Cism Exam Guide
Cism Exam Guide
ESSENTIAL
CISM
Exam Guide
Updated for the
15th Edition Review Manual
Phil Martin
ISBN 978-1-98068-442-8
Essential CISM
Contents
Contents
CONTENTS
FIGURES
TABLES
ABOUT THE
THE EXAM
HOW TO USE THIS BOOK
SECTION 1: THE BASICS
CHAPTER 1: SECURITY CONCEPTS
CHAPTER 2:
2: GOVERNANCE, GOALS, STRATEGIES,
STRATEGIES, POLICIES, STANDARDS AND
PROCEDURES
PROCEDU RES
CHAPTER 3:
3: STRATEGY
CHAPTER 4: RISK APPETITE, TOLERANCE AND CAPACITY
CHAPTER 5:
5: ANALYSIS OF RISK
CHAPTER 6:
6: CONTROLLING THREATS AND RISK
CHAPTER 7: CONTROLS AND COUNTERMEASURES
CHAPTER 8:
8: ALE, RTO, RPO, SDO, MTO, MTD AND AIW
CHAPTER 9:
9: BCP, DRP AND BIA
CHAPTER 10: BUSINESS CONTINUITY AND DISASTER RECOVERY
CHAPTER 11:
11: TESTING INCIDENT RESPONSE, BUSINESS CONTINUITY PLANS
CONTINUITY PLANS AND
DISASTER RECOVERY
RECOVERY PLANS
CHAPTER 12: ROLES, RESPONSIBILITIES, RACI AND SKILLS
CHAPTER 13:
13: DUE DILIGENCE
DILIGENCE AND DUE CARE
CHAPTER 14:
14: SECURITY
SECURITY PRINCIPLES
CHAPTER 15: KGIS, KPIS, KRIS AND CSFS
INDEX
Figuress
Figure
Figure 1:
1: Goals, Strategies, Policies, Stan dards, Procedures and Guidelines
Figure 2:
2: Optimizing Risk Costs
Figure 3:
3: Qualitative Impact Matrix
Figure 4:
4: Semiquantitative Matrix
Figure 5:
5: Information Security Relationships
Figure 6:
6: Control Types and Effect
Figure 7:Techniques
7:Techniques Implemented in Relation
Relation to RTOs and RPOs
Figure 8:
8: COBIT 5 Principles
Figure 9:
9: COBIT 5 Enterprise Enable rs
Figure 10:
10: Overview of the Process Assessment
As sessment Model
Figure 11:
11: TOGAF Architecture Development
Development Cycle
Figure 12:
12: Characteristics of CMMI Maturity Levels
Figure 13:
13: Balanced Scorecard Dimensions
Dimensions
Figure 14:
14: How Cultures are Created
Figure 15:
15: Common Framework LayersLayers
Figure 16:
16: Enterprise Architecture Domains
Figure 17:
17: Classic Architecture vs. Cloud Computing
Computing
Figure 18:
18: Cloud Computing Deployment Models
Figure 19:
19: 'as a Service' Offerings
Offerings
Figure 20:
20: Cloud Computing Risk Map
Figure 21:
21: Business Model for Information
Information Security
Figure 22:
22: Governance Relationships
Relationships
Figure 23:
23: Information Security Strategy
Strategy Development Participants
Figure 24:
24: Prevalent Standards and
and Frameworks
Figure
Figure 25:
26: Relationship
Components ofof Security
Governance Elements
Metrics
Figure 27: The IT Risk Management Life Cycle
Figure 28: Top Layer of Business Risk Structure
Figure 29: Critical Function Layer of Business Risk Structure
Figure 30: Aligning Assets to the Critical Layer Function
Figure 31: Asset Vulnerabilities
Figure 32: Combined Impact Risk Structure
Figure 33: Risk Analysis Framework
Figure 34: Factor analysis of information risk (FAIR)
Figure 35: Risk Scenario Structure
Figure 36: PDCA Methodology
Tables
Table 1: Basic Recovery Tests and Categories
Table 2: A RACI Example
Table 3: Roles and Responsibilities RACI Matrix
Table 4: Security Content and Application
Table 5: Security Incident Roles and Responsibilities
Principle of of
The principle Least
leastPrivilege
privilege is an approach that segments all resources so
that we can increase access as-needed. This allows us to give people access
only to the bare minimum resources they need to do their job. The downside
of this approach is that it requires a well-thought-out plan from the very
beginning and requires increased attention to ensure resources are properly
segmented.
Need-to-Know
Need-to-know is a security approach that requires a person to not only have
the proper authority to access resources, but also a valid need to do so. For
example, it is not enough to be given authority to read customer files – your
role in the company must also require it. This provides an extra layer of
security to keep information out of the wrong hands.
Segregation of Duties
Segregation of duties, or SOD, is a security mechanism that prevents a single
role from having too much power. For example, in a bank, the same person
who prints a check should not have the ability to change the name on that
check – it should require a different person to execute both actions. This
greatly reduces the chance of fraud.
Criticality
Criticality is the impact that the loss of an asset will have, or how important
the asset is to the business. For example, if the loss of a specific IT system
would prevent orders from being processed until the system is returned to a
usable state, it is most definitely critical to the business. On the other hand,
payroll processing is not as critical – while the permanent loss of the ability
to pay employees would certainly cause a mass exodus of people at some
point, we can probably absorb a lengthier downtime.
Sensitivity
Sensitivity is the impact that unauthorized disclosure of the asset will have,
meaning that people that should not see information are able to get to it.
