+ All Categories
Home > Documents > Managing Security Through Services Process … Security Through Services Process Leadership Mark...

Managing Security Through Services Process … Security Through Services Process Leadership Mark...

Date post: 15-Mar-2018
Category:
Upload: phamthu
View: 217 times
Download: 2 times
Share this document with a friend
32
1 © 2008 AFSMI , SSPA , TSPA Managing Security Through Services Process Leadership Mark Baniewicz Xerox Corporation
Transcript
Page 1: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

1 © 2008 AFSMI , SSPA , TSPA

Managing Security ThroughServices Process Leadership

Mark BaniewiczXerox Corporation

Page 2: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

2 © 2008 AFSMI , SSPA , TSPA

The Xerox Support OrganizationThe Xerox Support Organization, Xerox Services, is comprised of Technical Services, Professional Services and Managed ServicesWith over 50,000,000 touch points each year, our customers interact with Xerox and experience our capabilities in three ways:

Online: with easy, flexible instant accessOn-Call: responsive, live call support, 24/7On-Site: proactive, highly trained, certified professionals

Xerox Services provides coverage that is second to none. We have over 14,000 highly skilled support personnel who know Xerox products and are dedicated to servicing themProviding the highest levels of support for every Xerox solution – support that’s convenient, fast, responsive and reliable; dedicated to protecting our customer’s investments, maximizing their performance and giving them peace of mind – that’s the Xerox commitment

Xerox Services info…Services Employees:14,214

Services Offered: Online, On-Call, and On-Site services and solutions

Products Supported:Award winning color and black-and-white printers, digital presses, multifunction devices, digital copiers, and various software offerings

Services Delivery: 60% Onsite Visit40% Remote Solution

Support Cases Handled Annually:Online: 668,965On-Call: 5.3 millionOn-Site: 2.6 millionSupport Centers Operated: 5Locations: Saint John, NB; Halifax, NS; Montego Bay, JASt. Lucia; Manila, Philippines

Page 3: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

3 © 2008 AFSMI , SSPA , TSPA

Workshop Goals

• To build awareness that customers need a delivery strategy for security

• To build awareness that customers need a delivery process to comply with security

• To share the building blocks to delivering security--the right people, processes, and technology

Page 4: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

4 © 2008 AFSMI , SSPA , TSPA

Video

http://www.performedia.com/staging/xerox/ssla08/

Page 5: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

5 © 2008 AFSMI , SSPA , TSPA

Global Landscape of Enterprise Security

Security attacks are increasingly:• more strategic, more sophisticated, and more

focused on high value targets and information worldwide

Page 6: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

6 © 2008 AFSMI , SSPA , TSPA

What is at Risk?

http://www.xeroxnewways.com/

Information…the new currency of the Internet economy

HIPAA

SOX

SAS70

SB 1386

GLB

FCPA

FERPA

PCI

FISMA

NERC

Patriot Act

Basil IIAccord

Page 7: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

7 © 2008 AFSMI , SSPA , TSPA

How can I help keep my customers secure?

Do I have the Technology?

Do I have the People?

Do I have the Process?

Page 8: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

8 © 2008 AFSMI , SSPA , TSPA

Challenge Question # 1To maintain network security, Acme corporation tightly

controls software on devices connecting to their network. Each vendor must pass a rigorous testing and certification process before their equipment can be connected. No changes allowed without recertification.

Your technician Jan is covering for Dave who is away on vacation. She is called to an Acme device to address a power supply problem. A new software release resolves this issue. Jan upgrades the device to the new software level.

Later that day, your account manager gets a call from Acme IT Security about (yet another) security violation.

How was this a security violation?

Page 9: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

9 © 2008 AFSMI , SSPA , TSPA

Challenge Question # 2Sales is working through the details of the managed services

renewal for Acme. The final workshop with the customer is just closing out. Your products have the security features Acme is looking for and the pricing is favorable for both parties.

Suddenly, the door opens and in walks the newly appointed Acme Security Officer. Casually, they hand you an Information Security Agreement (ISA) that they’d like you to sign. The ISA has questions about security incident response, change management, business resumption, HR policies, and etc.

Internally, where do you go for answers?

