the probability of an attack
from each threat type within a given time frame.
An organization must be able to place a dollar value on each
collection of information and the information assets it owns, This value is commonly referred to as the ARO, or annualized
based on: rate of occurrence.

How much did it cost to create or acquire this information? In order to standardize calculations, you convert the rate to a
yearly (annualized) value.
How much would it cost to recreate or recover this informa-
tion? This is expressed as the probability of a threat occurrence.

How much does it cost to maintain this information? Once each asset’s worth is known, the next step is to ascer-
tain how much loss is expected from a single attack, and
How much is this information worth to the organization? how often these attacks occur.

How much is this information worth to the competition? Once those values are determined, the equation can be com-
pleted to determine the overall lost potential per risk.
Next the organization examines the potential loss that could
occur from the exploitation of vulnerability or a threat occur- This is usually determined via an annualized loss expec-
rence. tancy, or ALE, using the values for the ARO and SLE from
previous sections.
This process results in the estimate of potential loss per risk.
ALE = SLE x ARO
The questions that must be asked here include:
The Cost Benefit Analysis (CBA) Formula
What damage could occur, and what financial impact would
it have? CBA determines whether or not a control alternative is worth
its associated cost.
What would it cost to recover from the attack, in addition to
the financial impact of damage? CBAs may be calculated before a control or safeguard is im-
plemented, to determine if the control is worth implementing,
What is the single loss expectancy for each risk? or calculated after controls have been implemented and
have been functioning for a time.
A single loss expectancy, or SLE, is the calculation of the
value associated with the most likely loss from an attack. CBA = ALE(prior) – ALE(post) – ACS

It is a calculation based on the value of the asset and the ex- ALE(prior to control) is the annualized loss expectancy of the
pected percentage of loss that would occur from a particular risk before the implementation of the control.
attack:
ALE(post control) is the ALE examined after the control has
SLE = asset value (AV) x exposure factor (EF) been in place for a period of time.

Where EF = the percentage loss that would occur from a ACS is the annual cost of the safeguard.
given vulnerability being exploited.

109
Other Feasibility Studies Numbers of successful attacks

In the previous sections the concepts of economic feasibility Staff hours spent on systems protection
or using baselines or benchmarks were used to justify pro-
posals for information security controls. Dollars spent on protection

The next step in measuring how ready an organization is for Numbers of security personnel
these controls is determining the proposal’s organizational,
operational, technical, and political feasibility. Estimated value in dollars of the information lost in success-
ful attacks
Organizational feasibility analysis examines how well the pro-
posed information security alternatives will contribute to the Loss in productivity hours associated with successful at-
operation of an organization. tacks

Operational feasibility addresses user acceptance and sup- Process-based measures are generally less focused on num-
port, management acceptance and support, and the overall bers and are more strategic.
requirements of the organization’s stakeholders.
For each of the areas the organization is interested in bench-
Technical feasibility examines whether or not the organiza- marking, process based measures enable the companies to
tion has or can acquire the technology to implement and sup- examine the activities an individual company performs in pur-
port the alternatives. suit of its goal, rather than the specifics of how goals are at-
tained.
Political feasibility defines what can and cannot occur based
on the consensus and relationships between the communi- The primary focus is the method the organization uses to ac-
ties of interest. complish a particular process, rather than the outcome.

Benchmarking In the field of information security, two categories of bench-


marks are used:
Benchmarking is the process of seeking out and studying
the practices used in other organizations that produce the standards of due care and due diligence, and
results you desire in your organization.
best practices.
An organization typically benchmarks by selecting a measure
with which to compare itself with the other organizations in Within best practices, the gold standard is a subcategory of
its market. practices that are typically viewed as “the best of the best.”

The organization then measures the difference in the way it Due Care and Due Diligence
conducts business and the way the other organizations con-
duct business. For legal reasons, an organization may be forced to adopt a
certain minimum level of security.
When benchmarking, an organization typically uses one of
two measures to compare practices: metrics-based meas- When organizations adopt levels of security for a legal de-
ures or process-based measures. fense, they may need to show that they have done what any
prudent organization would do in similar circumstances. This
Metrics-based measures are comparisons based on numeri- is referred to as a standard of due care.
cal standards, such as:

110
Due diligence is the demonstration that the organization is Can your organization expend resources that are in line with
persistent in ensuring that the implemented standards con- the requirements of the best practice?
tinue to provide the required level of protection.
Is your organization in a similar threat environment as the
Best Business Practices. one cited in the best practice?