Consider a scenario in which we want to keep the recipe to our secret sauce
from getting out. The leakage of this information would not impact our day-
to-day operations, so it is not considered to be critical. But, we would be
losing one of our core advantages over competitors, and so the recipe is said
to have a high sensitivity.
Assurance
ssurance, related to security information, means that we can manage
security risks by keeping vulnerabilities and threats to a level that we can live
with. For example, if we deploy a firewall and encryption techniques to help
protect access to a database, then we are assuring the database is being kept
secure.
TCO
The total cost of ownership, or TCO, represents the true cost to own an asset,
as opposed to just the cost to initially acquire it. TCO at a minimum covers
the original cost, any upgrades, ongoing maintenance, support, and training.
Figure 1: Goals,
Goals, Strategies, Policies,
Policies, Standards,
Standards, Procedures and Guidelines
Governance
In a nutshell, governance is the act of creating a plan on how a company will
achieve a goal and then making sure everyone executes that plan.
Governance is the responsibility of the board and company executives. These
folks at the top might delegate a lot of the footwork, but they are ultimately
responsible to ensure the plan is properly implemented. A core tenant of
governance is that the people tasked with it must have the authority to
enforce it. After all, what good does it do to have the responsibility of
multiple
will also standards for each
need a standard forpolicy. For example,
high security in the (such
information example above
as the we
existence
of Mars colonists on the spaceship), as only low and medium security
domains were addressed.
When we encounter a standard for which there is not a readily available
technology, or there is some other reason for which we cannot create a
process to meet the standard, we must create an exception process. For
example, let’s assume we want to use a 6-digit pin number to secure some
low-security rooms. That does not follow the standard, and we would
therefore need to follow some exception process to have it approved.
Another way of looking at policies vs. standards is a strategic vs. tactical
viewpoint. Policies are strategic – a high-level view of wherew e want to get
to. Standards are tactical – they represent specific tools we use to get to
where want to go. But a standard by itself doesn’t get any work done – it only
describes at a medium level how it should work. To actually accomplish real
work, we need a procedure!
Procedure
A procedure is an unambiguous list of steps required to accomplish a task. It
must define the following:
If
If aa task
task is preferred
is purely but not mandatory,
discretionary , use the use the‘may
terms termor
‘should’
‘can’
Chapter 3: Strategy
Overview
In its simplest form, the term strategy can be defined as…
…a plan to achieve a goal.
But if we dig a little deeper, we find that any successful plan must have two
components – a well-defined goal and an understanding of the current
conditions. Digging even deeper, we discover that a successful strategy
involves answering the following four questions:
1) Where are we now?
2) Where do we want to be?
3) What is the gap between the two?
4) What do we need to do to close the gap?
Strategies can fail for a number of reasons – let’s walk through them one at a
time.
First of all, overconfidence is a leading cause of failure. Research has shown
that people have way too much confidence in their ability to create accurate
estimates. Most people dislike coming up with estimates that have a wide
range and prefer to be precisely wrong rather than vaguely right.
Additionally, people tend to be more confident in their abilities than their
success history warrants.
Closely related, people tend to be overly optimistici n their forecasts. When
you combine overconfidence with optimism, you wind up with estimates that
will also show more concern over a possible loss than excitement over a
possible gain.
The endowment effect makes people hold something they already own at a
higher value than if they did not already own it. In other words, if I have a
vase that I will not sell for anything less than $20, I probably would not pay
someone else $20 for that same vase if I did not already own it.
The mental accounting effect is seen when we treat money differently based
on where it comes from or how it is spent and is common in boardrooms. For
example, senior management may clamp down on costs for a core business
but spend freely on a startup. Or, they might create new spending categories
with nebulous names such as ‘revenue investment’.
The herding instinct describes the tendency for people to ‘do what everyone
else is doing’. It takes a special leader to step out and take a chance when no
one else is doing it.
False consensus describes the tendency to overestimate the extent to which
other people share our own views or beliefs. When dealing with strategies,
this pitfall can cause someone to ignore important threats or to prolong a
doomed strategy.
Confirmation bias happens when we seek opinions and facts that support a
conclusion we have already reached.
Selective recall occurs when we remember only facts and experiences that
support our current assumptions.
Biased assimilation is encountered when we accept o
nly facts that support
our current position or perspective.
Biased evaluation is very similar, but in this case, we go one step further and
attack anyone presenting those ‘alternative’ facts, even to the point of
personal attacks.
Groupthink is encountered when we experience pressure for agreement in
team-based cultures.
Elements of a Strategy
Once the starting and ending point of a strategy have been defined, what else
should we look
constraints at? The
that need biggest
to be components
examined are going
while creating thetoroad
be resources and
map. A typical
road map includes elements such as people, processes, technologies and other
resources. The interactions between these elements can be quite complex, and
so it is probably a smart move to employ a security framework from the
beginning.
Getting to the desired state is usually a long-term goal that requires multiple
projects and initiatives. It is beneficial to break these down into smaller bite-
sized projects that can be executed in a reasonable time-period. While we
need a long-term road map, everyone must understand that security sits still
for no man, and it is highly likely that some initiatives further down the road
may become obsolete by the time we get there, or at least require some
serious updating. One advantage of breaking long-term projects into multiple
short-term initiatives is that we get built-in checkpoints to revalidate previous
assumptions and to make midcourse corrections. They can also provide
valuable metrics to validate the overall strategy.
