550 likes | 560 Views
Learn about contingency planning for unexpected events that threaten the security of information resources and assets. Explore principles of information security management and develop a comprehensive incident response and disaster recovery plan.
E N D
INFORMATION SECURITY MANAGEMENT Lecture 3: Planning for Contingencies You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra
Principles of Information Security Mgmt Chapters 2 & 3 Chapter 4 http://csrc.nist.gov/publications/PubsTC.html Include the following characteristics that will be the focus of the current course (six P’s): • Planning • Policy • Programs • Protection • People • Project Management
Introduction One study found that over 40% of businesses that don't have a disaster plan go out of business after a major loss Small Business Approaches Additional Approaches
Contingency Planning • Contingency planning (CP) • The overall planning for unexpected events • Involves preparing for, detecting, reacting to, and recovering from events that threaten the security of information resources and assets
Fundamentals of Contingency Planning Incident Response Disaster Recovery Business Continuity
Developing a CP Document • Develop the contingency planning policy statement • Conduct the BIA • Identify preventive controls • Develop recovery strategies • Develop an IT contingency plan • Plan testing, training, and exercises • Plan maintenance
Business Impact Analysis (BIA) Provides detailed scenarios of each potential attack’s impact
Management of Information Security, 3rd ed. Business Impact Analysis (cont’d.) • The CP team conducts the BIA in the following stages: • Threat attack identification • Business unit analysis • Attack success scenarios • Potential damage assessment • Subordinate plan classification • What are the goals of a BIA?
Business Impact Analysis (cont’d.) • An organization that uses a risk management process will have identified and prioritized threats • The second major BIA task is the analysis and prioritization of business functions within the organization • Each should be categorized
Business Impact Analysis (cont’d.) • Create a series of scenarios depicting impact of successful attack on each functional area • Attack profiles should include scenarios depicting typical attack including: (1) Methodology, (2) Indicators, (3) Broad consequences • Estimate the cost Should this be done in-house or outsourced?
NIST Business Process and Recovery Criticality • Key recovery measures: • Maximum Tolerable Downtime (MTD) - total amount of time the system owner is willing to accept for a mission/business process outage or disruption • Recovery time objective (RTO) - maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources and processes • Recovery point objective (RPO) - point in time, prior to a disruption or system outage, to which mission/business process data can be recovered after an outage
NIST Business Process and Recovery Criticality • Work Recovery Time (WRT) - amount of effort that is necessary to get the business function operational AFTER the technology element is recovered • Can be added to the RTO to determine the realistic amount of elapsed time before a business function is back in useful service • Total time needed to place the business function back in service must be shorter than the MTD • Must balance the cost of system inoperability against the cost of recovery
Management of Information Security, 3rd ed. Timing and Sequence of CP Elements Figure 3-6 Contingency planning implementation timeline Source: Course Technology/Cengage Learning
Incident Response Plan The question is not will an incident occur, but rather when an incident will occur • A detailed set of processes and procedures that commence when an incident is detected • When a threat becomes a valid attack, it is classified as an information security incident if it: • directed against information assets • a realistic chance of success • threatens the confidentiality, integrity, or availability of information assets
Incident Response Plan (cont’d.) Who creates the incident response plan? • Planners develop and document the procedures that must be performed during the incident and immediately after the incident has ceased • Separate functional areas may develop different procedures
Incident Response Plan (cont’d.) • Develop procedures for tasks that must be performed in advance of the incident • Details of data backup schedules • Disaster recovery preparation • Training schedules • Testing plans • Copies of service agreements • Business continuity plans
Management of Information Security, 3rd ed. Incident Response Plan (cont’d.) Figure 3-3 Incident response planning Source: Course Technology/Cengage Learning
Incident Response Plan (cont’d.) • Planning requires a detailed understanding of the information systems and the threats they face • The IR planning team seeks to develop pre-defined responses that guide users through the steps needed to respond to an incident