Page 10: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

10 © 2008 AFSMI , SSPA , TSPA

Challenge Question # 3Your Call Center is now using remote management tools

which allow them to manage devices in the Acme network over a secure Internet connection. This has been ideal for trouble-shooting and the number of on-site service calls has been reduced with a positive benefit to your bottom line.

At 10:00 am Joe phones in a panic. A VP conference starts in 15 minutes. Sally is on vacation and no one knows the admin password.

What should the Call Agent do next?

Page 11: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

11 © 2008 AFSMI , SSPA , TSPA

How can I help keep my customers secure?

Do I have the Technology?

Do I have the People?

Do I have the Process?

Page 12: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

12 © 2008 AFSMI , SSPA , TSPA

Designed for Security

Removable hard drives

Security Feature

Fax/Network SeparationDisk Image OverwriteNetwork AuthenticationData EncryptionInternal FirewallAudit loggingSecure Print

Security features added to protect functions: copy, print, fax, scan.

PDLInterpreter(s)

Disk Drive(s)

Fax System

Web Server

Operating Systems 1+

Input ScannerLocal User Interface

Local Hardware Ports

Network Controller

Powerful computer inside!

Page 13: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

13 © 2008 AFSMI , SSPA , TSPA

Take-away for Services suppliers• Select devices and software tools that have been

‘designed for security’

• Look for independent validation of security features– Common Criteria, International Standards– Full system validation

• Consider all software and hardware elements – include service personnel laptops and other mobile and/or remote technology

Page 14: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

14 © 2008 AFSMI , SSPA , TSPA

How can I help keep my customers secure?

Do I have the Technology?

Do I have the People?

Do I have the Process?

Page 15: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

15 © 2008 AFSMI , SSPA , TSPA

The ‘Thought Leader’

Page 16: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

16 © 2008 AFSMI , SSPA , TSPA

Security Knowledgebase –

Monitor for newthreats

Respond

ProactiveDefense

www.xerox.com/security

Page 17: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

17 © 2008 AFSMI , SSPA , TSPA

Take-away for Services suppliers• Establish clear leadership for security

• Build a knowledgebase specific to security

• Make security training available

Page 18: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

18 © 2008 AFSMI , SSPA , TSPA

How can I help keep my customers secure?

Do I have the Technology?

Do I have the People?

Do I have the Process?

Page 19: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

19 © 2008 AFSMI , SSPA , TSPA

Security Services

Deliver the PlanConfigure and MonitorIncident ResponsePatch management

Create the PlanAssess and discover riskEstablish governing policiesConsider product and operations

