170 likes | 328 Views
BEST SECURITY PRACTICES. GUY KING Computer Sciences Corporation Defense Group Information Security and Operations Center Presented by: Tong Xu. Agenda. Introduction Definition of Best Security Practice (BSP) Security process framework (SPF) BSP life cycle Summary. Introduction.
E N D
BEST SECURITY PRACTICES GUY KING Computer Sciences Corporation Defense Group Information Security and Operations Center Presented by: Tong Xu
Agenda • Introduction • Definition of Best Security Practice (BSP) • Security process framework (SPF) • BSP life cycle • Summary
Introduction • Technology vs. Human practices • Best practices • Proven effective by one or more organizations • Promising to be effective if adapted by other organizations • The need for BSP
Best Security Practices • Security implementations • Technical: software, hardware • Physical: physical barriers, locks, etc. • Administrative: the practices of people • BSP is an administrative means • Good security practices are the foundation of security
Human practice Security-related Shown by experience to be effective A best existing practice Among the most effective Not IT mechanism Not business practice Not the result of armchair theorizing Not the best possible practice Not necessarily the single best Definition and ClarificationA BSP is
Collect the Best, the Good and the Worst Security Practices • Sometimes the good is better than the best • An example of the four levels of excellence: • Good idea • Good practice • Local best practice • Industry best practice • Profit from knowing the worst security practices
BSPs and KM • BSP is about sharing knowledge • Knowledge management (KM) techniques apply to BSP sharing • To document BSP is not enough • Expert-novice interaction is needed for knowledge transfer to occur
Security Process Framework(SPF) • An ordered structure of security processes, used to categorize BSPs • Facilitates BSP sharing and management • Related to the security program • Includes the program areas (high-level security processes) and their sub-processes
The SPF’s 10 Program Areas Security Program Management Customer Security Support Risk Management Certification and Accreditation (C&A) Personnel Security Security Training Physical Security Contingency Planning Technical Security Incident Response
Two Major Divisions of SPF Organizational security program (OSP) vs System security program(SSP) • Apply different BSPs • Pertain to the same program areas • The ten security processes of each division follow a four-phase life cycle • The operate phase of the OSP guides all phases of the SSP
BSP Life Cycle 1 • Identify candidate BSPs • Package BSPs • Evaluate BSPs • Adopt BSPs • Deliver BSPs • Improve BSPs
BSP Life Cycle 2 Package BSPs • Provide sample and template documents, check lists, etc • Document steps, relationship to other BSPs, implementation guidance and resource estimates, metrics
BSP Life Cycle 3 Evaluate BSPs • Preliminary evaluation criteria: • Authenticate the BSP contributors • Check mandatory sections • Ensure BSPs harmless • Evaluation criteria • Effective • Cost and time efficient • Easy to implement • Consistent with other BSPs
Summary • Security industry situations • Education • Sharing of BSPs • Approaches of sharing BSPs