+ All Categories
Home > Technology > Security Baselines and Risk Assessments

Security Baselines and Risk Assessments

Date post: 29-Nov-2014
Category:
Upload: priyank-singh
View: 240 times
Download: 2 times
Share this document with a friend
Description:
 
55
Security Baselines and Risk Assessments
Transcript
Page 1: Security Baselines and Risk Assessments

Security Baselines and RiskAssessments

Page 2: Security Baselines and Risk Assessments

Baseline

• When a new system is implemented, a preliminary assessment called a security baseline needs to be performed.

• A baseline provides a starting point to measure changes in configurations and improvements to the system.

Page 3: Security Baselines and Risk Assessments

Risk assessments

• Risk assessments educate the administrators about their systems.

• Assessments are a mechanism to identify the strengths and implemented controls of a system, not just the weaknesses and risks.

Page 4: Security Baselines and Risk Assessments

INFORMATION SECURITY ASSESSMENT: A PHASED APPROACH

• Areas of increased risk within an organization:– Operating environment– Security organization– Security planning, administration, and

management– Information security policies, standards, and

procedures– Information security risk assessment– Information classification and control

Page 5: Security Baselines and Risk Assessments

Requirements

• Organization chart• Security policies, standards, and procedures

documentation• Network diagrams• List of applications• List of network management tools• List of security assessment tools• Asset inventory• List of databases• Reports from previous assessments and audits

Page 6: Security Baselines and Risk Assessments

Information Security Assessment Workplan

• Section I:– Provides an overview concentrating on the

management of specific programs developed as a part of the ISA and the allocation of security responsibilities.

• Section II:– Security monitoring– Computer virus controls– Microcomputer security– Compliance with legal and regulatory requirements

Page 7: Security Baselines and Risk Assessments

• Section III, Computer Operations, includes:– Physical and environmental security– Computer systems management– Backup and recovery– Problem management

• Section IV reviews those areas related to applications: access controls, application development and implementation, and change management.

Page 8: Security Baselines and Risk Assessments

HIGH-LEVEL SECURITY ASSESSMENT (SECTION I)

• Assessing the Organization of the Security Function– An assessment of the security organization should

document the number of individuals performing security functions, including full-time security positions as well as individuals that dedicate only a portion of their time to security.

– To whom these positions report.

Page 9: Security Baselines and Risk Assessments

• Assessing the Security Plan– The Information Security Plan should be

documented and describe support for the goals and objectives of the Strategic Information Technology Plan.

– Determine who is responsible for its development, review, approval, and implementation.

– Responsibility for, as well as target completion dates, should be defined for each project, initiative, or strategy defined in the Plan.

Page 10: Security Baselines and Risk Assessments

• Assessing Security Policies, Standards, and Procedures– Determine how policies, standards, and procedures

are developed, reviewed, approved, and modified and who is responsible for each step of this process.

• Assessing Risk-Related Programs– Programs for risk assessment include classification

methodologies, business impact analysis (BIA), incident and emergency reporting and response, disaster recovery planning (DRP), business continuity planning (BCP), and incident monitoring, investigation, and remediation.

Page 11: Security Baselines and Risk Assessments

– Determine who is responsible for each of these programs

• Assessment Document Checklist– Organization chart– IT strategic plan– Information security plan– Security charter or mission statement– Security policies, standards, and procedures– Policy acknowledgment forms– Confidentiality agreements/statements

Page 12: Security Baselines and Risk Assessments

• Network diagrams• Maintenance and service contracts with third-party service

providers• Application inventory• Hardware asset inventory• Network management tools inventory• Security assessment tools inventory• Database inventory• Classification methodology• Audit programs• Compliance checklists• Security assessment reports• Resource ownership matrix

Page 13: Security Baselines and Risk Assessments

SECURITY OPERATIONS (SECTION II)

• Security Monitoring– Security monitoring includes those processes in place to

identify and investigate suspected access violations and attempted system intrusions.

– For Ex.• Daily review of remote access log-ins to identify failed access

attempts• Review of system access logs for access to systems during non-work

hours• Review of traffic on external gateways• Review of access to application system utilities and privileged user

activities• Review of access to sensitive files or data

Page 14: Security Baselines and Risk Assessments

– Procedures are necessary for reporting and responding to suspected violations.

