SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
CISM Study Guide
Christian Reina, CISSP, CISA, CRISC
                                          2010
 An investment in knowledge pays the best interest.

                                   Benjamin Franklin




     _______________________________

       This document may be used only for informational,
                  training and noncommercial purposes.
Table of Contents
Information Security Governance ................................................................................................................. 7
   Overview ................................................................................................................................................... 7
      Significant benefits:............................................................................................................................... 7
      Outcomes: ............................................................................................................................................. 7
   Effective Governance ................................................................................................................................ 7
      Business goals and objectives ............................................................................................................... 7
      Roles and Responsibilities ..................................................................................................................... 8
      Governance, Risk and Compliance ........................................................................................................ 8
      Business Model for Information Security ............................................................................................. 8
   Information security manager .................................................................................................................. 9
      Obtaining senior management commitment ....................................................................................... 9
   Governance metrics .................................................................................................................................. 9
      Effective security metrics ...................................................................................................................... 9
      Strategic alignment ............................................................................................................................... 9
      Risk management.................................................................................................................................. 9
      Value delivery........................................................................................................................................ 9
      Resource management ......................................................................................................................... 9
      Performance measurement .................................................................................................................. 9
      Assurance integration ........................................................................................................................... 9
   Common pitfalls in developing a security strategy ................................................................................. 10
   Strategic Objectives ................................................................................................................................ 10
      The goal ............................................................................................................................................... 10
      Business case development ................................................................................................................ 10
      The desired state................................................................................................................................. 11
      Risk objectives ..................................................................................................................................... 11
   Information security strategy ................................................................................................................. 12
      Road map ............................................................................................................................................ 12
      Resources ............................................................................................................................................ 12
      Constraints .......................................................................................................................................... 12
   Action Plan .............................................................................................................................................. 13
Information Risk Management ................................................................................................................... 13
Overview ................................................................................................................................................. 13
   Effective information risk management ................................................................................................. 14
      Development....................................................................................................................................... 14
      Roles and Responsibilities ................................................................................................................... 14
   Implementing Risk Management ............................................................................................................ 14
      Process: ............................................................................................................................................... 14
      Framework .......................................................................................................................................... 14
      External and Internal environment ..................................................................................................... 14
      Risk management scope ..................................................................................................................... 15
   Risk Assessment ...................................................................................................................................... 15
      NIST approach ..................................................................................................................................... 15
      Aggregated and cascading risk............................................................................................................ 15
      Other ................................................................................................................................................... 15
      Identification of risks........................................................................................................................... 15
      Threats ................................................................................................................................................ 16
      Vulnerabilities ..................................................................................................................................... 16
      Risks .................................................................................................................................................... 16
      Risk Analysis ........................................................................................................................................ 16
      Evaluation of risks ............................................................................................................................... 16
      Risk treatment..................................................................................................................................... 16
      Impact ................................................................................................................................................. 16
   Controls ................................................................................................................................................... 16
   Information Resource valuation ............................................................................................................. 16
      Information Asset Classification ......................................................................................................... 17
      Impact assessment and analysis ......................................................................................................... 17
   Integration with Life Cycle Processes ..................................................................................................... 17
   Risk monitoring and communication ...................................................................................................... 17
Information Security Program Development.............................................................................................. 17
   Overview ................................................................................................................................................. 17
      Outcomes ............................................................................................................................................ 17
   Information Security Manager Responsibilities...................................................................................... 17
   Scope and Charter development ............................................................................................................ 18
Development Objectives......................................................................................................................... 18
      Defining objectives.............................................................................................................................. 18
      Residual risks ....................................................................................................................................... 18
      The Desired State ................................................................................................................................ 18
   Defining a program development road map .......................................................................................... 19
   Program Resources ................................................................................................................................. 19
   Implementing an Information security program .................................................................................... 20
      PDCA Methodology ............................................................................................................................. 20
   Information Infrastructure and Architecture.......................................................................................... 20
      Objectives............................................................................................................................................ 20
   Development Metrics ............................................................................................................................. 21
      Levels................................................................................................................................................... 21
      Attributes ............................................................................................................................................ 21
      Goals ................................................................................................................................................... 21
Information Security Program Management .............................................................................................. 22
   Overview ................................................................................................................................................. 22
   Outcomes ................................................................................................................................................ 22
   Roles and responsibilities ....................................................................................................................... 22
      Information security manager ............................................................................................................ 22
      Board of directors ............................................................................................................................... 23
      Executive management....................................................................................................................... 23
      Steering committee ............................................................................................................................ 23
      IT.......................................................................................................................................................... 23
      Business unit managers ...................................................................................................................... 23
   Management Framework ....................................................................................................................... 23
      Technical ............................................................................................................................................. 23
      Operational ......................................................................................................................................... 23
      Management ....................................................................................................................................... 24
      Administrative ..................................................................................................................................... 24
      Educational ......................................................................................................................................... 24
      Assurance integration ......................................................................................................................... 24
   Measuring Performance ......................................................................................................................... 24
Risk and Loss ....................................................................................................................................... 24
      Support of business objectives ........................................................................................................... 24
      Compliance ......................................................................................................................................... 24
      Operational productivity ..................................................................................................................... 24
      Cost effectiveness ............................................................................................................................... 25
      Organizational awareness ................................................................................................................... 25
      Technical security architecture ........................................................................................................... 25
      Effectiveness of management framework and resources .................................................................. 25
      Operational performance ................................................................................................................... 25
   Management challenges ......................................................................................................................... 25
   Determine the State of Information Security ......................................................................................... 25
   Information Security Management Resources ....................................................................................... 26
   Implementing Management ................................................................................................................... 26
      Outsourcing......................................................................................................................................... 27
Incident Management and Response ......................................................................................................... 27
   Overview ................................................................................................................................................. 27
   Incident management and response ...................................................................................................... 28
   Incident handling process ....................................................................................................................... 28
      Detection and reporting...................................................................................................................... 28
      Triage .................................................................................................................................................. 28
      Analysis ............................................................................................................................................... 28
      Incident response................................................................................................................................ 28
   Information security manager responsibilities ....................................................................................... 28
   Metrics and Indicators ............................................................................................................................ 28
      Strategic alignment ............................................................................................................................. 28
      Risk management................................................................................................................................ 29
      Assurance process integration ............................................................................................................ 29
      Value delivery...................................................................................................................................... 29
      Resource management ....................................................................................................................... 29
      Performance Measurement ................................................................................................................ 29
   Plan of action .......................................................................................................................................... 29
   Challenges ............................................................................................................................................... 29
Resources ................................................................................................................................................ 30
BIA ........................................................................................................................................................... 30
   Goals ................................................................................................................................................... 30
   Activities .............................................................................................................................................. 30
Current state of incident response capability......................................................................................... 31
Developing an incident response plan .................................................................................................... 31
   Elements ............................................................................................................................................. 31
   Gap analysis ........................................................................................................................................ 31
Response and recovery plans ................................................................................................................. 31
   Threat mitigation ................................................................................................................................ 31
   Recovery sites ..................................................................................................................................... 31
   Basis for recovery ................................................................................................................................ 31
   Incident management teams .............................................................................................................. 32
   Continuity of network services ........................................................................................................... 32
   Insurance ............................................................................................................................................. 32
Testing ..................................................................................................................................................... 32
   Types of tests ...................................................................................................................................... 32
   Test Results ......................................................................................................................................... 33
Executing Response and Recovery Plans ................................................................................................ 33
   Ensuring Execution as required........................................................................................................... 33
Forensic Evidence ................................................................................................................................... 33
Information Security Governance


Overview
Significant benefits:
    Policy compliance
    Lowering risks
    Optimize resources
    Assurance on critical decisions
    Efficient and effective risk management
    Trust and reputation

Outcomes:
   1. Strategic Alignment
          a. Security requirements driven by organizational objectives
          b. Security solutions fit for organizational processes
          c. Investments aligned with the organizational strategy
   2. Risk Management
          a. Collective understanding
          b. Risks mitigation
   3. Value delivery
          a. Standard set of security practices
          b. Prioritizing security objectives based on risk analysis
   4. Resource management
          a. Knowledge is captured and available
          b. Efficient security architecture
   5. Performance measurement
          a. Metrics
          b. External assessments and audits
   6. Integration
          a. Relationships with assurance functions
          b. Roles and responsibilities between assurance functions should not overlap

Effective Governance
Business goals and objectives
    Security strategy linked with business objectives
    Policies address each aspect of strategy, controls, and regulation
    Standards for each policy
    Sufficient authority
    Metrics and monitoring
Roles and Responsibilities
Board of directors/senior management

       Validating and ratifying the key assets they want protected and the protection levels
       Penalties for non compliance must be communicated and enforced

Executive management

       Implement effective security governance
       Align information security activities in support of business objectives

Steering Committee

       Consensus on priorities and tradeoffs
       Ensuring the alignment of the security program with business objectives

CISO

       CISO, CSO, C-Level responsibility, authority, and required resources to improve the security
        posture

Governance, Risk and Compliance
Governance: senior executive management responsibility

Risk management: Risk tolerance, risk identification and impact, risk mitigation

Compliance: Records and monitors the policies, procedures, and controls needed to ensure that plicies
and standards are adhered to.

