1 / 55

INFORMATION SECURITY MANAGEMENT

Learn about contingency planning for unexpected events that threaten the security of information resources and assets. Explore principles of information security management and develop a comprehensive incident response and disaster recovery plan.

byerly
Download Presentation

INFORMATION SECURITY MANAGEMENT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INFORMATION SECURITY MANAGEMENT Lecture 3: Planning for Contingencies You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

  2. Principles of Information Security Mgmt Chapters 2 & 3 Chapter 4 http://csrc.nist.gov/publications/PubsTC.html Include the following characteristics that will be the focus of the current course (six P’s): • Planning • Policy • Programs • Protection • People • Project Management

  3. Introduction One study found that over 40% of businesses that don't have a disaster plan go out of business after a major loss Small Business Approaches Additional Approaches

  4. Introduction – 2012 Natural Disaster Map

  5. Contingency Planning • Contingency planning (CP) • The overall planning for unexpected events • Involves preparing for, detecting, reacting to, and recovering from events that threaten the security of information resources and assets

  6. Fundamentals of Contingency Planning Incident Response Disaster Recovery Business Continuity

  7. Developing a CP Document • Develop the contingency planning policy statement • Conduct the BIA • Identify preventive controls • Develop recovery strategies • Develop an IT contingency plan • Plan testing, training, and exercises • Plan maintenance

  8. Business Impact Analysis (BIA) Provides detailed scenarios of each potential attack’s impact

  9. Management of Information Security, 3rd ed. Business Impact Analysis (cont’d.) • The CP team conducts the BIA in the following stages: • Threat attack identification • Business unit analysis • Attack success scenarios • Potential damage assessment • Subordinate plan classification • What are the goals of a BIA?

  10. Business Impact Analysis (cont’d.) • An organization that uses a risk management process will have identified and prioritized threats • The second major BIA task is the analysis and prioritization of business functions within the organization • Each should be categorized

  11. Business Impact Analysis (cont’d.) • Create a series of scenarios depicting impact of successful attack on each functional area • Attack profiles should include scenarios depicting typical attack including: (1) Methodology, (2) Indicators, (3) Broad consequences • Estimate the cost Should this be done in-house or outsourced?

  12. NIST Business Process and Recovery Criticality • Key recovery measures: • Maximum Tolerable Downtime (MTD) - total amount of time the system owner is willing to accept for a mission/business process outage or disruption • Recovery time objective (RTO) - maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources and processes • Recovery point objective (RPO) - point in time, prior to a disruption or system outage, to which mission/business process data can be recovered after an outage

  13. NIST Business Process and Recovery Criticality • Work Recovery Time (WRT) - amount of effort that is necessary to get the business function operational AFTER the technology element is recovered • Can be added to the RTO to determine the realistic amount of elapsed time before a business function is back in useful service • Total time needed to place the business function back in service must be shorter than the MTD • Must balance the cost of system inoperability against the cost of recovery

  14. Management of Information Security, 3rd ed. Timing and Sequence of CP Elements Figure 3-6 Contingency planning implementation timeline Source: Course Technology/Cengage Learning

  15. Incident Response Plan The question is not will an incident occur, but rather when an incident will occur • A detailed set of processes and procedures that commence when an incident is detected • When a threat becomes a valid attack, it is classified as an information security incident if it: • directed against information assets • a realistic chance of success • threatens the confidentiality, integrity, or availability of information assets

  16. Incident Response Plan (cont’d.) Who creates the incident response plan? • Planners develop and document the procedures that must be performed during the incident and immediately after the incident has ceased • Separate functional areas may develop different procedures

  17. Incident Response Plan (cont’d.) • Develop procedures for tasks that must be performed in advance of the incident • Details of data backup schedules • Disaster recovery preparation • Training schedules • Testing plans • Copies of service agreements • Business continuity plans

  18. Management of Information Security, 3rd ed. Incident Response Plan (cont’d.) Figure 3-3 Incident response planning Source: Course Technology/Cengage Learning

  19. Incident Response Plan (cont’d.) • Planning requires a detailed understanding of the information systems and the threats they face • The IR planning team seeks to develop pre-defined responses that guide users through the steps needed to respond to an incident

  20. Incident Response Plan (cont’d.) • Incident classification • Determine whether an event is an actual incident • Uses initial reports from end users, intrusion detection systems, host- and network-based virus detection software, and systems administrators (Example: RSA Data Loss Prevention)