Security efforts that seek to provide a superior level of per- Problems with Benchmarking and Best Practices
formance are referred to as best business practices.
Organizations don’t talk to each other.
Best security practices are those that are among the best in
the industry, balancing access to information with adequate No two organizations are identical.
protection, while maintaining a solid degree of fiscal responsi-
bility. Best practices are a moving target.

Companies with best practices may not be the best in every Simply knowing what was going on a few years ago, doesn’t
area, but may simply have established an extremely high necessarily indicate what to do next.
quality or successful security effort in one or more area.
Baselining
The Gold Standard
Baselining is the analysis of measures against established
Even the best business practices are not sufficient for some standards.
organizations. These organizations aspire to set the standard
by implementing the most protective, supportive, and yet In information security, baselining is the comparison of secu-
fiscally responsible standards they can. rity activities and events against the organization’s future per-
formance.
The gold standard is a defining level of performance that
demonstrates a company’s industrial leadership, quality, and The information gathered for an organization’s first risk as-
concern for the protection of information. sessment becomes the baseline for future comparisons.

Seeking the gold standard is a method of striving for excel- Quick Quiz
lence.
What is cost benefit analysis? ANSWER: The criterion most
Applying Best Practices commonly used when evaluating a project that implements
information security controls and safeguards is economic
When considering best practices for adoption, address the feasibility.
following questions:

Does your organization resemble the organization that is im-


plementing the best practice under consideration?

Is your organization in a similar industry?

Does your organization face similar challenges?

Is your organizational structure similar to the organization


from which you are modeling the best practices?

111
Risk Management Discussion Points The goal of information security is not to bring residual risk
to zero, but to bring it in line with an organization’s risk appe-
Risk Appetite tite.

Risk appetite defines the quantity and nature of risk that or- If decision makers have been informed of uncontrolled risks
ganizations are willing to accept, as they evaluate the trade- and the proper authority groups within the communities of
offs between perfect security and unlimited accessibility. interest decide to leave residual risk in place, then the infor-
mation security program has accomplished its primary goal.
The reasoned approach to risk is one that balances the ex-
pense against the possible losses if exploited. Documenting Results

Residual Risk When the risk management program of an organization has


been completed, the result is that a series of proposed con-
When vulnerabilities have been controlled as much as possi- trols are prepared, each of which is justified by one or more
ble, there is often remaining risk that has not been com- feasibility or rationalization approaches.
pletely removed, shifted, or planned for.
At a minimum, each information asset-threat pair should
This remainder is called residual risk. have a documented control strategy that clearly identifies
any residual risk remaining after the proposed strategy has
“Residual Risk is a combined function of (1) a threat less the been executed.
effect of threat-reducing safeguards; (2) a vulnerability less
the effect of vulnerability-reducing safeguards, and (3) an as- Some organizations document the outcome of the control
set less the effect of asset value-reducing safeguards.” strategy for each information asset-threat pair in an action
plan that includes concrete tasks, each with accountability
assigned to an organizational unit or to an individual.

Recommended Risk Control Practices

Qualitative Measures

Quantitative assessment performs asset valuation with ac-


tual values or estimates.

An organization could determine that it cannot put specific


numbers on these values.

Organizations could use qualitative assessments instead,


using scales instead of specific estimates.

Quick Quiz

What is risk appetite? ANSWER: Risk appetite is the amount


The significance of residual risk must be judged within the of risk that organizations are willing to accept, as they evalu-
context of an organization. ate the trade-offs between perfect security and unlimited ac-
cessibility

112
The OCTAVE Method The OCTAVE Method is self directed.

The Operationally Critical Threat, Asset, and Vulnerability The OCTAVE Method requires an analysis team to conduct
Evaluation the evaluation and to analyze the information. The basic
tasks of the team are:
(OCTAVE) Method defines the essential components of a
to facilitate the knowledge elicitation workshops of
comprehensive, systematic, context-driven, self-directed
Phase 1
information security risk evaluation.

to gather any supporting data that are necessary


By following the OCTAVE Method, an organization can make
information-protection decisions based on risks to the confi-
to analyze threat and risk information
dentiality, integrity, and availability of critical information tech-
nology assets. The operational or business units and the IT
to develop a protection strategy for the organization
department work together to address the information secu-
rity needs of the organization.
to develop mitigation plans to address the risks to the
organization’s critical assets
Phase 1: Build Asset-Based Threat Profiles – This is an or-
ganizational evaluation.
The OCTAVE Method uses a workshop-based approach for
gathering information and making decisions.
Key areas of expertise within the organization are examined
to elicit important knowledge about information assets, the
The OCTAVE Method relies upon the following major cata-
threats to those assets, the security requirements of the as-
logs of information:
sets, what the organization is currently doing to protect its
information assets and weaknesses in organizational policies
catalog of practices – a collection of good strategic
and practice.
and operational security practices

