SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Cyber Security Governance and Digital Risk
Management for OFFICIAL Environments
TONY RICHARDS
SECURITY FRAMEWORK FOR
DIGITAL RISK MANAGEMENT
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
This work is licensed under the Creative Commons,
Attribution-Non Commercial-Share Alike 4.0 International License.
To view a copy of this license, visit
http://creativecommons.org/licenses/by-nc-sa/4.0/.
CREATIVE COMMONS
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Securestorm in partnership with the Youth Justice Board (YJB), have
developed a robust security governance framework and information
risk management approach for OFFICIAL digital services and systems.
This provides a practical and proportional process with re-usable
common security profiles and architectural patterns to:
• increase efficiency
• reduce overheads
• effectively manage Information Risk
This move comes after the Cabinet Office announcement of the
retirement of mandatory accreditation from the Security Policy
Framework (SPF) and CESG’s move to supporting a business led
Information Risk Management.
INTRODUCTION
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Securestorm’s Security Framework for Digital Risk Management1
approach2 enables organisations to utilise the latest security thought
leadership from across UK government and industry, in a synchronised
and logical flow that can be deployed rapidly and with agility.
Note: 1This is available from Securestorm under a Creative Commons
Attribution-NonCommercial-ShareAlike 4.0 International License.
2The following is not a stand alone process or methodology, but a framework
for organisations, incorporating a range of security and risk management
principles from CESG and the Cabinet Office.
INTRODUCTION
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
SECURITY GOVERNANCE FRAMEWORK
Secure by
Design
•Security Design
Principles
•User Security
Needs
•Agile Security
Stories
•Cloud and
micro-service
Architectural
Patterns
•Secured base
images
•Protecting Bulk
Personal Data
Principles
•Security
Operations
Info Risk
Management
•Information Risk
Management
Principles
•Digital
Information Risk
Management
•IT and Digital
Security Policy
•GSCS Core
Security
Controls
•Relevant
Security Profiles
Risk Managed
Life-cycle
•Risk Status and
Management
Dashboard
•Audit Program
•Risk
Management
Checkpoints&
road-maps
•Assure Third
Parties
•SIRO/AO Risk
Report
•Digital Risk
Management
Record Schema
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
SECURE BY DESIGN
Integrate CESG’s Security Design Principles for Digital Services
in all new service designs
https://www.cesg.gov.uk/guidance/security-design-principles-digital-services-0
User Security Needs – Predefined library of Security
Outcomes, security controls for OFFICIAL, security stories, any
legal and regulatory requirements specific to organisation and
any other relevant security controls as required by the business
https://www.gov.uk/government/publications/government-security-
classifications
Develop and share reusable Architectural Patterns where
relevant for services or system components
COMMON SOLUTIONS FOR COMMON PROBLEMS
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
INFORMATION RISK MANAGEMENT
Understand CESG’s guidance on managing Information Risk
https://www.cesg.gov.uk/guidance/10-steps-information-risk-management-
regime
Incorporate the “Apply Common Solutions to solve Common
Problems” approach to Information Risk Management
https://www.gov.uk/guidance/managing-information-risk
Identify and apply Security Polices, Government Security
Classification Core Controls and relevant Security Profiles
COMMON SOLUTIONS FOR COMMON PROBLEMS
Use the Security Framework for Digital Risk Management
approach to pragmatically categorise data and assess the
impact of a breach
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
RISK MANAGED LIFE-CYCLE
Produce a Risk Status and Management Dashboard, for weekly,
monthly or real time reporting
Develop and maintain an Audit and Assurance program, to
ensure that Service Providers and system Suppliers security
assurances are actively audited, validated and managed
Use a SIRO/AO Risk Report to document business risk decisions
and provide supporting risk and assurance detail with a
proportional Digital Risk Management Record Schema
CONTINUOUS THROUGH-LIFE PROCESS
Plan and schedule Risk Management Checkpoints to ensure
that Risk Treatment Plans and security validations are reviewed
and assured in a forecastable and pragmatic way
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
GOVERNANCE STRUCTURE
‘Effective leadership’ is a critical component of good security and
accountability. The permanent Secretary (or equivalent) will own the
organization's approach to security and ensure that these issues receive
the attention and investment required.
The Security Policy Framework (SPF) states: ‘Government organizations
will have, an appropriate security governance structure to support the
Permanent Secretary, that is properly resourced with individuals who
have been appropriately trained; Board-level oversight of security
compliance and auditing processes; and, arrangements to determine and
satisfy themselves that Delivery Partners, service providers and third
party suppliers, apply proper security controls’
https://www.gov.uk/government/publications/security-policy-framework/hmg-security-
policy-framework
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
GOVERNANCE STRUCTURE
The security management structure of an
organisation, whatever size, needs to be
strong. By splitting operational security from
information risk, enables greater flexibility,
ensuring that incident investigations and day
to day operations don’t impact compliance
and on-going risk management activities and
vice versa.
Binding the two strands together, overseeing
the bigger picture and ensuring an important
liaison with the business, the CISO is
responsible for the entire security function
while providing leadership, knowledge and
experience.
These roles are not necessarily
