SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Going Beyond Technology
Privacy Impact Assessments
                  from NIST
                               Candy Alexander, CISSP CISM
                                   SecureWorld Expo Boston
                                             March 24, 2011
                                                  Room 103




   Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Topics
   What is PII, PIAs and why should I care
   Using NIST’s guide
   How to define impact levels & safeguards
   Where should I begin
   Incident response
   Summary



       Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
What is PII
   Personally Identifiable Information
       Information which can be used to distinguish or
        trace an individuals identity, such as their name,
        social security number, biometric records, etc.
        alone, or when combined with other personal or
        identifying information which is linked to linkable
        to a specific individual, such as date and place of
        birth, mother’s maiden name, etc.”*

    OMB Memorandum 07-16


          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
OR more specifically…..
Personally Identifiable Information – refers to information that can be
used to uniquely identify, contact, or locate a single person or can be
used with other sources to uniquely identify a single individual.

The following are often used for the express purpose of distinguishing
individual identity, and thus are clearly PII under the definition used by
the U.S. Office of Management and Budget (described in detail below):
     •Full name (if not common)
     •National identification number
     •IP address (in some cases)
     •Vehicle registration plate number
     •Driver's license number
     •Face, fingerprints, or handwriting
     •Credit card numbers
     •Digital identity
     •Birthday
     •Birthplace
     •Genetic information


         Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Privacy Impact Assessment
Using the premise that all Personally
 Identifiable Information (PII) is not created
 equal or has the same value/risk
     PII should be protected from inappropriate
      access, use and disclosure
     Provides a practical, context-based guidance for
      identifying PII
     Define the appropriate level of protection for each
      instance of PII
     Encourage close coordination among privacy, IT,
      security and legal when addressing PII issues

         Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Why is this approach so
important?
   Enables you to focus efforts and resources
    on protecting the data that has the most risk
    – rather than all
       Expensive and complex to protect the whole
        environment
       Similar to the gold in Fort Knox; concentrating it in
        one location & safeguarding it to the fullest




          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
PIA Approach
1.   Identify all PII residing in their environment

2.   Categorize their PII by confidentially impact

3.   Apply the appropriate safeguards for PII based on the
     PII confidentiality impact level (i.e. how sensitive it is)

4.   Minimize the collection/retention of PII to what is strictly
     necessary to accomplish their business

5.   Develop an incident response plan to handle breaches
     of PII
        Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
NIST SP800-122* Process

                                            Identify PII


  Determine Confidentiality Impact Level

                  Apply Appropriate Protection Measures


          Minimize Collection & Retention

                          Incident Response Plan for PII

  *NIST SP800-122 – Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)


          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Identify PII within Environment
   What PII elements
           Name, Address, Social Security Number, Email, etc.
   Where are they
           Stored, processed and transmitted
   How are they used
           What is the business need
           Linkable
   Who
       Access
       “Custodianship”

             Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level

   Based on “harm”
   Identified as
       Low
           limited adverse effect (minor harm - minor financial loss or no more
            than an inconvenience )
       Moderate
           Serious adverse effect (significant harm that may result in significant
            financial loss, but does not include loss of life, such as denial of
            benefits, discrimination or potential blackmail)
       High
           Severe or Catastrophic adverse effect (major financial loss or server
            harm to individuals such as life threatening injuries or loss of life)



             Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level


   Evaluation Factors
       Holistic approach in evaluating data elements
       Complete view of data elements determine the
        impact level
       5 factors used
           Distinguishability
           Aggregation and sensitivity
           Context of Use
           Obligation to Protect
           Access to and location of
            Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level

1 - Distinguishability
     Unique id or not?
         SSN vs. Phone number (department phone)
         Listing of just SSNs?
2 - Aggregation and sensitivity
     Sensitivity of data when used together such as
         Name, address, SSN
         Name, address, SSN and data of birth
         May have requirement if SSN is involved, it is a
          Moderate automatically

