SlideShare a Scribd company logo
1 of 20
SECURITY CONTROLS PUT IN 
PLACE TO IMPLEMENT EFG 
FEDERAL CREDIT UNION 
STANDARDS
Security controls 
Security controls 
 Countermeasures to implement organizational 
standards in order to safeguard against attacks 
 Selected and applied based on the risk assessment 
 Technology dependent 
Goals 
 Maintain integrity 
 Protect confidentiality 
 Assure availability
The need for security controls 
in EGF FCU 
Financial institution 
One of the nation’s critical infrastructures 
Stores non public personal information 
 Social security number 
 Bank account 
 Credit card information 
 Names and addresses
Types of security controls 
Management controls 
Technical controls 
Security controls
Policies, procedures, standards, laws, 
regulations, and guidelines which form the 
framework upon which the organization 
operates 
 Risk assessment 
 Vehicle used to verify that the implementers and operators of 
information systems are meeting their stated security goals and 
objectives
Management controls 
 Security Awareness and Training 
 Familiarize employees with the security policy and communicate 
standards and procedures
Technical Controls 
Protect the technological components of the 
information systems such as the system 
architectural design, hardware, software and 
firmware 
 Access control 
 grants or denies resources and services 
 Access control models: 
 Mandatory access control (MAC) model ensures the end user cannot 
implement, modify or transfer any controls. It is the most restrictive 
model
Technical Controls 
 Access control models 
 Discretionary access control (DAC) model allows a subject to have 
a total control over any objects that he or she owns and other 
programs associated with those objects. 
 Role-based access control (RBAC) model assigns role to a 
particular roles in the organization and then assigns users to that 
role 
 Rule-based access controls (RBAC) model assigns roles based on a 
set of defined rules
Technical controls 
 Identification 
 Users accessing the organizational computer system must present 
credentials or identification such as username 
 Authentication 
 checks users’ credentials to ensure that they are authentic and not 
fabricated 
 Authorization 
 grants the user permission to access only the resources needed to 
perform one’s duties
Technical controls 
 Physical access control protects computer 
equipment and prevent unauthorized access 
 Video surveillance 
 Computer security 
 Door security 
 Access logs 
 Badges
Technical controls 
System and Communication Protection 
 Nonrepudiation 
 Provides undeniable proof that a user took a specific action such as 
account transactions, money transfer or sending a message 
 Encryption 
 Converts electronic data into unreadable form to protect the integrity 
and the confidentiality 
 Firewall 
 First line of defense that inspects network traffics and allows or blocks 
traffics based on a set rule.
Technical controls 
System and Communication Protection 
 Network-based firewall 
 Inspects traffic as it flows between networks 
 Host-based firewall 
 Inspects traffic received by a host 
 Anti-Virus 
 Scans the organizational computer, emails attachments for infections 
and monitor computer activities
Technical controls 
System and Communication Protection 
 Anti-Virus 
 Acts as detective and corrective control and is updated frequently in 
order to recognize new viruses 
 Intrusion detection and preventive systems 
(IDS/IPS) 
 IDS is detective in nature, looks for pattern anomaly 
activities and logs it 
 IPS both recognizes the suspicious traffic and responds to 
the potential threat.
Technical controls 
System and Communication Protection 
 Audit and accountability 
 Monitor, track, log system behavior and report those that are not in 
accordance with the norms. 
 Essential for detecting, understanding and recovering from security 
breaches.
Operational controls 
Defines how employees in EFG FCU use data, 
resources, software and hardware 
 Incidence response 
 Identifies and contains the problem, investigates, removes, eradicates 
the cause and repairs the damage 
 Documents, reports the incident and implements countermeasures to 
reduce the likelihood of a future attack 
 Media access control and disposal 
 Ensure that only authorized users have access to sensitive 
information 
 Ensure that media such as tapes, USB, CD, DVD and external hard 
drives are protected from theft and damage
Operational controls 
 Media access control and disposal 
 Ensure that EFG FCU uses formatting to delete, sanitization to clean 
all remnants of the data, and crushing, incineration, acid dipping, and 
shredding to properly dispose data 
 Business continuity 
 Availability of backup systems and offsite backup storage to help 
restore data in case of natural disaster 
 Emergency backup power protects sensitive electronic systems and 
data during power outages ensures members have uninterrupted 
access to their accounts.
Operational controls 
Conclusion 
 Control depends on 
 Cost comparison, 
 Policies, standards and procedures 
 Resources 
 Training 
 Testing 
 Technology design. 
 EFG FCU considers all the above including senior 
management support and the organizational culture 
to effectively implement its security controls.
Recommendation for improvement 
Best Practices 
 Collection of informally standardized techniques, 
methods or process that have gained wide 
acceptance in the organization 
 Widely accepted as an effective and efficient 
method to complete a task 
Goals 
 Ensures uniform development 
 Ensures uniform distribution 
 Ensures acceptance of standard
Recommendation for improvement 
Recommendation 
 Best practices not currently mandated by the 
organization standard 
 EFG FCU should apply best practices in all aspect 
of their security controls to improve its security 
program an make it more effective 
 Recommended best practices: 
 Segregation of duty requires a process be divided between two or 
more individuals to avoid a fraudulent application process resulting 
in a breach of security
Recommendation for improvement 
 Recommended best practices: 
 Dual control assures that two people participate in a transaction to 
create a system of checks and balances in order to reduce opportunity 
for fraud 
 Audit and Management reviews of accounts to ensure that the level 
of access conforms with the least privilege control 
 Email policy ensures that the organizational email use is limited only 
to what is absolutely necessary to complete a task, to avoid misuse 
and employee inadvertently clicking on viruses and Trojan horse that 
can compromise the organizational information security.