full time, rather should be
continuously adjusted to be
dynamic to the organisations
needs.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
GOVERNANCE STRUCTURE
The organisational example depicts an extended governance structure
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Prior to April 2014, a security process called accreditation was
mandated by the HMG Security Policy Framework (SPF), for all
Government departments processing classified information.
The process of accreditation provided for the assessment of a system
against its security requirements, and approval was required from an
accreditor as a prerequisite for operation.
This was removed as a mandatory requirement from the April 2014
version of the SPF
https://www.gov.uk/guidance/managing-information-risk
INTRODUCING INFORMATION RISK
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
An organizational responsibility: Risk management decisions should be
objective and informed by an understanding of risk. They should not be made
in isolation but on a basis of understanding how individual decisions affect
the wider business, and what it is trying to achieve.
Tech to deliver business attracts risk: Organisations should decide for
themselves what risk management decisions need to be made to support the
delivery and operation of a system or service.
Decisions: right people, time & support: They need to be empowered by the
organisation and have the right business, technology, security knowledge and
skills to enable informed and objective decisions.
https://www.gov.uk/guidance/managing-information-risk
INTRODUCING INFORMATION RISK
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
BUSINESS CONTEXT
RISK MANAGEMENT APPROACH
Before taking any action, the organisation must understand and communicate what
risk management approach the business is going to take to provide confidence that
the technology and information used is proportionally secured.
Organisations should always be aware of the risks they are taking to achieve their
aims. To ensure meaningful outcomes, organisations need to provide a context in
which risk management and risk assessment is conducted.
KEY COMPONANTS of RISK
Risk assessments have inputs and outputs. Regardless of the risk assessment
method used, any inputs and outputs should be understandable and meaningful in
the context of the business and what it is trying to achieve.
INFORMATION RISK MANAGEMENT
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Irrespective of the approach taken to assessing risks, the outcome should be captured in
a way that can be used to inform business decision making. Consistency is achieved by
ensuring that the inputs to and outputs from assessments are meaningful in the context
of what the business is trying to achieve
To understand what risks exist, the risk assessment should be applied in the context of
what the organisation is trying to achieve. The output of any risk assessment should be
recorded for traceability purposes. Traceability is important so that risk management
decisions and investment choices can be traced to an identified risk.
MAKE INFORMED RISK MANAGEMENT DECISIONS
Throughout the lifecycle of a system or service, the organisation will need to make
objective decisions about what needs to be done to manage identified risks. These
decisions should be informed and supported by information, subject matter expertise
and evidence. After risk management action has taken place, some risks will remain.
These are often referred to as residual risks.
INFORMATION RISK MANAGEMENT
COMMUNICATE RISK CONSISTENTLY
UNDERSTAND WHAT RISKS EXIST
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Taking risks is a necessary part of doing business in order to create
opportunities and help deliver business objectives. Organisations should
always be aware of the risks they are taking to achieve their aims.
To ensure meaningful outcomes, organisations need to provide a context in
which risk management and risk assessment is conducted. This context can
be set by answering the following questions:
Goal: What is the organisation trying to achieve ?
Ethos: What does it really care about ?
Attitude: What is it’s risk appetite?
BUSINESS CONTEXT
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Apply common solutions to solve common problems
In this approach, the organisation applies the security provided by common
security solutions to solve common technology problems. It only carries out
tailored risk assessments (or specifies additional security controls) for those
business objectives that are not entirely covered by the common solution.
This is particularly useful in OFFICIAL environments, where an increasing
range of common solutions are being assured across government.
https://www.gov.uk/guidance/managing-information-risk
RISK MANAGEMENT APPROACH
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
RISK MANAGEMENT APPROACH
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
THE OFFICIAL ENVIRONMENT
Identify which elements of the environment require
assurance as part of the service or solution.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
END USER DEVICES
Configured inline with CESG EUD
Security and Configuration Guidance
https://www.gov.uk/government/collections/end-
user-devices-security-guidance
Assured for OFFICIAL by another
government organisation
Legacy Accreditation as part of a Legacy
service or system at OFFICIAL or
previously “Restricted”
ASSURANCE OPTIONS
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
NETWORK
Data protected in transit inline with
CESG Transport Layer Security (TLS) for
external-facing services guidance
https://www.gov.uk/guidance/transport-layer-
security-tls-for-external-facing-services
Public Services Network (PSN)
accredited by the PSNA for OFFICIAL
https://www.gov.uk/government/groups/public-
services-network
A VPN or other encrypted network
legacy accredited for OFFICIAL (or
previously “Restricted”)
ASSURANCE OPTIONS
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
SERVICE
Cloud services purchased via the Digital