Business Model for Information Security
   1. Elements
          a. Organization design and strategy
          b. People
                   i. Recruitment strategies
                  ii. Employment issues
                 iii. Termination
          c. Process
          d. Technology
   2. Dynamic Interconnections
          a. Governance: Sets limits within which an enterprise operates and is implemented within
             processes to monitor performance
          b. Culture
          c. Enablement and support: Connects the technology element and the process element
          d. Emergence: Introduce feedback loops, alignment with process improvement,
          e. Human factors
f.   Architecture

Information security manager
Obtaining senior management commitment
    Aligning security objectives with business objectives
    Identifying potential consequences
    Budget
    ROI
    Monitoring and auditing

Governance metrics
Effective security metrics
     Strong upper level management support
     Security policies and procedures
     Quantifiable performance metrics
     Periodic analysis of metrics data

Strategic alignment
From a business perspective, adequate and sufficient practices proportionate to the requirements are
likely to be more cost effective than best practices.

Risk management
Reduce adverse impacts on the organization to an acceptable level

Value delivery
    Cost of security being proportional to the value of assets
    Well designed controls

Resource management
    Infrequent problem rediscovery
    Effective knowledge capture and dissemination

Performance measurement
    Time it takes to detect and report incidents
    Benchmarking comparable organizations
    Methods of tracking evolving risks

Assurance integration
    No gaps in information asset protection
    No security overlaps
    Well defined roles and responsibilities
Common pitfalls in developing a security strategy
      Overconfidence
      Optimism
      Anchoring
      Status quo bias
      Mental accounting
      Herding instinct
      False consensus

Strategic Objectives
The goal
   1. Information is located and identified
   2. Asset valuation
   3. Level of sensitivity

Business case development
    Process
          o Introduce project considering value, risk, and relative priority
          o Value to the organization
          o Allow management to determine the value to the business relative to other alternatives
          o Enable management to objectively measure the benefits
    Business case format
          o Reference
          o Context
          o Value proposition: Important
          o Focus
          o Deliverables: important
          o Dependencies : critical success factors (CSF)
          o Project metrics: KGI, KPI
          o Workload
          o Resources
          o Commitments (Required)
    Objectives
          o Adaptable
          o Consistent
          o Business oriented
          o Comprehensive
          o Understandable
          o Measurable
          o Transparent
          o Accountable
The desired state
Complete snapshot of all relevant conditions at a particular point in the future.

Approaches to get there:

COBIT:

        Plan and organize
        Acquire and implement
        Deliver and support
        Monitor and evaluate

CMM

        Nonexistent
        Ad hoc
        Defined process
        Managed
        Optimized

Balanced scorecard

        Learning and growth
        Business process
        Customer
        Financial

ISO 27001/27002

        Security policy
        Organizing information security
        Asset management
        Human resources security
        Physical and environmental security
        Communications and operations
        Access controls
        Infosec development and maintenance
        Infosec incident management
        BCP
        Compliance

Risk objectives
    Developing the right strategy objectives usually needs to be an iterative approach
   Process risks pose the greatest hazard and technical controls are unlikely to adequately
        compensate for poor management or faulty processes.

Information security strategy
The goal of security is business process assurance

Road map
    Consider the initial stages of developing a security architecture
    Break down complex projects into a series of shorter-term projects
    Shorter projects can serve as checkpoints and opportunities

Resources
    Policies, standards, procedures, and guidelines
    Architecture
    Controls
    Countermeasures
    Layered defenses
    Technologies
    Personnel security
    Organizational structure
    Roles and responsibilities
    Skills
    Training
    Awareness and education
    Audits
    Compliance enforcement
    Threat analysis
    Risk assessment
    BIA
    Resource dependency analysis
    Outsourced security providers
    Environmental security

Constraints
    Legal
    Physical
    Ethics
    Culture
    Costs
    Personnel
    Organizational structure
    Resources
   Capabilities
       Time
       Risk tolerance

Action Plan
       Gap analysis
            o Annually
            o Work backward from endpoint to the current state
            o Link business objectives with strategy
            o Appropriate authority
            o Appropriate security approvals
       Policy development
       Standards development
       Training and awareness
       Metrics
            o KGI:
                     Completing independent controls testing validation and attestation
                     Preparation of required statement of control effectiveness
            o CSF
                     Identification, categorization, and definition of controls
                     Defining appropriate test to determine effectiveness
            o KPI
                     Control effectiveness testing plans
                     Results of testing control effectiveness




Information Risk Management

Overview
The foundation for effective risk management is a comprehensive risk assessment. Although a
computational approach may be used to arrive at various risk aspects, the approach is nevertheless
qualitative and subjective to some extent.

Effectiveness is influenced by:

       Culture
       Mission and objectives
       Structure
       Products and services
       Processes
       Practices
   Regulatory conditions

Outcomes:

       Understanding of the organization’s threat, vulnerability and risk profile
       Understanding risk exposure and potential consequences
       Awareness of risk management priorities
       Organizational risk mitigation strategy
       Organizational acceptance based on potential residual risk
       Cost effectiveness

Effective information risk management
Development
    Context and purpose: Defining the organization, process, project, scope, and establishing goals
      and objectives. Risk tolerance and appetite.
    Scope and charter
    Objectives: Based of risk analysis
    Methodologies
    Implementation team

Roles and Responsibilities
    Governing boards and senior management: Ultimate responsibility for mission accomplishment.
       Ensure adequate resources. Sign off acceptable risk levels.
    CIO: IT planning, budgeting, and performance.
    Information Security Manager: responsible for security program
    System and information owners: Ensuring proper controls are in place to address CIA.
    Business managers: Responsible for business operations

Implementing Risk Management
Process:
   1. Establish scope and boundaries
   2. Risk assessment
   3. Risk treatment
   4. Acceptance of residual risk
   5. Risk communication and monitoring

Framework
Scope and framework are independent from the particular structure of the management process,
methods, and tools to be used for implementation.

External and Internal environment
    External: Political, financial, local market, law, regulation, social and cultural.
   Internal: Key business drivers, Organization’s SWOT, internal stakeholders, structure, culture,
       assets, goals and objectives

Risk management scope
    Must provide a balance between costs and benefits
    Duration
    Full scope of activities
    Roles and responsibilities
    Activities to be assessed

Risk Assessment
      Asset valuation
      Vulnerabilities
      Threat analysis
      Risk mitigation

NIST approach
   1. System characterization
   2. Threat identification
   3. Vulnerability identification
   4. Control analysis
   5. Likelihood determination
   6. Impact analysis
   7. Risk determination
   8. Control recommendations
   9. Results documentation

Aggregated and cascading risk
    Aggregated: Minor vulnerabilities combined can have a significant impact.
    Cascading: Chain reaction as a result of one failure contribute to unacceptable impact.

Other
Factor Analysis of Information Risk (FAIR): Taxonomy, a method for measuring, a computational engine,
simulation model

Probabilistic Risk Assessment (PRA): Systematic and comprehensive methodology to evaluate risk
associated with a complex engineered technological entity. (Nuclear regulatory commission)

Identification of risks
    Brainstorming
    Flow charting
    What if
Threats
Natural, unintentional, intentional physical/nonphysical

Vulnerabilities
Poor network design, lack of redundancy, poor management communications, insufficient staff, lack of
skills, defective software

Risks
Every organization has a level of risk to accept.

Risk Analysis
    Examination of risk sources
    Consequences
    Likelihood
    Assessment of existing controls: Quantitative, Qualitative, Semiquantitative

Evaluation of risks
Risk evaluation may lead to a decision to undertake further analysis.

Risk treatment
    Terminate
    Transfer
    Mitigate
    Accept

Impact
The bottom line for risk management. A direct financial loss can include:

       Reputation
       Money
       Legal liability
       Business interruption
       Breach
       Noncompliance

Controls
       Deterrent controls reduce probability of threats
       Preventative controls reduce vulnerabilities
       Corrective controls reduce impact
       Compensatory controls compensate increased risk
       Detective controls discover attacks

Information Resource valuation
Valuation must be based on the total range of potential losses and impacts
Information Asset Classification
     Determine sensitivity and criticality
     Business dependency analysis can be used to provide a basis for protective activities if there are
      resource constraints or other reasons
     Locate and identify followed by appropriate level of sensitivity and criticality

Impact assessment and analysis
System mission, system/data criticality (system’s value), system/personnel/data criticality (impact if
disclosed) is required to conduct the analysis.

Integration with Life Cycle Processes
Risk management is paramount during SDLC phases for IT system development and during project
management life cycles.

Risk monitoring and communication
       Monitoring: Key risk indicators (KRI) can be defined as measure that indicate when an
        enterprise is subject to risk that exceeds a defined risk level.
       Reporting: Reporting significant changes in risk is a primary responsibility of the information
        security manager.