Audit the PlanControls in placeComply with regulation

Page 20: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

20 © 2008 AFSMI , SSPA , TSPA

Complexity andUnidentified Risks

HP LaserJet 5MP1152

HP Laserjet IIP+0

HP Laserjet IID768

HP LaserJet 4Plus2304

H P Laserjet IIIP768

HP L aserJe t 2100 192 0

HP LaserJet 4Plus2304

H P LaserJet 5 2 304

*Hp/Lj4HP La se rJet 4Plus2408

HP LaserJet 4Plus2304

H P LaserJet 8000 DN4608

H P LaserJet 4 Plus6

H P LaserJet 4Plu s23 04

HP LaserJet 5N2304

*Apple /Lase rw riter 2

H P LaserJet 4Plus2 304

H P Laserjet III 1 536

*Canon/Bjc-2110

*Ap ple/Laserwri te r 2

H P Laserjet III 1 536

H P LaserJet 405 0N3 264

H P Laserjet III 1 536

*Tektroni x/Phaser 849

HP LaserJet 4Plus2988

HP LaserJet 4Si 5101

HP LaserJet 4050N3264

HP Lase rJet 4Si MX5269

HP LaserJet 4Plus2304

HP LaserJet 4Plus2304

HP LaserJe t 4Plus106 9

HP L aserJe t 5Si MX 820 2

HP LaserJet 4Plu s20 38

HP La serJe t 4Plus2304

HP La serJe t 4Plus230 4

HP LaserJet 5N23 04

HP La serJe t 5Si MX 460 8

HP LaserJet 4000N1920

HP LaserJet 4Plus728

HP La se rJet 5N2304

HP LaserJet 5N2304

*Apple/Imagew ri te r 2

H P LaserJet 400 0N3 445

H P LaserJet 4Plus2 304

H P LaserJet 4Plus2 304

H P LaserJet 405 0N1 511

HP Deskje t color 2500C 1824

* Hp/Dj12 20c

*HP/Colo r laserjet HP L aserJet 5M 261 4

H P Deskjet color 2000C Pro2

*Canon/ima gewriter5 502

Pitney Bowes 993096 0

Pitney Bo wes 9 930960

Pitney Bowes 9930960

Pitney Bowes PB 993096 0

Pitney Bowes PB 993096 0

Ricoh 3500L0 R icoh 3700L

9 60Ricoh 370 0L96 0

Pitney Bowes 9930960

Pitney Bowes 993 0960

Pitney Bo wes 992 0960

Pi tney Bowes 9930960

Pitney Bowes PB 99 30960

Pi tne y Bowes 993 09 60

Ricoh 3800L960

R icoh 35 00L9 60

R icoh 37 00L9 60

R icoh 28 00L9 60

Pitne y Bowes 99309 60

Pi tne y Bowes 9300960

Pitne y Bowes 97 504 80

*Mac/Lacie vi sioneer/610 0vi sioneer/Paperpo rt

vi si oneer/Paperpo rt

R icoh 28 00L0

R icoh 3 200L9 60

HP LaserJet 4MV3072

Xerox 568014889

H P LaserJet 4MV3072

HP La serJe t 4Plus2304

HP La serJe t 4Plus230 4

HP LaserJe t 4Plus2304

*Hp/L j4

HP LaserJet 5MP1152

HP Laserjet IIP+0

HP Laserjet IID768

HP LaserJet 4Plus2304

H P Laserjet IIIP768

HP L aserJe t 2100 192 0

HP LaserJet 4Plus2304

H P LaserJet 5 2 304

*Hp/Lj4HP La se rJet 4Plus2408

HP LaserJet 4Plus2304

H P LaserJet 8000 DN4608

H P LaserJet 4 Plus6

H P LaserJet 4Plu s23 04

HP LaserJet 5N2304

*Apple /Lase rw riter 2

H P LaserJet 4Plus2 304

H P Laserjet III 1 536

*Canon/Bjc-2110

*Ap ple/Laserwri te r 2

H P Laserjet III 1 536

H P LaserJet 405 0N3 264

H P Laserjet III 1 536

*Tektroni x/Phaser 849

HP LaserJet 4Plus2988

HP LaserJet 4Si 5101

HP LaserJet 4050N3264

HP Lase rJet 4Si MX5269

HP LaserJet 4Plus2304

HP LaserJet 4Plus2304

HP LaserJe t 4Plus106 9

HP L aserJe t 5Si MX 820 2

HP LaserJet 4Plu s20 38

HP La serJe t 4Plus2304

HP La serJe t 4Plus230 4

HP LaserJet 5N23 04

HP La serJe t 5Si MX 460 8

HP LaserJet 4000N1920

HP LaserJet 4Plus728

HP La se rJet 5N2304

HP LaserJet 5N2304

*Apple/Imagew ri te r 2

H P LaserJet 400 0N3 445

H P LaserJet 4Plus2 304

H P LaserJet 4Plus2 304

H P LaserJet 405 0N1 511

HP Deskje t color 2500C 1824

* Hp/Dj12 20c

*HP/Colo r laserjet HP L aserJet 5M 261 4

H P Deskjet color 2000C Pro2

*Canon/ima gewriter5 502

Pitney Bowes 993096 0

Pitney Bo wes 9 930960

Pitney Bowes 9930960

Pitney Bowes PB 993096 0

Pitney Bowes PB 993096 0

Ricoh 3500L0 R icoh 3700L

9 60Ricoh 370 0L96 0

Pitney Bowes 9930960

Pitney Bowes 993 0960

Pitney Bo wes 992 0960

Pi tney Bowes 9930960

Pitney Bowes PB 99 30960

Pi tne y Bowes 993 09 60

Ricoh 3800L960

R icoh 35 00L9 60

R icoh 37 00L9 60

R icoh 28 00L9 60

Pitne y Bowes 99309 60

Pi tne y Bowes 9300960

Pitne y Bowes 97 504 80

*Mac/Lacie vi sioneer/610 0vi sioneer/Paperpo rt

vi si oneer/Paperpo rt

R icoh 28 00L0

R icoh 3 200L9 60

HP LaserJet 4MV3072

Xerox 568014889

H P LaserJet 4MV3072

HP La serJe t 4Plus2304

HP La serJe t 4Plus230 4

HP LaserJe t 4Plus2304

*Hp/L j4

• Job urgency• Simple to use• Local control• Specialty user needs• Immediate access• Culture