          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level

3 - Context of Use
     Purpose PII is collected , stored, used, processed,
      disclosed or disseminated
         How could it be used or potentially be used (risk)
     The same PII used in different context may cause for
      different impact levels
         Each “process” could have a different impact level on the
          same PII data. For example: Name, address & SSN could be
          moderate, but used for analysis of: alcohol or drug use, illegal
          conduct, illegal immigration status, information damaging to
          financial standing, and employability could make it a “high”




          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level


4 - Obligation to Protect Confidentiality
     Laws & regulations
         Privacy Act of 1974
         OMB memoranda
         HIPAA
         State Data Regulations
         Gramm-Leach-Bliley Act




          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level


   5 - Access to & Location of PII
       How many are accessing (staff & systems)
       Where they are accessing it from (remote
        workers, onsite, vendors, etc.)
       Where is it stored (local on desktop/laptop or on
        fileserver)




          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level


   How to get started?
       Form a team consisting of InfoSec, Privacy, IT,
        “system owner” or info custodian and Legal
       Develop a form to help guide you through the
        review and document the impact levels.
       Review the impact levels on a regular basis
       Similar to HIPAA




          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level


Form should include:
   Process Name:
   Process Description:
   Process Owner:
   PII data elements use:
   Distinguishability:
   Aggregation/Sensitivity:
   Context of Use:
   Obligation:
   Access to/Location of:
   Impact Level Declaration:
   Date of Declaration:
          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level

Going through the exercise – Example 1
 Incident Response Roster
    Data elements: Name, titles, office & work cell
     numbers, work email addresses
        Distinguishability: small number (under 20)
        Aggregation/Sensitivity: internally available
        Context of Use: release would not likely cause harm to
         individual or organization
        Obligation: none
        Access to/Location of: accessed by IT and response team; is
         available to remote workers
    Impact level = Low
         Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Determine Confidentiality Impact Level

Exercise Example 2
 Intranet Activity Tracking
     Data Elements: user’s IP address, URL if website user viewed, date/time
      user access website, amount of time user spent viewing, web pages or
      topics accessed
         Distinguishability: by itself – no, but linked - admins can view this log and the AD
          log to identify individual)
         Aggregation/Sensitivity: info accessed could cause embarrassment if related to HR
          subjects, however amount of potential info is limited
         Context of Use: release of info would unlikely cause harm. Since logging is known
          and assumed to happen – would not cause harm.
         Obligation: none
         Access to/Location of: Log data is accessed by small number of sys admins and
          only accessible from Org’s own systems.
     Impact level = Low


          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Apply Appropriate Protection Measures
                 (Beyond Technology)

   Policy & Procedures
        Use of PIAs, access rules for PII, retention schedule,
         redress, individual consent, data sharing agreements,
         PII incident response, privacy in the SDLC, limitation
         of collection, disclosure, sharing and use of PII
   Education, Training & Awareness
        What is PII, basic privacy laws/regs/policies,
         restrictions on data collections/storage/use, roles &
         responsibilities for using/protecting PII, appropriate
         disposal, sanctions for misuse, recognizing a security
         or privacy incident involving PII, retention schedules,
         roles & responsibilities in responding to PII incidents

          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Minimize Collection & Retention

   Minimize to least amount necessary
       Reduce potential risk
       Review PII collection requirements regularly
   De-identifying Info (encryption/tokenization)
       Info that has enough PII removed/obscured such that
        it does not identify an individual
           Full data records aren’t always necessary
           Can be accomplished by code, algorithm, or pseudonym
           Changes impact level to a low as long as:
           Re-identification is on a separate system with appropriate
            controls
           Data elements are not linkable


            Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Minimize Collection & Retention


   Anonymzing Information
       Making previously identifiable info de-identifiable
        for which a code or other link no longer exists.
       Renders information so that it is no longer PII
           Generalizing the data
           Suppressing the data (redaction)
           Scrambling or swapping the data
       Useful in system development & testing



            Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Incident Response Plan for PII


   Follow traditional IR planning
   Include Privacy & Legal
       Know you notification requirements
        (State/Federal)




          Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
Questions?


                Candy Alexander, CISSP CISM
                 calexander@ltcpartners.com



For a copy of this presentation, send an email request.




 Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103

Contenu connexe

Tendances

2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecuritySvetlana Belyaeva
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent ThreatsBooz Allen Hamilton
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 

Tendances (20)

HIPAA Preso
HIPAA PresoHIPAA Preso
HIPAA Preso
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
C02
C02C02
C02
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 

Similaire à Beyond Tech using PIAs 2011

The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadVinoth Sn
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2FRSecure
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalUlf Mattsson
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case StudyAngilina Jones
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copySandra (Sandy) Dunn
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 

Similaire à Beyond Tech using PIAs 2011 (20)

CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-upload
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 final
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 

Beyond Tech using PIAs 2011

  • 1. Going Beyond Technology Privacy Impact Assessments from NIST Candy Alexander, CISSP CISM SecureWorld Expo Boston March 24, 2011 Room 103 Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 2. Topics  What is PII, PIAs and why should I care  Using NIST’s guide  How to define impact levels & safeguards  Where should I begin  Incident response  Summary Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 3. What is PII  Personally Identifiable Information  Information which can be used to distinguish or trace an individuals identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked to linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.”* OMB Memorandum 07-16 Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 4. OR more specifically….. Personally Identifiable Information – refers to information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual. The following are often used for the express purpose of distinguishing individual identity, and thus are clearly PII under the definition used by the U.S. Office of Management and Budget (described in detail below): •Full name (if not common) •National identification number •IP address (in some cases) •Vehicle registration plate number •Driver's license number •Face, fingerprints, or handwriting •Credit card numbers •Digital identity •Birthday •Birthplace •Genetic information Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 5. Privacy Impact Assessment Using the premise that all Personally Identifiable Information (PII) is not created equal or has the same value/risk  PII should be protected from inappropriate access, use and disclosure  Provides a practical, context-based guidance for identifying PII  Define the appropriate level of protection for each instance of PII  Encourage close coordination among privacy, IT, security and legal when addressing PII issues Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 6. Why is this approach so important?  Enables you to focus efforts and resources on protecting the data that has the most risk – rather than all  Expensive and complex to protect the whole environment  Similar to the gold in Fort Knox; concentrating it in one location & safeguarding it to the fullest Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 7. PIA Approach 1. Identify all PII residing in their environment 2. Categorize their PII by confidentially impact 3. Apply the appropriate safeguards for PII based on the PII confidentiality impact level (i.e. how sensitive it is) 4. Minimize the collection/retention of PII to what is strictly necessary to accomplish their business 5. Develop an incident response plan to handle breaches of PII Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 8. NIST SP800-122* Process Identify PII Determine Confidentiality Impact Level Apply Appropriate Protection Measures Minimize Collection & Retention Incident Response Plan for PII *NIST SP800-122 – Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 9. Identify PII within Environment  What PII elements  Name, Address, Social Security Number, Email, etc.  Where are they  Stored, processed and transmitted  How are they used  What is the business need  Linkable  Who  Access  “Custodianship” Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 10. Determine Confidentiality Impact Level  Based on “harm”  Identified as  Low  limited adverse effect (minor harm - minor financial loss or no more than an inconvenience )  Moderate  Serious adverse effect (significant harm that may result in significant financial loss, but does not include loss of life, such as denial of benefits, discrimination or potential blackmail)  High  Severe or Catastrophic adverse effect (major financial loss or server harm to individuals such as life threatening injuries or loss of life) Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 11. Determine Confidentiality Impact Level  Evaluation Factors  Holistic approach in evaluating data elements  Complete view of data elements determine the impact level  5 factors used  Distinguishability  Aggregation and sensitivity  Context of Use  Obligation to Protect  Access to and location of Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 12. Determine Confidentiality Impact Level 1 - Distinguishability  Unique id or not?  