Information Security Program Development


Overview
       Well developed information security strategy
       Cooperation and support from management and stakeholders

Outcomes
   1. Strategic Alignment: change management practices that ensure business requirements drive
      security initiatives
   2. Risk management: ongoing or continuous process of risk management
   3. Value delivery: effective/efficient
   4. Resource management: project planning, technology selection and skill acquisition
   5. Assurance integration
   6. Performance Measurement: progress and monitoring

Information Security Manager Responsibilities
    1. Strategy: monitors and makes recommendations
    2. Policy: writes and publishes
3.      Awareness
    4.      Implementation: Contributes secure architecture, design, and engineering strategy.
    5.      Monitoring
    6.      Compliance

Scope and Charter development
           Integrated with corporate objectives
           Clearly defined
           End users are increasingly accountable
           Information security reporting
           Active monitoring
           Incidents are promptly addressed
           Threats and vulnerabilities analyzed
           Intrusion testing
           Continuous improvement

Challenges:

           Cost overruns
           New monitoring and metrics requirements
           New policies or standards

Pitfalls:

           Resistance
           Failure of strategy
           Increase security results in less job functionality
           Ineffective project management

Development Objectives
Defining objectives
    Develop the processes and projects that close the gap between the current state and those
       objectives.
    Develop KGI

Residual risks
A business case must address the fact that regardless of the level of control, residual risk will always
remain and it must address the fact that it may aggregate into levels that are unacceptable

The Desired State
A state where defined objectives have corresponding KGIs, which in turn have corresponding control
objectives. These control objectives should be supported by a control activity which is managed and
measurable.
Defining a program development road map


Review Security Level:

      Objective
      Scope
      Constraint
      Approach
      Result

Program Resources
      Documentation: Policies, standards, procedures
      Security Architecture: Conceptual layer integrates with business requirements.
      Controls
            o Logical access: MAC, DAC
            o Secure failure: affects availability
            o Principle of least privilege
            o Compartmentalize to minimize damage
            o Segregation of duties
            o Transparency
            o Trust
            o Trust no one
      Countermeasures
      Technologies
            o ACLS
            o Choke routers
            o Content filtering
            o DBMS
            o Encryption
            o Hashing
            o PKI
            o Route filtering
            o Traffic/packet filtering
      Skill, roles and responsibilities
      Awareness
      Formal audits
      Compliance enforcement
      Project risk analysis: Possible threats include the following
            o Unclear objectives
            o Carelessness
            o Mistakes
o Deficient strategy
            o Poor planning
            o Inadequate resources
            o Incorrect specifications
            o Faulty execution
            o Sabotage
       Vulnerability analysis
       BIA
       Resource dependency analysis

Implementing an Information security program
       Objectives have been defined
       Resources are available
       Control objectives have been defined
       Security reviews and audits are available
       Management support
       Integration into life cycle processes

PDCA Methodology
   1. Plan: Design, plan, initiate. Create strategy, policies, goals, objectives
   2. Do: Execute and control including integration into organizational practices
   3. Check: semiannual audits
   4. Act: Continuous improvement

Information Infrastructure and Architecture
Objectives
    Defined
    Precise
    Tested
    Monitored
    Measured

Business View: Business risk model                  Contextual
Architect’s View: Control objectives                Conceptual
Designer’s View: Security Policies                  Logical
Builder’s View: security rules, procedures          Physical
Tradesman’s View: Security standards                Component
Facilities Manager’s View: Operational risk         Operational
management
Development Metrics
      Security is certainly comprised of technical controls, processes, and people issues, called
       security program
      Measurement is a fundamental requirement for security program success

Levels
    Strategic: security program on track, on target, and on budget
    Management/tactical: policy standards compliance, incident management effectiveness
    Operational: Technical metrics

Attributes
     Manageable
     Meaningful
     Actionable
     Unambiguous
     Reliable
     Timely
     Predictable

Goals
   1. Strategic Alignment:
          a. Portfolio of projects
          b. Committee charters include data protection
          c. Regulatory audit
   2. Risk management
          a. Design risk
          b. Project risk
          c. Program development
          d. Risk management at the steering committee
   3. Value delivery
          a. Expected value
          b. Cost of work performed
          c. Cost variance
          d. Cost of internal services
   4. Resource management
          a. Deficiencies detected and corrected
          b. Resource utilization
          c. Functions have a backup
   5. Assurance integration
          a. Assurance providers participating in development, planning, oversight
   6. Performance metrics: Metrics on metrics
Information Security Program Management


Overview
      Ongoing, largely administrative function
      Involves addressing incidents, conducting investigations, protect management, consulting,
       educating, budgeting, recruiting, business case development.

Outcomes
   1. Strategic alignment:
          a. Enumeration of risks, selection of controls, agreement on risk tolerance
          b. Consideration of security solutions taking into account enterprise processes as well as
              culture, cost, governance, and existing technology.
   2. Risk management:
          a. Develop a comprehensive understanding of threats the organization faces.
   3. Value delivery:
          a. Security solutions be institutionalized as normal and expected practices
   4. Resource management
          a. Knowledge is captured and made available to those who need it
   5. Performance measurement
          a. Good metrics design and implementation
   6. Business process assurance

Roles and responsibilities
Information security manager
     Alignment to business objectives
     Consistent strategy
     Corporate culture values security
     Interaction with business process owners
     Established metrics
     Risk management
          o Methods for assessing
          o Ability to analyze
          o Knowledge of risk analysis
          o Impact analysis
          o Methods of tracking
     Technology competencies
     Administrative
          o Project management
          o Service delivery
          o Budgeting
o      SDLC

Board of directors
    Direction, oversight, and requirements for appropriate metrics

Executive management
    Sets tone for information security

Steering committee
    Communications channel and provides ongoing basis for the alignment of the security program
       with business objectives
    Information security manager should clearly define the roles, responsibilities, and scope of the
       information security steering committee

IT
        Configuring security within the actual technical environment

Business unit managers
    Ensuring business operations meet security requirements
    Identify and escalate security incidents

Management Framework
Conceptual representation of an information security management structure

Technical
   1. Native controls
   2. Supplemental controls
   3. Management controls

Control Analysis

        Placement
        Effectiveness
        Efficiency
        Policy
        Implementation

Operational
    Ongoing management activities
         o Procedures
         o Security practices
         o Maintenance
         o IAM
         o Change control
         o Security metrics collection
o   Incident response, investigation, and resolution

Management
   Strategic
        o Policy review
        o Standards implementation
        o Threat, risk, analysis

Administrative
   Financial: TCO, ROI
   HR: job description, organizational planning, recruitment, hiring, payroll, termination

Educational
    Employee quiz scores
    Avg time since last employee training

Assurance integration
    Assurance functions provide input, requirements, and feedback

Measuring Performance
      Objectives
          o Minimize risk
          o Support business
          o Support compliance
          o Maximize productivity
          o Maximize cost effectiveness
          o Security awareness
          o Measure and manage performance

Risk and Loss
    Technical vulnerability management
    Risk management
    Loss prevention

Support of business objectives
    Completed objectives that support the business

Compliance
    Internal and external audits

Operational productivity
    Logs analyzed
    Personnel cost savings
Cost effectiveness
    Accurate cost forecasting
    Total cost of keeping up security program

Organizational awareness
    Tracking awareness success
    Employee testing

Technical security architecture
    Intrusions detected
    Blocked attacks

Effectiveness of management framework and resources
     Frequency issue occurrence
     Infosec requirements in every project plan

Operational performance
    Time between vulnerability detection and resolution
    Time to detect, escalate, isolate, and contain incidents

Management challenges
      Inadequate management support
      Inadequate funding
      Inadequate staffing

Determine the State of Information Security
      Evaluate program objectives
           o Goals alignment
           o Objectives alignment
           o Collaboration
      Evaluate compliance requirement
           o Compliance in policies
           o Recent audit results
      Evaluate program management
           o Documentation
           o Roles and responsibilities
           o Approved polices
           o Program accountability
      Evaluate security operations
           o Standard Operating Procedures (SOP)
           o Separation of duties
           o Effective operational metrics
      Evaluate technical security management
o Technical security standards
          o Technical standards uniformly implemented
     Evaluate resource levels
          o Financial: budget
          o HR: skilled people
          o Technical: capacity of supporting technologies

Information Security Management Resources
     Policies, standards, and procedures
     Controls
     Countermeasures
     Technologies
     Skills
     Awareness and education
     Audits
     Compliance enforcement
     Threat analysis: at least annually by evaluating changes in the technical and operating
      environments of the organization, particularly where external entities are granted access to
      organizational resources.
     Vulnerability analysis
     Incremental risk assessments
     Resource dependency analysis

Implementing Management
     Review Policies and Standards
     Security metrics and monitoring
          o Must be implemented to determine the ongoing effectiveness
          o Monitoring with risk assessments
          o Determine success of information security investments
     Control testing and modification: Under change control management
     Monitoring and communication: SIEM
     Documentation
     Assurance integration
          o Steering committees
          o Policies and standards
     Acceptable use policies
     Change management
     Vulnerability assessments
          o There must be a threat to exploit a vulnerability that must cause an impact.
     Due dillegence
          o Senior management support
o    Appropriate security education, training, awareness
           o    Comprehensive policies
           o    Risk assessments
           o    Backup recovery
           o    Compliance efforts
       SDLC
           o    Establishing requirements
           o    Feasibility
           o    Architecture and design
           o    Proof of concept
           o    Full development
           o    Integration testing
           o    Quality and acceptance testing
           o    Deployment
           o    Maintenance
           o    System end of life

Outsourcing
    Contracts
          o Right to audit
          o Notification procedures
          o Investigation process
          o SLA
          o Indemnity clauses to mitigate impacts caused by the service provider
          o Data protection
          o Privacy laws




Incident Management and Response


Overview
Incident management and response is part of business continuity. It may be less costly to maintain an
effective incident management capability than to try to prevent most incidents. It is critical to achieve
stakeholder consensus and senior management support.

Response activities:

    1. Detect incidents quickly
    2. Diagnose incidents accurately
3.   Manage them properly
    4.   Contain and minimize damage
    5.   Restore affected services
    6.   Determine root causes
    7.   Implement improvements to prevent reoccurrence

Incident management and response
Incident Management Planning (IRP) focuses on security breaches. Defining requirements and
expectations is primarily the responsibility of business owners. BCP, DR, and IRP must be consistent but
not necessarily integrated.

