410 likes | 430 Views
Lesson 9-Information Security Best Practices. Overview. Understanding administrative security. Security project plans. Understanding technical security. Making use of ISO 17799. Understanding Administrative Security. Administrative security policies:
E N D
Overview • Understanding administrative security. • Security project plans. • Understanding technical security. • Making use of ISO 17799.
Understanding Administrative Security Administrative security policies: • Define the importance of information and information systems to the company and its employees. • Define the resources required to accomplish appropriate risk management activities. • Identify the individuals responsible for managing the information security risk for the organization.
Understanding Administrative Security Administrative security policies fall under the following areas: • Policies and procedures. • Resources. • Responsibility. • Education. • Contingency plans.
Policies and Procedures The most important policies that organizations must draft are: • Information policy - Defines the level of sensitivity of information assets within the organization. • Security policy - Defines the technical controls and security configurations to be implemented on all computer systems.
Policies and Procedures The most important policies that organizations must draft are (continued): • Use policy - Identifies the approved uses of organization computer systems and the penalties for misusing such systems. • Backup policy - Defines the frequency of information backups and the method of moving backups to an off-site storage.
Policies and Procedures Organizations must define the following procedures: • User management - Includes information about individuals who can authorize access to the organization’s computer systems. • System administration - Defines the process of implementing the organization’s security policy on various systems. • Configuration management - Defines the steps for making changes to production systems.
Resources Determining required resources depends on: • The size of the organization. • The organization’s business. • The risk to the organization. • The full risk assessment of the organization. • The plan to manage risk.
Resources The project management triangle
Resources The security department staff members should have the following skills: • Security administration - A thorough understanding of day-to-day administration of security devices. • Policy development - Hands-on experience in the development and maintenance of security policies, procedures, and plans. • Architecture - An understanding of network and system architectures and implementation of new systems.
Resources The security department staff members should have the following skills (continued): • Research - The examination of new security technologies for risk assessment. • Assessment - Experience in conducting risk assessment activities, such as penetration and security testing. • Audit - Experience in conducting system and procedure audits.
Resources An organization’s security budget is based on: • The scope and time frame of the security project. • The capital expenditures, current operations, and cost of training. • The security project plans.
Responsibility • An executive-level position must own security responsibilities within an organization. • They should have the authority to define the organization’s policy and sign off on all security-related policies. • They should also have the authority to enforce policy. • They should develop metrics to track the progress toward security goals.
Education The best practices for education includes: • Preventive measures. • Enforcement measures. • Incentive measures.
Preventive Measures • Preventive measures can be used to explain the importance and need to protect an organization’s information assets. • It will make employees comply with policies and procedures. • It includes awareness programs, publicity campaigns, electronic mail messages, and pop-up windows.
Enforcement Measures • Enforcement measures force employees to abide by the organization’s policies and procedures. • It can be enforced in the form of security-awareness training. • Employees can also be provided copies of relevant policies. • They can also be asked to sign a security statement.
Incentive Programs Incentive programs: • Can increase the reporting of security issues. • Can be in the form of monetary incentives or verbal encouragement. • Can also be used for suggestions on how to improve security.
Contingency Plans Contingency plans include: • Incident response - Defines the series of steps to be taken in the event of a compromise. • Backup and data archival - Defines how and when backups are to be taken. It also specifies the backup storage and restore mechanisms. • Disaster recovery - Identifies the most critical resources and states the need and objectives in the event of a disaster.
Security Project Plans Best practices recommend that the security department must establish the following plans: • Improvement plans - Address the risk areas and implement appropriate changes to the environment. • Vulnerability assessment - Includes regular scans of the organization’s systems. It also includes regular follow-up with system administrators to ensure corrective actions are being taken.
Security Project Plans Best practices recommend that the security department must establish the following plans (continued): • Assessment plans - Frequently assess the risk to the organization. • Audit plans - Ensures policy compliance. • Training - Includes schedules for awareness training classes and publicity campaigns. • Policy evaluation - Includes built-in review schedules.
Understanding Technical Security • Network connectivity. • Malicious code protection. • Authentication. • Monitoring.
Understanding Technical Security • Encryption. • Patching systems. • Backup and recovery. • Physical security.
