SlideShare une entreprise Scribd logo
1  sur  27
Information
Security Manual
WHAT IT IS, AND ITS IMPACT ON PUBLIC SECTOR PROJECT DELIVERY
How this presentation is going to work….
 We’re pretty open, informal guys
 Everything in this talk is NOT CLASSIFIED and this information is freely
available to the public on the Internet
 If you want to say something – Raise your hand and stop us! Speak Up!
 We will be talking about “Common Sense”
AGENDA
 Who ARE we?
 What is the ISM?
 Common Misconceptions
 Common Issues
 Issue Resolution
 Scenario
 Q & A
Who are We?
OR WHY YOU OUGHT TO LISTEN TO US
 Wears a lot of hats (literally and figuratively);
 Career is focused on Information Security, Policy and
Compliance Management;
 Background in Systems and Networking;
 Active in several local InfoSec communities;
 Regularly attends special interest groups and
conferences such as Ruxcon, SIG, ACSC and ACS;
 Working on several ISM Projects on the side;
 Works on a multitude of private engineering projects;
 Works as a Visual-Jockey for nightclubs and festivals;
 Runs an FM Radio Station;
 All of the above WHILE renovating his house.
James Mouat
 Doesn’t like Hats, but tends to figuratively wear a fair
few;
 Career is focused on Tech Consulting, Strategy and
Project Management;
 Background in Networking, Business Analysis and Web
Development;
 Active in several local technology-related communities;
 Regularly attends events by the ACS, Canberra
Innovation Network, UNAA, ISACA, IIBA, etc.;
 Working as a casual tutor and mentor at the ANU;
 Working on a few side projects;
 Works as a photographer and blogger;
 Runs a blog;
 All of the above WHILE playing video games and
reading manga.
Kevin Landale
What is the ISM?
 The Information Security Manual (ISM) is a publication by the Australian
Signals Directorate (ASD) as the standard which governs Information
Security of Government Information Technology Systems.
 It was originally called ACSI 33 until 2005, when it was renamed as the
Information Security Manual, or ISM.
 Updated and published on an Annual basis.
 The current edition was release in April 2015, and consists of 932 controls.
 Contains guidance for Unclassified DLM, Protected, Confidential, Secret
and TOP SECRET classifications.
What is the ISM?
Common Misconceptions / Issues
 IT Security are far too draconian! I want access to
Facebook/Instagram/Snapchat !!!
 IT Security isn’t important to this project. We’ll worry
about it later!
 The IT Security Approvals process for our system is too
hard and takes too long! The IT Security
team/branch take forever!
Common Misconceptions
 Project Cost blow outs
 Project Schedule blow outs
 Inadequate internal skilled resources
 Inadequate understanding of the role of the ISM as a
compliance tool
Common Issues
Common Issues
 Here are some project phases and where security
advice will help avoid the issues outlined earlier:
 Scoping Phase
 Assists in defining what technical concerns may affect this project
 Design Phase
 Where required, can play a pivotal role in designing out potential
risks
 Testing
 Assess if effectiveness of the technical implementation and if the
scoped security controls have been met
 Operation
 Monitoring the ongoing operation of, and/or response to any
security concerns with the system in use, over it’s lifetime.
Simple Manner on avoiding Issues
Scenario
DEPARTMENT OF MAGICAL ANOMALIES
 Director John Smith, head of the Division of New
Applications and Public Interactions in the
Department of Magical Anomalies, has been asked
to implement a new cloud-based application to
allow the public to report about new magical
anomalies.
 John starts by creating a project team that consists
of a Project Manager, Business Analyst, Technical
Lead, Architect, etc.
 The team decide that there aren’t enough skilled
resources internally to handle some of the more
technical or complex tasks, so they go and hire
consultants, etc.
Scenario
 The Project Plan is created and sent to the Executive
for sign-off. The high level plan states that security
signoff and testing is done towards the tail-end of the
project as a matter of process.