Decisions to be made:

        Detection
        Severity level: triggers response
        Assessment and triage: Effectively manage limited resources during incident
        Declaration criteria
        Scope of incident management
        Response capabilities

Incident handling process
Detection and reporting
Receive and review event information

Triage
Categorize, prioritize, and assign events and incidents

Analysis
Determine what happened

Incident response
Actions taken to resolve or mitigate and incident

Information security manager responsibilities
        Developing plan
        Handling and coordinating
        Validating, verifying, and reporting

Metrics and Indicators
Strategic alignment
     Constituency: who are the stakeholders
     Mission
     Services: manage stakeholders expectations
    Organizational structure: Provide business with the maximum availability of IMT services on the
         most cost-effective basis.
        Resources: staffing
        Funding
        Management buy-in

Risk management
Any risk that materializes becomes an incident

Assurance process integration
Involvement from other business units

Value delivery
    Integrate with business processes
    Provide assurance to stakeholders
    Integrate with BCP
    Part of overall strategy

Resource management
Optimal effectiveness

Performance Measurement
Successful handling of incidents

Plan of action
    1. Prepare/improve/sustain (Prepare)
    2. Protect infrastructure (Protect)
    3. Detect events (Detect)
    4. Triage events (Triage)
           a. Tactical: based on set criteria
           b. Strategic: based on the impact of business
    5. Respond
           a. Technical
           b. Management
           c. Legal

Challenges
        Lack of business buy in
        Mismatch to organizational goals and structure
        IMT member turnover
        Lack of communication process
        Complex and wide plan
Resources
       Policies and standards
       Technologies
       Personnel
            o Central IRT
            o Distributed IRT: geographically dispersed
            o Coordinating IRT
            o Outsourced IRT
       Roles and responsibilities
       Personal Skills
            o Communication
            o Presentation skills
            o Ability to follow policies and procedures
            o Team skills
            o Integrity
            o Self understanding
            o Coping with stress
            o Problem solving
            o Time management
       Technical skills: foundation and handling skills
       Awareness and education
       Audits
       BIA

BIA
Vulnerability analysis is often part of the BIA process. The first step in the incident response
management process is to consider the potential impact of each type of incident that may occur. A BIA
must establish the escalation of loss over time, identify the minimum resources needed for recovery,
and prioritize the recovery of processes and supporting systems.

Goals
   1. Criticality prioritization
   2. Downtime estimation
   3. Resource requirement

Activities
    Gathering assessment material
    Vulnerability assessment
    Analyzing information
    Documenting results
Current state of incident response capability
What’s already in place.

       History of incidents
       Threats: environmental, technical, man-made
       Vulnerabilities
       Risks
       Risk tolerance
       Business & incident response integration
       RPO/RTO/SDO/MTO (Maximum tolerable outage) integration

Developing an incident response plan
Elements
   1. Preparation
   2. Identification: chain of custody, ownership of an incident, determining severity
   3. Containment: activating the incident management, notifying, controlling
   4. Eradication: locating recent backups, improving defenses
   5. Recovery: restoring, validating actions taken
   6. Lessons learned

Gap analysis
Processes that need to be improved and resources needed to achieve the objectives

Response and recovery plans
Threat mitigation
    Eliminate or neutralize a threat
    Minimize the likelihood of a threat’s occurrence (The best option)
    Minimize the effects of a threat if an incident occurs

Recovery sites
    Hot sites
    Warm sites
    Cold sites
    Mobile sites
    Duplicate information processing facilities
    Mirror sites

Basis for recovery
    Interruption window: total time the organization can wait from the point of failure to the
        restoration of critical services/applications
    RTO: Recovery Time Objective
   RPO: Recovery Point Objective
      SDO: Service Delivery Objective. Level of service to be supported
      MTO: Maximum Tolerable Outage. Maximum time the organization can support processing in
       alternate mode.

Incident management teams
     Emergency action team: fire wardens
     Damage assessment team
     Emergency management team: Coordinating the activities of all other recovery teams and
       handling key decision making
     Relocation team
     Security team

Continuity of network services
    Redundancy
    Alternate routing: Using alternate medium such as fiber optics
    Diverse routing: duplicate cable facilities
    Long haul network diversity
    Last mile circuit protection
    Voice recovery

Insurance
    IT equipment and facilities
    Media reconstruction
    Extra expense
    Business interruption
    Valuable papers
    Error and omissions
    Fidelity coverage: Loss from dishonest or fraudulent acts by employees
    Media transportation

Testing
      Identifying gaps
      Verifying assumptions
      Testing time lines
      Effectiveness of strategies
      Performance of personnel
      Accuracy and currency of plan information

Types of tests
    Checklist review
    Structured walkthrough
   Simulation test: role play
       Parallel test
       Full implementation test

Other tests

       Table-top walk-through of plans
       Table-top walk-through with mock disaster scenarios
       Testing infrastructure
       Full restoration and recovery with some personnel unfamiliar with systems
       Surprise test

Test Results
    Verify completeness
    Evaluate personnel performance
    Level of training and awareness
    Evaluate coordination
    Retrieval capability

Executing Response and Recovery Plans
It is virtually guaranteed that untested plans will not work.

Ensuring Execution as required
    Facilitator or director to direct the tasks within the plans
    Independent observer to record progress and document any exceptions
    Change management is paramount
    Maintenance activities
          o Periodic review
          o Calling for revisions
          o Coordinating scheduled and unscheduled tests to evaluate adequacy
          o Participating in scheduled plan test
          o Training personnel
          o Maintaining records

Forensic Evidence
       Requirements
           o Disconnect the power to maximize the preservation of evidence on the hard disk is not
                universally accepted as the best solution, and the information security manager will
                need to establish the most appropriate approach.
           o Trained personnel must use forensic tools to create a bit by bit copy of any evidence on
                hard drives
           o Original media must remain unchanged
       Legal aspects
o   Chain of custody
o   Checklists for acquiring technicians
o   Detailed activity log
o   Signed non-disclosure/confidentiality forms for all technicians involved in recovering
    evidence

Contenu connexe

Tendances

Der Weg in den vollautomatisierten SOC Betrieb
Der Weg in den vollautomatisierten SOC BetriebDer Weg in den vollautomatisierten SOC Betrieb
Der Weg in den vollautomatisierten SOC Betrieb
Splunk
 
Centros de Operaciones de Seguridad - IV Jornada Pribatua
Centros de Operaciones de Seguridad - IV Jornada PribatuaCentros de Operaciones de Seguridad - IV Jornada Pribatua
Centros de Operaciones de Seguridad - IV Jornada Pribatua
Pribatua
 
Thuyet minhtcvn-27042-giai-thich-bang-chung-so
Thuyet minhtcvn-27042-giai-thich-bang-chung-soThuyet minhtcvn-27042-giai-thich-bang-chung-so
Thuyet minhtcvn-27042-giai-thich-bang-chung-so
Vu Thu
 

Tendances (20)

How to Plan and Manage a BCM and IT DR Project
How to Plan and Manage a BCM and IT DR ProjectHow to Plan and Manage a BCM and IT DR Project
How to Plan and Manage a BCM and IT DR Project
 
Batch script for nslookup range of ip address
Batch script for nslookup range of ip addressBatch script for nslookup range of ip address
Batch script for nslookup range of ip address
 
Đề tài: tấn công qua mạng và cách phòng chống
Đề tài: tấn công qua mạng và cách phòng chốngĐề tài: tấn công qua mạng và cách phòng chống
Đề tài: tấn công qua mạng và cách phòng chống
 
Der Weg in den vollautomatisierten SOC Betrieb
Der Weg in den vollautomatisierten SOC BetriebDer Weg in den vollautomatisierten SOC Betrieb
Der Weg in den vollautomatisierten SOC Betrieb
 
Livre Blanc Cloud Computing / Sécurité
Livre Blanc Cloud Computing / Sécurité Livre Blanc Cloud Computing / Sécurité
Livre Blanc Cloud Computing / Sécurité
 
Luận văn: Bài toán an toàn thông tin cho doanh nghiệp vừa và nhỏ
Luận văn: Bài toán an toàn thông tin cho doanh nghiệp vừa và nhỏLuận văn: Bài toán an toàn thông tin cho doanh nghiệp vừa và nhỏ
Luận văn: Bài toán an toàn thông tin cho doanh nghiệp vừa và nhỏ
 
ISO 27002-2022.pdf
ISO 27002-2022.pdfISO 27002-2022.pdf
ISO 27002-2022.pdf
 
Centros de Operaciones de Seguridad - IV Jornada Pribatua
Centros de Operaciones de Seguridad - IV Jornada PribatuaCentros de Operaciones de Seguridad - IV Jornada Pribatua
Centros de Operaciones de Seguridad - IV Jornada Pribatua
 
CyberOps Associate Modul 24 Technologies and Protocols
CyberOps Associate Modul 24 Technologies and ProtocolsCyberOps Associate Modul 24 Technologies and Protocols
CyberOps Associate Modul 24 Technologies and Protocols
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
CyberOps Associate Modul 28 Digital Forensics and Incident Analysis and Response
CyberOps Associate Modul 28 Digital Forensics and Incident Analysis and ResponseCyberOps Associate Modul 28 Digital Forensics and Incident Analysis and Response
CyberOps Associate Modul 28 Digital Forensics and Incident Analysis and Response
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 
Lý thuyết giấu tin trong file audio
Lý thuyết giấu tin trong file audioLý thuyết giấu tin trong file audio
Lý thuyết giấu tin trong file audio
 