Marketplace, which meet the security
requirements of the business inline with
CESG Cloud Security Principles.
https://www.gov.uk/government/collections/clou
d-security-guidance
Services legacy accredited for OFFICIAL
by another government organisation
including CESG Pan Government
Accreditors.
ASSURANCE OPTIONS
Services can be assessed against the
security requirements of the business
and any deficiencies risk managed inline
with the business risk appetite.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
CLOUD SERVICES
Cloud services purchased via the Digital
Marketplace, can be procured in a
variety of structures:
• Software as a Service (SaaS)
• An application built on top of
Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Platform as a Service (PaaS) built on
Infrastructure as a Service (IaaS)
• Infrastructure as a Service (IaaS)
CLOUD STRUCTURES
Software as a Service
Platform as a Service
Infrastructure as a Service
Application
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
Combined
Security
Profile
User
Security
Needs
Applicable
Security
Controls
Security
Stories
CLOUD SERVICES
Where an application is to be developed or
implemented on IaaS or PaaS, then the Digital
Risk Management approach is still applicable.
The Combined Security Profile will help identify
the relevant User Security Needs and Outcomes,
which in turn drive out proportional controls,
which map into Security Stories for Agile
development
https://www.gov.uk/service-manual
DEVELOPED APPLICATIONS
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
DATA TYPES
Non-Sensitive Information
This information will typically be public knowledge or intended for public consumption; for example,
marketing material, open consultations, information to be published under transparency/open data
or even routine communications with members of the public or third parties where there is no
confidentiality requirement. There may be a requirement to protect the integrity and availability of
this information.
Transactional
This includes one-off (potentially) sensitive exchanges with external partners, (citizens, industry,
third sector etc), and online transactional services where the loss of a small number of instances is
tolerable, but systematic or large scale compromise is unacceptable. Loss of confidentiality, integrity
or availability of this data will result in disruption to HMG service delivery and may have a
commercial or financial impact. Organisations may also need to comply with external compliance
obligations such as the Payment Card Industry Data Security Standard (PCI DSS).
Information of varying sensitivity that supports the routine business, operations and services of the
Public Sector. There is a requirement to protect the confidentiality, integrity and availability of this
information.
Routine Public Sector Business
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
DATA TYPES
Legally Defined
Information which is subject to legal and / or regulatory requirements. For example, personal
information that relates to an identifiable individual as defined by the Data Protection Act (DPA).
Legal or regulatory requirements must be met and additional controls may be required in line with
HMG risk appetite tolerances. There is a clear requirement to protect the confidentiality, availability
and integrity of such information.
OFFICIAL - SENSITIVE
The loss, compromise or misuse of information marked with the OFFICIAL-SENSITIVE caveat has
been assessed as being likely to have damaging consequences for an individual, an organisation or
HMG more generally. Risk owners will typically require additional assurance that the need-to-know
is strictly enforced, and there is a clear requirement to protect the confidentiality, integrity and
availability of this information. However, note that this example is intended to illustrate where
heightened technical protections may be appropriate; in most cases it will be more proportionate to
risk manage access to limited amounts of OFFICIAL-SENSITIVE information on corporate systems
using more stringent procedural controls instead.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
SECURITY REQUIREMENTS
• External Legal requirements could include: the Data Protection Act
• External Regulatory requirements could include: PCI DSS or HMG Off-
shoring Policy for Official
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
BUSINESS RED-LINES
The Business must decide if there are any business appetite
red-lines that would constrain the service or solution, or
Business Red-lines are controls or restrictions that are not
mandated by external requirements
An example of a red-line might be: “No Off-Shoring of Sensitive
Information”, or “Data-in-transit Must be encrypted”
where the Business has assessed that additional specific
security controls are required
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
BUSINESS IMPACTS
The business impacts are a
range of impacts that could
effect the Business if a
threat was realised for
Confidentiality, Integrity or
Availability.
Each impact could be due to
a number of reasons,
including Financial,
Personnel, Physical, Logical,
etc
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
BUSINESS IMPACTS
No Impact – No identified impact on the business, its operations, staff,
management, or finances.
Business Red-line Impact – An impact that effects the Business
appetite in regards to a specific risk, control, or technology
Reputation Impact – An impact that effects the Business through a
degradation of its perceived reputation,
Business Disruption – An impact that effects the daily operations of
the Business, incl. administration, staff and technology
Regulatory Impact– An impact that would lead to a breach of external
regulatory requirements, resulting in fines, sanctions or agreements
Legal Impact– An impact would lead to a breach of applicable law and
the risk of legal prosecution
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
ASSESS THE IMPACT
The Business must assess what the worst case impact of a breach of
C, I and A would be for the Data Types involved. Text in Italics are