• Computer Virus Controls– Effective computer virus controls are an absolute

necessity.

Page 15: Security Baselines and Risk Assessments

For anti-virus security assessments, it is necessary to ensure that procedures

exist to:

• Download current definitions from the appropriate sources on a timely basis

• Test virus software before distribution• Distribute and upload current definitions to all platforms

(servers, mail servers, firewalls, and workstations)• Validate that distribution of software and definition files is

effective• Ensure compliance with all anti-virus software procedures• Assess the communications mechanism between

administrators and users on potential viruses and the reporting of suspected viruses

Page 16: Security Baselines and Risk Assessments

• Microcomputer Security:– Monitoring licenses registered versus licenses

used– Inventorying PC software– Defining and distributing approved software lists– Developing software usage policies

Page 17: Security Baselines and Risk Assessments

COMPLIANCE WITH LEGAL AND REGULATORY REQUIREMENTS

• A security review of these areas should be conducted to ensure:– Guidelines on the retention, storage, and handling

of regulated information– Appropriate protection of classified data– Compliance with regulatory requirements– Compliance with legislation protecting information

Page 18: Security Baselines and Risk Assessments

COMPUTER OPERATIONS (SECTION III)

• Computer operations personnel are responsible for the physical security of the central processing facility, ensuring the proper execution of programs, maintaining system and critical data backups, responding to and resolving execution errors, and providing assistance in the recovery of systems, programs, and information.

Page 19: Security Baselines and Risk Assessments

Physical and Environmental Security

• Cypher or key pad locks• Fencing• Guards• Monitoring devices• Maintaining authorized personnel access lists• Limiting access to only essential operations

personnel• Maintaining sign-in logs• Badges

Page 20: Security Baselines and Risk Assessments

Environmental controls include

• Backup power (uninterruptible power systems [UPS])• Air conditioning• Fire suppression devices (fire extinguishers, halon,

other)• Fire detection devices (sensors)• Heat detection devices• Business continuity plans (BCPs)• Alternative processing facilities• Disaster recovery plans (DRPs)• System and data backups

Page 21: Security Baselines and Risk Assessments

Backup and Recovery

• Removing backups from the facility creates a requirement for ensuring that those critical backups are not subject to unauthorized access by vendors or outside personnel. Review who, when, and how third-party vendors obtain, transport, and store those critical business system backup tapes.

Page 22: Security Baselines and Risk Assessments

• Internal tape management as well as by third-party vendors is also very important.

• As a part of physical security, backup processing locations are important.

• Recovery plans should be tested annually.

Page 23: Security Baselines and Risk Assessments

Computer Systems Management

• Computer systems management includes the daily execution and maintenance of systems, applications, and information.

• Maintain a log that details the execution, completion, and issues identified during the shift.

• This log should be reviewed by management and jointly reviewed by both the outgoing shift personnel and incoming shift personnel so that continuity and efficiency are maintained.

Page 24: Security Baselines and Risk Assessments

• Computer operations personnel should be restricted from read, write, and delete access of computer programs.

• Change logs: documentation of changes, validation of changes, and follow-up testing.

Page 25: Security Baselines and Risk Assessments

Problem Management

• A problem management process needs to be in place to report, track, and resolve problems incurred in computer operations, as well as in dealing with security-related issues.

• Reduction of failures to an acceptable level• Prevention of the reoccurrence of problems• Reduction of the impact on service

Page 26: Security Baselines and Risk Assessments

Problem resolution should include:• Providing a centralized point of contact for problems• Logging problem calls• Resolution of problems quickly and efficiently• Transferring unresolved problems to more technically qualified

personnel• Tracking and managing difficult problems• Identifying recurring problems, analyzing root causes, and providing

permanent resolution• Improving communication and training to end users• Reporting the status of issues to management, users, and departments

impacted• Evaluating vendor performance and service-level contracts based on

the level of support provided in resolving issues

Page 27: Security Baselines and Risk Assessments

APPLICATION CONTROLS ASSESSMENTS

• Security control assessments related to applications primarily focus on the appropriate access of – users, – administrators, and – programmers to application data and functionality,

system files, program modules, and hardware resources.