Luận văn: Xây dựng quy trình bảo đảm thông tin cho doanh nghiệp
Luận văn: Xây dựng quy trình bảo đảm thông tin cho doanh nghiệpLuận văn: Xây dựng quy trình bảo đảm thông tin cho doanh nghiệp
Luận văn: Xây dựng quy trình bảo đảm thông tin cho doanh nghiệp
 
Bao cao do an
Bao cao do an Bao cao do an
Bao cao do an
 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
 
Thuyet minhtcvn-27042-giai-thich-bang-chung-so
Thuyet minhtcvn-27042-giai-thich-bang-chung-soThuyet minhtcvn-27042-giai-thich-bang-chung-so
Thuyet minhtcvn-27042-giai-thich-bang-chung-so
 
Szemely es vagyonor-kepzes_szobeli_vizsgakerdesek_
Szemely es vagyonor-kepzes_szobeli_vizsgakerdesek_Szemely es vagyonor-kepzes_szobeli_vizsgakerdesek_
Szemely es vagyonor-kepzes_szobeli_vizsgakerdesek_
 
La seguridad de la información en el Gobierno de Canadá
La seguridad de la información en el Gobierno de CanadáLa seguridad de la información en el Gobierno de Canadá
La seguridad de la información en el Gobierno de Canadá
 

En vedette (6)

Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
CISA Summary V1.0
CISA Summary V1.0CISA Summary V1.0
CISA Summary V1.0
 
Slides for chapter 3 Portals - Corporate Information Strategy Management
Slides for chapter 3 Portals  - Corporate Information Strategy Management Slides for chapter 3 Portals  - Corporate Information Strategy Management
Slides for chapter 3 Portals - Corporate Information Strategy Management
 
Corporate information strategy & management
Corporate information strategy & managementCorporate information strategy & management
Corporate information strategy & management
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
CISSP Summary V1.1
CISSP Summary V1.1CISSP Summary V1.1
CISSP Summary V1.1
 

Similaire à CISM Summary V1.0

AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)
Bilha Diaz
 
Mentoring for OPM Implementation-final.ashx
Mentoring for OPM Implementation-final.ashxMentoring for OPM Implementation-final.ashx
Mentoring for OPM Implementation-final.ashx
Dino Butorac
 
Fraud risk managementA guide to good practice1Th.docx
Fraud risk managementA guide to good practice1Th.docxFraud risk managementA guide to good practice1Th.docx
Fraud risk managementA guide to good practice1Th.docx
shericehewat
 
Services Article Uc Apps Research Wp
Services Article Uc Apps Research WpServices Article Uc Apps Research Wp
Services Article Uc Apps Research Wp
chgibbs7
 
2011 Spring Training Catalog
2011 Spring Training Catalog2011 Spring Training Catalog
2011 Spring Training Catalog
mrhuelsmann
 
Mekong Womens Entreprenuer Program
Mekong Womens Entreprenuer ProgramMekong Womens Entreprenuer Program
Mekong Womens Entreprenuer Program
Hetal Patel
 
Information security
Information securityInformation security
Information security
Hai Nguyen
 
Microfranchising in Kenya
Microfranchising in KenyaMicrofranchising in Kenya
Microfranchising in Kenya
00shelly
 

Similaire à CISM Summary V1.0 (20)

AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)AppSec Quick Start Guide 011215-2 (1)
AppSec Quick Start Guide 011215-2 (1)
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants Proposal
 
Privacy and Tracking in a Post-Cookie World
Privacy and Tracking in a Post-Cookie WorldPrivacy and Tracking in a Post-Cookie World
Privacy and Tracking in a Post-Cookie World
 
Mentoring for OPM Implementation-final.ashx
Mentoring for OPM Implementation-final.ashxMentoring for OPM Implementation-final.ashx
Mentoring for OPM Implementation-final.ashx
 
Fraud risk managementA guide to good practice1Th.docx
Fraud risk managementA guide to good practice1Th.docxFraud risk managementA guide to good practice1Th.docx
Fraud risk managementA guide to good practice1Th.docx
 
Services Article Uc Apps Research Wp
Services Article Uc Apps Research WpServices Article Uc Apps Research Wp
Services Article Uc Apps Research Wp
 
Buisness Plan V1
Buisness Plan V1Buisness Plan V1
Buisness Plan V1
 
Creating A Business Advantage With Offshore Resources
Creating A Business Advantage With Offshore ResourcesCreating A Business Advantage With Offshore Resources
Creating A Business Advantage With Offshore Resources
 
White Paper: Look Before You Leap Into Google Apps
White Paper: Look Before You Leap Into Google AppsWhite Paper: Look Before You Leap Into Google Apps
White Paper: Look Before You Leap Into Google Apps
 
2011 Spring Training Catalog
2011 Spring Training Catalog2011 Spring Training Catalog
2011 Spring Training Catalog
 
Linkage Training Programs: May-December 2011
Linkage Training Programs: May-December 2011Linkage Training Programs: May-December 2011
Linkage Training Programs: May-December 2011
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
Mekong Womens Entreprenuer Program
Mekong Womens Entreprenuer ProgramMekong Womens Entreprenuer Program
Mekong Womens Entreprenuer Program
 
Information security
Information securityInformation security
Information security
 
Fed lib 2011 competencies
Fed lib 2011 competenciesFed lib 2011 competencies
Fed lib 2011 competencies
 
20 Challenges on Outsourcing and Offshoring
20 Challenges on Outsourcing and Offshoring20 Challenges on Outsourcing and Offshoring
20 Challenges on Outsourcing and Offshoring
 
Microfranchising in Kenya
Microfranchising in KenyaMicrofranchising in Kenya
Microfranchising in Kenya
 
Rand rr2364
Rand rr2364Rand rr2364
Rand rr2364
 
Ict in africa education fullreport
Ict in africa education fullreportIct in africa education fullreport
Ict in africa education fullreport
 