examples.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
SECURITY PROFILES
Security Profiles are based on the 14 Cloud Security Principles from CESG’s
published guidance on Cloud Security, and the 51 G-Cloud Security Assertions.
https://www.gov.uk/government/collections/cloud-security-guidance
https://digitalmarketplace.blog.gov.uk/2014/11/04/the-g-cloud-6-security-questions
A range of reusable security profiles have been developed for different external
requirements, such as the PSN Service Security Standard, DPA compliance, PCI
DSS compliance, NHS IG Toolkit alignment, etc…
https://www.gov.uk/guidance/apply-for-a-public-services-network-psn-service-provision-
compliance-certificate
The Impact Assessment will provide guidance as to which Security Profiles are
relevant. New Security Profiles can be developed at any time to meet the
Business Security Needs, including: organisation specific security controls.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
APPLY SECURITY PROFILES
Any relevant external security
requirements (DPA, PSN, NHS,
PCI DSS, etc), the business
security needs (OFFICIAL), and
any business red-lines (UK only,
etc) will define which security
profiles are applicable.
The various applicable security
profiles are then combined into
one Consolidated Security
Profile.
Security Profiles
Consolidated OFFICIAL DPA PSN OS Red-line
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
COMPARE SECURITY PROFILES
The Consolidated Security Profile
can be used for a range of
activities:
• As part of the selection criteria
for the procurement of services
from the Digital Marketplace
• As a Supplier security
assessment benchmark
• To develop Security
Requirements and Controls
• To develop User Security Needs
and User Security Stories
• To Audit Suppliers security
maturity
Security Profile Comparison
Consolidated Security Profile Supplier / Service Provider
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
RISK MANAGE THE DELTA
Identify any external requirements or business red-lines
that the solution or service does not meet.
Any deficiency to the security requirements, “the Delta”,
must be recorded and risk managed.
The outcome is to reduce, where possible, the impact on
the business or the likelihood of the impact occurring
Identify any areas where the solution does not meet the
consolidated security profile or user security needs.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
RISK DEFINITIONS
Threat
Threat describes the source of a risk being realised. Where appropriate to their
organisation’s context, the business should apply the threat profile for OFFICIAL,
supplemented if necessary with local or specific threat intelligence where it is available.
https://gov.uk/government/publications/government-security-classifications
Likelihood
Likelihood also known as “probability” estimates how likely it is for a threat to occur. It
can be captured by examining historical records of compromises to estimate how history
will be repeated. https://www.gov.uk/guidance/managing-information-risk
Impact describes the consequences of a risk being realised. To allow risk evaluation and
prioritisation, impact should specify the negative effect that a risk’s realisation would
entail. This should include expected losses (e.g. financial and reputation losses) as well as
business objectives which would not be achievable as a result of the impact.
Impact
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
LIKELIHOOD OF OCCURANCE
RARE: The threat may occur in exceptional circumstances
UNLIKELY: The threat could occur some time in the target period
POSSIBLE: The threat may occur within the target period
LIKELY: The threat is likely to occur within the target period
EXPECTED: The threat is expected to occur within the target period
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
RISK INDEX
Risk Index = Impact of risk X Likelihood of occurrence
(Described in a 5x6 matrix: Low = 1-4, Medium = 5-12, High = 15-20, Critical = 24-30)
Other Risk Assessment methodologies can be used.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
RISK TREATMENT
Identified risks can be avoided if alternative technical or
business decisions are made on the service design
Identified risks are transferred to more appropriate
business areas or responsibility is escalated
Identified risks are accepted in the event that business
needs override the impact of the risk or is within the
business risk appetite
Identified risks can be mitigated if a treatment or control
will reduce the impact or likelihood
AVOID
MITIGATE
TRANSFER
ACCEPT
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
DOCUMENTATION
Document the risk management approach, environment
elements, and relevant data types
Document the output of the assessment of impacts that
could be realised, relevant to the data type
Document the relevant security profiles and business red-
lines, and define the consolidated security profile
Document the external requirements, business red-lines
and business security needs
The documented output can be in a range of formats, not necessarily a document
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
DOCUMENTATION
Document any “Delta” to the security requirements,
business red-lines and consolidated security profile
Document any controls or mitigations that can reduce the
impact or likelihood of the risks occurring
Produce a, high level, Risk Report for the SIRO / AO
Document the risk management assessment outcomes,
form whichever methodology used.
WHO WE AREWWW.SECURESTORM.COM
THE EXPERT
SECURITY ADVISORS
DOCUMENTATION - SCHEMA
As a standardised mechanism for
recording, sharing and exchanging
information risk management data,
Securestorm developed a data schema.
The Digital Services Risk Management
Record1 provides the relevant risk and
assurance information on a system or
service, in a concise and proportional
way.
The schema can be saved in a variety of
formats, including: CSV, JSON or Txt,
enabling both human and machines
readability.
ANY QUESTIONS?
www.securestorm.com @Securestorm +44(0)8455196138