More Related Content

What's hot

Access control policy
Access control policyAccess control policy
Access control policyBsmah Fahad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsMohammad Abdul Matin Emon
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentjenito21
 
Audit and security application
Audit and security applicationAudit and security application
Audit and security applicationRihab Chebbah
 

What's hot (19)

Access control policy
Access control policyAccess control policy
Access control policy
 
The information security audit
The information security auditThe information security audit
The information security audit
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
CYBER SECURITY audit course report
CYBER SECURITY audit course reportCYBER SECURITY audit course report
CYBER SECURITY audit course report
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Audit and security application
Audit and security applicationAudit and security application
Audit and security application
 

Similar to Applying Security Control to Implement EFG FCU Standards

17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptxKinetic Potential
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxVinayPratap58
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security ManagementNick Krym
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MISAaDi Malik
 
Shivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementShivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementshivanishuks
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalManoj Agarwal
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidyaSuraj Vaidya
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 

Similar to Applying Security Control to Implement EFG FCU Standards (20)

17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptx
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Shivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementShivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagement
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 Final
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Applying Security Control to Implement EFG FCU Standards

  • 1. SECURITY CONTROLS PUT IN PLACE TO IMPLEMENT EFG FEDERAL CREDIT UNION STANDARDS
  • 2. Security controls Security controls  Countermeasures to implement organizational standards in order to safeguard against attacks  Selected and applied based on the risk assessment  Technology dependent Goals  Maintain integrity  Protect confidentiality  Assure availability
  • 3. The need for security controls in EGF FCU Financial institution One of the nation’s critical infrastructures Stores non public personal information  Social security number  Bank account  Credit card information  Names and addresses
  • 4. Types of security controls Management controls Technical controls Security controls
  • 5. Policies, procedures, standards, laws, regulations, and guidelines which form the framework upon which the organization operates  Risk assessment  Vehicle used to verify that the implementers and operators of information systems are meeting their stated security goals and objectives
  • 6. Management controls  Security Awareness and Training  Familiarize employees with the security policy and communicate standards and procedures
  • 7. Technical Controls Protect the technological components of the information systems such as the system architectural design, hardware, software and firmware  Access control  grants or denies resources and services  Access control models:  Mandatory access control (MAC) model ensures the end user cannot implement, modify or transfer any controls. It is the most restrictive model
  • 8. Technical Controls  Access control models  Discretionary access control (DAC) model allows a subject to have a total control over any objects that he or she owns and other programs associated with those objects.  Role-based access control (RBAC) model assigns role to a particular roles in the organization and then assigns users to that role  Rule-based access controls (RBAC) model assigns roles based on a set of defined rules
  • 9. Technical controls  Identification  Users accessing the organizational computer system must present credentials or identification such as username  Authentication  checks users’ credentials to ensure that they are authentic and not fabricated  Authorization  grants the user permission to access only the resources needed to perform one’s duties