 The project ticks along for over 10 months. Normal
development and other project issues crop up
occasionally, but the team resolve them in due
course. Still, no real thought or foresight given to
security considerations.
 As per Department Change requirements, the project
team start to undertake compliance requirements
towards the end prior to getting the application live
and in production.
Scenario
 Project team talk to their IT Security division in order to get security
sign-off…….
 They fail.
 Lots of holes, lots of significant security compliance issues.
 No real protection of citizen data. Brings about further questions on
legal obligations of privacy, confidentiality and data sovereignty.
 No protection against basic attacks such as SQL Injections, etc.
 Cost of implementing all these updates and fixes
= 3 months and at roughly $500,000 per month in resource costs
Scenario
 Executives decide to push ahead with the project. Approve
additional time, resources and funding on the proviso that
Security specialists are brought in to assist in ensuring
compliance and best practice.
 Ultimately, the project is considered a success. Despite
taking 8 months longer than planned, and a budget over-
run of over $2.5 million.
* Numbers are just an estimate, but are severely below real world examples
that we’ve seen.
Scenario
 The easy answer?
Engage with Security personnel from the start – They are valuable
resource
 While its easy enough to state the obvious in hindsight, the controls
outlined in the ISM help projects in avoiding this scenario.
 Government Agencies are required to address the controls within the
ISM for every system and for the agency as a whole.
 Engaging with Security personnel can raise awareness of other risks
relevant to your project early in the project, this will help reduce the risk
of compliance failure. For example cloud computing requirements:
http://www.asd.gov.au/publications/protect/cloud_computing_security_considerations.htm
Scenario – Resolution?
 By engaging with security earlier, business or project teams can
scope out security requirements.
 Security Requirements can then be utilised as part of the
design/development process.
 And, if required, those requirements can help engage with
Solution Providers and/or Specialists.
 Planning becomes less risky, your specifications write themselves,
and in turn make Executives happier as the risk of non-
compliance gets reduced.
Scenario – Resolution?
 Engineers keeping security controls in mind when developing
the solution can significantly reduce the need for refactoring
 If the system needs to obtain accreditation, the system will be
assessed for non-compliances and any residual risks after
implementing controls.
 Project Executives can make an informed business decision
based on residual risk, and any treatments applied.
 Organisational IT maturity as a whole will be strengthened.
Scenario – Resolution?
 The Information Security Manual is an enabler – NOT an inhibitor.
 Project Success is dependant on a variety of factors, almost ALL
of them important.
 Just don’t forget about Security!
 Early engagement with Security saves a lot of time and money.
 Security Guys are friendly and don’t bite!!
 …
 Profit?
Recap
Free resources to help with your
ISM Compliance
 GRC and ISM Project pages.
 Key resource:
 Up-to-date HTML versions of the ISM;
 Fully referenced navigation links for the ISM;
 Breakdown of ISM document format;
 Fully self contained, portable HTML file with all images (less than
2Mb); and
 All grammar and mistakes (hopefully) fixed.
Some ISM Resources
 And as a special announcement, at the ACS Conference:
 A free-to-use, configurable ISM Checklist
 Scope controls applicable to your project
 Contributes to Requirements and Design
 Record your compliance and evidence statements
 Input for Security Accreditation or Audit Processes
Some ISM Resources
Q & A
James Mouat
@joflixen
http://au.linkedin.com/in/jamesmouat
http://james.mouat.net.au/ism/
http://james.mouat.net.au/ism/checklist/
Kevin Landale
@craftyninja
http://www.thecraftyandnudge.com
http://au.linkedin.com/in/landalekevin
Thank You

