78
Topic 5: Security Engineering: An Overview 虞虞虞 [email protected] Security Principles & Applications

Information Security Principles & Applications

Embed Size (px)

DESCRIPTION

Information Security Principles & Applications. Topic 5: Security Engineering: An Overview 虞慧群 [email protected]. Information Security. A successful organization should have multiple layers of security in place: Physical security Personal security Operations security - PowerPoint PPT Presentation

Citation preview

Page 1: Information Security Principles & Applications

Topic 5: Security Engineering:

An Overview

虞慧群[email protected]

Information SecurityPrinciples & Applications

Page 2: Information Security Principles & Applications

Information Security A successful organization should have multiple layers

of security in place: Physical security Personal security Operations security Communications security Network security Information security

The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information

Necessary tools: policy, awareness, training, education, technology

Page 3: Information Security Principles & Applications

NSTISSC Security Model

Storage Processing Transm.

Confidentiality

Availability

Integrity

Tech

nolo

gy

Education

Policy

Page 4: Information Security Principles & Applications

Components of an Information System

Information System (IS) is entire set of software, hardware, data, people, procedures, and networks necessary to use information as a resource in the organization

Page 5: Information Security Principles & Applications

Securing Components

Computer can be subject of an attack and/or the object of an attack

When the subject of an attack, computer is used as an active tool to conduct attack

When the object of an attack, computer is the entity being attacked

Page 6: Information Security Principles & Applications
Page 7: Information Security Principles & Applications

Balancing Information Security and Access

Impossible to obtain perfect security—it is a process, not an absolute

Security should be considered balance between protection and availability

To achieve balance, level of security must allow reasonable access, yet protect against threats

Page 8: Information Security Principles & Applications
Page 9: Information Security Principles & Applications

The Systems Development Life Cycle Systems development life cycle (SDLC) is methodology

and design for implementation of information security within an organization

Methodology is formal approach to problem-solving based on structured sequence of procedures

Using a methodology ensures a rigorous process avoids missing steps

Goal is creating a comprehensive security posture/program

Traditional SDLC consists of six general phases

Page 10: Information Security Principles & Applications
Page 11: Information Security Principles & Applications

Investigation

What problem is the system being developed to solve?

Objectives, constraints and scope of project are specified

Preliminary cost-benefit analysis is developed

At the end, feasibility analysis is performed to assesses economic, technical, and behavioral feasibilities of the process

Page 12: Information Security Principles & Applications

Analysis

Consists of assessments of the organization, status of current systems, and capability to support proposed systems

Analysts determine what new system is expected to do and how it will interact with existing systems

Ends with documentation of findings and update of feasibility analysis

Page 13: Information Security Principles & Applications

Logical Design

Main factor is business need; applications capable of providing needed services are selected

Data support and structures capable of providing the needed inputs are identified

Technologies to implement physical solution are determined

Feasibility analysis performed at the end

Page 14: Information Security Principles & Applications

Physical Design

Technologies to support the alternatives identified and evaluated in the logical design are selected

Components evaluated on make-or-buy decision

Feasibility analysis performed; entire solution presented to end-user representatives for approval

Page 15: Information Security Principles & Applications

Implementation

Needed software created; components ordered, received, assembled, and tested

Users trained and documentation created

Feasibility analysis prepared; users presented with system for performance review and acceptance test

Page 16: Information Security Principles & Applications

Maintenance and Change

Consists of tasks necessary to support and modify system for remainder of its useful life

Life cycle continues until the process begins again from the investigation phase

When current system can no longer support the organization’s mission, a new project is implemented

Page 17: Information Security Principles & Applications

The Security Systems Development Life Cycle

The same phases used in traditional SDLC may be adapted to support specialized implementation of an IS project

Identification of specific threats and creating controls to counter them

SecSDLC is a coherent program rather than a series of random, seemingly unconnected actions

Page 18: Information Security Principles & Applications

Investigation

Identifies process, outcomes, goals, and constraints of the project

Begins with enterprise information security policy

Organizational feasibility analysis is performed

Page 19: Information Security Principles & Applications

Analysis

Documents from investigation phase are studied

Analyzes existing security policies or programs, along with documented current threats and associated controls

Includes analysis of relevant legal issues that could impact design of the security solution

The risk management task begins

Page 20: Information Security Principles & Applications

An Overview of Risk Management

Know yourself: identify, examine, and understand the information and systems currently in place

Know the enemy: identify, examine, and understand threats facing the organization

Responsibility of each community of interest within an organization to manage risks that are encountered

Page 21: Information Security Principles & Applications

The Roles of the Communities of Interest Information security, management and users,

information technology all must work together

Management review:

Verify completeness/accuracy of asset inventory

Review and verify threats as well as controls and mitigation strategies

Review cost effectiveness of each control

Verify effectiveness of controls deployed

Page 22: Information Security Principles & Applications

Risk Identification

Assets are targets of various threats and threat agents

Risk management involves identifying organization’s assets and identifying threats/vulnerabilities

Risk identification begins with identifying organization’s assets and assessing their value

Page 23: Information Security Principles & Applications

Asset Identification and Valuation

Iterative process; begins with identification of assets, including all elements of an organization’s system (people, procedures, data and information, software, hardware, networking)

Assets are then classified and categorized

Page 24: Information Security Principles & Applications

Table 4-1 - Categorizing Components

Page 25: Information Security Principles & Applications

Threat Identification

Realistic threats need investigation; unimportant threats are set aside

Threat assessment:

Which threats present danger to assets?

Which threats represent the most danger to information?

How much would it cost to recover from attack?

Which threat requires greatest expenditure to prevent?

Page 26: Information Security Principles & Applications
Page 27: Information Security Principles & Applications

Vulnerability Identification

Specific avenues threat agents can exploit to attack an information asset are called vulnerabilities

Examine how each threat could be perpetrated and list organization’s assets and vulnerabilities

Process works best when people with diverse backgrounds within organization work iteratively in a series of brainstorming sessions

At end of risk identification process, list of assets and their vulnerabilities is achieved

Page 28: Information Security Principles & Applications

Risk Assessment

Risk assessment evaluates the relative risk for each vulnerability

Assigns a risk rating or score to each information asset

Page 29: Information Security Principles & Applications

Valuation of Information Assets Assign weighted scores for value of each asset; actual

number used can vary with needs of organization

To be effective, assign values by asking questions: Which threats present danger to assets?

Which threats represent the most danger to information?

How much would it cost to recover from attack?

Which threat requires greatest expenditure to prevent?

Finally: which of the above questions for each asset is most important to protection of organization’s information?

Page 30: Information Security Principles & Applications

Risk Determination

For the purpose of relative risk assessment, risk equals:

Likelihood of vulnerability occurrence TIMES value (or impact)

MINUS percentage risk already controlled

PLUS an element of uncertainty

Page 31: Information Security Principles & Applications

Identify Possible Controls

For each threat and associated vulnerabilities that have residual risk, create preliminary list of control ideas

Residual risk is risk that remains to information asset even after existing control has been applied

Page 32: Information Security Principles & Applications

Access Controls

Specifically address admission of a user into a trusted area of organization

Types of Access Control Mandatory access controls (MAC): give users and data owners

limited control over access to information Nondiscretionary controls: managed by a central authority in

organization; can be based on individual’s role (role-based controls) or a specified set of assigned tasks (task-based controls)

Discretionary access controls (DAC): implemented at discretion or option of data user

Lattice-based access control: variation of MAC; users assigned matrix of authorizations for areas of access

Page 33: Information Security Principles & Applications

Documenting the Results of Risk Assessment

Final summary comprised in ranked vulnerability risk worksheet

Worksheet details asset, asset impact, vulnerability, vulnerability likelihood, and risk-rating factor

Ranked vulnerability risk worksheet is initial working document for next step in risk management process: assessing and controlling risk

Page 34: Information Security Principles & Applications
Page 35: Information Security Principles & Applications

Risk Control Strategies

Once ranked vulnerability risk worksheet complete, must choose one of four strategies to control each risk:

Apply safeguards (avoidance)

Transfer the risk (transference)

Reduce impact (mitigation)

Understand consequences and accept risk (acceptance)

Page 36: Information Security Principles & Applications

Avoidance

Attempts to prevent exploitation of the vulnerability

Preferred approach; accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards

Three common methods of risk avoidance:

Application of policy

Training and education

Applying technology

Page 37: Information Security Principles & Applications

Transference Control approach that attempts to shift risk to other

assets, processes, or organizations

If lacking, organization should hire individuals/firms thatprovide security management and administration expertise

Organization may then transfer risk associated with management of complex systems to another organization experienced in dealing with those risks

Page 38: Information Security Principles & Applications

Mitigation

Attempts to reduce impact of vulnerability exploitation through planning and preparation

Approach includes three types of plans:

Incident response plan (IRP)

Disaster recovery plan (DRP)

Business continuity plan (BCP)

Page 39: Information Security Principles & Applications

Mitigation (continued)

DRP is most common mitigation procedure

The actions to take while incident is in progress is defined in IRP

BCP encompasses continuation of business activities if catastrophic event occurs

Page 40: Information Security Principles & Applications

Acceptance Doing nothing to protect a vulnerability and accepting

the outcome of its exploitation

Valid only when the particular function, service, information, or asset does not justify cost of protection