Phase 2: Identify Infrastructure Vulnerabilities – This is an


threat profile – the range of major sources of threats that an
evaluation of the information infrastructure.
organization needs to consider

The key operational components of the information technol-


catalog of vulnerabilities – a collection of vulnerabilities
ogy infrastructure are examined for weaknesses (technology
based on platform and application
vulnerabilities) that can lead to unauthorized action.

Phases, Processes and Activities


Phase 3: Develop Security Strategy and Plans – Risks are
analyzed in this phase.
Each phase of the OCTAVE Method contains two or more
processes. Each process is made of activities.
The information generated by the organizational and informa-
tion infrastructure evaluations (Phases 1 and 2) is analyzed
Phase 1: Build Asset-Based Threat Profiles
to identify risks to the organization and to evaluate the risks
based on their impact to the organization’s mission.
Process 1: Identify Senior Management Knowledge

In addition, an organization protection strategy and risk miti-


Process 2: Identify Operational Area Management Knowl-
gation plans for the highest priority risks are developed.
edge

Important Aspects of the OCTAVE Method


Process 3: Identify Staff Knowledge

113
Process 4: Create Threat Profiles Quick Quiz

Phase 2: Identify Infrastructure Vulnerabilities What are the three phases of the OCTAVE method? AN-
SWER: Phase 1: Build Asset-Based Threat Profiles, Phase 2:
Process 5: Identify Key Components Identify Infrastructure Vulnerabilities, Phase 3: Develop Secu-
rity Strategy and Plans.
Process 6: Evaluate Selected Components

Phase 3: Develop Security Strategy and Plans

Process 7: Conduct Risk Analysis

Process 8: Develop Protection Strategy

Preparing For the OCTAVE Method

Obtain senior management sponsorship of OCTAVE.

Select analysis team members.

Train analysis team.

Select operational areas to participate in OCTAVE.

Select participants.

Coordinate logistics.

Brief all participants.

For more information, you can download the OctaveSM


method implementation guide from
www.cert.org/octave/omig.html.

114
Key Terms Qualitative assessment

Acceptance Quantitative assessment

Annualized loss expectancy (ALE) Residual risk

Annualized rate of occurrence (ARO) Risk appetite

Asset valuation Risk management

Avoidance Single loss expectancy (SLE)

Behavioral feasibility Technical feasibility

Benefit Transference

Competitive advantage User involvement

Competitive disadvantage

Cost avoidance

Cost benefit analysis (CBA)

Cyberactivism

Delphi technique

Detective controls

Economic feasibility study

Hacktivism

Intrinsic value acquired value

Mitigation

OCTAVE method

Operational feasibility

Organizational feasibility

Political feasibility

Preventive controls

115
MODULE 9
“Move swift as the Wind
Laws & Ethics and closely-formed as the
Wood. Attack like the Fire
and be still as the Moun-
tain”
– Tsun Zu
Chapter Overview

Chapter nine covers the topics of law and ethics. In this


chapter readers will learn to identify major national and inter-
national laws that relate to the practice of information secu-
rity as well as come to understand the role of culture as it
applies to ethics in information security.

Chapter Objectives

When you complete this chapter, you will be able to:

Differentiate between law and ethics

Identify major national and international laws that relate to


the practice of information security

Understand the role of culture as it applies to ethics in infor-


mation security

Access current information on laws, regulations, and relevant


professional organizations

Set-up Notes

This chapter could be completed in a single class session, if


there is sufficient time to cover the material. Unless the stu-
dents have not had the opportunity to read the material in
advance (in some settings, the textbooks are not made avail-
able until the first class meeting), it may be prudent to have a
general discussion of the topic, with detailed lecture to fol-
low at the next class meeting. The subject matter can be cov-
ered in 1.25 to 2.5 hours.

117
Lecture Notes and Teaching Tips with relatively fixed moral attitudes or customs of a societal
group.
Quick Quizzes

Introduction

As a future information security professional, it is vital that


you understand the scope of an organization’s legal and ethi-
cal responsibilities.

To minimize the organization’s liabilities the information secu-


rity practitioner must understand the current legal environ-
ment and keep apprised of new laws, regulations, and ethi-
cal issues as they emerge.