Contenu connexe

Tendances

Tendances (20)

SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 

Similaire à ISM and its impact on Government Project Delivery

Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"
Gene Kim
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
hforhassan101
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
sleeperharwell
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 

Similaire à ISM and its impact on Government Project Delivery (20)

111.pptx
111.pptx111.pptx
111.pptx
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
Topic11
Topic11Topic11
Topic11
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 

Dernier

Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Inaayaeventcompany
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 

Dernier (20)

Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort ServicePremium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
 
Call Girl Service in West Tripura 9332606886Call Girls Advance Cash On Deliv...
Call Girl Service in West Tripura  9332606886Call Girls Advance Cash On Deliv...Call Girl Service in West Tripura  9332606886Call Girls Advance Cash On Deliv...
Call Girl Service in West Tripura 9332606886Call Girls Advance Cash On Deliv...
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
YHRGeorgetown Spring 2024 America should Take Her Share
YHRGeorgetown Spring 2024 America should Take Her ShareYHRGeorgetown Spring 2024 America should Take Her Share
YHRGeorgetown Spring 2024 America should Take Her Share
 
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
 
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
 
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery ServiceWomen Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
The Outlook for the Budget and the Economy
The Outlook for the Budget and the EconomyThe Outlook for the Budget and the Economy
The Outlook for the Budget and the Economy
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
 