Resources
Resources are defined as mechanisms, processes and systems that are
available for use. When considering resources, the strategy must enumerate
all available possibilities, but use existing resources if possible. Here is a list
of the most commonly used resources:
Policies Training
Standards Awareness and education
Procedures Audits
Guidelines Compliance enforcement
Constraints
Constraints are factors that work against efficiency, and typically include the
following ten:
Risk tolerance
appetite , which
a business is the amount
considers of deviation from the risk
acceptable.
Risk capacity, which is the amount of risk a business can absorb
without ceasing to exist.
In general, the following statement must be true:
risk appetite + risk tolerance <= risk capacity
Let’s use an example to make this clearer. Let’s say the Boring company
wants to sell flame throwers. However, there is a risk of customers catching
fire while using the tool. The business does a quick calculation and decides it
has sufficient
business. moneyitfor
Therefore, 7% of
wants to customers to file lawsuits
keep the number before it goes out of
of spontaneously
combusting customers at 5%. So, we have the following:
Risk appetite = 5%
Risk capacity = 7%
Risk tolerance = (7% - 5%) = 2%
Now, risk tolerance is not correct – yet. It is actually expressed as a deviation
from the risk appetite, so the value is actually (2%/5%) = .4, or a 40%
deviation from risk appetite. Risk tolerance is a 40% deviation.
If risk appetite plus risk tolerance is ever more than risk capacity, then
something went wrong. The level of risk must always be equal to or lower
than the risk capacity.
A final term to note: risk acceptance occurs when an organization decides
that no action is required for a specific risk – it is willing to suffer the
consequences instead of expending resources to mitigate it.
Defining these risk values – appetite, capacity and tolerance - is crucial if we
hope to arrive at reasonable goals. It is also necessary if we expect to have
solid criteria by which risk acceptability will be measured.
Before continuing, we need to introduce another term called a control.
Basically, a control is something put into effect to reduce risk. For example,
let’s say the threat of fire is too great, meaning that the risk of fire exceeds
our risk tolerance. In this case, we can install some sprinkler systems to
reduce the likelihood of fire, bringing the risk of fire down below our risk
tolerance level. That sprinkler system is a control. While it reduces risk, it
also costs money to implement.
Figure 2: Optimizing
Optimizing Risk Costs
Figure 2 illustrates the relationships between risk, control and the cost of a
control. The only way to decrease costs due to a negative incident is to
increase the level of controls, which increases upfront control costs. If we
decrease the level of controls, we can save money now but the cost after an
incursion will go up. The sweet spot is where those two lines cross,
representing a happy compromise where our total costs – upfront control
costs plus costs after an incident - will be the lowest. But, without a clear idea
of what ‘acceptable risk’ is, it will be exceedingly difficult to know if a given
sweet spot is acceptable, or where it even lives.
Let’s go back to our sprinkler example to drive this point home. If the cost of
policy costs
RTO, the us $50Kcompany
insurance each year. If wepay
would ever
ushave
up toan$1incident
million that
afterexceeds our
taking out
the $10K deductible.
We could also justify spending up to $50K on controls to mitigate the risk
and not purchase the insurance, as long as we are willing to accept a $10K
residual risk. Residual risk is the amount of risk left over after we have
mitigated a risk. Mitigation does not mean we entirely eliminate risk – it just
means we decrease the level of risk so that it is at or less than our risk
appetite.
For a given risk, there are usually multiple options that will all mitigate the
risk to some extent. However, some will be costlier than others, and so we
must be careful to evaluate and choose the lowest cost option that will
mitigate the risk to an acceptable level. Arriving at the best decision will
usually be an iterative process as we run through various possibilities until
the best choice is identified.
The information security manager must understand that technical controls
such as firewalls or intrusion detection systems (IDS) are just one dimension
that should be considered. Physical, process and procedural controls may
actually be more effective and less costly than a technical control. For
example, we could use biometric scanners and keycard readers to protect an
asset in our local facility that experiences heavy foot traffic, but perhaps
simply moving the asset to an off-site location that almost no one visits
would achieve the same level of protection. In this case a physical control
achieves the same protection as a technical control, but at a much lower cost.
matrix,
increasewith impact such
in severity on the y-axis
that and likelihood
the upper on of
right corner thethe
x-axis. Both
matrix values
represents
the greatest severity. Categories are assigned to each risk such as low risk,
moderate risk or high risk. Figure 3 shows an example of a qualitative
matrix.
Figure 3: Qualitative
Qualitative Impact Matrix
Matrix
Semiquantitative Analysis
Semiquantitative
A semiquantitative analysis uses the same approach as a qualitative analysis,
but instead of using categories to represent levles of risk, a numerical value is
employed. This value is not representative of anything in the real world – it
simply represents a relative value among risks, with a higher number
representing more risk. If this approach is used, it must be noted that the
differences in numerical value may not represent relative severity between
each risk. For example, suppose we assigned a value of 4 to risk of fire, and a
value of 5 to theft. If the magnitude of the numbers are to be taken at face-
value, we might assume that the risk of theft is only slightly higher than the
risk of fire, but in reality theft might be three times as likely to happen as fire.
So just be careful how you use the results.
Typical minimum and maximum values for impact range from 1 representing
no impact to a value of 5 representing a failure or downsizing of the
organization. The values for likelihood range from 1 meaning rare to a value
of 5 representing frequent, or that the event happens on a regular basis. The
risk probability can be calculated using the following formula:
risk = impact x likelihood
risk
For example, if a risk had a major impact of 3 and a likelihood of unlikely or
2, then the resulting risk would be 6. Figure 4s hows an example of a
semiquantitative matrix.