Contenu connexe

Tendances

Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
SlideTeam
 

Tendances (20)

Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk ResilienceHow to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

En vedette

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
Shaun Sloan
 
Cert IV in Security & Risk Managment
Cert IV in Security & Risk ManagmentCert IV in Security & Risk Managment
Cert IV in Security & Risk Managment
Paul Harrison J.P.
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
VMware Tanzu
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
7wounders
 

En vedette (15)

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
 
Policy Map
Policy MapPolicy Map
Policy Map
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist
 
Cert IV in Security & Risk Managment
Cert IV in Security & Risk ManagmentCert IV in Security & Risk Managment
Cert IV in Security & Risk Managment
 
Choosing the Right Fabric for Your Bespoke Suit
Choosing the Right Fabric for Your Bespoke SuitChoosing the Right Fabric for Your Bespoke Suit
Choosing the Right Fabric for Your Bespoke Suit
 
secQme BodyGuard in your mobile phone
secQme BodyGuard in your mobile phonesecQme BodyGuard in your mobile phone
secQme BodyGuard in your mobile phone
 
Credit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HECredit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HE
 
BUSQUEDA EN INTERNET
BUSQUEDA EN INTERNETBUSQUEDA EN INTERNET
BUSQUEDA EN INTERNET
 
Barrington Ayre Shirtmaker & Tailor Brochure
Barrington Ayre Shirtmaker & Tailor BrochureBarrington Ayre Shirtmaker & Tailor Brochure
Barrington Ayre Shirtmaker & Tailor Brochure
 
Socio-technical Secuirty Value Chain
Socio-technical Secuirty Value ChainSocio-technical Secuirty Value Chain
Socio-technical Secuirty Value Chain
 
20160517 สกญ-การนำเข้าและส่งออกไปมาเลเซีย
20160517 สกญ-การนำเข้าและส่งออกไปมาเลเซีย20160517 สกญ-การนำเข้าและส่งออกไปมาเลเซีย
20160517 สกญ-การนำเข้าและส่งออกไปมาเลเซีย
 
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillPanel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 

Similaire à Security Framework for Digital Risk Managment

Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
Lennart Bredberg
 
harnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVEharnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVE
Nezar Albkower
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
Ayham Kochaji
 
harnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVEharnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVE
Daad Nassif
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
NA Putra
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
lneut03
 

Similaire à Security Framework for Digital Risk Managment (20)

7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
CISO as a service in India | Senselearner
CISO as a service in India | SenselearnerCISO as a service in India | Senselearner
CISO as a service in India | Senselearner
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
harnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVEharnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVE
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
harnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVEharnsergroup-brochure2015-INTERACTIVE
harnsergroup-brochure2015-INTERACTIVE
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 

Dernier

Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
ScottMeyers35
 
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
HyderabadDolls
 

Dernier (20)

Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
 
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
 
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
 
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
Peace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdf
Peace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdfPeace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdf
Peace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdf
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
 
