200 likes | 328 Views
Cyber security implementation - MIA. Ag u Kivimägi Head of Department for Cybersecurity , Strategy Division 8.11.2012. SMIT – IT and Development Centre, Ministry of Interior, Estonia. Ca 10 000 end users, 3 4 0 different locations, 50 server rooms ca 1200 servers
E N D
Cyber security implementation - MIA Agu Kivimägi Head ofDepartmentforCybersecurity, StrategyDivision 8.11.2012
SMIT – IT and Development Centre, Ministry of Interior, Estonia • Ca 10 000 end users, • 340different locations, • 50server rooms • ca 1200 servers • We provide 180 ICT services Operative radio communication,passport printing, e-police information system, 112-emergency call system, border guard information system, visa- Schengen-, EURODAC, geo-informationsystem forrescue services …
Director Assistant Support Division Infrastructure Division Strategy Division Development Division Administrative Division Data Services Division Cyber Security Department Department of Analysis Finance and Foreign Aid Department Department of Administration Server Services Department Project Management Department Legal and Procurement Department Special Projects Department Department of Software Development Quality Department Communications Department Department of General Administration Computer Workstation Services Division
Cybersecurity Department • Risk management • Security organisation • Policys, - requirements, securitydocumentation • Awareness, training, education • Supervision • Recommendations, improvements
Questions to answer • How secure is our institution? • When top management could be satisfied with the security situation? • How to measure the security level? • How to define where to invest?
What is the objective of cyber security To protect IT system against cyber attacks OR Capability to manage ICT services
ISO 27 000 seires ITIL ISM 3
Service design 1.Design coordination 2.Service Catalogue 3.Service level Management 4.Availability Management 5.Capacity Management 6.IT Service Continuity Management 7.Information Security Management System 8.Supplier Management
Service transition 1.Transition planning and support 2.Change management 3.Service asset and configuration management 4.Release and deployment management 5.Service validation and testing 6.Change evaluation 7.Knowledge management
Service operation 1.Event management 2.Incident management 3.Request fulfillment 4.Problem management 5.Access management
ISO 27000 series • ISO 27001 – Information security management systems (ISMS) Requirements • specification for an ISMS • ISO 27002 – Code of practice for information security management • guidelines for implementing, maintaining ISMS • ISO 27003 – PDCA (plan-do-check-act) • ISO 27004 - metrics • ISO 27005 - information security risk management • ….
ISM3 processes • Generic Processes (3) • Strategic Processes (4) • Tactical Processes (12) • Operational Processes (26)