CISM Summary V1.0

  • 1. CISM Study Guide Christian Reina, CISSP, CISA, CRISC 2010 An investment in knowledge pays the best interest. Benjamin Franklin _______________________________ This document may be used only for informational, training and noncommercial purposes.
  • 2. Table of Contents Information Security Governance ................................................................................................................. 7 Overview ................................................................................................................................................... 7 Significant benefits:............................................................................................................................... 7 Outcomes: ............................................................................................................................................. 7 Effective Governance ................................................................................................................................ 7 Business goals and objectives ............................................................................................................... 7 Roles and Responsibilities ..................................................................................................................... 8 Governance, Risk and Compliance ........................................................................................................ 8 Business Model for Information Security ............................................................................................. 8 Information security manager .................................................................................................................. 9 Obtaining senior management commitment ....................................................................................... 9 Governance metrics .................................................................................................................................. 9 Effective security metrics ...................................................................................................................... 9 Strategic alignment ............................................................................................................................... 9 Risk management.................................................................................................................................. 9 Value delivery........................................................................................................................................ 9 Resource management ......................................................................................................................... 9 Performance measurement .................................................................................................................. 9 Assurance integration ........................................................................................................................... 9 Common pitfalls in developing a security strategy ................................................................................. 10 Strategic Objectives ................................................................................................................................ 10 The goal ............................................................................................................................................... 10 Business case development ................................................................................................................ 10 The desired state................................................................................................................................. 11 Risk objectives ..................................................................................................................................... 11 Information security strategy ................................................................................................................. 12 Road map ............................................................................................................................................ 12 Resources ............................................................................................................................................ 12 Constraints .......................................................................................................................................... 12 Action Plan .............................................................................................................................................. 13 Information Risk Management ................................................................................................................... 13
  • 3. Overview ................................................................................................................................................. 13 Effective information risk management ................................................................................................. 14 Development....................................................................................................................................... 14 Roles and Responsibilities ................................................................................................................... 14 Implementing Risk Management ............................................................................................................ 14 Process: ............................................................................................................................................... 14 Framework .......................................................................................................................................... 14 External and Internal environment ..................................................................................................... 14 Risk management scope ..................................................................................................................... 15 Risk Assessment ...................................................................................................................................... 15 NIST approach ..................................................................................................................................... 15 Aggregated and cascading risk............................................................................................................ 15 Other ................................................................................................................................................... 15 Identification of risks........................................................................................................................... 15 Threats ................................................................................................................................................ 16 Vulnerabilities ..................................................................................................................................... 16 Risks .................................................................................................................................................... 16 Risk Analysis ........................................................................................................................................ 16 Evaluation of risks ............................................................................................................................... 16 Risk treatment..................................................................................................................................... 16 Impact ................................................................................................................................................. 16 Controls ................................................................................................................................................... 16 Information Resource valuation ............................................................................................................. 16 Information Asset Classification ......................................................................................................... 17 Impact assessment and analysis ......................................................................................................... 17 Integration with Life Cycle Processes ..................................................................................................... 17 Risk monitoring and communication ...................................................................................................... 17 Information Security Program Development.............................................................................................. 17 Overview ................................................................................................................................................. 17 Outcomes ............................................................................................................................................ 17 Information Security Manager Responsibilities...................................................................................... 17 Scope and Charter development ............................................................................................................ 18
  • 4. Development Objectives......................................................................................................................... 18 Defining objectives.............................................................................................................................. 18 Residual risks ....................................................................................................................................... 18 The Desired State ................................................................................................................................ 18 Defining a program development road map .......................................................................................... 19 Program Resources ................................................................................................................................. 19 Implementing an Information security program .................................................................................... 20 PDCA Methodology ............................................................................................................................. 20 Information Infrastructure and Architecture.......................................................................................... 20 Objectives............................................................................................................................................ 20 Development Metrics ............................................................................................................................. 21 Levels................................................................................................................................................... 21 Attributes ............................................................................................................................................ 21 Goals ................................................................................................................................................... 21 Information Security Program Management .............................................................................................. 22 Overview ................................................................................................................................................. 22 Outcomes ................................................................................................................................................ 22 Roles and responsibilities ....................................................................................................................... 22 Information security manager ............................................................................................................ 22 Board of directors ............................................................................................................................... 23 Executive management....................................................................................................................... 23 Steering committee ............................................................................................................................ 23 IT.......................................................................................................................................................... 23 Business unit managers ...................................................................................................................... 23 Management Framework ....................................................................................................................... 23 Technical ............................................................................................................................................. 23 Operational ......................................................................................................................................... 23 Management ....................................................................................................................................... 24 Administrative ..................................................................................................................................... 24 Educational ......................................................................................................................................... 24 Assurance integration ......................................................................................................................... 24 Measuring Performance ......................................................................................................................... 24
  • 5. Risk and Loss ....................................................................................................................................... 24 Support of business objectives ........................................................................................................... 24 Compliance ......................................................................................................................................... 24 Operational productivity ..................................................................................................................... 24 Cost effectiveness ............................................................................................................................... 25 Organizational awareness ................................................................................................................... 25 Technical security architecture ........................................................................................................... 25 Effectiveness of management framework and resources .................................................................. 25 Operational performance ................................................................................................................... 25 Management challenges ......................................................................................................................... 25 Determine the State of Information Security ......................................................................................... 25 Information Security Management Resources ....................................................................................... 26 Implementing Management ................................................................................................................... 26 Outsourcing......................................................................................................................................... 27 Incident Management and Response ......................................................................................................... 27 Overview ................................................................................................................................................. 27 Incident management and response ...................................................................................................... 28 Incident handling process ....................................................................................................................... 28 Detection and reporting...................................................................................................................... 28 Triage .................................................................................................................................................. 28 Analysis ............................................................................................................................................... 28 Incident response................................................................................................................................ 28 Information security manager responsibilities ....................................................................................... 28 Metrics and Indicators ............................................................................................................................ 28 Strategic alignment ............................................................................................................................. 28 Risk management................................................................................................................................ 29 Assurance process integration ............................................................................................................ 29 Value delivery...................................................................................................................................... 29 Resource management ....................................................................................................................... 29 Performance Measurement ................................................................................................................ 29 Plan of action .......................................................................................................................................... 29 Challenges ............................................................................................................................................... 29
