140 likes | 261 Views
IT Security Requirements. Protection requirements Safeguards Controls Preventive (before) Detective (during) Corrective (after). IT Security ”Catalogue” for Controls Suitable (reasonable) set of Security Requirements. Standard ISO/IEC 17799 (BS 7799-1) International Standard
E N D
IT Security Requirements • Protection requirements • Safeguards • Controls • Preventive (before) • Detective (during) • Corrective (after)
IT Security ”Catalogue” for ControlsSuitable (reasonable) set of Security Requirements • Standard • ISO/IEC 17799 (BS 7799-1) • International Standard • ”De Facto” standard • ISF (Information Security Forum) • Standard of Good Practice (Information Security) • Guidelines • ISO/IEC TR 13335, 1-5 • International Technical Reports • Certification (a possibility) • BS 7799 – 2 • Specifies a necessary minimum of Security Requirements
Level of requirement (Terminology) • Should (Shall) • Must • Ought • In reading or in writing?
IT Security requirements • Law (invariable) • National and International • Regulation • Rules • Standard • Policy • Guidance - Guidelines • Procedure • Instruction (Manual operation)
Who specifies the IT Security Requirements ? (Invariable demand or not …) • External (Requirement from outside) • Law (Legal aspect, Legislation) - ”Breaking the rule is punishable” • Departmental order • Requirements from business partners • Certification • Customer agreements • Internal • More or less related to Standards • ISO/IEC 17799, ISF, DS-484 (Danish Norm) - Instans • Management Team / business needs • Risk Assessment • IT Security Policy • IT Security Guidelines (hierarchy) • Informal • Ethics • Code of ethics • Valuable property
IT Security Policy • Use for • Signal to business partners and employees • Responsible (Create, update, create awareness) • IT Security Manager • Approved • Board of directors • Relation to • Businesss Strategy • Characteristics • High abstract language, non technical and max 2 pages • Content • We shall …. Example follows ISF Standard of Good Practice • Apply to • IT Security Guidelines • Type of document • Official (should be) but can be kept secret from the public
IT Security Guidelines • Use for • Directions of employees • Responsible (Create, update, create awareness) • IT Security Manager in co-operation with the people who need the guideline • Approved • Executive management • Relation to • IT Security Policy • Characteristics • More concrete language in use for users or technical part • Content • We shall for network dial-up solutions …. • Allways use strong authentication with one-time-password generator • Apply to • IT Instruction or procedure • Type of document • Keep secret for public
Network Security Policy (Guideline) • Use for • Keep the focus on security in the network • Responsible (Create, update, create awareness) • IT Security Manager in co-operation with the network team • Approved • Executive management / IT management • Relation to • IT Security Policy • Characteristics • More concrete language use for technical part • Content • We shall protect our Intranet as if it is the Internet • We shall allways use Switch-to-the-desktop on the LANs • Apply to • Network instruction or procedure • Type of document • Keep secret for public
Creating IT Security Guideline • Choose one guideline from ISF • Example CN23 • Just follow ”The One and only” • Choose three guidelines from ISF • Example CN23+CB53+SM54 • ”Shake up” the three guidelines an create your own • Make do the new guideline more concrete • Do something different ?
In the ”real” world • Documentation use for • Quality arrangement • Homogeneity in the way of doing things • Priority • Written guidelines (Easy to see what the staff do) • Verbal guidelines to follow (Praxis should be in accordance with what the staff tell you) • Nothing (A problem) • State • Guidelines • Reality (the guidelines ”wont” be used ?) • Be granted an exemption from the IT Security department • Important to find a balance between what you create of paperworks, documentation and what will be used in the future
IT Security level • Relative (?) • Choose a satisfactory level of IT Security (trust?) • A Company can choose to Live up to • Guidance • ISO/IEC 17799-1 • ISF • DS 484-1 • Certification • BS 7799-2 • DS 484-2 • Result • ISF - ”the solution” < Some point to be addressed (goal for the auditor) • ISF - ”the solution” = Satisfactory • ISF - ”the solution” > Better than ISF (maybe the company decision)
Evolution (obsoleted and new) • Who should take care? • Standards • BS7799 will soon come in a new version • IT Security Policy • How to handle the relation to IT Security Guidelines?
IT Security Organisation • Corporate level • IT Security Officier • Normally responsible for one or more IT Security Managers • Company • IT Security Manager • Normally refer to board of directors in the Compagny • Responsible for IT Security Department • IT Security Consultant • Staff in the IT Security Department • IT Security Co-ordinator • Replacement for IT Security Manager • Department • Line managers in general are responsible for security within their areas • IT Security Responsible • Example a staff in the Network Department responsible for the firewall system • Employees • To be trained for IT Security Awareness
Auditing and the Auditors • Who controls the controls and why? • IT and financial auditors (Internal and External) • There is a need for current audit because the solutions will always ”sand up” • Who are using the auditors and why? • Board of directors • Prosecution if something is going wrong • The Company Accountants • Shareholders (Stockholders) • When convincing the Business Partners and Customers • Prove that the IT Security level is satisfactory • Declaration (Yearly Statement) • Business partners • The public