DC 440 SLXVo lume rep lacingCopies- 2,000Prints – 14,648Faxes – 1,920

DC 440 SLXVolume replacin gCop ies- 5,502Prin ts – 12,042Faxes – 960

DC 440 SLX - du al faxVolume replacingCo pies- 1,764Prin ts – 13,720Faxes – 2,880Plus 1,824 color images to b e migrated to graphics

DC 440 SLXVo lu me replacingCopies- 4,839Prints – 7,309Faxes – 1,920

DC 440 SLX - dual faxVolume rep lac in gCop ies- 4,839Prints – 10,303Faxes – 3,360Plus 2,616 color images to b e migrated to graphics

DC 440 SLXVolume replacingCo pies- 2,000Prin ts – 14,151Faxes – 2,880

DC 440 SL XVolume replacingCo pies- 7,889Prin ts – 8,950F axes – 960

DC 440 SL XVolume replacingC opies- 2,000Prints – 12,350F axes – 960

DC 440 SLXVolume replacingCo pies- 2,000Prin ts – 12,350Faxes – 1,920

DC 440 SLXVolume rep lacin gCop ies- 3,156Prints – 12,351Faxes – 1,920

DC 440 SLXVolume rep lac in gCop ies- 4,839Prints – 9,200Faxes – 2,880

HP L aserJet 4Plu s2304

HP LaserJet 4Plus2304

DC 440 SLXVo lu me replacingCopies- 4,838Prints – 7,310Faxes – 1,920

• Job urgency• Simple to use• Local control• Specialty user needs• Immediate access• Culture

DC 440 SLXVo lume rep lacingCopies- 2,000Prints – 14,648Faxes – 1,920

DC 440 SLXVolume replacin gCop ies- 5,502Prin ts – 12,042Faxes – 960

DC 440 SLX - du al faxVolume replacingCo pies- 1,764Prin ts – 13,720Faxes – 2,880Plus 1,824 color images to b e migrated to graphics

DC 440 SLXVo lu me replacingCopies- 4,839Prints – 7,309Faxes – 1,920

DC 440 SLX - dual faxVolume rep lac in gCop ies- 4,839Prints – 10,303Faxes – 3,360Plus 2,616 color images to b e migrated to graphics

DC 440 SLXVolume replacingCo pies- 2,000Prin ts – 14,151Faxes – 2,880

DC 440 SL XVolume replacingCo pies- 7,889Prin ts – 8,950F axes – 960

DC 440 SL XVolume replacingC opies- 2,000Prints – 12,350F axes – 960

DC 440 SLXVolume replacingCo pies- 2,000Prin ts – 12,350Faxes – 1,920

DC 440 SLXVolume rep lacin gCop ies- 3,156Prints – 12,351Faxes – 1,920

DC 440 SLXVolume rep lac in gCop ies- 4,839Prints – 9,200Faxes – 2,880

HP L aserJet 4Plu s2304

HP LaserJet 4Plus2304

DC 440 SLXVo lu me replacingCopies- 4,838Prints – 7,310Faxes – 1,920

Risks identified, Documented and mitigated

Security Plan

Security Plan

Current State to…Secure Future State

Page 21: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

21 © 2008 AFSMI , SSPA , TSPA

Take-away for Services suppliers?

• Create Plan

• Deliver Plan

• Audit Plan

Page 22: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

22 © 2008 AFSMI , SSPA , TSPA

How can I help keep my customers secure?

Do I have the Technology?

Do I have the People?

Do I have the Process?