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
 

Security Framework for Digital Risk Managment

  • 1. Cyber Security Governance and Digital Risk Management for OFFICIAL Environments TONY RICHARDS SECURITY FRAMEWORK FOR DIGITAL RISK MANAGEMENT
  • 2. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS This work is licensed under the Creative Commons, Attribution-Non Commercial-Share Alike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. CREATIVE COMMONS
  • 3. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Securestorm in partnership with the Youth Justice Board (YJB), have developed a robust security governance framework and information risk management approach for OFFICIAL digital services and systems. This provides a practical and proportional process with re-usable common security profiles and architectural patterns to: • increase efficiency • reduce overheads • effectively manage Information Risk This move comes after the Cabinet Office announcement of the retirement of mandatory accreditation from the Security Policy Framework (SPF) and CESG’s move to supporting a business led Information Risk Management. INTRODUCTION
  • 4. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Securestorm’s Security Framework for Digital Risk Management1 approach2 enables organisations to utilise the latest security thought leadership from across UK government and industry, in a synchronised and logical flow that can be deployed rapidly and with agility. Note: 1This is available from Securestorm under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. 2The following is not a stand alone process or methodology, but a framework for organisations, incorporating a range of security and risk management principles from CESG and the Cabinet Office. INTRODUCTION
  • 5. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS SECURITY GOVERNANCE FRAMEWORK Secure by Design •Security Design Principles •User Security Needs •Agile Security Stories •Cloud and micro-service Architectural Patterns •Secured base images •Protecting Bulk Personal Data Principles •Security Operations Info Risk Management •Information Risk Management Principles •Digital Information Risk Management •IT and Digital Security Policy •GSCS Core Security Controls •Relevant Security Profiles Risk Managed Life-cycle •Risk Status and Management Dashboard •Audit Program •Risk Management Checkpoints& road-maps •Assure Third Parties •SIRO/AO Risk Report •Digital Risk Management Record Schema
  • 6. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS SECURE BY DESIGN Integrate CESG’s Security Design Principles for Digital Services in all new service designs https://www.cesg.gov.uk/guidance/security-design-principles-digital-services-0 User Security Needs – Predefined library of Security Outcomes, security controls for OFFICIAL, security stories, any legal and regulatory requirements specific to organisation and any other relevant security controls as required by the business https://www.gov.uk/government/publications/government-security- classifications Develop and share reusable Architectural Patterns where relevant for services or system components COMMON SOLUTIONS FOR COMMON PROBLEMS
  • 7. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS INFORMATION RISK MANAGEMENT Understand CESG’s guidance on managing Information Risk https://www.cesg.gov.uk/guidance/10-steps-information-risk-management- regime Incorporate the “Apply Common Solutions to solve Common Problems” approach to Information Risk Management https://www.gov.uk/guidance/managing-information-risk Identify and apply Security Polices, Government Security Classification Core Controls and relevant Security Profiles COMMON SOLUTIONS FOR COMMON PROBLEMS Use the Security Framework for Digital Risk Management approach to pragmatically categorise data and assess the impact of a breach
  • 8. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS RISK MANAGED LIFE-CYCLE Produce a Risk Status and Management Dashboard, for weekly, monthly or real time reporting Develop and maintain an Audit and Assurance program, to ensure that Service Providers and system Suppliers security assurances are actively audited, validated and managed Use a SIRO/AO Risk Report to document business risk decisions and provide supporting risk and assurance detail with a proportional Digital Risk Management Record Schema CONTINUOUS THROUGH-LIFE PROCESS Plan and schedule Risk Management Checkpoints to ensure that Risk Treatment Plans and security validations are reviewed and assured in a forecastable and pragmatic way
  • 9. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS GOVERNANCE STRUCTURE ‘Effective leadership’ is a critical component of good security and accountability. The permanent Secretary (or equivalent) will own the organization's approach to security and ensure that these issues receive the attention and investment required. The Security Policy Framework (SPF) states: ‘Government organizations will have, an appropriate security governance structure to support the Permanent Secretary, that is properly resourced with individuals who have been appropriately trained; Board-level oversight of security compliance and auditing processes; and, arrangements to determine and satisfy themselves that Delivery Partners, service providers and third party suppliers, apply proper security controls’ https://www.gov.uk/government/publications/security-policy-framework/hmg-security- policy-framework
  • 10. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS GOVERNANCE STRUCTURE The security management structure of an organisation, whatever size, needs to be strong. By splitting operational security from information risk, enables greater flexibility, ensuring that incident investigations and day to day operations don’t impact compliance and on-going risk management activities and vice versa. Binding the two strands together, overseeing the bigger picture and ensuring an important liaison with the business, the CISO is responsible for the entire security function while providing leadership, knowledge and experience. These roles are not necessarily full time, rather should be continuously adjusted to be dynamic to the organisations needs.
  • 11. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS GOVERNANCE STRUCTURE The organisational example depicts an extended governance structure
  • 12. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Prior to April 2014, a security process called accreditation was mandated by the HMG Security Policy Framework (SPF), for all Government departments processing classified information. The process of accreditation provided for the assessment of a system against its security requirements, and approval was required from an accreditor as a prerequisite for operation. This was removed as a mandatory requirement from the April 2014 version of the SPF https://www.gov.uk/guidance/managing-information-risk INTRODUCING INFORMATION RISK
  • 13. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS An organizational responsibility: Risk management decisions should be objective and informed by an understanding of risk. They should not be made in isolation but on a basis of understanding how individual decisions affect the wider business, and what it is trying to achieve. Tech to deliver business attracts risk: Organisations should decide for themselves what risk management decisions need to be made to support the delivery and operation of a system or service. Decisions: right people, time & support: They need to be empowered by the organisation and have the right business, technology, security knowledge and skills to enable informed and objective decisions. https://www.gov.uk/guidance/managing-information-risk INTRODUCING INFORMATION RISK
  • 14. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS BUSINESS CONTEXT RISK MANAGEMENT APPROACH Before taking any action, the organisation must understand and communicate what risk management approach the business is going to take to provide confidence that the technology and information used is proportionally secured. Organisations should always be aware of the risks they are taking to achieve their aims. To ensure meaningful outcomes, organisations need to provide a context in which risk management and risk assessment is conducted. KEY COMPONANTS of RISK Risk assessments have inputs and outputs. Regardless of the risk assessment method used, any inputs and outputs should be understandable and meaningful in the context of the business and what it is trying to achieve. INFORMATION RISK MANAGEMENT