By educating employees and management about their legal


and ethical obligations and the proper use of information
technology and information security, security professionals
can keep an organization focused on its primary objectives.

Law and Ethics in Information Security

Laws are rules adopted and enforced by governments to


codify expected behavior in modern society.

The key difference between law and ethics is that law carries
the sanction of a governing authority and ethics do not.

Ethics are based on cultural mores: relatively fixed moral atti-


tudes or customs of a societal group.

Quick Quiz

What should an information security practitioner do that can


minimize the organization’s legal liabilities? ANSWER: To
minimize the organization’s liabilities the information security
practitioner must understand the current legal environment
and keep apprised of new laws, regulations, and ethical is-
sues as they emerge.

What are the major differences between law and ethics? AN-
SWER: The law carries the sanction of a governing authority
and ethics do not. Ethics are also based on cultural mores:

118
The Legal Environment

The information security professional and managers involved


in information security must possess a rudimentary grasp of
the legal framework within which their organizations operate.

This legal environment can influence the organization to a


greater or lesser extent depending on the nature of the or-
ganization and the scale on which it operates.

Types of Law

Civil law embodies a wide variety of laws pertaining to rela-


tionships between and among individuals and organizations.

Criminal law addresses violations harmful to society and is


actively enforced and prosecuted by the state.

Tort law is a subset of civil law which allows individuals to


seek recourse against others in the event of personal, physi-
cal, or financial injury.

Private law regulates the relationships among individuals and


among individuals and organizations, and encompasses fam-
ily law, commercial law, and labor law.

Public law regulates the structure and administration of gov-


ernment agencies and their relationships with citizens, em-
ployees, and other governments.

Public law includes criminal, administrative, and constitu-


tional law.

Relevant U.S. Laws

Table 11-1 summarizes the U.S. federal laws relevant to infor-


mation security:

The Computer Fraud and Abuse Act of 1986 (CFA Act) is the
cornerstone of many computer-related federal laws and en-
forcement efforts.

It was amended in October 1996 by the National Information


Infrastructure Protection Act of 1996, which modified several
sections of the previous act, and increased the penalties for
selected crimes.

119
The CFA Act was further modified by the USA Patriot Act of The Computer Security Act of 1987 also amended the Fed-
2001—the abbreviated name for “Uniting and Strengthening eral Property and Administrative Services Act of 1949, requir-
America Act by Providing Appropriate Tools Required to Inter- ing the National Bureau of Standards to distribute standards
cept and Obstruct Terrorism Act of 2001,” which provides and guidelines pertaining to federal computer systems, mak-
law enforcement agencies with broader latitude to combat ing such standards compulsory and binding to the extent to
terrorism-related activities. Some of the laws modified by the which the secretary determines necessary to improve the
Patriot Act date from the earliest laws created to deal with efficiency of operation or security and privacy of federal com-
electronic technology. puter systems.

The Communication Act of 1934 was revised by the Telecom- Another provision of the Computer Security Act requires man-
munications Deregulation and Competition Act of 1996, datory periodic training in computer security awareness and
which attempts to modernize the archaic terminology of the accepted computer security practice for all employees who
older act. are involved with the management, use, or operation of each
federal computer system.
The Computer Security Act of 1987 was one of the first at-
tempts to protect federal computer systems by establishing Privacy Laws
minimum acceptable security practices.
Many organizations collect, trade, and sell personal informa-
The Computer Security Act of 1987 charged the National Bu- tion as a commodity, and many individuals are becoming
reau of Standards, in cooperation with the National Security aware of these practices and looking to the governments to
Agency, with the following tasks: protect their privacy.

Developing standards, guidelines, and associated methods In the past it was not possible to create databases that con-
and techniques for computer systems tained personal information collected from multiple sources.

Developing uniform standards and guidelines for most fed- Today, the aggregation of data from multiple sources per-
eral computer systems mits unethical organizations to build databases with alarming
quantities of personal information.
Developing technical, management, physical, and administra-
tive standards and guidelines for the cost-effective security The Privacy of Customer Information Section of the section
and privacy of sensitive information in federal computer sys- of regulations covering common carriers specifies that any
tems proprietary information shall be used explicitly for providing
services, and not for any marketing purposes.
Developing guidelines for use by operators of federal com-
puter systems that contain sensitive information in training The Federal Privacy Act of 1974 regulates the government’s
their employees in security awareness and accepted security use of private information. The Federal Privacy Act was cre-
practice ated to ensure that government agencies protect the privacy
of individuals’ and businesses’ information, and holds those
Developing validation procedures for, and evaluate the effec- agencies responsible if any portion of this information is re-
tiveness of, standards and guidelines through research and leased without permission.
liaison with other government and private agencies
The Electronic Communications Privacy Act of 1986 is a col-
The Computer Security Act also established a Computer Sys- lection of statutes that regulates the interception of wire, elec-
tem Security and Privacy Advisory Board within the Depart- tronic, and oral communications.
ment of Commerce.