SSN vs. Phone number (department phone)  Listing of just SSNs? 2 - Aggregation and sensitivity  Sensitivity of data when used together such as  Name, address, SSN  Name, address, SSN and data of birth  May have requirement if SSN is involved, it is a Moderate automatically Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 13. Determine Confidentiality Impact Level 3 - Context of Use  Purpose PII is collected , stored, used, processed, disclosed or disseminated  How could it be used or potentially be used (risk)  The same PII used in different context may cause for different impact levels  Each “process” could have a different impact level on the same PII data. For example: Name, address & SSN could be moderate, but used for analysis of: alcohol or drug use, illegal conduct, illegal immigration status, information damaging to financial standing, and employability could make it a “high” Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 14. Determine Confidentiality Impact Level 4 - Obligation to Protect Confidentiality  Laws & regulations  Privacy Act of 1974  OMB memoranda  HIPAA  State Data Regulations  Gramm-Leach-Bliley Act Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 15. Determine Confidentiality Impact Level  5 - Access to & Location of PII  How many are accessing (staff & systems)  Where they are accessing it from (remote workers, onsite, vendors, etc.)  Where is it stored (local on desktop/laptop or on fileserver) Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 16. Determine Confidentiality Impact Level  How to get started?  Form a team consisting of InfoSec, Privacy, IT, “system owner” or info custodian and Legal  Develop a form to help guide you through the review and document the impact levels.  Review the impact levels on a regular basis  Similar to HIPAA Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 17. Determine Confidentiality Impact Level Form should include:  Process Name:  Process Description:  Process Owner:  PII data elements use:  Distinguishability:  Aggregation/Sensitivity:  Context of Use:  Obligation:  Access to/Location of:  Impact Level Declaration:  Date of Declaration: Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 18. Determine Confidentiality Impact Level Going through the exercise – Example 1  Incident Response Roster  Data elements: Name, titles, office & work cell numbers, work email addresses  Distinguishability: small number (under 20)  Aggregation/Sensitivity: internally available  Context of Use: release would not likely cause harm to individual or organization  Obligation: none  Access to/Location of: accessed by IT and response team; is available to remote workers  Impact level = Low Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 19. Determine Confidentiality Impact Level Exercise Example 2  Intranet Activity Tracking  Data Elements: user’s IP address, URL if website user viewed, date/time user access website, amount of time user spent viewing, web pages or topics accessed  Distinguishability: by itself – no, but linked - admins can view this log and the AD log to identify individual)  Aggregation/Sensitivity: info accessed could cause embarrassment if related to HR subjects, however amount of potential info is limited  Context of Use: release of info would unlikely cause harm. Since logging is known and assumed to happen – would not cause harm.  Obligation: none  Access to/Location of: Log data is accessed by small number of sys admins and only accessible from Org’s own systems.  Impact level = Low Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 20. Apply Appropriate Protection Measures (Beyond Technology)  Policy & Procedures  Use of PIAs, access rules for PII, retention schedule, redress, individual consent, data sharing agreements, PII incident response, privacy in the SDLC, limitation of collection, disclosure, sharing and use of PII  Education, Training & Awareness  What is PII, basic privacy laws/regs/policies, restrictions on data collections/storage/use, roles & responsibilities for using/protecting PII, appropriate disposal, sanctions for misuse, recognizing a security or privacy incident involving PII, retention schedules, roles & responsibilities in responding to PII incidents Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 21. Minimize Collection & Retention  Minimize to least amount necessary  Reduce potential risk  Review PII collection requirements regularly  De-identifying Info (encryption/tokenization)  Info that has enough PII removed/obscured such that it does not identify an individual  Full data records aren’t always necessary  Can be accomplished by code, algorithm, or pseudonym  Changes impact level to a low as long as:  Re-identification is on a separate system with appropriate controls  Data elements are not linkable Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 22. Minimize Collection & Retention  Anonymzing Information  Making previously identifiable info de-identifiable for which a code or other link no longer exists.  Renders information so that it is no longer PII  Generalizing the data  Suppressing the data (redaction)  Scrambling or swapping the data  Useful in system development & testing Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 23. Incident Response Plan for PII  Follow traditional IR planning  Include Privacy & Legal  Know you notification requirements (State/Federal) Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103
  • 24. Questions? Candy Alexander, CISSP CISM calexander@ltcpartners.com For a copy of this presentation, send an email request. Candy Alexander CISSP, CISM - SecureWorld Expo - Boston March 24, 2011 - Room 103