Risk appetite describes the degree to which organization is willing to accept risk as trade-off to the expense of applying controls

Page 41: Information Security Principles & Applications

Characteristics of Secure Information Controls can be classified according to the

characteristics of secure information they are intended to assure

These characteristics include: confidentiality; integrity; availability; authentication; authorization; accountability; privacy

Page 42: Information Security Principles & Applications

Feasibility Studies

Before deciding on strategy, all information about economic/non-economic consequences of vulnerability of information asset must be explored

A number of ways exist to determine advantage of a specific control

Page 43: Information Security Principles & Applications

Cost Benefit Analysis (CBA)

Most common approach for information security controls is economic feasibility of implementation

CBA is begun by evaluating worth of assets to be protected and the loss in value if those assets are compromised

The formal process to document this is called cost benefit analysis or economic feasibility study

Page 44: Information Security Principles & Applications

Cost Benefit Analysis (CBA) (continued)

Items that impact cost of a control or safeguard include: cost of development; training fees; implementation cost; service costs; cost of maintenance

Benefit is the value an organization realizes by using controls to prevent losses associated with a vulnerability

Asset valuation is process of assigning financial value or worth to each information asset; there are many components to asset valuation

Page 45: Information Security Principles & Applications

Cost Benefit Analysis (CBA) (continued)

Once worth of various assets is estimated, potential loss from exploitation of vulnerability is examined

Process results in estimate of potential loss per risk

Expected loss per risk stated in the following equation:

Annualized loss expectancy (ALE) equals Single loss expectancy (SLE) TIMES

Annualized rate of occurrence (ARO)

SLE is equal to asset value times exposure factor (EF)

Page 46: Information Security Principles & Applications

The Cost Benefit Analysis (CBA) Formula

CBA determines whether or not control alternative being evaluated is worth cost incurred to control vulnerability

CBA most easily calculated using ALE from earlier assessments, before implementation of proposed control:

CBA = ALE(prior) – ALE(post) – ACS ALE(prior) is annualized loss expectancy of risk before

implementation of control ALE(post) is estimated ALE based on control being in

place for a period of time ACS is the annualized cost of the safeguard

Page 47: Information Security Principles & Applications

Benchmarking

An alternative approach to risk management

Benchmarking is process of seeking out and studying practices in other organizations that one’s own organization desires to duplicate

One of two measures typically used to compare practices:

Metrics-based measures

Process-based measures

Page 48: Information Security Principles & Applications

Benchmarking (continued)

Standard of due care: when adopting levels of security for a legal defense, organization shows it has done what any prudent organization would do in similar circumstances

Due diligence: demonstration that organization is diligent in ensuring that implemented standards continue to provide required level of protection

Failure to support standard of due care or due diligence can leave organization open to legal liability

Page 49: Information Security Principles & Applications

Benchmarking (continued) Best business practices: security efforts that provide a

superior level protection of information

When considering best practices for adoption in an organization, consider:

Does organization resemble identified target with best practice?

Are resources at hand similar?

Is organization in a similar threat environment?

Page 50: Information Security Principles & Applications

Problems with Benchmarking and Best Practices Organizations don’t talk to each other (biggest problem)

No two organizations are identical

Best practices are a moving target

Knowing what was going on in information security industry in recent years through benchmarking doesn’t necessarily prepare for what’s next

Page 51: Information Security Principles & Applications

Risk Management Discussion Points Organizations must define level of risk it can live with

Risk appetite: defines quantity and nature of risk that organizations are willing to accept as tradeoffs between perfect security and unlimited accessibility are weighed

Residual risk: risk that has not been completely removed, shifted, or planned for

Page 52: Information Security Principles & Applications
Page 53: Information Security Principles & Applications

Logical Design

Creates and develops blueprints for information security

Incident response actions planned:

Continuity planning

Incident response

Disaster recovery

Feasibility analysis to determine whether project should continue or be outsourced

Page 54: Information Security Principles & Applications

Hybrid Framework for a Blueprint of an Information Security System

Result of a detailed analysis of components of all documents, standards, and Web-based information described previously

Offered here as a balanced introductory blueprint for learning the blueprint development process

Page 55: Information Security Principles & Applications

Figure 5-15 – Spheres of Security

Page 56: Information Security Principles & Applications

Physical Design The physical design process:

Selects technologies to support information security blueprint

Identifies complete technical solutions based on these technologies, including deployment, operations, and maintenance elements, to improve security of environment

Designs physical security measures to support technical solution

Prepares project plans for implementation phase that follows

Page 57: Information Security Principles & Applications

Implementation SecSDLC implementation phase accomplished through

changing configuration and operation of organization’s information systems

Implementation includes changes to procedures, people, hardware, software, and data