Summing it up

Page 23: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

23 © 2008 AFSMI , SSPA , TSPA

The Secure ApproachBuild the professional team• Certified Information System Security Professional (CISSP)• Certified Security+• Certified Lean Six Sigma Black Belts

Utilize best practices methodologies• Lean Six Sigma (LSS)• ISO 27001 Code of Practice for Information Security

Deploy secure products and solutions• ISO 15408 (Common Criteria) • Remote management tools

Secure Delivery• Security policy and plan for customer• Security training • Auditing and reporting

PeopleProcess

TechnologyData

Facilities

Page 24: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

24 © 2008 AFSMI , SSPA , TSPA

Workshop Questions

Page 25: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

25 © 2008 AFSMI , SSPA , TSPA

Challenge Question # 1“The Software Upgrade”

The violation: Customer policy documented in the Security Plan prohibits unapproved/uncertified software updates. Technician did not follow the upgrade process.

Discussion Points:Many customers maintain consistent software across their device fleet

for management and security purposes.If you upgrade one, then you need to upgrade all.

Controls to consider:On-going security trainingNote attached to deviceNote added to technician work ticket – paper or electronicPlaybook for account documenting all things securityService closeout checklist updated for security

Page 26: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

26 © 2008 AFSMI , SSPA , TSPA

Challenge Question # 2“The Sales Response”

Security subject matter experts and a knowledgebase or repository for product/services security is a must-have.

Discussion Points:Security is very complex and touches many business elements

including: HR, physical, electronic, network, and environmental.

Approaches to consider:Identify an internal resource to focus on securityGather existing security information to seed a knowledgebaseCreate security whitepapers or FAQ to address common questionsContract with third party security serviceObtain external security certifications of products (Common Criteria) or

services (ISO standards)

Page 27: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

27 © 2008 AFSMI , SSPA , TSPA

Challenge Question # 3“Social Engineering”

This is a process in which an attacker attempts to acquire information about your network and system by social means.

Discussion Points:This attack method has over 80% effectiveness. In 2007, attacks were

split 50-50 between external and internal origination.

Controls to consider:Identify ‘sensitive’ data in your systems (like passwords)Have documented processes for handling sensitive data Refresh and validate customer contact lists frequentlyAlways identify a primary and back-up contact at customer siteNever provide passwords over the phone – use known emailAuthenticate service technicians with employee # and last 4 digits of SS#Train call center agents to avoid giving out unnecessary informationPost reminders about security prominently in call centers

Page 28: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

28 © 2008 AFSMI , SSPA , TSPA

Thank You!

• For more information, please visit us at www.xerox.com/security

Page 29: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

29 © 2008 AFSMI , SSPA , TSPA

Backup Slides

Page 30: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

30 © 2008 AFSMI , SSPA , TSPA

Creating the Security Management Plan

• Security Analyst as point-of-contact • Collaborates with client IT to

assess, document, plan, and create policies

• Documents risks for devices, remote management tools, on-site service processes, and data flow

• Define secure device configuration• Build secure operational processes

– Install, Upgrade, Service, Disposal, Incident Response

• Create Training materials• Create Audit plan

Page 31: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

31 © 2008 AFSMI , SSPA , TSPA

• Provide end-to-end security management of the customer environment for the term of the contract

• Include full operations security services including:• setup • configuration• deployment • maintenance • patch management • change management• incident response • auditing

• Assign a Security focal point to collaborate with customer IT and security

Executing the Security Management Plan

Page 32: Managing Security Through Services Process … Security Through Services Process Leadership Mark Baniewicz Xerox Corporation 2 © 2008 AFSMI , SSPA , TSPA The Xerox Support Organization

32 © 2008 AFSMI , SSPA , TSPA

FirewallCompensatingPenaltiesDeterrentBCPRecoveryPoliciesDirectiveTrainingCorrective Audit logsDetectiveAccess controlPreventative

TypeControl

Reference: The National Institute of Standards and Technology (NIST), Special Publication 800-30 Rev. A

• Human error• Document handling• Natural disaster• Employee Turnover• Improperly configured devices

• Malicious Internal Attack• Malicious External Attack• Data Tampering• Theft of Services

Introduce Process ControlsMany challenges to maintaining security over time

– unintentional or otherwise!


Recommended