Figure 4: Semiquantitative
Semiquantitative Matrix
Quantitativee Analysis
Quantitativ
In a quantitative analysis numbers are assigned to both impact and
likelihood. Unlike a semiquantitative analysis where a relative value is
sufficient, the accuracy of these numbers in a quantitative analysis is very
important. Some type of formula is designed to calculate a resulting
consequence for each risk, usually expressed in terms of:
Monetary
Technical
Operational
Human impact
Value at Risk
A different approach that is required in some financial sectors is called value
at risk , or VAR, and has shown some promise for information security
management. For this approach to work, we have to a lot of historical data
that is very accurate. We won’t say much more about this approach.
Operationally Critical Threat Asset and Vulnerability Evaluation
Operationally
(OCTAVE)
Another approach to risk assessment is called the operationally critical threat
asset and vulnerability evaluation, or OCTAVE. OCTAVE is great when we
Phase 1 locates all assets and builds a threat profile for each.
Phase 2 locates all network paths and IT components required for
each
are. asset, and then figures out how vulnerable those components
Phase 3 assigns risk to each asset and decides what to do about it.
Other Risk Analysis Methods
Some of the more common alternatives to the options we have discussed are
the following seven.
Figure 5: Info
Information
rmation Security Relationships
time such as drought or may occur annually such as flooding during the wet
season. Some threats are rare enough or impractical to address, such as a
comet strike, and so are generally disregarded or addressed using business
continuity insurance.
The second type of threat is technical which includes:
Fire
Electrical failure
Heating
Ventilating
Air conditioning, or HVAC, failures
Information system and software issues
Telecommunication failures
Gas or water leakage
With proper planning, most of these threats can be managed adequately, with
the possible exceptions of advanced persistent threats or zero-day
vulnerabilities (we’ll discuss both of those in just a moment).
The third type of threat is man-made that results from man-made actions.
Examples are:
Internal Threats
Employees are one of the greatest sources of man-made threats. One way to
mitigate this threat is to apply need-to-know and least privilege access to
prevent access to assets, but this is not a perfect solution, as someonew ill
always have access. The typical malicious insider is a current or former
employee, contractor or business partner who has or had authorized access to
an organization’s network, system or data and intentionally caused harm to
the organization. The first step to mitigate internal threats is with the hiring
process itself by reviewing references and background checks. When hiring,
the employee should be required to sign a nondisclosure agreement (NDA)
and be advise of the organization’s ethics and policies.
Criminal acts
Data corruption
Disease (epidemic)
Espionage
Facility flaws, such as burst water pipes
Fire
Flooding
Hardware flaws
Industrial accidents
Lost assets
Mechanical failures
Power surges
Utility failures
Sabotage
Seismic activity
Severe storms
Software errors
Supply chain interruption
Terrorism
Theft
A zero-day vulnerability is a weakness that is so new a fix is not yet
available. Many times, the only recourse is to disable the system or process
exhibiting the weakness until a fix is available. The ‘zero-day’ name comes
from the risk that an attacker will exploit the vulnerability immediately after
discovery before anyone is aware of its existence.
Intelligence agencies
Criminal groups
Terrorist groups
Activist groups
Armed forces
An emerging threat consists of mounting evidence that something ‘hinky’ is
going on in the organization’s network and systems. This may be unusual
system activity, repeated alarms, slow system or network performance, or
new activity (or excessive activity) in logs. Often, logs will contain advanced
warning of a coming threat, but is overlooked because no one paid attention
to it.
Since technology is almost always built with functionality in-mind and
rushed to market, it is a core source of vulnerabilities. In fact, it is not too
uncommon to discover that new software itself is a threat agent because the
authors had malicious intent. Bring your own device (BYOD) where
employees are allowed to use their personal devices on the corporate network
can be a cost-savings boon to companies, but it brings a substantial increase
of risk with it, so be careful with this tempting trend. On the flip side, a
security posture that focuses on rejection of new technology will completely
fail in short order, so a compromise is essential.
Vulnerabilities
A vulnerability, sometimes called a ‘weakness’ is not a yes or no proposition
– we can’t say an asset is vulnerable or not. Pretty much everything is
vulnerable to something, it is simply a matter of degree. NIST SP 800-30
provides a list of vulnerabilities to consider as well as predisposing
conditions – scenarios which may lead to the rapid or unpredictable
emergence of new vulnerabilities.
Estimating the degree of vulnerability can be carried out by testing or by
using estimates
management thefrom subject in
uncertainty matter experts.
estimates It is important
by using to communicate
either ranges or to
distributions – by doing so we can inform management on unlikely
maximums and likely values.
Be careful not to overplay weaknesses of a single control if it is part of a very
effective mitigation approach when combined with one or more other
controls. For example, a legacy system may have a very weak password
protection mechanism, but if the system is only accessible from a single
physical workstation locked away in a high-security room, it is probably not
worth worrying about. Automated scanning of IT systems can serve as a
leading indicator of vulnerabilities, but process and performance weaknesses
are tougher to uncover.
Vulnerabilities can be grouped into the following categories:
Network vulnerabilities
Physical access
Applications and web-facing services
Utilities
Supply chains
Processes
Equipment
Cloud computing
Internet of Things (IoT)
Some typical examples of vulnerabilities include:
Defective software
Improperly configured hardware/software
Inadequate compliance enforcement
Poor network design
Uncontrolled or defective processes
Inadequate governance or management
Insufficient staff
Lack of knowledge to support users or applications
Lack of security functionality
Lack of proper maintenance
Poor choice of passwords
Transmission of unprotected communications
Lack of redundancy
Poor management communications
Vulnerability management is part of the incident management capability, and
represents the proactive identification, monitoring and repair of any
weakness.