  • 15. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Irrespective of the approach taken to assessing risks, the outcome should be captured in a way that can be used to inform business decision making. Consistency is achieved by ensuring that the inputs to and outputs from assessments are meaningful in the context of what the business is trying to achieve To understand what risks exist, the risk assessment should be applied in the context of what the organisation is trying to achieve. The output of any risk assessment should be recorded for traceability purposes. Traceability is important so that risk management decisions and investment choices can be traced to an identified risk. MAKE INFORMED RISK MANAGEMENT DECISIONS Throughout the lifecycle of a system or service, the organisation will need to make objective decisions about what needs to be done to manage identified risks. These decisions should be informed and supported by information, subject matter expertise and evidence. After risk management action has taken place, some risks will remain. These are often referred to as residual risks. INFORMATION RISK MANAGEMENT COMMUNICATE RISK CONSISTENTLY UNDERSTAND WHAT RISKS EXIST
  • 16. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Taking risks is a necessary part of doing business in order to create opportunities and help deliver business objectives. Organisations should always be aware of the risks they are taking to achieve their aims. To ensure meaningful outcomes, organisations need to provide a context in which risk management and risk assessment is conducted. This context can be set by answering the following questions: Goal: What is the organisation trying to achieve ? Ethos: What does it really care about ? Attitude: What is it’s risk appetite? BUSINESS CONTEXT
  • 17. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Apply common solutions to solve common problems In this approach, the organisation applies the security provided by common security solutions to solve common technology problems. It only carries out tailored risk assessments (or specifies additional security controls) for those business objectives that are not entirely covered by the common solution. This is particularly useful in OFFICIAL environments, where an increasing range of common solutions are being assured across government. https://www.gov.uk/guidance/managing-information-risk RISK MANAGEMENT APPROACH
  • 18. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS RISK MANAGEMENT APPROACH
  • 19. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS THE OFFICIAL ENVIRONMENT Identify which elements of the environment require assurance as part of the service or solution.
  • 20. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS END USER DEVICES Configured inline with CESG EUD Security and Configuration Guidance https://www.gov.uk/government/collections/end- user-devices-security-guidance Assured for OFFICIAL by another government organisation Legacy Accreditation as part of a Legacy service or system at OFFICIAL or previously “Restricted” ASSURANCE OPTIONS
  • 21. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS NETWORK Data protected in transit inline with CESG Transport Layer Security (TLS) for external-facing services guidance https://www.gov.uk/guidance/transport-layer- security-tls-for-external-facing-services Public Services Network (PSN) accredited by the PSNA for OFFICIAL https://www.gov.uk/government/groups/public- services-network A VPN or other encrypted network legacy accredited for OFFICIAL (or previously “Restricted”) ASSURANCE OPTIONS
  • 22. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS SERVICE Cloud services purchased via the Digital Marketplace, which meet the security requirements of the business inline with CESG Cloud Security Principles. https://www.gov.uk/government/collections/clou d-security-guidance Services legacy accredited for OFFICIAL by another government organisation including CESG Pan Government Accreditors. ASSURANCE OPTIONS Services can be assessed against the security requirements of the business and any deficiencies risk managed inline with the business risk appetite.
  • 23. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS CLOUD SERVICES Cloud services purchased via the Digital Marketplace, can be procured in a variety of structures: • Software as a Service (SaaS) • An application built on top of Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Platform as a Service (PaaS) built on Infrastructure as a Service (IaaS) • Infrastructure as a Service (IaaS) CLOUD STRUCTURES Software as a Service Platform as a Service Infrastructure as a Service Application
  • 24. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS Combined Security Profile User Security Needs Applicable Security Controls Security Stories CLOUD SERVICES Where an application is to be developed or implemented on IaaS or PaaS, then the Digital Risk Management approach is still applicable. The Combined Security Profile will help identify the relevant User Security Needs and Outcomes, which in turn drive out proportional controls, which map into Security Stories for Agile development https://www.gov.uk/service-manual DEVELOPED APPLICATIONS
  • 25. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS DATA TYPES Non-Sensitive Information This information will typically be public knowledge or intended for public consumption; for example, marketing material, open consultations, information to be published under transparency/open data or even routine communications with members of the public or third parties where there is no confidentiality requirement. There may be a requirement to protect the integrity and availability of this information. Transactional This includes one-off (potentially) sensitive exchanges with external partners, (citizens, industry, third sector etc), and online transactional services where the loss of a small number of instances is tolerable, but systematic or large scale compromise is unacceptable. Loss of confidentiality, integrity or availability of this data will result in disruption to HMG service delivery and may have a commercial or financial impact. Organisations may also need to comply with external compliance obligations such as the Payment Card Industry Data Security Standard (PCI DSS). Information of varying sensitivity that supports the routine business, operations and services of the Public Sector. There is a requirement to protect the confidentiality, integrity and availability of this information. Routine Public Sector Business
  • 26. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS DATA TYPES Legally Defined Information which is subject to legal and / or regulatory requirements. For example, personal information that relates to an identifiable individual as defined by the Data Protection Act (DPA). Legal or regulatory requirements must be met and additional controls may be required in line with HMG risk appetite tolerances. There is a clear requirement to protect the confidentiality, availability and integrity of such information. OFFICIAL - SENSITIVE The loss, compromise or misuse of information marked with the OFFICIAL-SENSITIVE caveat has been assessed as being likely to have damaging consequences for an individual, an organisation or HMG more generally. Risk owners will typically require additional assurance that the need-to-know is strictly enforced, and there is a clear requirement to protect the confidentiality, integrity and availability of this information. However, note that this example is intended to illustrate where heightened technical protections may be appropriate; in most cases it will be more proportionate to risk manage access to limited amounts of OFFICIAL-SENSITIVE information on corporate systems using more stringent procedural controls instead.
