90 likes | 253 Views
Office of Campus Information Security. Stefan Wahe (smwahe@wisc.edu) Sr. Information Security Analyst. Driving a Security Architecture by Assessing Risk. Realizing our Principles. Answering the question, “Why?” To have a common understanding of building a secure architecture.
E N D
Office of Campus Information Security Stefan Wahe (smwahe@wisc.edu) Sr. Information Security Analyst Driving a Security Architecture by Assessing Risk
Realizing our Principles • Answering the question, “Why?” • To have a common understanding of building a secure architecture. • Developed based on NIST 800-27,, ISO 20071, CIC schools, and other publications.
OCIS IT Security Principles Security is Everyone’s Responsibility • Security is Part of the Development Life Cycle • Information Privacy and Assurance; Usability; and Defense in Depth. • Security is Asset Management • Classify Information; Least Privilege; and Separation of Duties. • Security is a Common Understanding • Due Diligence; Manage Threats, Risks, and Costs; and Incident Management.
Risk Assessment Process Step 1: Letter of Engagement Step 2: Conduct the Assessment Step 3: Draft Report on Findings Step 4: Communicate Findings Step 5: Re-Assess
Building a Common Understanding: Managing Risk Impact Likelihood Risk Mitigation Controls $ Care $ $
Example Question • Does the system maintain Configuration Management methodology that includes: • A documented process for reviewing, approving and implementing changes • Version control for software system components • Timely identification and installation of all applicable patches for any software used in the provisioning of the CS.
Common Gaps • Common Security Gaps (examples) • The system infrastructure needs to be segmented with robust firewall controls. • Encryption controls and key management procedures should be implemented for data at rest. • Restricted data needs to be sanitized in non-production environments. • Intrusion detection, prevention and log management devices should be installed and maintained with appropriate alerting processes.
Integrating a Security Culture • Awareness and Training • SANS Secure Web Development • Policy Development and Best Practices • Restricted Information Management Practices • Desktop Encryption Policy • Centralized Resources • Security Event Management • Network Management • Desktop Tools • PKI
Questions • How can we help you? 42