Risk, Likelihood and Impact
We have already defined risk as the likelihood that a threat agent will exploit
a vulnerability combined with the damage that could result. If we were to put
A risk is thewith
combined likelihood that athat
the damage threat agent
could willFor
result. exploit a vulnerability
example, if an Intrusion
Detection System, or IDS, is not implemented on your network, then the risk
of an attack going unnoticed goes up
Probability is the likelihood that a threat will exploit a vulnerability, which is
itself a measure of frequency – how often an event might occur. When
identifying risk, likelihood is used to calculate the level of risk based on the
number of events, combined with the impact that may occur in a given time
period, usually a year. The likelihood combined with the magnitude of the
impact is used to determine ALE (which we will discuss up in a few
chapters). The greater the frequency, the greater the likelihood, the and the
greater the risk.
For example, on the anniversary of its founding, nation states often
experience elevated levels of attacks from foreign countries. Anti-American
countries love to launch attacks on July 4 th. So, the probabilityo
f a threat
exploiting a vulnerability goes up during this time period. But since ALE is
the annualized
span loss expectancy, we spread that increased likelihood over the
of one year.
Determining likelihood requires us to consider the following factors:
potential targets.
the attacker The
will go greater
after the skillset,
high-value the greater the likelihood
assets.
the trisk
Avoid
Transfer by by
he risk terminating the to
outsourcing activity that encounters
third party the risk
or taking out
Risk
Once aOwnership and
risk has been Accountability
identified and evaluated, an owner must be chosen, who
Standards andgoals
achieving its procedures
will be that are too
ignored. restrictive
If we require or prevent the
employees business
to pass froma
through
turnstile, swipe a card, and then submit to an iris scan every time they need to
go to the bathroom, we will very quickly discover that our security devices
have been mysteriously sabotaged. Instead, we need to balance the need for
controls with the requirements for the business. This means the security
manager must have a good business perspective, resulting in controls that are
the least restrictive while still delivering acceptable risk mitigation.
Control Categories
Controls can be grouped into five functional categories:
detectiontrying
hackers system, or IDS,
to carry outthat
a brute-force a detection
will act aslogin attack c against
ontrol by
thelooking
system.for
In
case we don’t catch the attacker and they compromise a system, we use a
backup and restore process as a corrective control to bring the system back
to a usable state. And finally, we add session timeouts as a compensating
control so that if credentials are compromised, the damage is limited to 20
minutes.
Figure 6 shows the relationships between controls and their effects.
Figure 6: Con
Control
trol Types and
and Effect
Control Methods
Controls can implement a procedural, technical or physical method.
A procedural control, sometimes called an administrative control or
managerial control, is anything that oversees or reports on a process and
includes the procedures and operations of that process. This includes policies,
procedures, balancing accounts, employee development and compliance
reporting.
A technical control, sometimes called a logical control, always contains
some type of technology whether it is hardware or software – usually a
combination of both. Examples include firewalls, intrusion detection systems,
passwords and antivirus software. A technical control requires one or more
administrative controls to operate correctly. Most security failures can be
attributed to failures of management, and we need to remember that
management problems do not have a technical solution. Therefore, we need
to be careful about being too reliant on technological controls.
A physical control can physically restrict access to a facility or hardware.
Such controls require maintenance and monitoring, and there should be a way
to react to an alert if the control provides one. Examples are locks, fences and
closed-circuit TV.
Countermeasures
When a control is deployed to counter a specific threat known to exist, it is
called a countermeasure. A countermeasure will be more effective at
countering the specific threat, but as a side-effect will be less efficient than
more general controls. As an example, a firewall is a general control that is
not implemented for a specific threat, while a countermeasure might be using
a router to segment specific systems into their own subnet for added security.
Countermeasures are not necessarily less cost-effective as they usually are
targeted to reduce the cost of any harmful event. Our radiation shield is very
targeted to a specific threat, and while it is very costly, the mission would
certainly not succeed without it.
A countermeasure
enhancement to an may oftencontrol.
existing be a newForcontrol,
example,butifoften
a newit version
is applied
of as
an an
email
scam is uncovered, a spam filter may be enhanced to detect that specific
threat. Security programs must be nimble enough to roll out countermeasures
quickly, often with a special process that bypasses the normal procedures.
However, this exception path must ensure that all change management and
approval processes still take place, even if it is after the fact.
A countermeasure may be preventative, detective or corrective, or any
combination of the three, but are not recognized by ISO 27001 (which is
discussed later) as they address a specific threat. A countermeasure can be
expensive not only in terms of cost, but also because it may distract from core
security operations. Their use should be authorized only after careful
consideration and justification.
We must keep in mind that controls are not the only way to implement
security. In some cases, we can simply reengineer a process or modify an
architecture. Something else to be aware of – at times risk mitigation can
actually reduce business opportunities and will be counterproductive. Some
risks are worth living with when only financial considerations are being
looked at. Ultimately, the goal of information security is to assure that
business goals are achieved. Security for the sake of security is useless.
As a valid example of ignoring risk, suppose a business decides to expand
into manufacturing shoes, where we might encounter the risk of the glue not
holding the shoe together. We calculate this would result in a potential loss of
$15 per pair due to returned merchandise. But, if we make $20 per pair, it’s
well worth the risk. Just because some risks cannot be mitigated doesn’t
mean the business venture is not worthwhile.