  • 10. Technical controls  Physical access control protects computer equipment and prevent unauthorized access  Video surveillance  Computer security  Door security  Access logs  Badges
  • 11. Technical controls System and Communication Protection  Nonrepudiation  Provides undeniable proof that a user took a specific action such as account transactions, money transfer or sending a message  Encryption  Converts electronic data into unreadable form to protect the integrity and the confidentiality  Firewall  First line of defense that inspects network traffics and allows or blocks traffics based on a set rule.
  • 12. Technical controls System and Communication Protection  Network-based firewall  Inspects traffic as it flows between networks  Host-based firewall  Inspects traffic received by a host  Anti-Virus  Scans the organizational computer, emails attachments for infections and monitor computer activities
  • 13. Technical controls System and Communication Protection  Anti-Virus  Acts as detective and corrective control and is updated frequently in order to recognize new viruses  Intrusion detection and preventive systems (IDS/IPS)  IDS is detective in nature, looks for pattern anomaly activities and logs it  IPS both recognizes the suspicious traffic and responds to the potential threat.
  • 14. Technical controls System and Communication Protection  Audit and accountability  Monitor, track, log system behavior and report those that are not in accordance with the norms.  Essential for detecting, understanding and recovering from security breaches.
  • 15. Operational controls Defines how employees in EFG FCU use data, resources, software and hardware  Incidence response  Identifies and contains the problem, investigates, removes, eradicates the cause and repairs the damage  Documents, reports the incident and implements countermeasures to reduce the likelihood of a future attack  Media access control and disposal  Ensure that only authorized users have access to sensitive information  Ensure that media such as tapes, USB, CD, DVD and external hard drives are protected from theft and damage
  • 16. Operational controls  Media access control and disposal  Ensure that EFG FCU uses formatting to delete, sanitization to clean all remnants of the data, and crushing, incineration, acid dipping, and shredding to properly dispose data  Business continuity  Availability of backup systems and offsite backup storage to help restore data in case of natural disaster  Emergency backup power protects sensitive electronic systems and data during power outages ensures members have uninterrupted access to their accounts.
  • 17. Operational controls Conclusion  Control depends on  Cost comparison,  Policies, standards and procedures  Resources  Training  Testing  Technology design.  EFG FCU considers all the above including senior management support and the organizational culture to effectively implement its security controls.
  • 18. Recommendation for improvement Best Practices  Collection of informally standardized techniques, methods or process that have gained wide acceptance in the organization  Widely accepted as an effective and efficient method to complete a task Goals  Ensures uniform development  Ensures uniform distribution  Ensures acceptance of standard
  • 19. Recommendation for improvement Recommendation  Best practices not currently mandated by the organization standard  EFG FCU should apply best practices in all aspect of their security controls to improve its security program an make it more effective  Recommended best practices:  Segregation of duty requires a process be divided between two or more individuals to avoid a fraudulent application process resulting in a breach of security
  • 20. Recommendation for improvement  Recommended best practices:  Dual control assures that two people participate in a transaction to create a system of checks and balances in order to reduce opportunity for fraud  Audit and Management reviews of accounts to ensure that the level of access conforms with the least privilege control  Email policy ensures that the organizational email use is limited only to what is absolutely necessary to complete a task, to avoid misuse and employee inadvertently clicking on viruses and Trojan horse that can compromise the organizational information security.