120
These statutes work in cooperation with the Fourth Amend- Export and Espionage Laws
ment of the U.S. Constitution, which prohibits search and
seizure without a warrant. In an attempt to protect intellectual property and competitive
advantage, Congress passed the Economic Espionage Act
The Health Insurance Portability & Accountability Act Of (EEA) in 1996.
1996 (HIPPA), also known as the Kennedy-Kassebaum Act,
is an attempt to protect the confidentiality and security of This law attempts to protect trade secrets “from the foreign
health care data by establishing and enforcing standards government that uses its classic espionage apparatus to spy
and by standardizing electronic data interchange. on a company, to the two American companies that are at-
tempting to uncover each other's bid proposals, or to the
HIPPA requires organizations that retain health care informa- disgruntled former employee who walks out of his former
tion to use information security mechanisms to protect this company with a computer diskette full of engineering sche-
information, as well as policies and procedures to maintain matics.”
them, and also requires a comprehensive assessment of the
organization's information security systems, policies, and
procedures. HIPPA provides guidelines for the use of elec-
tronic signatures based on security standards ensuring mes-
sage integrity, user authentication, and nonrepudiation.

HIPPA has five fundamental privacy principles:

Consumer control of medical information

Boundaries on the use of medical information

Accountability for the privacy of private information

Balance of public responsibility for the use of medical infor-


mation for the greater good measured against impact to the
individual

Security of health information The Security and Freedom through Encryption Act of 1997
provides guidance on the use of encryption, and institutes
The Financial Services Modernization Act or Gramm-Leach- measures of public protection from government intervention.
Bliley Act of 1999 contains a number of provisions that affect Specifically, the Act reinforces an individual’s right to use or
banks, securities firms, and insurance companies. sell encryption algorithms, without concern for the impact of
other regulations requiring some form of key registration and
This act requires all financial institutions to disclose their pri- prohibits the federal government from requiring the use of
vacy policies, describing how they share nonpublic personal encryption for contracts, grants, and other official docu-
information, and describing how customers can request that ments, and correspondence.
their information not be shared with third parties.
U.S. Copyright Law
The act also ensures that the privacy policies in effect in an
organization are fully disclosed when a customer initiates a U.S. copyright law extends protection to intellectual prop-
business relationship, and distributed at least annually for erty, which includes words published in electronic formats.
the duration of the professional association.

121
The doctrine of fair use allows material to be quoted for the European Council Cyber-Crime Convention
purpose of news reporting, teaching, scholarship, and a num-
ber of other related activities, so long as the purpose is edu- Recently the Council of Europe drafted the European Council
cational and not for profit, and the usage is not excessive. Cyber-Crime Convention, which empowers an international
task force to oversee a range of Internet security functions,
Proper acknowledgement must be provided to the author and to standardize technology laws across international bor-
and/or copyright holder of such works, including a descrip- ders.
tion of the location of source materials by using a recognized
form of citation. It also attempts to improve the effectiveness of international
investigations into breaches of technology law.
Freedom of Information Act of 1966 (FOIA)
The overall goal of the convention is to simplify the acquisi-
All federal agencies are required under the Freedom of Infor- tion of information for law enforcement agents in certain
mation Act (FOIA) to disclose records requested in writing by types of international crimes, as well as the extradition proc-
any person. ess.

The FOIA applies only to federal agencies and does not cre- Digital Millennium Copyright Act (DMCA)
ate a right of access to records held by Congress, the
courts, or by state or local government agencies. The Digital Millennium Copyright Act (DMCA) is a U.S.-based
international effort to reduce the impact of copyright, trade-
Sarbanes-Oxley Act of 2002 mark, and privacy infringement especially via the removal of
technological copyright protection measures.
The U.S. Congress enacted the Sarbanes-Oxley Act of 2002
to enforce accountability for the financial record keeping and The European Union also put forward Directive 95/46/EC of
reporting at publicly traded corporations. the European Parliament and of the Council of 24 October
1995 that increases individual rights to process and freely
The law requires that the CEO and chief financial officer move personal data.
(CFO) assume direct and personal accountability for the com-
pleteness and accuracy of a publicly traded organization’s The United Kingdom has already implemented a version of
financial reporting and record-keeping systems. this directive called the Database Right.