Control Design Considerations
With the current regulatory environment, which is heavy on rules and light on
forgiveness, the best approach to identifying and selecting controls is a top-
down, risk-based approach. Top-down so that we don’t leave gaps, and risk-
based because control goals will be defined by the amount of acceptable risk
the organization has. This means that the overall objective for any control is
both its goal and the metrics used to measure how well it has achieved the
goal. Normally, reaching the goal of a control will actually involve using a
combination of different types of controls, such as physical, technical and
administrative. For example, a technicalf irewall will require some physical
protection and oversight by an administrative control.
The cost of the control is one of the most important considerations, but there
are others that factor in, such as:
Impacts on productivity
Inconvenience to users
Training costs
Operation costs
Maintenance and testing costs
User acceptance
Cultural and ethical acceptability
Legal and regulatory requirements
Adaptability to changing risk
Scalability
Ability to monitor
Ability to provide notifications
Robustness
Resilience
Reliability
Ease of testing
Self-testing capability
Control Strategies
An overall strategy to follow when selecting controls is to:
Determine acceptable risk and risk tolerance
Determine control objectives based on acceptable risk levels
Determine requirements for controls based on the objectives
Some security products can act as multiple types of controls simultaneously.
For example, a firewall may act as a deterrent control by having a proxy
service running on the firewall to display a warning banner. It can also act as
a preventative control by restricting the types of traffic allowed in. At the
same time, it can be a detective control by examining inbound traffic and
generating alerts if suspicious patterns are discovered. The same control can
also be a corrective control by rerouting traffic to an alternative site if it
determines that the systems it is protecting have degraded below a preset
threshold.
Of course, none of the features just mentioned have any reliance on the
appliance being a firewall. Rather, that appliance just happens to implement
multiple control types. It is important for the security manager to be able to
distinguish capabilities apart from whatever an appliance may be called. Just
because we might call an appliance ‘Super-Strong Security Gizmo’ does not
in fact mean that it can actually secure our network. We need to be able to
look at its individual capabilities and make that determination for ourselves.
Controls need to be automated as much as possible to make it harder to
bypass. Anytime we introduce a human into the equation, we increase the
risk of a critical process or procedure getting missed or intentionally skipped.
Let’s discuss some various aspects of automation.
Access Control
Before a user is allowed to access information, a system should always
identify, authenticate and authorize that user:
your account – such as your name – without having to log in again – your
browser has a cookie that remembers who you are. But, if you attempt to look
at your order history, you will be forced to authenticate again. Some sites will
force a third authentication if you try to access credit card information. This
approach can be taken to the extreme by requiring different credentials for
each level of access.
Transparency
We achieve transparency when all stakeholders can easily understand how a
security mechanism is supposed to work. This allows them to clearly see
what effects their activities have on system security. How do we do this? By
keeping the technology design as simple as possible to avoid confusion. Each
department is free to layer on their domain-specific terminology within their
own discussions, but cross-department communication should remain at a
level that everyone understands.
Trust
Trust relevant to security means that we trust an external party to tell us if a
user’s identity has been authenticated and is valid. A common use of this
mechanism is with certificates such as SSL or TSL. In this example, a
certificate is handed to us from a third party (the certificate authority) that
represents the user, and we trust the certificate because we trust the third
party.
Trust No One
Trust no one is a design strategy that does not trust any one person to follow
the proper procedures when administrating a system. Instead, we rely on one
or more oversight controls to monitor and audit their activity. An example
might be closed-circuit television that watches activities from a remote
station.
Two other important controls are segregation of duties (SOD) and principle
of least privilege, both of which were covered in Section 1.
Control Strength
Although we have stated previously that an automated control is favored over
a manual control, there are exceptions to this rule. Why? If the effectiveness
of a control cannot be measured, then it is useless. In fact, it is usually
harmful as it will give us a false sense of security. In this scenario it is far
If it is preventative or detective
If it is manual or automated
If it has formal or ad-hoc
A formal control has documentation reflecting its procedures and how well it
has been maintained.
Control Recommendations
Beyond determining a control’s strength, the following checklist should be
used when selecting controls:
The effectiveness
Compatibility with other systems, processes and controls
Relevant regulation and legislation
Identification badges
Authentication devices such as smart cards
Security cameras
Security guards
Fences
Lighting
Locks
Sensors
Environmental controls are a specialized type of physical controls dealing
with facility capabilities that allow us to host computer equipment. These
include:
Air conditioning
Water drainage
Fire suppression
If an organization has facilities dispersed over a large geographical area, it
may be necessary for the security manager to delegate on-site responsibilities
to local employees.
Control Technology Categories
not
levelbyofinformation security
native controls staff. Some devices that will always have some
include:
Servers
Databases
Routers
Switches
While native controls come out-of-the-box, a supplemental control
technology is added on to an information system after the fact. As a result,
supplemental controls tend to be more specialized and are therefore often
operated by security
share oversight specialists.
of these However,
technologies it usually
between is of somesecurity
the information benefit and
to IT
groups. Some examples of supplemental controls are:
Automate a security-related
Process management procedure
information
SLE
S LE = AV x EF
= $400,000 x 33%
= $132,000
In simple terms, we expect that if the building catches fire, it will cost us
$132,000 to repair it.
We have one more term to cover before we can calculate ALE.
The annualized rate of occurrence, or ARO, is the number of times a threat
on a single asset is expected to happen in a single year. This number can be
years, then ARO = 1/10, or .1. If we, for some bizarre reason, expect our
building to catch fire 3 times each year, then ARO will be 3. Let’s go with
the once per 10 years in our example, since that seems to be a bit more
reasonable.