  • 6. Resources ................................................................................................................................................ 30 BIA ........................................................................................................................................................... 30 Goals ................................................................................................................................................... 30 Activities .............................................................................................................................................. 30 Current state of incident response capability......................................................................................... 31 Developing an incident response plan .................................................................................................... 31 Elements ............................................................................................................................................. 31 Gap analysis ........................................................................................................................................ 31 Response and recovery plans ................................................................................................................. 31 Threat mitigation ................................................................................................................................ 31 Recovery sites ..................................................................................................................................... 31 Basis for recovery ................................................................................................................................ 31 Incident management teams .............................................................................................................. 32 Continuity of network services ........................................................................................................... 32 Insurance ............................................................................................................................................. 32 Testing ..................................................................................................................................................... 32 Types of tests ...................................................................................................................................... 32 Test Results ......................................................................................................................................... 33 Executing Response and Recovery Plans ................................................................................................ 33 Ensuring Execution as required........................................................................................................... 33 Forensic Evidence ................................................................................................................................... 33
  • 7. Information Security Governance Overview Significant benefits:  Policy compliance  Lowering risks  Optimize resources  Assurance on critical decisions  Efficient and effective risk management  Trust and reputation Outcomes: 1. Strategic Alignment a. Security requirements driven by organizational objectives b. Security solutions fit for organizational processes c. Investments aligned with the organizational strategy 2. Risk Management a. Collective understanding b. Risks mitigation 3. Value delivery a. Standard set of security practices b. Prioritizing security objectives based on risk analysis 4. Resource management a. Knowledge is captured and available b. Efficient security architecture 5. Performance measurement a. Metrics b. External assessments and audits 6. Integration a. Relationships with assurance functions b. Roles and responsibilities between assurance functions should not overlap Effective Governance Business goals and objectives  Security strategy linked with business objectives  Policies address each aspect of strategy, controls, and regulation  Standards for each policy  Sufficient authority  Metrics and monitoring
  • 8. Roles and Responsibilities Board of directors/senior management  Validating and ratifying the key assets they want protected and the protection levels  Penalties for non compliance must be communicated and enforced Executive management  Implement effective security governance  Align information security activities in support of business objectives Steering Committee  Consensus on priorities and tradeoffs  Ensuring the alignment of the security program with business objectives CISO  CISO, CSO, C-Level responsibility, authority, and required resources to improve the security posture Governance, Risk and Compliance Governance: senior executive management responsibility Risk management: Risk tolerance, risk identification and impact, risk mitigation Compliance: Records and monitors the policies, procedures, and controls needed to ensure that plicies and standards are adhered to. Business Model for Information Security 1. Elements a. Organization design and strategy b. People i. Recruitment strategies ii. Employment issues iii. Termination c. Process d. Technology 2. Dynamic Interconnections a. Governance: Sets limits within which an enterprise operates and is implemented within processes to monitor performance b. Culture c. Enablement and support: Connects the technology element and the process element d. Emergence: Introduce feedback loops, alignment with process improvement, e. Human factors
  • 9. f. Architecture Information security manager Obtaining senior management commitment  Aligning security objectives with business objectives  Identifying potential consequences  Budget  ROI  Monitoring and auditing Governance metrics Effective security metrics  Strong upper level management support  Security policies and procedures  Quantifiable performance metrics  Periodic analysis of metrics data Strategic alignment From a business perspective, adequate and sufficient practices proportionate to the requirements are likely to be more cost effective than best practices. Risk management Reduce adverse impacts on the organization to an acceptable level Value delivery  Cost of security being proportional to the value of assets  Well designed controls Resource management  Infrequent problem rediscovery  Effective knowledge capture and dissemination Performance measurement  Time it takes to detect and report incidents  Benchmarking comparable organizations  Methods of tracking evolving risks Assurance integration  No gaps in information asset protection  No security overlaps  Well defined roles and responsibilities
  • 10. Common pitfalls in developing a security strategy  Overconfidence  Optimism  Anchoring  Status quo bias  Mental accounting  Herding instinct  False consensus Strategic Objectives The goal 1. Information is located and identified 2. Asset valuation 3. Level of sensitivity Business case development  Process o Introduce project considering value, risk, and relative priority o Value to the organization o Allow management to determine the value to the business relative to other alternatives o Enable management to objectively measure the benefits  Business case format o Reference o Context o Value proposition: Important o Focus o Deliverables: important o Dependencies : critical success factors (CSF) o Project metrics: KGI, KPI o Workload o Resources o Commitments (Required)  Objectives o Adaptable o Consistent o Business oriented o Comprehensive o Understandable o Measurable o Transparent o Accountable
  • 11. The desired state Complete snapshot of all relevant conditions at a particular point in the future. Approaches to get there: COBIT:  Plan and organize  Acquire and implement  Deliver and support  Monitor and evaluate CMM  Nonexistent  Ad hoc  Defined process  Managed  Optimized Balanced scorecard  Learning and growth  Business process  Customer  Financial ISO 27001/27002  Security policy  Organizing information security  Asset management  Human resources security  Physical and environmental security  Communications and operations  Access controls  Infosec development and maintenance  Infosec incident management  BCP  Compliance Risk objectives  Developing the right strategy objectives usually needs to be an iterative approach
  • 12. Process risks pose the greatest hazard and technical controls are unlikely to adequately compensate for poor management or faulty processes. Information security strategy The goal of security is business process assurance Road map  Consider the initial stages of developing a security architecture  Break down complex projects into a series of shorter-term projects  Shorter projects can serve as checkpoints and opportunities Resources  Policies, standards, procedures, and guidelines  Architecture  Controls  Countermeasures  Layered defenses  Technologies  Personnel security  Organizational structure  Roles and responsibilities  Skills  Training  Awareness and education  Audits  Compliance enforcement  Threat analysis  Risk assessment  BIA  Resource dependency analysis  Outsourced security providers  Environmental security Constraints  Legal  Physical  Ethics  Culture  Costs  Personnel  Organizational structure  Resources
  • 13. Capabilities  Time  Risk tolerance Action Plan  Gap analysis o Annually o Work backward from endpoint to the current state o Link business objectives with strategy o Appropriate authority o Appropriate security approvals  Policy development  Standards development  Training and awareness  Metrics o KGI:  Completing independent controls testing validation and attestation  Preparation of required statement of control effectiveness o CSF  Identification, categorization, and definition of controls  Defining appropriate test to determine effectiveness o KPI  Control effectiveness testing plans  Results of testing control effectiveness Information Risk Management Overview The foundation for effective risk management is a comprehensive risk assessment. Although a computational approach may be used to arrive at various risk aspects, the approach is nevertheless qualitative and subjective to some extent. Effectiveness is influenced by:  Culture  Mission and objectives  Structure  Products and services  Processes  Practices
  • 14. Regulatory conditions Outcomes:  Understanding of the organization’s threat, vulnerability and risk profile  Understanding risk exposure and potential consequences  Awareness of risk management priorities  Organizational risk mitigation strategy  Organizational acceptance based on potential residual risk  Cost effectiveness Effective information risk management Development  Context and purpose: Defining the organization, process, project, scope, and establishing goals and objectives. Risk tolerance and appetite.  Scope and charter  Objectives: Based of risk analysis  Methodologies  Implementation team Roles and Responsibilities  Governing boards and senior management: Ultimate responsibility for mission accomplishment. Ensure adequate resources. Sign off acceptable risk levels.  CIO: IT planning, budgeting, and performance.  Information Security Manager: responsible for security program  System and information owners: Ensuring proper controls are in place to address CIA.  Business managers: Responsible for business operations Implementing Risk Management Process: 1. Establish scope and boundaries 2. Risk assessment 3. Risk treatment 4. Acceptance of residual risk 5. Risk communication and monitoring Framework Scope and framework are independent from the particular structure of the management process, methods, and tools to be used for implementation. External and Internal environment  External: Political, financial, local market, law, regulation, social and cultural.
  • 15. Internal: Key business drivers, Organization’s SWOT, internal stakeholders, structure, culture, assets, goals and objectives Risk management scope  Must provide a balance between costs and benefits  Duration  Full scope of activities  Roles and responsibilities  Activities to be assessed Risk Assessment  Asset valuation  Vulnerabilities  Threat analysis  Risk mitigation NIST approach 1. System characterization 2. Threat identification 3. Vulnerability identification 4. Control analysis 5. Likelihood determination 6. Impact analysis 7. Risk determination 8. Control recommendations 9. Results documentation Aggregated and cascading risk  Aggregated: Minor vulnerabilities combined can have a significant impact.  Cascading: Chain reaction as a result of one failure contribute to unacceptable impact. Other Factor Analysis of Information Risk (FAIR): Taxonomy, a method for measuring, a computational engine, simulation model Probabilistic Risk Assessment (PRA): Systematic and comprehensive methodology to evaluate risk associated with a complex engineered technological entity. (Nuclear regulatory commission) Identification of risks  Brainstorming  Flow charting  What if
  • 16. Threats Natural, unintentional, intentional physical/nonphysical Vulnerabilities Poor network design, lack of redundancy, poor management communications, insufficient staff, lack of skills, defective software Risks Every organization has a level of risk to accept. Risk Analysis  Examination of risk sources  Consequences  Likelihood  Assessment of existing controls: Quantitative, Qualitative, Semiquantitative Evaluation of risks Risk evaluation may lead to a decision to undertake further analysis. Risk treatment  Terminate  Transfer  Mitigate  Accept Impact The bottom line for risk management. A direct financial loss can include:  Reputation  Money  Legal liability  Business interruption  Breach  Noncompliance Controls  Deterrent controls reduce probability of threats  Preventative controls reduce vulnerabilities  Corrective controls reduce impact  Compensatory controls compensate increased risk  Detective controls discover attacks Information Resource valuation Valuation must be based on the total range of potential losses and impacts
  • 17. Information Asset Classification  Determine sensitivity and criticality  Business dependency analysis can be used to provide a basis for protective activities if there are resource constraints or other reasons  Locate and identify followed by appropriate level of sensitivity and criticality Impact assessment and analysis System mission, system/data criticality (system’s value), system/personnel/data criticality (impact if disclosed) is required to conduct the analysis. Integration with Life Cycle Processes Risk management is paramount during SDLC phases for IT system development and during project management life cycles. Risk monitoring and communication  Monitoring: Key risk indicators (KRI) can be defined as measure that indicate when an enterprise is subject to risk that exceeds a defined risk level.  Reporting: Reporting significant changes in risk is a primary responsibility of the information security manager. Information Security Program Development Overview  Well developed information security strategy  Cooperation and support from management and stakeholders Outcomes 1. Strategic Alignment: change management practices that ensure business requirements drive security initiatives 2. Risk management: ongoing or continuous process of risk management 3. Value delivery: effective/efficient 4. Resource management: project planning, technology selection and skill acquisition 5. Assurance integration 6. Performance Measurement: progress and monitoring Information Security Manager Responsibilities 1. Strategy: monitors and makes recommendations 2. Policy: writes and publishes