As these executives attempt to ensure that the systems used State and Local Regulations
to record and report are sound—often relying upon the exper-
tise of CIOs and CISOs to do so—the related areas of avail- It is the responsibility of information security professionals to
ability and confidentiality are also emphasized. understand state laws and regulations and ensure that their
organization’s security policies and procedures comply with
INTERNATIONAL LAWS AND LEGAL BODIES the laws and regulations.

Many domestic laws and customs do not apply to interna- For example, the State of Georgia recently passed the Geor-
tional trade, which is governed by international treaties and gia Computer Systems Protection Act, which has various
trade agreements. computer security provisions, and establishes specific penal-
ties for use of information technology to attack or exploit in-
Because of the political complexities of the relationships formation systems in organizations.
among nations and cultural differences, there are currently
few international laws relating to privacy and information se- The Georgia legislature also passed the Georgia Identity
curity. Theft Law in 1998, which requires that a business may not

122
discard a record containing personal information unless it,
shreds, erases, modifies or otherwise makes the information
irretrievable.

Policy versus Law

As an information security professional, you must be aware


of the legal environment in which your organization operates,
and of how information security is maintained by means of
policy.

The key difference between policy and law is that ignorance


is an acceptable defense, and therefore policies must be:

Distributed to all individuals who are expected to comply


with them

Readily available for employee reference

Easily understood, with multilingual translations and transla-


tions for visually impaired or low-literacy employees

Acknowledged by the employee, usually by means of a


signed consent form

Quick Quiz

What is the Federal Privacy Act? ANSWER: The Federal Privacy Act
of 1974 regulates the government’s use of private informa-
tion. The Federal Privacy Act was created to ensure that gov-
ernment agencies protect the privacy of individuals’ and busi-
nesses’ information, and holds those agencies responsible if
any portion of this information is released without permis-
sion.

123
Ethical Concepts in Information Security Differences in Ethical Concepts

The student of information security is not expected to study Studies reveal that individuals of different nationalities have
the topic of ethics in a vacuum, but within a larger ethical different perspectives on the ethics of computer use.
framework.
Difficulties arise when one nationality’s ethical behavior does
However, those employed in the area of information security not correspond to that of another national group.
may be expected to be more articulate about the topic than
others in the organization, and often must withstand a higher Ethics and Education
degree of scrutiny.
Differences in computer use ethics are not exclusively cul-
The Ten Commandments of Computer Ethics tural.

—from The Computer Ethics Institute Differences are found among individuals within the same
country, within the same social class, and within the same
Thou shalt not use a computer to harm other people. company.

Thou shalt not interfere with other people's computer work. Key studies reveal that the overriding factor in leveling the
ethical perceptions within a small population is education.
Thou shalt not snoop around in other people's computer
files. Employees must be trained and kept up to date on informa-
tion security topics, including the expected behaviors of an
Thou shalt not use a computer to steal. ethical employee.

Thou shalt not use a computer to bear false witness. Deterring Unethical and Illegal Behavior

Thou shalt not copy or use proprietary software for which It is the responsibility of information security personnel to do
you have not paid. everything in their power to deter unethical and illegal acts,
using policy, education and training, and technology as con-
Thou shalt not use other people's computer resources with- trols or safeguards to protect the information and systems.
out authorization or proper compensation.
Many security professionals understand technological
Thou shalt not appropriate other people's intellectual output. means of protection, but many underestimate the value of
policy.
Thou shalt think about the social consequences of the pro-
gram you are writing or the system you are designing. There are three general categories of unethical behavior that
organizations and society should seek to eliminate:
Thou shalt always use a computer in ways that ensure con-
sideration and respect for your fellow humans. Ignorance

Accident

Intent

Deterrence is the best method for preventing an illegal or un-


ethical activity. Laws, policies, and technical controls are all

124
examples of deterrents. However, it is generally agreed that Certifications and Professional Organizations
laws and policies and their associated penalties only deter if
three conditions are present: A number of professional organizations have established
codes of conduct and/or codes of ethics that members are
Fear of penalty: expected to follow.

Probability of being caught:. Codes of ethics can have a positive effect on an individual’s
judgment regarding computer use.
Probability of penalty being administered
Unfortunately, many employers do not encourage their em-
ployees to join these professional organizations.