So now we finally get down to calculating ALE, which is simply how much
money we will lose for each instance of the threat multiplied by how often it
will happen each year. This will give us how much money we can expect to
lose each year – that is why we call it the annualizedl oss expectancy. The
formula is:
ALE = SLE x ARO
And calculating it for our example, we would use:
ALE = $132,000 x .1
= $13,200
decide our risk appetite is 2 days, but our risk tolerance is 75%, something
has obviously gone wrong, since we are saying that we cannot survive longer
than 3 days without the ordering systems, yet out of the other side of our
collective mouths we are claiming we can stomach 3.5 days of downtime.
Something doesn’t add up!
Recovery Point Objectives (RPO)
The recovery point objective, or RPO, focuses on data backup and
restoration. RPO will tell us how much data we can stand to permanently lose
in case of interruption in terms of time, usually hours or days. Backup
schemes normally will perform full or partial backups of data systems
automatically on a periodic basis. RPO tells us the maximum amount of time
we should ever go without performing some type of backup. There is a
scenario in which the time to restore exceeds the RPO or RTO. For example,
the RPO dictates we can lose only 6 hours of data, but if an interruption
occurs, it will take 8 hours to restore that 6 hours’ worth of data, in which
case we will have exceeded the RPO by 2 hours. Or, perhaps the RPO is 2
days, but RTO may be set at 6 hours, in which case the RTO will be
exceeded due to a slow restore. In either case, we are simply unable to meet
the RPO or RTO, and if we cannot make them align by using different
technologies, we just have to accept the risk.
Service Delivery Objectives (SDO)
The service delivery objective, or SDO, defines the minimum level of service
that must be restored after an event until normal operations can be resumed.
Both RTO and RPO affect the value of the SDO. The units of SDO are
specific to the system, but some possibilities might be transactions per second
(TPS) or the number of concurrent users.
Maximum Tolerable Outage (MTO, or MTD)
The maximum tolerable outage, or MTO, is the maximum time that an
organization can operate in an alternate or recovery mode until normal
operations are resumed. Many factors can limit MTO, such as the availability
of fuel to operate emergency generators, or the accessibility of a remote
backup site. MTO will have a direct impact on the RTO, which in turn
impacts the RPO.
have
incur athat
plan thatifkicks
cost we caninto place
avoid it.ifWe
an can
outage occurs,anbut
calculate ALEwefor
would rather not
a specific
threat to help us understand how much money we should spend to avoid an
outage. Let’s assume that the most likely reason our primary assembly
facility would go down is due to an alien attack trying to take out our
Roadster spaceship fleet. In our example, the following is calculated:
A DRP is all about boots on the ground getting our systems back up at an
operational level after some bad event has happened. A BCP is all about how
the organization will function before the event and after we have recovered.
However, it turns out that before we can talk about either a BCP or DRP, we
have to perform something called a business impact analysis, or BIA. The
BIA helps us to understand what assets are important, and what their loss will
mean to us. After all, if we don’t know which assets are important and why,
how can we possibly know how to recover from their loss using a DRP or
BCP?
A
of BIA is the
losing undertaken so that
availability we given
of any can easily see the
resource. impact
One of thetodownsides
the organization
of a
BIA is that all assessments tend to be ‘worse-case’ and end up being inflated.
This leads to management often discounting the estimates. An alternative is
to look at a small subset of scenarios, and have key stakeholders analyze each
and produce a range of outcomes. Based on these results, we then estimate a
minimum, maximum and likely values along with a confidence level. We can
then perform some quantitative magic to objectively come up with a final
estimate that can be trusted.
RTOs (recovery time objective – how long it will take for us to get
operational again) are defined when carrying out a BIA as part of BCP
development. Often, there can be two different perspectives on RTO, with
each providing a different answer: the individuals who consume information,
and senior management who have a broader view of the organization and
must consider costs. For example, a lower-level supervisor may believe that
specific information is critical to his job, but a vice president may disagree
because she is looking at overall organizational risk, and that particular asset
is actually much lower in priority. However, the information security
manager should take both views into account and try to achieve an RTO that
services both views.
The BCP will take RTOs and use them to arrive at a priority order in which
assets are restored – those with the shortest RTO first, with assets having the
longest RTO being restored last. Of course, it’s never that simple as some
assets will have dependencies on other assets before they can be declared
‘recovered’. For example, a specific generator by itself may have an RTO of
2 weeks, but a system having an RTO of 2 days might depend on that
generator being available. Therefore, the generator must jump in priority even
though its personal RTO is quite long.
Costs must also be factored in when setting RTO and restoration priority.
System owners will always lean toward shorter RTOs, but a shorter RTO
usually comes at a cost. Near-instantaneous recovery is almost always
technically possible, but not necessarily financially justifiable. For example,
we can maintain a backup system that is an exact duplicate of the one we use
in production, but if they both must have 20 servers, that can be costly. To
ustify such an expense, the system must generate significant revenue, or any
downtime must be extremely impactful. In general, the longer the RTO, the
less costofisthe
impact involved. There
disruption is a to
begins break-even
be greaterpoint
than in
thethe time-period
cost where
of recovery, and the
we
need to make sure that RTO never exceeds that value. In other words, RTO
should be shorter than the point at which the impact loss exceeds the recovery
cost.
Now that we’ve discussed RTO, BCP and DRP at-length, let’s go back to the
BIA and discuss it a little deeper.
Question: If we don’t understand the impact that an undesirable event will
have on our business, then how do we plan an appropriate response to it?
Answer: We can’t.
