460 likes | 507 Views
How to Conduct an Information Security (INFOSEC) Assessment. The NSA INFOSEC Assessment Methodology (IAM). Stephen Mencik, CISSP ACS Defense, Inc. Agenda. What is an INFOSEC Assessment? The need for a common Assessment Methodology The NSA INFOSEC Assessment Methodology (IAM).
E N D
How to Conduct an Information Security (INFOSEC) Assessment The NSA INFOSEC Assessment Methodology (IAM) Stephen Mencik, CISSP ACS Defense, Inc.
Agenda • What is an INFOSEC Assessment? • The need for a common Assessment Methodology • The NSA INFOSEC Assessment Methodology (IAM)
What Is an INFOSEC Assessment? A review of the Information System Security (INFOSEC) posture of operational system(s) for the purpose of identifying potential vulnerabilities. Once identified, recommendations are provided for the elimination or mitigation of the vulnerability.
INFOSEC Assurance Vulnerability Discovery Triad Assessments (Level 1) Evaluations (Level 2) Red Team (Level 3)
INFOSEC Assessment Characteristics • No hands-on testing • Management buy-in • Success depends on cooperation of people • Non-attribution
What Is the Purpose of an INFOSEC Assessment? • An INFOSEC Assessment allows one to: • Determine which information is critical to the organization • Identify the systems that process, store, or transmit that critical information • Determine the proper INFOSEC posture for these systems • Identify potential vulnerabilities • Recommend solutions to mitigate or eliminate those vulnerabilities
Why the Need for a Common Assessment Methodology? • Compare results over time • Compare assessments done by different teams
The NSA INFOSEC Assessment Methodology • Developed by the National Security Agency (NSA) during the mid-late 1990’s • NSA had more assessment requests than they could handle • Needed a common methodology to be used by all contractors performing assessments on NSA’s behalf • Provided to the public sector as a community service
IAM Phases Phase 1 Phase 2 Phase 3 Post-Assessment Pre-Assessment Assessment On-Site On/Off-Site
Pre-assessment Phase • Purpose • Gain an understanding of the criticality of the customer’s information • Identify system, including system boundaries • Coordinate logistics with the customer • Write an assessment plan
On-site Activities • Purpose • To explore and confirm the information and conclusions made during the Pre-Assessment Phase • To perform data gathering and validation • Interviews • Documentation • System demonstrations • To provide initial analysis and feedback to the customer
Post-assessment • Finalize analysis • Preparation and coordination of a final report
On-site Details • Gather and validate system information • Interviews • System demonstrations • Documentation review • Analyze assessment information • Develop initial recommendations
Interviews • Used to: • Gain information from a larger cross section of the organization • Learn how operations “really” occur
System Demonstrations • Useful tool to supplement information gathering • Can be used to resolve conflicting information
Additional Documentation Review • Supplements information gathered during interviews • Added assurance if it is documented • Lack of documentation is a finding
Baseline Information Categories 10. Contingency Planning 11. Maintenance 12. Configuration Management 13. Back-ups 14. Labeling 15. Media Sanitization / Disposal 16. Physical Environment 17. Personnel Security 18. Training and Awareness 1. INFOSEC documentation 2. INFOSEC Roles and Responsibilities 3. Identification & Authentication 4. Account Management 5. Session Controls 6. External Connectivity 7. Telecommunications 8. Auditing 9. Virus Protection
1. INFOSEC Documentation • Policy • Guidelines / requirements • System Security Plans (SSP) • Standard Operating Procedures (SOP) • User system security manuals
2. INFOSEC Roles and Responsibilities • Upper Level Management • Systems Operation • User Community
3. Identification & Authentication • Fundamental building block of INFOSEC • Three methods of implementation • “Something you know” • “Something you have” • “Something you are”
4. Account Management • Documented account management policy and procedures • Written formal account request • General and privileged user agreements • Supervisor and data owner approval for access • Minimal privilege access • Account initialization
4. Account Management (Cont.) • Account termination • Account maintenance • Special accounts
5. Session Controls • Protected, logged on workstation • Time-outs • Lock-screen capability with password • Warning banner
6. External Connectivity • Internet • Modems • Dedicated
7. Telecommunications • Documented requirements and procedures for transmitting sensitive information • Encryption issues • Purpose (confidentiality, integrity, non-repudiation) • Trust in communications medium • Strength of algorithm • Alternate routes for increased availability
8. Auditing • Policy requiring mandatory auditing • SOP defining what to audit • Audit analysis and reporting on a timely basis • SSA trained in audit analysis
9. Virus Protection • Written policy • Personal software allowed? • Scan incoming software • System scans • Update tools • Employee education/training
10. Contingency Planning • Documented plan • Identify mission or business critical functions • Uninterruptible Power Supply (UPS)
11. Maintenance • Policy and procedures • Personnel clearance level • Control of diagnostic software • Remote maintenance access
12. Configuration Management • Documented configuration control plan • Configuration Control Board (CCB) • Software loading issues for SSA approval
13. Back-ups • Documented in SSP and SOP • Schedule • Proper storage • Periodic testing of back-ups
14. Labeling • Policy/SOPs • Document what/why information is sensitive • Employees trained on proper marking procedures • Removable media • System components
15. Media Sanitization/Disposal • Documented policy and SOPs • Media sanitization methods • Establish responsibilities • User education/training • Contract concerns
16. Physical Environment • Physical environment can be used to offset lack of system security capabilities • Ramifications to INFOSEC posture
17. Personnel Security • Background checks • Security clearance • Signed user agreements • Employee awareness of social engineering techniques
18. Training and Awareness • Users are usually the weakest link in security • Documented responsibilities • Formal INFOSEC training program for users and SSA
Baseline Information Categories Summary • All categories need to be addressed • Category details will be dependent on the specific system • Additional categories can be included
Analysis of Vulnerabilities • Identify weaknesses or vulnerabilities in the system and operations that could potentially be exploited by an adversary
Threat Aspects • Environmental • Human • External • Internal malicious • Internal inadvertent
Develop Recommendations • The assessment team will develop a list of recommended technical and operational security countermeasures to the identified system vulnerabilities
Post-assessment Activities Phase • Additional review of documentation • Additional expertise • Report Coordination
Summary IAM Baseline Activities • Pre-Assessment • On-site customer coordination • Information criticality analysis with matrices • Customers concerns • Documented INFOSEC assessment plan
Summary IAM Baseline Activities • On-site Assessment • Information gathering • Interviews • Documentation review • System demonstrations • 18 baseline information categories
Summary IAM Baseline Activities • Post-Assessment • Documented report
Useful Links • http://www.iatrp.com/iam.cfm Official IAM site • http://www.iatrp.com/indivu2.cfm List of individuals certified to perform assessments using IAM • http://www.iatrp.com/certclass.cfm Information on 2-day IAM training leading to certification
Contact Information Stephen Mencik Sr. INFOSEC Engineer ACS Defense, Inc. 9020 Mendenhall Ct., Suite J. Columbia, MD 21045 (410) 953-7313 stephen.mencik@acs-inc.com steve@mencik.com