Network Connectivity To protect an organization from unwanted intrusions, the following network connectivity practices are recommended: • Permanent connections - Network connection to other organizations or the Internet is protected by a firewall. This prevents damage in one network to spread to others. • Remote access connections - These connections can be dial-in connections or connections across the Internet. Two-factor authentication, such as dial-back modems or dynamic passwords is recommended.
Malicious Code Protection To protect systems from computer viruses or Trojan horse programs: • Use anti-virus programs for servers, desktops, and e-mail systems. • Allow frequent signature updates and the delivery of updates.
Authentication The following are the recommended best practices for password usage: • Passwords must be a minimum of eight characters in length. • The last ten passwords should not be reused. • It should always be stored in encrypted form, which is inaccessible to normal users. • It should not be more than 60 days old. • It should be composed of alphanumeric characters.
Authentication The following are the recommended best practices for password usage (continued): • Dynamic passwords or other two-factor authentication mechanisms offer added security. • Systems should be configured to start a screen saver while the employee is away. The system should require re-authentication to access the system.
Monitoring Auditing is a mechanism of monitoring actions that occur on a computer system. The audit log or files must keep track of the following events: • Login/logoff. • Failed login attempts. • Dial-in connection attempts. • Supervisor/administrator/root login. • Supervisor/administrator/root privileged functions. • Sensitive file access.
Monitoring • Intrusion detection systems (IDS) monitor networks or systems. • They trigger an alarm when security is compromised. • Host-based IDS may be used to examine log files. • Network-based IDS helps monitor the network for attacks or unusual traffic.
Encryption • Encrypt information while transmitting over unsecured lines or electronic mail. • Choose an algorithm that matches the sensitivity of the information being protected. Use well-known and well-tested encryption algorithms.
Encryption • Use link encryption for transmission lines between organization facilities. • Follow regulatory standards, such as HIPAA while transmitting over open networks.
Patching Systems • Patches correct vulnerabilities. • Install patches only after testing. • Install patches according to the organization’s change control procedures. • Check for new patches frequently.
Backup and Recovery • Information on servers should be backed up regularly. • Verify all backups to determine if the backup successfully copied the important files. • Establish regular schedules of tests. • Backups must be accessible to restore systems in the event of system failures. • Backups should be stored off-site for protection.
Physical Security The following physical security mechanisms are recommended: • Physical access - Restrict access to data center, where all sensitive computers are kept. • Climate - Configure climate control units to notify administrators if a failure occurs.
Physical Security The following physical security mechanisms are recommended (continued): • Fire suppression - Configure fire-suppression systems to prevent any damage to the systems in the data center. • Electrical power - Size battery backups to provide sufficient power for computer systems to shut down.
Making Use of ISO 17799 The Information Technology - Code of Practice for Information Security Management (ISO 17799) covers the following areas: • Security policy - Covers the need for a security policy. It also recommends regular reviews and evaluation of the document.
Making Use of ISO 17799 The Information Technology - Code of Practice for Information Security Management (ISO 17799) covers the following areas (continued): • Organizational security - Covers how information security functions are managed within an organization. • Asset classification and control - Covers the need to properly protect both physical and information assets.
Making Use of ISO 17799 ISO 17799 key concepts include: • Personal security - Discusses the need to manage the risk within the hiring process and ongoing employee education. • Physical and environmental security - Discusses the need to protect all physical assets from theft, fire, and other hazards. • Communication and operations management- Covers the need for documented management procedures for computers and networks.
Making Use of ISO 17799 ISO 17799 key concepts include (continued): • Access control - Discusses the control of access to information, systems, networks, and applications. • Systems development and maintenance - Discusses the inclusion of security in development projects.
Making Use of ISO 17799 ISO 17799 key concepts include (continued): • Business continuity management - Discusses the risks of business interruptions and various alternatives for continuity management. • Compliance - Discusses how the organization should enforce policy and check compliance.
Summary • Administrative security practices include policies and procedures, resources, responsibility, education, and contingency plans. • The security department must establish plans for improvement, assessment, vulnerability assessment, audits, training, and policy evaluation.
Summary • Technical security measures deal with the implementation of security controls on computers and networked systems. • ISO 17799 standards help establish an effective security program.