Incident Response Plan (cont’d.) • Incident classification • Determine whether an event is an actual incident • Uses initial reports from end users, intrusion detection systems, host- and network-based virus detection software, and systems administrators (Example: RSA Data Loss Prevention)
Incident Response Plan: Indicators http://www.npr.org/blogs/thetwo-way/2013/01/16/169528579/outsourced-employee-sends-own-job-to-china-surfs-web • Possible indicators • Probable indicators • Definite indicators • When the following occur, the corresponding IR must be immediately activated • Loss of availability • Loss of integrity • Loss of confidentiality • Violation of policy • Violation of law
Incident Response Plan (cont’d.) • Once an actual incident has been confirmed and properly classified • IR team moves from the detection phase to the reaction phase • A number of action steps must occur quickly and may occur concurrently
Incident Response Plan: Action Steps • Notification of key personnel (alert roster) • Assignment of tasks • Documentation of the incident
Incident Response Plan (cont’d.) • The essential task of IR is to stop the incident or contain its impact • Incident containment strategies focus on two tasks:
IRP: Stopping the Incident • Containment strategies • Once contained and system control regained, incident recovery can begin • Incident damage assessment • An incident may increase in scope or severity to the point that the IRP cannot adequately contain the incident
IRP: Recovery Process • Identify the vulnerabilities • Address the safeguards that failed • Evaluate monitoring capabilities (if present) • Restore the data from backups as needed • Restore the services and processes in use • Continuously monitor the system • Restore the confidence of the members
Incident Response Plan (cont’d.) • When an incident violates civil or criminal law, it is the organization’s responsibility to notify the proper authorities • Involving law enforcement has both advantages and disadvantages
Disaster Recovery Plan • The preparation for and recovery from a disaster, whether natural or man made • In general, an incident is a disaster when:
Disaster Recovery Plan (cont’d.) • The key role of a DRP is defining how to reestablish operations at the location where the organization is usually located • Common DRP classifications: • Natural Disasters • Human-made Disasters • Scenario development and impact analysis • Used to categorize the level of threat of each potential disaster
Disaster Recovery Plan (cont’d.) Discussion on Disaster Recovery Myths
Dispelling 10 Common Disaster Recovery Myths:Lessons Learned from Hurricane Katrina andOther Disasters BRETT J. L. LANDRY University of Dallas AND M. SCOTT KOGER Western Carolina University
Common Myths to Avoid in Disaster Recovery • Only Plan for Natural Disasters • Mock Tests are not Enough • External Threats are the only Attack on Resources • Data Recovery Sites are Ready for a DR • Employee Non-Working Areas are Adequately Equipped
Common Myths to Avoid in Disaster Recovery • Implementing DR Testing at a Later Time for New Systems • Replacement Equipment will be Available for DR During or After • Back-up Data Works and can be Restored after DR • DR can be Planned in Company Depts. • Employees are Aware of what they Need to Do
Disaster Recovery • Be a ‘Pessimist’ - (TV show Doomdayers) • Plan, plan, and plan • Multiple scenarios • Have a Multitude of Backups and Contingencies • Test – Scheduled and Unscheduled • Keep DR Planning and Preparation as an Continuous Task
Beyond The Article https://www-01.ibm.com/support/knowledgecenter/ssw_ibm_i_71/rzarm/rzarmdisastr.htm http://www.sungardas.com/Documents/disaster-recovery-plan-template-SFW-WPS-086.pdf http://www.disasterrecovery.org/plan_steps.html • Multitude of Vendors that help with DR Plans • Put together a Disaster Recovery Team • Document Everything have a Manual • Personal Experiences
Disaster Recovery Plan (cont’d.) Discussion on Disaster Recovery Checklist
Business Continuity Plan • Ensures critical business functions can continue in a disaster • Activated and executed concurrently with the DRP when needed • Relies on identification of critical business functions and the resources to support them
BCP: Strategies • Continuity strategies
Business Continuity Plan:Site Options • Hot Sites • Warm Sites • Cold Sites • Other Alternatives: Timeshares, Service Bureaus, Mutual Agreements Ex. RSA data centers – lease 2 - 10gig Ethernet lines between MA and NC
Business Continuity Plan (cont’d.) • To get any BCP site running quickly organization must be able to recover data • Options include:
Timing and Sequence of CP Elements Figure 3-4 Incident response and disaster recovery Source: Course Technology/Cengage Learning
Timing and Sequence of BCP Source: Course Technology/Cengage Learning
Management of Information Security, 3rd ed. Timing and Sequence of CP Elements Figure 3-6 Contingency planning implementation timeline Source: Course Technology/Cengage Learning