Page 28: Security Baselines and Risk Assessments

Access Controls

• Data owners approve access based on job requirements and functionality.

• Role-based access is the most logical method for setting up access to an application.

• Role-based access is determined by an employee’s job function — not by who the employee is as a person.

• Access control lists (ACLs)• Application access is typically controlled by menus that

restrict user access to certain functionalities of the application.

Page 29: Security Baselines and Risk Assessments

Separation (or Segregation) of Duties

• Separation of duties ensures that no single employee has control of a transaction from beginning to end.

• Separation of duties guards against manipulating a transaction for personal gain.

Page 30: Security Baselines and Risk Assessments

Audit Trails

• Audit logs are a record of system activities that provide the capability to reconstruct the sequence of events related to a transaction.

• Audit logs can be used to determine errors in system processing as well as misuse of the system.

• Violation reports that log security-related events, such as unsuccessful access attempts, should be monitored daily.

Page 31: Security Baselines and Risk Assessments

• It is necessary to test that users cannot break out of the menu and obtain the system prompt.

• Application system utilities are sensitive because they bypass application access controls and allow direct access to production code and data.

• These utilities should be protected by passwords and should not be accessible from the application.

Page 32: Security Baselines and Risk Assessments

Authentication

• Authentication as it relates to application access is defined as the reconciliation of evidence of user identity.

• The use of a password for authenticating a user is the most common method and is known as simple authentication.

Page 33: Security Baselines and Risk Assessments

There are three ways a user can identify himself to an application or system:

• Presenting something that only the user knows.

• Presenting something that only the user has. • Presenting something that the user is.

Page 34: Security Baselines and Risk Assessments

• Passwords are something that a user knows.• It is the least secure method of authentication

because a password can be stolen and used by someone else.

Presenting something that only the user knows.

Page 35: Security Baselines and Risk Assessments

Something the user has

• Secure token.• An example of secure tokens are credit card-

size hardware that produce a one-time password only valid and usable for a small window of time, such as one minute.

Page 36: Security Baselines and Risk Assessments

Something that the user is

• Passwords and tokens can be stolen.• Fingerprints and retinas are unique to every

person and they represent who the person is.

Page 37: Security Baselines and Risk Assessments

Using combinations of methods increases the strength of the authentication.

• something you know + something you have = two-factor authentication

• something you know + something you are = two-factor authentication

• something you have + something you are = two-factor authentication

• something you know + something you know = two-factor authentication

• something you have + something you have = two-factor authentication

• something you are + something you are = two-factor authentication

Page 38: Security Baselines and Risk Assessments

Password parameters include:

• Application lockout after so many failed attempts to log on (e.g., three failed attempts)

• Minimum password length (e.g., eight characters)

• Specified password structure• Password change frequency (e.g., every 30

days)

Page 39: Security Baselines and Risk Assessments

• Passwords must be unique• Passwords must be encrypted• Maintain encrypted password files• Maintain password history (e.g., last ten

passwords cannot be reused)• Establish password cycle time • Non-displayed fields• Validation of password before passwords can

be changed• Limitations on sharing passwords

Page 40: Security Baselines and Risk Assessments

Application Development and Implementation

• A formal program for application development and implementation is necessary to ensure that appropriate controls are built into the application to provide authentication, authorization, and integrity.

Page 41: Security Baselines and Risk Assessments

The application development and implementation program should ensure:

• Appropriate access to source libraries• The ability to audit access to source libraries• Integrity checks for the input of data to detect

out-of-range values, invalid characters in data fields, incomplete data, upper and lower data volume limits, two character data ranges, and inconsistent control data

• Session or batch controls to reconcile file balances after transaction updates

Page 42: Security Baselines and Risk Assessments

• Balance controls to validate opening balances with previously closed balances, including run-to-run totals, file update totals, program-to-program totals, and hash totals on records and files

• Management authorization for the initiation of application acquisition, development, and maintenance

• Change requests documents that record the reason for the amendment, date of amendment, and appropriate approvals

• Separate test and production environments• Documented acceptance criteria for test plans