  • 27. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS SECURITY REQUIREMENTS • External Legal requirements could include: the Data Protection Act • External Regulatory requirements could include: PCI DSS or HMG Off- shoring Policy for Official
  • 28. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS BUSINESS RED-LINES The Business must decide if there are any business appetite red-lines that would constrain the service or solution, or Business Red-lines are controls or restrictions that are not mandated by external requirements An example of a red-line might be: “No Off-Shoring of Sensitive Information”, or “Data-in-transit Must be encrypted” where the Business has assessed that additional specific security controls are required
  • 29. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS BUSINESS IMPACTS The business impacts are a range of impacts that could effect the Business if a threat was realised for Confidentiality, Integrity or Availability. Each impact could be due to a number of reasons, including Financial, Personnel, Physical, Logical, etc
  • 30. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS BUSINESS IMPACTS No Impact – No identified impact on the business, its operations, staff, management, or finances. Business Red-line Impact – An impact that effects the Business appetite in regards to a specific risk, control, or technology Reputation Impact – An impact that effects the Business through a degradation of its perceived reputation, Business Disruption – An impact that effects the daily operations of the Business, incl. administration, staff and technology Regulatory Impact– An impact that would lead to a breach of external regulatory requirements, resulting in fines, sanctions or agreements Legal Impact– An impact would lead to a breach of applicable law and the risk of legal prosecution
  • 31. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS ASSESS THE IMPACT The Business must assess what the worst case impact of a breach of C, I and A would be for the Data Types involved. Text in Italics are examples.
  • 32. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS SECURITY PROFILES Security Profiles are based on the 14 Cloud Security Principles from CESG’s published guidance on Cloud Security, and the 51 G-Cloud Security Assertions. https://www.gov.uk/government/collections/cloud-security-guidance https://digitalmarketplace.blog.gov.uk/2014/11/04/the-g-cloud-6-security-questions A range of reusable security profiles have been developed for different external requirements, such as the PSN Service Security Standard, DPA compliance, PCI DSS compliance, NHS IG Toolkit alignment, etc… https://www.gov.uk/guidance/apply-for-a-public-services-network-psn-service-provision- compliance-certificate The Impact Assessment will provide guidance as to which Security Profiles are relevant. New Security Profiles can be developed at any time to meet the Business Security Needs, including: organisation specific security controls.
  • 33. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS APPLY SECURITY PROFILES Any relevant external security requirements (DPA, PSN, NHS, PCI DSS, etc), the business security needs (OFFICIAL), and any business red-lines (UK only, etc) will define which security profiles are applicable. The various applicable security profiles are then combined into one Consolidated Security Profile. Security Profiles Consolidated OFFICIAL DPA PSN OS Red-line
  • 34. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS COMPARE SECURITY PROFILES The Consolidated Security Profile can be used for a range of activities: • As part of the selection criteria for the procurement of services from the Digital Marketplace • As a Supplier security assessment benchmark • To develop Security Requirements and Controls • To develop User Security Needs and User Security Stories • To Audit Suppliers security maturity Security Profile Comparison Consolidated Security Profile Supplier / Service Provider
  • 35. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS RISK MANAGE THE DELTA Identify any external requirements or business red-lines that the solution or service does not meet. Any deficiency to the security requirements, “the Delta”, must be recorded and risk managed. The outcome is to reduce, where possible, the impact on the business or the likelihood of the impact occurring Identify any areas where the solution does not meet the consolidated security profile or user security needs.
  • 36. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS RISK DEFINITIONS Threat Threat describes the source of a risk being realised. Where appropriate to their organisation’s context, the business should apply the threat profile for OFFICIAL, supplemented if necessary with local or specific threat intelligence where it is available. https://gov.uk/government/publications/government-security-classifications Likelihood Likelihood also known as “probability” estimates how likely it is for a threat to occur. It can be captured by examining historical records of compromises to estimate how history will be repeated. https://www.gov.uk/guidance/managing-information-risk Impact describes the consequences of a risk being realised. To allow risk evaluation and prioritisation, impact should specify the negative effect that a risk’s realisation would entail. This should include expected losses (e.g. financial and reputation losses) as well as business objectives which would not be achievable as a result of the impact. Impact
  • 37. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS LIKELIHOOD OF OCCURANCE RARE: The threat may occur in exceptional circumstances UNLIKELY: The threat could occur some time in the target period POSSIBLE: The threat may occur within the target period LIKELY: The threat is likely to occur within the target period EXPECTED: The threat is expected to occur within the target period
  • 38. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS RISK INDEX Risk Index = Impact of risk X Likelihood of occurrence (Described in a 5x6 matrix: Low = 1-4, Medium = 5-12, High = 15-20, Critical = 24-30) Other Risk Assessment methodologies can be used.
  • 39. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS RISK TREATMENT Identified risks can be avoided if alternative technical or business decisions are made on the service design Identified risks are transferred to more appropriate business areas or responsibility is escalated Identified risks are accepted in the event that business needs override the impact of the risk or is within the business risk appetite Identified risks can be mitigated if a treatment or control will reduce the impact or likelihood AVOID MITIGATE TRANSFER ACCEPT
  • 40. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS DOCUMENTATION Document the risk management approach, environment elements, and relevant data types Document the output of the assessment of impacts that could be realised, relevant to the data type Document the relevant security profiles and business red- lines, and define the consolidated security profile Document the external requirements, business red-lines and business security needs The documented output can be in a range of formats, not necessarily a document
  • 41. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS DOCUMENTATION Document any “Delta” to the security requirements, business red-lines and consolidated security profile Document any controls or mitigations that can reduce the impact or likelihood of the risks occurring Produce a, high level, Risk Report for the SIRO / AO Document the risk management assessment outcomes, form whichever methodology used.
  • 42. WHO WE AREWWW.SECURESTORM.COM THE EXPERT SECURITY ADVISORS DOCUMENTATION - SCHEMA As a standardised mechanism for recording, sharing and exchanging information risk management data, Securestorm developed a data schema. The Digital Services Risk Management Record1 provides the relevant risk and assurance information on a system or service, in a concise and proportional way. The schema can be saved in a variety of formats, including: CSV, JSON or Txt, enabling both human and machines readability.