Organization translates blueprint for information security into a concrete project plan

Organization should avoid overconfidence after implementation of improved information security profile as time passes by

Page 58: Information Security Principles & Applications

Project Management for Information Security

Once organization’s vision and objectives are understood, process for creating project plan can be defined

Major steps in executing project plan are: Planning the project

Supervising tasks and action steps

Wrapping up

Each organization must determine its own project management methodology for IT and information security projects

Page 59: Information Security Principles & Applications

Developing the Project Plan

Creation of project plan can be done using work breakdown structure (WBS)

Major project tasks in WBS are work to be accomplished; individuals assigned; start and end dates; amount of effort required; estimated capital and noncapital expenses; and identification of dependencies between/among tasks

Each major WBS task further divided into smaller tasks or specific action steps

Page 60: Information Security Principles & Applications

Project Planning Considerations

As project plan is developed, adding detail is not always straightforward

Special considerations include financial; priority; time and schedule; staff; procurement; organizational feasibility; and training

Page 61: Information Security Principles & Applications

Executing the Plan

Negative feedback ensures project progress is measured periodically

Measured results compared against expected results

When significant deviation occurs, corrective action taken

Often, project manager can adjust one of three parameters for task being corrected: effort and money allocated; scheduling impact; quality or quantity of deliverable

Page 62: Information Security Principles & Applications

Figure 10-1

Page 63: Information Security Principles & Applications

Project Wrap-up

Project wrap-up usually handled as procedural task and assigned to mid-level IT or information security manager

Collect documentation, finalize status reports, and deliver final report and presentation at wrap-up meeting

Goal of wrap-up to resolve any pending issues, critique overall project effort, and draw conclusions about how to improve process

Page 64: Information Security Principles & Applications

Conversion Strategies

As components of new security system are planned, provisions must be made for changeover from previous method of performing task to new method

Four basic approaches

Direct changeover

Phased implementation

Pilot implementation

Parallel operations

Page 65: Information Security Principles & Applications

The Maintenance Model

Designed to focus organizational effort on maintaining systems

Recommended maintenance model based on five subject areas

External monitoring

Internal monitoring

Planning and risk assessment

Vulnerability assessment and remediation

Readiness and review

Page 66: Information Security Principles & Applications

Figure 12-1 - The Maintenance Model

Page 67: Information Security Principles & Applications

Monitoring the External Environment

Objective to provide early awareness of new threats, threat agents, vulnerabilities, and attacks that is needed to mount an effective defense

Entails collecting intelligence from data sources and giving that intelligence context and meaning for use by organizational decision makers

Page 68: Information Security Principles & Applications
Page 69: Information Security Principles & Applications

Monitoring the Internal Environment

Maintain informed awareness of state of organization’s networks, systems, and defenses by maintaining inventory of IT infrastructure and applications

Internal monitoring accomplished by: Active participation in, or leadership of, IT

governance process Real-time monitoring of IT activity using intrusion

detection systems Automated difference detection methods that identify

variances introduced to network or system hardware and software

Page 70: Information Security Principles & Applications
Page 71: Information Security Principles & Applications

Planning and Risk Assessment

Primary objective to keep lookout over entire information security program

Accomplished by identifying and planning ongoing information security activities that further reduce risk

Page 72: Information Security Principles & Applications

Planning and Risk Assessment (continued)

Primary outcomes

Establishing a formal information security program review

Instituting formal project identification, selection, planning and management processes

Coordinating with IT project teams to introduce risk assessment and review for all IT projects

Integrating a mindset of risk assessment across organization

Page 73: Information Security Principles & Applications
Page 74: Information Security Principles & Applications

Vulnerability Assessment and Remediation

Primary goal is identification of specific, documented vulnerabilities and their timely remediation

Accomplished by:

Using vulnerability assessment procedures

Documenting background information and providing tested remediation procedures for reported vulnerabilities

Tracking vulnerabilities from when they are identified

Communicating vulnerability information to owners of vulnerable systems

Page 75: Information Security Principles & Applications
Page 76: Information Security Principles & Applications

Readiness and Review

Primary goal to keep information security program functioning as designed and continuously improving

Accomplished by:

Policy review: for policy to be sound

Program review: for major planning components to be current, accurate, and appropriate

Rehearsals: for major plan elements to be effective

Page 77: Information Security Principles & Applications
Page 78: Information Security Principles & Applications

Summary Successful organizations have multiple layers of

security in place: physical, personal, operations, communications, network, and information.

Security should be considered a balance between protection and availability

Information security must be managed similar to any major system implemented in an organization using a methodology like SecSDLC

Implementation of information security often described as a combination of art and science