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s education
 

ISM and its impact on Government Project Delivery

  • 1. Information Security Manual WHAT IT IS, AND ITS IMPACT ON PUBLIC SECTOR PROJECT DELIVERY
  • 2. How this presentation is going to work….  We’re pretty open, informal guys  Everything in this talk is NOT CLASSIFIED and this information is freely available to the public on the Internet  If you want to say something – Raise your hand and stop us! Speak Up!  We will be talking about “Common Sense”
  • 3. AGENDA  Who ARE we?  What is the ISM?  Common Misconceptions  Common Issues  Issue Resolution  Scenario  Q & A
  • 4. Who are We? OR WHY YOU OUGHT TO LISTEN TO US
  • 5.  Wears a lot of hats (literally and figuratively);  Career is focused on Information Security, Policy and Compliance Management;  Background in Systems and Networking;  Active in several local InfoSec communities;  Regularly attends special interest groups and conferences such as Ruxcon, SIG, ACSC and ACS;  Working on several ISM Projects on the side;  Works on a multitude of private engineering projects;  Works as a Visual-Jockey for nightclubs and festivals;  Runs an FM Radio Station;  All of the above WHILE renovating his house. James Mouat
  • 6.  Doesn’t like Hats, but tends to figuratively wear a fair few;  Career is focused on Tech Consulting, Strategy and Project Management;  Background in Networking, Business Analysis and Web Development;  Active in several local technology-related communities;  Regularly attends events by the ACS, Canberra Innovation Network, UNAA, ISACA, IIBA, etc.;  Working as a casual tutor and mentor at the ANU;  Working on a few side projects;  Works as a photographer and blogger;  Runs a blog;  All of the above WHILE playing video games and reading manga. Kevin Landale
  • 7. What is the ISM?
  • 8.  The Information Security Manual (ISM) is a publication by the Australian Signals Directorate (ASD) as the standard which governs Information Security of Government Information Technology Systems.  It was originally called ACSI 33 until 2005, when it was renamed as the Information Security Manual, or ISM.  Updated and published on an Annual basis.  The current edition was release in April 2015, and consists of 932 controls.  Contains guidance for Unclassified DLM, Protected, Confidential, Secret and TOP SECRET classifications. What is the ISM?
  • 10.  IT Security are far too draconian! I want access to Facebook/Instagram/Snapchat !!!  IT Security isn’t important to this project. We’ll worry about it later!  The IT Security Approvals process for our system is too hard and takes too long! The IT Security team/branch take forever! Common Misconceptions
  • 11.  Project Cost blow outs  Project Schedule blow outs  Inadequate internal skilled resources  Inadequate understanding of the role of the ISM as a compliance tool Common Issues
  • 13.  Here are some project phases and where security advice will help avoid the issues outlined earlier:  Scoping Phase  Assists in defining what technical concerns may affect this project  Design Phase  Where required, can play a pivotal role in designing out potential risks  Testing  Assess if effectiveness of the technical implementation and if the scoped security controls have been met  Operation  Monitoring the ongoing operation of, and/or response to any security concerns with the system in use, over it’s lifetime. Simple Manner on avoiding Issues
  • 15.  Director John Smith, head of the Division of New Applications and Public Interactions in the Department of Magical Anomalies, has been asked to implement a new cloud-based application to allow the public to report about new magical anomalies.  John starts by creating a project team that consists of a Project Manager, Business Analyst, Technical Lead, Architect, etc.  The team decide that there aren’t enough skilled resources internally to handle some of the more technical or complex tasks, so they go and hire consultants, etc. Scenario
  • 16.  The Project Plan is created and sent to the Executive for sign-off. The high level plan states that security signoff and testing is done towards the tail-end of the project as a matter of process.  The project ticks along for over 10 months. Normal development and other project issues crop up occasionally, but the team resolve them in due course. Still, no real thought or foresight given to security considerations.  As per Department Change requirements, the project team start to undertake compliance requirements towards the end prior to getting the application live and in production. Scenario
  • 17.  Project team talk to their IT Security division in order to get security sign-off…….  They fail.  Lots of holes, lots of significant security compliance issues.  No real protection of citizen data. Brings about further questions on legal obligations of privacy, confidentiality and data sovereignty.  No protection against basic attacks such as SQL Injections, etc.  Cost of implementing all these updates and fixes = 3 months and at roughly $500,000 per month in resource costs Scenario
  • 18.  Executives decide to push ahead with the project. Approve additional time, resources and funding on the proviso that Security specialists are brought in to assist in ensuring compliance and best practice.  Ultimately, the project is considered a success. Despite taking 8 months longer than planned, and a budget over- run of over $2.5 million. * Numbers are just an estimate, but are severely below real world examples that we’ve seen. Scenario
  • 19.  The easy answer? Engage with Security personnel from the start – They are valuable resource  While its easy enough to state the obvious in hindsight, the controls outlined in the ISM help projects in avoiding this scenario.  Government Agencies are required to address the controls within the ISM for every system and for the agency as a whole.  Engaging with Security personnel can raise awareness of other risks relevant to your project early in the project, this will help reduce the risk of compliance failure. For example cloud computing requirements: http://www.asd.gov.au/publications/protect/cloud_computing_security_considerations.htm Scenario – Resolution?
  • 20.  By engaging with security earlier, business or project teams can scope out security requirements.  Security Requirements can then be utilised as part of the design/development process.  And, if required, those requirements can help engage with Solution Providers and/or Specialists.  Planning becomes less risky, your specifications write themselves, and in turn make Executives happier as the risk of non- compliance gets reduced. Scenario – Resolution?
  • 21.  Engineers keeping security controls in mind when developing the solution can significantly reduce the need for refactoring  If the system needs to obtain accreditation, the system will be assessed for non-compliances and any residual risks after implementing controls.  Project Executives can make an informed business decision based on residual risk, and any treatments applied.  Organisational IT maturity as a whole will be strengthened. Scenario – Resolution?
  • 22.  The Information Security Manual is an enabler – NOT an inhibitor.  Project Success is dependant on a variety of factors, almost ALL of them important.  Just don’t forget about Security!  Early engagement with Security saves a lot of time and money.  Security Guys are friendly and don’t bite!!  …  Profit? Recap
  • 23. Free resources to help with your ISM Compliance
  • 24.  GRC and ISM Project pages.  Key resource:  Up-to-date HTML versions of the ISM;  Fully referenced navigation links for the ISM;  Breakdown of ISM document format;  Fully self contained, portable HTML file with all images (less than 2Mb); and  All grammar and mistakes (hopefully) fixed. Some ISM Resources
  • 25.  And as a special announcement, at the ACS Conference:  A free-to-use, configurable ISM Checklist  Scope controls applicable to your project  Contributes to Requirements and Design  Record your compliance and evidence statements  Input for Security Accreditation or Audit Processes Some ISM Resources
  • 26. Q & A