  • 18. 3. Awareness 4. Implementation: Contributes secure architecture, design, and engineering strategy. 5. Monitoring 6. Compliance Scope and Charter development  Integrated with corporate objectives  Clearly defined  End users are increasingly accountable  Information security reporting  Active monitoring  Incidents are promptly addressed  Threats and vulnerabilities analyzed  Intrusion testing  Continuous improvement Challenges:  Cost overruns  New monitoring and metrics requirements  New policies or standards Pitfalls:  Resistance  Failure of strategy  Increase security results in less job functionality  Ineffective project management Development Objectives Defining objectives  Develop the processes and projects that close the gap between the current state and those objectives.  Develop KGI Residual risks A business case must address the fact that regardless of the level of control, residual risk will always remain and it must address the fact that it may aggregate into levels that are unacceptable The Desired State A state where defined objectives have corresponding KGIs, which in turn have corresponding control objectives. These control objectives should be supported by a control activity which is managed and measurable.
  • 19. Defining a program development road map Review Security Level:  Objective  Scope  Constraint  Approach  Result Program Resources  Documentation: Policies, standards, procedures  Security Architecture: Conceptual layer integrates with business requirements.  Controls o Logical access: MAC, DAC o Secure failure: affects availability o Principle of least privilege o Compartmentalize to minimize damage o Segregation of duties o Transparency o Trust o Trust no one  Countermeasures  Technologies o ACLS o Choke routers o Content filtering o DBMS o Encryption o Hashing o PKI o Route filtering o Traffic/packet filtering  Skill, roles and responsibilities  Awareness  Formal audits  Compliance enforcement  Project risk analysis: Possible threats include the following o Unclear objectives o Carelessness o Mistakes
  • 20. o Deficient strategy o Poor planning o Inadequate resources o Incorrect specifications o Faulty execution o Sabotage  Vulnerability analysis  BIA  Resource dependency analysis Implementing an Information security program  Objectives have been defined  Resources are available  Control objectives have been defined  Security reviews and audits are available  Management support  Integration into life cycle processes PDCA Methodology 1. Plan: Design, plan, initiate. Create strategy, policies, goals, objectives 2. Do: Execute and control including integration into organizational practices 3. Check: semiannual audits 4. Act: Continuous improvement Information Infrastructure and Architecture Objectives  Defined  Precise  Tested  Monitored  Measured Business View: Business risk model Contextual Architect’s View: Control objectives Conceptual Designer’s View: Security Policies Logical Builder’s View: security rules, procedures Physical Tradesman’s View: Security standards Component Facilities Manager’s View: Operational risk Operational management
  • 21. Development Metrics  Security is certainly comprised of technical controls, processes, and people issues, called security program  Measurement is a fundamental requirement for security program success Levels  Strategic: security program on track, on target, and on budget  Management/tactical: policy standards compliance, incident management effectiveness  Operational: Technical metrics Attributes  Manageable  Meaningful  Actionable  Unambiguous  Reliable  Timely  Predictable Goals 1. Strategic Alignment: a. Portfolio of projects b. Committee charters include data protection c. Regulatory audit 2. Risk management a. Design risk b. Project risk c. Program development d. Risk management at the steering committee 3. Value delivery a. Expected value b. Cost of work performed c. Cost variance d. Cost of internal services 4. Resource management a. Deficiencies detected and corrected b. Resource utilization c. Functions have a backup 5. Assurance integration a. Assurance providers participating in development, planning, oversight 6. Performance metrics: Metrics on metrics
  • 22. Information Security Program Management Overview  Ongoing, largely administrative function  Involves addressing incidents, conducting investigations, protect management, consulting, educating, budgeting, recruiting, business case development. Outcomes 1. Strategic alignment: a. Enumeration of risks, selection of controls, agreement on risk tolerance b. Consideration of security solutions taking into account enterprise processes as well as culture, cost, governance, and existing technology. 2. Risk management: a. Develop a comprehensive understanding of threats the organization faces. 3. Value delivery: a. Security solutions be institutionalized as normal and expected practices 4. Resource management a. Knowledge is captured and made available to those who need it 5. Performance measurement a. Good metrics design and implementation 6. Business process assurance Roles and responsibilities Information security manager  Alignment to business objectives  Consistent strategy  Corporate culture values security  Interaction with business process owners  Established metrics  Risk management o Methods for assessing o Ability to analyze o Knowledge of risk analysis o Impact analysis o Methods of tracking  Technology competencies  Administrative o Project management o Service delivery o Budgeting
  • 23. o SDLC Board of directors  Direction, oversight, and requirements for appropriate metrics Executive management  Sets tone for information security Steering committee  Communications channel and provides ongoing basis for the alignment of the security program with business objectives  Information security manager should clearly define the roles, responsibilities, and scope of the information security steering committee IT  Configuring security within the actual technical environment Business unit managers  Ensuring business operations meet security requirements  Identify and escalate security incidents Management Framework Conceptual representation of an information security management structure Technical 1. Native controls 2. Supplemental controls 3. Management controls Control Analysis  Placement  Effectiveness  Efficiency  Policy  Implementation Operational  Ongoing management activities o Procedures o Security practices o Maintenance o IAM o Change control o Security metrics collection
  • 24. o Incident response, investigation, and resolution Management  Strategic o Policy review o Standards implementation o Threat, risk, analysis Administrative  Financial: TCO, ROI  HR: job description, organizational planning, recruitment, hiring, payroll, termination Educational  Employee quiz scores  Avg time since last employee training Assurance integration  Assurance functions provide input, requirements, and feedback Measuring Performance  Objectives o Minimize risk o Support business o Support compliance o Maximize productivity o Maximize cost effectiveness o Security awareness o Measure and manage performance Risk and Loss  Technical vulnerability management  Risk management  Loss prevention Support of business objectives  Completed objectives that support the business Compliance  Internal and external audits Operational productivity  Logs analyzed  Personnel cost savings
  • 25. Cost effectiveness  Accurate cost forecasting  Total cost of keeping up security program Organizational awareness  Tracking awareness success  Employee testing Technical security architecture  Intrusions detected  Blocked attacks Effectiveness of management framework and resources  Frequency issue occurrence  Infosec requirements in every project plan Operational performance  Time between vulnerability detection and resolution  Time to detect, escalate, isolate, and contain incidents Management challenges  Inadequate management support  Inadequate funding  Inadequate staffing Determine the State of Information Security  Evaluate program objectives o Goals alignment o Objectives alignment o Collaboration  Evaluate compliance requirement o Compliance in policies o Recent audit results  Evaluate program management o Documentation o Roles and responsibilities o Approved polices o Program accountability  Evaluate security operations o Standard Operating Procedures (SOP) o Separation of duties o Effective operational metrics  Evaluate technical security management
  • 26. o Technical security standards o Technical standards uniformly implemented  Evaluate resource levels o Financial: budget o HR: skilled people o Technical: capacity of supporting technologies Information Security Management Resources  Policies, standards, and procedures  Controls  Countermeasures  Technologies  Skills  Awareness and education  Audits  Compliance enforcement  Threat analysis: at least annually by evaluating changes in the technical and operating environments of the organization, particularly where external entities are granted access to organizational resources.  Vulnerability analysis  Incremental risk assessments  Resource dependency analysis Implementing Management  Review Policies and Standards  Security metrics and monitoring o Must be implemented to determine the ongoing effectiveness o Monitoring with risk assessments o Determine success of information security investments  Control testing and modification: Under change control management  Monitoring and communication: SIEM  Documentation  Assurance integration o Steering committees o Policies and standards  Acceptable use policies  Change management  Vulnerability assessments o There must be a threat to exploit a vulnerability that must cause an impact.  Due dillegence o Senior management support
  • 27. o Appropriate security education, training, awareness o Comprehensive policies o Risk assessments o Backup recovery o Compliance efforts  SDLC o Establishing requirements o Feasibility o Architecture and design o Proof of concept o Full development o Integration testing o Quality and acceptance testing o Deployment o Maintenance o System end of life Outsourcing  Contracts o Right to audit o Notification procedures o Investigation process o SLA o Indemnity clauses to mitigate impacts caused by the service provider o Data protection o Privacy laws Incident Management and Response Overview Incident management and response is part of business continuity. It may be less costly to maintain an effective incident management capability than to try to prevent most incidents. It is critical to achieve stakeholder consensus and senior management support. Response activities: 1. Detect incidents quickly 2. Diagnose incidents accurately
  • 28. 3. Manage them properly 4. Contain and minimize damage 5. Restore affected services 6. Determine root causes 7. Implement improvements to prevent reoccurrence Incident management and response Incident Management Planning (IRP) focuses on security breaches. Defining requirements and expectations is primarily the responsibility of business owners. BCP, DR, and IRP must be consistent but not necessarily integrated. Decisions to be made:  Detection  Severity level: triggers response  Assessment and triage: Effectively manage limited resources during incident  Declaration criteria  Scope of incident management  Response capabilities Incident handling process Detection and reporting Receive and review event information Triage Categorize, prioritize, and assign events and incidents Analysis Determine what happened Incident response Actions taken to resolve or mitigate and incident Information security manager responsibilities  Developing plan  Handling and coordinating  Validating, verifying, and reporting Metrics and Indicators Strategic alignment  Constituency: who are the stakeholders  Mission  Services: manage stakeholders expectations
  • 29. Organizational structure: Provide business with the maximum availability of IMT services on the most cost-effective basis.  Resources: staffing  Funding  Management buy-in Risk management Any risk that materializes becomes an incident Assurance process integration Involvement from other business units Value delivery  Integrate with business processes  Provide assurance to stakeholders  Integrate with BCP  Part of overall strategy Resource management Optimal effectiveness Performance Measurement Successful handling of incidents Plan of action 1. Prepare/improve/sustain (Prepare) 2. Protect infrastructure (Protect) 3. Detect events (Detect) 4. Triage events (Triage) a. Tactical: based on set criteria b. Strategic: based on the impact of business 5. Respond a. Technical b. Management c. Legal Challenges  Lack of business buy in  Mismatch to organizational goals and structure  IMT member turnover  Lack of communication process  Complex and wide plan
  • 30. Resources  Policies and standards  Technologies  Personnel o Central IRT o Distributed IRT: geographically dispersed o Coordinating IRT o Outsourced IRT  Roles and responsibilities  Personal Skills o Communication o Presentation skills o Ability to follow policies and procedures o Team skills o Integrity o Self understanding o Coping with stress o Problem solving o Time management  Technical skills: foundation and handling skills  Awareness and education  Audits  BIA BIA Vulnerability analysis is often part of the BIA process. The first step in the incident response management process is to consider the potential impact of each type of incident that may occur. A BIA must establish the escalation of loss over time, identify the minimum resources needed for recovery, and prioritize the recovery of processes and supporting systems. Goals 1. Criticality prioritization 2. Downtime estimation 3. Resource requirement Activities  Gathering assessment material  Vulnerability assessment  Analyzing information  Documenting results
  • 31. Current state of incident response capability What’s already in place.  History of incidents  Threats: environmental, technical, man-made  Vulnerabilities  Risks  Risk tolerance  Business & incident response integration  RPO/RTO/SDO/MTO (Maximum tolerable outage) integration Developing an incident response plan Elements 1. Preparation 2. Identification: chain of custody, ownership of an incident, determining severity 3. Containment: activating the incident management, notifying, controlling 4. Eradication: locating recent backups, improving defenses 5. Recovery: restoring, validating actions taken 6. Lessons learned Gap analysis Processes that need to be improved and resources needed to achieve the objectives Response and recovery plans Threat mitigation  Eliminate or neutralize a threat  Minimize the likelihood of a threat’s occurrence (The best option)  Minimize the effects of a threat if an incident occurs Recovery sites  Hot sites  Warm sites  Cold sites  Mobile sites  Duplicate information processing facilities  Mirror sites Basis for recovery  Interruption window: total time the organization can wait from the point of failure to the restoration of critical services/applications  RTO: Recovery Time Objective
  • 32. RPO: Recovery Point Objective  SDO: Service Delivery Objective. Level of service to be supported  MTO: Maximum Tolerable Outage. Maximum time the organization can support processing in alternate mode. Incident management teams  Emergency action team: fire wardens  Damage assessment team  Emergency management team: Coordinating the activities of all other recovery teams and handling key decision making  Relocation team  Security team Continuity of network services  Redundancy  Alternate routing: Using alternate medium such as fiber optics  Diverse routing: duplicate cable facilities  Long haul network diversity  Last mile circuit protection  Voice recovery Insurance  IT equipment and facilities  Media reconstruction  Extra expense  Business interruption  Valuable papers  Error and omissions  Fidelity coverage: Loss from dishonest or fraudulent acts by employees  Media transportation Testing  Identifying gaps  Verifying assumptions  Testing time lines  Effectiveness of strategies  Performance of personnel  Accuracy and currency of plan information Types of tests  Checklist review  Structured walkthrough
  • 33. Simulation test: role play  Parallel test  Full implementation test Other tests  Table-top walk-through of plans  Table-top walk-through with mock disaster scenarios  Testing infrastructure  Full restoration and recovery with some personnel unfamiliar with systems  Surprise test Test Results  Verify completeness  Evaluate personnel performance  Level of training and awareness  Evaluate coordination  Retrieval capability Executing Response and Recovery Plans It is virtually guaranteed that untested plans will not work. Ensuring Execution as required  Facilitator or director to direct the tasks within the plans  Independent observer to record progress and document any exceptions  Change management is paramount  Maintenance activities o Periodic review o Calling for revisions o Coordinating scheduled and unscheduled tests to evaluate adequacy o Participating in scheduled plan test o Training personnel o Maintaining records Forensic Evidence  Requirements o Disconnect the power to maximize the preservation of evidence on the hard disk is not universally accepted as the best solution, and the information security manager will need to establish the most appropriate approach. o Trained personnel must use forensic tools to create a bit by bit copy of any evidence on hard drives o Original media must remain unchanged  Legal aspects
  • 34. o Chain of custody o Checklists for acquiring technicians o Detailed activity log o Signed non-disclosure/confidentiality forms for all technicians involved in recovering evidence