  21. Incident Response Software

  22. Incident Response Plan Tools

  23. Incident Response Plan Tools

  24. Incident Response Plan: Indicators http://www.npr.org/blogs/thetwo-way/2013/01/16/169528579/outsourced-employee-sends-own-job-to-china-surfs-web • Possible indicators • Probable indicators • Definite indicators • When the following occur, the corresponding IR must be immediately activated • Loss of availability • Loss of integrity • Loss of confidentiality • Violation of policy • Violation of law

  25. Incident Response Plan (cont’d.) • Once an actual incident has been confirmed and properly classified • IR team moves from the detection phase to the reaction phase • A number of action steps must occur quickly and may occur concurrently

  26. Incident Response Plan: Action Steps • Notification of key personnel (alert roster) • Assignment of tasks • Documentation of the incident

  27. Incident Response Plan (cont’d.) • The essential task of IR is to stop the incident or contain its impact • Incident containment strategies focus on two tasks:

  28. IRP: Stopping the Incident • Containment strategies • Once contained and system control regained, incident recovery can begin • Incident damage assessment • An incident may increase in scope or severity to the point that the IRP cannot adequately contain the incident

  29. IRP: Recovery Process • Identify the vulnerabilities • Address the safeguards that failed • Evaluate monitoring capabilities (if present) • Restore the data from backups as needed • Restore the services and processes in use • Continuously monitor the system • Restore the confidence of the members

  30. Incident Response Plan (cont’d.) • When an incident violates civil or criminal law, it is the organization’s responsibility to notify the proper authorities • Involving law enforcement has both advantages and disadvantages

  31. Article: Incident Response – SANS Survey

  32. Disaster Recovery Plan • The preparation for and recovery from a disaster, whether natural or man made • In general, an incident is a disaster when:

  33. Disaster Recovery Plan (cont’d.) • The key role of a DRP is defining how to reestablish operations at the location where the organization is usually located • Common DRP classifications: • Natural Disasters • Human-made Disasters • Scenario development and impact analysis • Used to categorize the level of threat of each potential disaster

  34. Disaster Recovery Plan (cont’d.) Discussion on Disaster Recovery Myths

  35. Dispelling 10 Common Disaster Recovery Myths:Lessons Learned from Hurricane Katrina andOther Disasters BRETT J. L. LANDRY University of Dallas AND M. SCOTT KOGER Western Carolina University

  36. Common Myths to Avoid in Disaster Recovery • Only Plan for Natural Disasters • Mock Tests are not Enough • External Threats are the only Attack on Resources • Data Recovery Sites are Ready for a DR • Employee Non-Working Areas are Adequately Equipped

  37. Common Myths to Avoid in Disaster Recovery • Implementing DR Testing at a Later Time for New Systems • Replacement Equipment will be Available for DR During or After • Back-up Data Works and can be Restored after DR • DR can be Planned in Company Depts. • Employees are Aware of what they Need to Do

  38. Disaster Recovery • Be a ‘Pessimist’ - (TV show Doomdayers) • Plan, plan, and plan • Multiple scenarios • Have a Multitude of Backups and Contingencies • Test – Scheduled and Unscheduled • Keep DR Planning and Preparation as an Continuous Task

  39. Beyond The Article https://www-01.ibm.com/support/knowledgecenter/ssw_ibm_i_71/rzarm/rzarmdisastr.htm http://www.sungardas.com/Documents/disaster-recovery-plan-template-SFW-WPS-086.pdf http://www.disasterrecovery.org/plan_steps.html • Multitude of Vendors that help with DR Plans • Put together a Disaster Recovery Team • Document Everything have a Manual • Personal Experiences

  40. Disaster Recovery Plan (cont’d.) Discussion on Disaster Recovery Checklist

  41. Business Continuity Plan • Ensures critical business functions can continue in a disaster • Activated and executed concurrently with the DRP when needed • Relies on identification of critical business functions and the resources to support them

  42. BCP: Strategies • Continuity strategies

  43. Business Continuity Plan:Site Options • Hot Sites • Warm Sites • Cold Sites • Other Alternatives: Timeshares, Service Bureaus, Mutual Agreements Ex. RSA data centers – lease 2 - 10gig Ethernet lines between MA and NC

  44. Business Continuity Plan (cont’d.) • To get any BCP site running quickly organization must be able to recover data • Options include:

  45. Timing and Sequence of CP Elements Figure 3-4 Incident response and disaster recovery Source: Course Technology/Cengage Learning

  46. Timing and Sequence of BCP Source: Course Technology/Cengage Learning

  47. Management of Information Security, 3rd ed. Timing and Sequence of CP Elements Figure 3-6 Contingency planning implementation timeline Source: Course Technology/Cengage Learning

More Related