It remains the individual responsibility of security profession-


Quick Quiz
als to act ethically and according to the policies and proce-

How can the information security professional deter unethical and illegal
dures of their employers, their professional organizations,
behavior of an employee? ANSWER: Information security person- and the laws of society.
nel should do everything in their power to deter unethical
and illegal acts, using policy, education and training, and Association of Computing Machinery (ACM)
technology as controls or safeguards to protect the informa-
tion and systems. The ACM (www.acm.org) is a respected professional society,
originally established in 1947, as “the world's first educa-
tional and scientific computing society.” It is one of the few
organizations that strongly promotes education, and pro-
vides discounted membership for students.

The ACM’s code of ethics requires members to perform their


duties in a manner befitting an ethical computing profes-
sional.

International Information Systems Security Certification Con-


sortium, Inc. (ISC)2

The (ISC)2 manages a body of knowledge on information se-


curity and administers and evaluates examinations for infor-
mation security certifications.

Currently the (ISC)2 offers two professional certifications in


the information security arena: the Certification for Informa-
tion Systems Security Professionals (CISSP), and the Sys-
tems Security Certified Professional, or SSCP

The code of ethics put forth by (ISC)2 is primarily designed


for information security professionals who have earned one
of their certifications.

This code includes four mandatory canons:

125
Protect society, the commonwealth, and the infrastructure Information Systems Security Association

Act honorably, honestly, justly, responsibly, and legally The Information Systems Security Association (ISSA)
(www.issa.org) is a nonprofit society of information security
Provide diligent and competent service to principals professionals.

Advance and protect the profession. As a professional association, its primary mission is to bring
together qualified practitioners of information security for in-
System Administration, Networking, and Security Institute formation exchange and educational development. ISSA pro-
(SANS) vides conferences, meetings, publications, and information
resources to promote information security awareness and
Founded in 1989, SANS is a professional research and edu- education.
cation cooperative organization with currently over 156,000
security professionals, auditors, system administrators, and ISSA also promotes a code of ethics, similar to those of
network administrators. (ISC)2, ISACA, and the ACM, “promoting management prac-
tices that will ensure the confidentiality, integrity, and avail-
SANS certifications can be pursued independently or com- ability of organizational information resources.”
bined to earn the comprehensive certification called the
GIAC Security Engineer (GSE). The newest GIAC certifica- Other Security Organizations
tion, the Information Security Officer (GISO), is an overview
certification that combines basic technical knowledge with The Internet Society or ISOC (www.isoc.org) is a nonprofit,
understanding of threats, risks, and best practices. nongovernmental, international professional organization. It
promotes the development and implementation of educa-
Information Systems Audit and Control Association tion, standards, policy, and education and training to pro-
(ISACA) mote the Internet.

The Information Systems Audit and Control Association, or The Internet Engineering Task Force (IETF) consists of indi-
ISACA (www.isaca.org), is a professional association with a viduals from the computing, networking, and telecommunica-
focus on auditing, control, and security. tions industries, and is responsible for developing the Inter-
net’s technical foundations.
The membership comprises both technical and managerial
professionals. Standards developed by the IETF are then reviewed by the
Internet Engineering Steering Group (IESG), with appeal to
The ISACA also has a code of ethics for its professionals. the Internet Architecture Board, and promulgated by the
Internet Society as international standards.
It requires many of the same high standards for ethical per-
formance as the other organizations and certifications. The Computer Security Division (CSD) of the National Insti-
tute for Standards and Technology (NIST) runs the Computer
CSI - Computer Security Institute (CSI) Security Resource Center (CSRC)—an essential resource for
any current or aspiring information security professional.
The Computer Security Institute (www.gocsi.com) provides
information and certification to support the computer, net- This Web site (csrc.nist.gov) houses one of the most compre-
working, and information security professional. hensive sets of publicly available information on the entire
suite of information security topics.
CSI also publishes a newsletter and threat advisory, and is
well known for its annual computer crime survey of threats The CSD is involved in five major research areas related to
developed in cooperation with the FBI. information security:

126
Cryptographic standards and applications Quick Quiz

Security testing What is the most important responsibility of an information


security professional? ANSWER: It remains the individual
Security research and emerging technologies responsibility of security professionals to act ethically and
according to the policies and procedures of their employers,
Security management and guidance their professional organizations, and the laws of society.

Outreach, awareness, and education

The CERT Coordination Center, or CERT/CC (www.cert.org),


is a center of Internet security expertise which is part of the
Software Engineering Institute, a federally funded research
and development center operated by Carnegie Mellon Uni-
versity.

