+ All Categories
Home > Documents > FTD Security Management Policy

FTD Security Management Policy

Date post: 07-Apr-2018
Category:
Upload: sally-frederick-tudor
View: 226 times
Download: 0 times
Share this document with a friend

of 23

Transcript
  • 8/6/2019 FTD Security Management Policy

    1/23

    Security Management Practices

    Sally F. Tudor, CISSPNext Generation Technologies

    FTD ENTERPRISES

  • 8/6/2019 FTD Security Management Policy

    2/23

    FTD ENTERPRISES

    The CIA

    Security Governance

    Policies, Procedures, etc.

    Organizational Structures

    Roles and Responsibilities Information Classification

    Risk Management

  • 8/6/2019 FTD Security Management Policy

    3/23

    FTD ENTERPRISES

    Confidentiality Allowing only authorized subjects access to information

    Integrity

    Allowing only authorized subjects to modifyinformation

    Availability

    Ensuring that information and resources are accessiblewhen needed

  • 8/6/2019 FTD Security Management Policy

    4/23

    FTD ENTERPRISES

    Think in terms of the core information security

    principles

    How does this threat impact the CIA?

    What controls can be used to reduce the risk to CIA?

    If we increase confidentiality, will we decreaseavailability?

  • 8/6/2019 FTD Security Management Policy

    5/23

    FTD ENTERPRISES

    Security Governance is the organizationalprocesses and relationships for managing risk

    Policies, Procedures, Standards, Guidelines,

    Baselines

    Organizational Structures

    Roles and Responsibilities

  • 8/6/2019 FTD Security Management Policy

    6/23

    FTD ENTERPRISES

    Policies are statements of managementintentions and goals

    Senior Management support and approval is vitalto success

    General, high-level objectives Acceptable use, internet access, logging,

    information security, etc

  • 8/6/2019 FTD Security Management Policy

    7/23

    FTD ENTERPRISES

    Procedures are detailed steps to perform aspecific task

    Usually required by policy

    Decommissioning resources, adding useraccounts, deleting user accounts, changemanagement, etc

  • 8/6/2019 FTD Security Management Policy

    8/23

    FTD ENTERPRISES

    Standards specify the use of specifictechnologies in a uniform manner

    Requires uniformity throughout the

    organization Operating systems, applications, server tools,

    router configurations, etc

  • 8/6/2019 FTD Security Management Policy

    9/23

    FTD ENTERPRISES

    Guidelines are recommended methods forperforming a task

    Recommended, but not required

    Malware cleanup, spyware removal, dataconversion, sanitization, etc

  • 8/6/2019 FTD Security Management Policy

    10/23

    FTD ENTERPRISES

    Baselines are similar to standards but accountfor differences in technologies and versionsfrom different vendors

    Operating system security baselines

    FreeBSD 6.2, Mac OS X Panther, Solaris 10, RedHat Enterprise Linux 5, Windows Server 2008,Windows XP, Windows Vista, etc

  • 8/6/2019 FTD Security Management Policy

    11/23

    FTD ENTERPRISES

    Organization of and official responsibilities forsecurity vary

    BoD, CEO, BoD Committee

    CFO, CIO, CEO, CSO, CISO

    Director, Manager

    IT/IS Security

    Audit

  • 8/6/2019 FTD Security Management Policy

    12/23

    Organizational Structure

    Audit should be separate from implementation andoperations Independence is not compromised

    Responsibilities for security should be defined in jobdescriptions

    Senior management has ultimate responsibility for security Security officers/managers have functional responsibility

  • 8/6/2019 FTD Security Management Policy

    13/23

    Roles and Responsibilities

    Best Practices: Least Privilege

    Mandatory Vacations

    Job Rotation Separation of Duties

  • 8/6/2019 FTD Security Management Policy

    14/23

    Roles and Responsibilities

    Owners Determine security requirements

    Custodians

    Manage security based on requirements Users

    Access as allowed by security requirements

  • 8/6/2019 FTD Security Management Policy

    15/23

    Information Classification

    Not all information has thesame value

    Need to evaluate value based on CIA

    Value determines protection level

    Protection levels determine procedures

    Labeling informs users on handling

  • 8/6/2019 FTD Security Management Policy

    16/23

    Information Classification

    Government classifications:

    Top Secret

    Secret

    Confidential

    Sensitive but Unclassified

    Unclassified

  • 8/6/2019 FTD Security Management Policy

    17/23

    Information Classification

    Private Sector classifications:

    Confidential

    Private

    Sensitive

    Public

  • 8/6/2019 FTD Security Management Policy

    18/23

    Information Classification

    Criteria: Value

    Age

    Useful Life

    Personal Association

  • 8/6/2019 FTD Security Management Policy

    19/23

    Risk Management

    Risk Management is identifying, evaluating, andmitigating risk to an organization

    Its a cyclical, continuous process

    Need to know what you have

    Need to know what threats are likely

    Need to know how and how well it is protected

    Need to know where the gaps are

  • 8/6/2019 FTD Security Management Policy

    20/23

    Identification

    Assets Threats

    Threat-sources: man-made, natural

    Vulnerabilities

    Weakness Controls

    Safeguard

  • 8/6/2019 FTD Security Management Policy

    21/23

    Analysis/Evaluation

    Quantitative

    Objective numeric values

    Cost-Benefit analysis

    Guesswork low

    Qualitative Subjective intangible values

    Time involved low

    Guesswork high

  • 8/6/2019 FTD Security Management Policy

    22/23

    Remedy/Mitigation

    Reduce-Use controls to limit or reduce threat

    Remove Stop using it

    Transfer Get insurance or outsource it

    Accept Hope for the best

  • 8/6/2019 FTD Security Management Policy

    23/23

    Summary

    Security Management practices involvebalancing security processes and proper

    management and oversight

    Risk Management is a big part of managingholistic security of an organization


Recommended