Page 43: Security Baselines and Risk Assessments

• New programs and program changes are formally approved during appropriate phases of the development process and prior to implementation

• Formal sign-off and acceptance procedures• Cut-over procedures to move applications from

the test to the production environment• Programmers are prevented from updating

production programs• Programmers are restricted from adding

programs to the production libraries

Page 44: Security Baselines and Risk Assessments

• Segregation of duties in programming and execution of programs

• System documentation and user documentation is updated to reflect all program and operations changes

• Emergency maintenance and temporary fixes to application and system software are covered by the same procedures applied to normal maintenance

• Backup versions of software are maintained prior to making any changes to the code

Page 45: Security Baselines and Risk Assessments

Change Management

• Change management refers to changes in program code, operating system configurations, or network architectures.

• An effective change management program uses an application or tool to register changes.

• This tool should record the change requestor’s name, details of the request, business justification, approvers, estimated time to perform or implement the change, individuals responsible for modifications, individuals affected by the change, testing requirements, requestor’s approval on tests, management approval, and a scheduled date of change.

Page 46: Security Baselines and Risk Assessments

Check to make sure that:

• The library control systems ensure that all changes to production programs are implemented by library control administrators — and not the programmers who coded the program

• Only the applications programmers involved in the changes have access to application programs under development

Page 47: Security Baselines and Risk Assessments

• Only systems programmers have access to system programs under development

• Only library administrators have write access to system and application libraries

• Access to live data is only through programs that are in the application libraries

Page 48: Security Baselines and Risk Assessments

Database Security

• Access is controlled through discretionary access controls (DACs) or mandatory access controls (MACs).

• With DACs, access must be granted before a user can gain access to a view.

• MACs secure information by assigning classification levels or labels to data.

Page 49: Security Baselines and Risk Assessments

Network Assessments

• Obtain an understanding of the network architecture:– Review network diagrams and documentation– Interview data network administrators– Interview voice network administrators– Interview network device administrators– Review standards relating to networked systems– Review planned migration to new technologies– Review network software inventory– Review network hardware inventory– Identify business functions utilizing the network

Page 50: Security Baselines and Risk Assessments

• Obtain an understanding of network management:– Identify network management tools and other utility

software used in managing the network– Identify how the network management tools are utilized– Identify the devices managed through network– Identify plans or changes to network managers

• Obtain an understanding of network security administration:– Identify policies, procedures, standards, and guidelines for

network security administration– Identify responsibilities for network security administration– Identify monitoring capabilities and reports used in

network security administration

Page 51: Security Baselines and Risk Assessments

• Obtain an understanding of new technology assessments and deployment:– Identify responsibilities for change control– Identify audit/security participation in new

technology plans– Identify documentation of risks in new technologies– Identify general control strategy used in

introduction of new technologies– Identify testing/acceptance methods used for new

technologies– Identify review process for approval of new

technology plans

Page 52: Security Baselines and Risk Assessments

• Obtain an understanding of outage/threat response capabilities:– Identify tools and approaches to reducing risks– Identify responsibility for emergency response– Identify tools/strategies for responding to

emergency conditions– Identify threat incidents and priorities

Page 53: Security Baselines and Risk Assessments

Emergency Response

• It is necessary to ensure that bugs, security holes, and vulnerabilities are disseminated to the appropriate individuals and that those individuals are addressing the problem.

• Include follow-up efforts to ensure that alerts, advisories, and fixes are applied in a timely manner.

Page 54: Security Baselines and Risk Assessments

Remote Access

• For each of the dial-in connections, the following activities will be performed:

• Evaluate external connections and dial access:– Identify external network service providers– Identify external network users (customers, business partners,

employees, service providers)– Identify access methods– Identify frequency of access– Identify nature of access– Identify services used for access– Identify time-of-day access required– Identify services used when access granted

Page 55: Security Baselines and Risk Assessments

• Evaluate network security features:– Identify points of control for each access path– Identify points of control for each service accessed– Identify points of external control– Identify nature of control points (intended for

authentication, monitoring, etc.)– Identify level of functionality for each control point– Identify responsibility for each control point

• Develop access path schematic:– Document access paths and control points– Report observations and recommendations


Recommended