The CERT/CC studies security issues and provides publica-


tions and alerts to help educate the public to the threats fac-
ing information security.

The center also provides training and expertise in the han-


dling of computer incidents. CERT/CC acts both as a re-
search center and outside consultant in the areas of incident
response, security practices, and programs development.

Computer Professionals for Social Responsibility (CPSR) is a


public organization for technologists and anyone with a gen-
eral concern about the impact of computer technology on
society. CPSR promotes ethical and responsible develop-
ment and use of computing, and seeks to inform public and
private policy and lawmakers on this subject. It acts as an
ethical watchdog for the development of ethical computing.

127
Key U.S. Federal Agencies protect key members of the U.S. government, the Secret
Service is also charged with the detection and arrest of any
There are a number of key U.S. federal agencies charged person committing a U.S. federal offense relating to com-
with the protection of U.S. information resources, and the puter fraud, as well as false identification crimes.
investigation of threats to, or attacks on, these resources.
The Patriot Act (Public Law 107-56) increased the Secret
The Federal Bureau of Investigation’s National Infrastructure Service's role in investigating fraud and related activity in
Protection Center (NIPC) (www.nipc.gov) was established in connection with computers.
1998 and serves as the U.S. government's focal point for
threat assessment and the warning, investigation, and re- The Department of Homeland Security is established with
sponse to threats or attacks against critical U.S. infrastruc- the passage of Public Law 107-296 which in part, transfers
tures. the United States Secret Service from the Department of the
Treasury, to the new department effective March 1, 2003.
A key part of the NIPC’s efforts to educate, train, inform, and
involve the business and public sector in information security
is the National InfraGard Program.

Quick Quiz
Every FBI field office has established an InfraGard chapter
and collaborates with public and private organizations and
What important information does the NSA’s Information Assurance Direc-
the academic community to share information about attacks, torate provide? ANSWER: It provides the information security pro-
vulnerabilities, and threats. fessional with “solutions including the technologies, specifi-
cations and criteria, products, product configurations, tools,
InfraGard’s dominant contribution is the free exchange of in- standards, operational doctrine and support activities
formation to and from the private sector in the subject areas needed to implement the protect, detect and report, and re-
of threats and attacks on information resources. spond elements of cyber defense.”

Another key federal agency is the National Security Agency


(NSA). The NSA is the Nation's cryptologic organization. It
coordinates, directs, and performs highly specialized activi-
ties to protect U.S. information systems and produce foreign
intelligence information…. It is also one of the most impor-
tant centers of foreign language analysis and research within
the Government.

The NSA is responsible for signal intelligence and informa-


tion system security.

The NSA’s Information Assurance Directorate (IAD) provides


information security “solutions including the technologies,
specifications and criteria, products, product configurations,
tools, standards, operational doctrine and support activities
needed to implement the protect, detect and report, and re-
spond elements of cyber defense.”

The U.S. Secret Service is a department within the Depart-


ment of the Treasury. In addition to its well-known mission to

128
Organizational Liability and the Need for Counsel

What if an organization does not support or even encourage


strong ethical conduct on the part of its employees?

What if an organization does not behave ethically?

If an employee, acting with or without the authorization, per-


forms an illegal or unethical act, causing some degree of
harm, the organization can be held financially liable for that
action.

An organization increases its liability if it refuses to take


measures—due care—to make sure that every employee
knows what is acceptable and what is not, and the conse-
quences of illegal or unethical actions.

Due diligence requires that an organization make a valid and


ongoing effort to protect others.

Quick Quiz

What is the organization’s responsibility regarding informa-


tion security? ANSWER: s. An organization must take meas-
ures—due care—to make sure that every employee knows
what is acceptable ethical and legal behavior, what is not,
and the consequences for such illegal or unethical actions.
Should an organization refuse to take such measures, it in-
creases its liability and can be held financially liable for any
unethical or illegal behavior of an employee.

129
Privacy

Private law
Key Terms
Public law
CERT Coordination Center (CERT/CC)

Restitution
Civil law

Tort law
Computer Professional for Social Responsibility (CPSR)

U.S. Secret Service


Computer Security Division (CSD)

Criminal law

Cultural mores

Deterrence

Due Care

Due Diligence

Ethics

Information Systems Security Association (ISSA)

Information Warfare (IW)

Internet Engineering Task Force (IETF)

Internet Society (ISOC)

Jurisdiction

Laws

Liability

Long-arm jurisdiction

National InfraGard Program

National Infrastructure Protection Center (NIPC)

National Security Agency (NSA)

130

You might also like