We will either wind up protecting ourselves from something that really isn’t
important, or we will completely neglect some critical aspect of our business
that will bring us to our collective knees when it is no longer accessible.
And that is where the BIA comes in - it will tell us about potential incidents
and any related business impacts, and it will prioritize them for us. Whereas
risk calculates the probability of compromise, the BIA determines the
consequences of compromise.
The BIA ultimately creates a report that stakeholders use to understand the
business impact that various incidents will cause. Each impact will be
expressed in either quantitative terms, such as money, or qualitative values,
such as a relative rating. There are three primary goals for any BIA, and they
are:
Recovery Operations
When an organization must fail over to an alternate site, the team that is
responsible for that move is also responsible for returning operation to the
original site when it is ready. As soon as that secondary move has ready, the
team notifies the business continuity leader, who then declares normalcy and
gives the OK to move operations back. There are some scenarios in which the
original site will never be made operational again within an acceptable
timeframe, and so the decision must be made to either make the alternate site
the permeant site, or to choose a third site to become the permanent site.
Choosing a third site is most often the case when the original site is no longer
viable, and the company is using a third-party’s facility for backup
operations.
the entire time, he should execute a risk assessment and create a plan to
mitigate risk as much as possible. During the crisis, any lessons learned, and
gaps identified should be documented and recorded for future actions.
Recovery Strategies
Choosing
events, andthe correct
best recovery
achieves strategy will
an acceptable be thetime
recovery one at
that address probable
a reasonable cost.
The total cost of the recovery process is a combination of the following:
The implementation
considerable time andofcost.
an effective
Multiplerecovery planshould
alternatives will likely take
be explored and
developed, with a single plan being selected by senior management.
Outsourcing may help with both time and cost.
Addressing Threats
Part of the incident management plan will be to proactively address threats,
which can be three separate strategies as follows.
First, we can eliminate or neutralize a threat. While this seems like a no-
brainer, if the threat is external we really have limited ability to eliminate it.
On the other hand, if the threat is internal ands pecific, we might be able to
eliminate it by stopping whatever activity is causing it. As an example, if a
threat is a result of a VPN connection to a minor partner, we could simply
end the relationship with that partner and close the VPN connection.
Secondly, we might be able to minimize the likelihood of a threat’s
occurrence by reducing vulnerabilities or exposure. This is usually the best
option and is normally achieved by rolling out physical, environmental or
security controls. For example, adding a layer of firewall controls may
degrade the ability for a bad actor to penetrate a sensitive network.
Lastly, we can try to minimize the effects of a threat if an incident occurs
by implementing effective incident management and response, purchasing
Recovery Sites
A recovery site is where we move operations when the original site has been
compromised. The recovery site should be a temporary move, but in extreme
cases they can become permanent when the original is no longer viable, and
the recovery site is acceptable in terms of both capacity and long-term cost.
There are seven different types of recovery sites that we can choose from.
A hot site is fully configured and can be ready to operate in a number of
hours – the only additional work is to add staff and restore the latest data.
A warm site has the complete infrastructure ready to go, but usually is not
able to operate
updating at the may
to software capacity of the original
be required. A warm site.
siteAdditionally, some
should be ready to go in a
day or less.
A cold site only provides the basic infrastructure with no servers or software,
and can take up to multiple weeks to bring online. Normally, backups of
software and data are required to configure the environment. Two primary
options exist for equipping a cold site during a disruption. The first option is
to use vendors or third-parties to provide equipment, particularly if the
hardware is not something easily purchased off-the-shelf. The second option
is to use equipment that can be easily acquired or purchased when needed. In
this case the hardware should be of a common design and not specialized.
A mobile site is a specially designed trailer that can be quickly moved to a
business location when needed. It is usually equipped with wireless links that
do not require surrounding infrastructure and is particularly useful in areas in
which there are no close recovery facilities.
A duplicate site is a site that is configured exactly like the primary site and
can be anything from a hot site to a reciprocal agreement with another
company. If this route is chosen, the following precautions should be taken.
The two sites must remain in-sync with both hardware and
software
The availability and scalability of the duplicate site must be tested
and monitored so that it is always ready to go
A mirror site is a duplicate site that is always active. Traffic and workload is
continuously shared between the two sites, even when a disruption is not
taking place. This configuration can result in no downtime in case either site
goes offline as use is automatically shifted to the other site. Care must be
taken that each site can handle all work by itself if necessary.
A reciprocal agreement is an agreement between one or more businesses that
promise to share their data centers and systems in the event one of the
partners experiences an outage. While this agreement is theoretically the most
cost-effective, in reality it has a large number of problems:
infrastructure
risk. would be a more frequent but much shorter-lasting
As a rule of thumb, as RTO decreases, the cost of the alternate site will
increase but the cost of the recovery process should decrease. As an example,
if we RTO is only 2 hours because we cannot afford to be down for more
than 2 hours, then will almost certainly require a hot site which is expensive.
However, the effort to bring the hot site online will be fairly inexpensive.
Alternatively, if a system can be non-functional for up to a week, then we can
probably leverage a cold site which is much cheaper than a hot site, but the
cot to spin the cold site up to operation will be pretty costly.
Response and Recovery Strategy Implementation
Mission
Strategies and goals
Senior management approval
The organization’s approach to incident response
Who the key-decision makers are
How communication will be carried out
Metrics for measuring incident response capability
A road map for maturing capabilities
How the program fits into the overall organizational structure
Supplies
The incident response plan must include provisions to ensure continued
delivery of supplies that are essential to continued operations. Easy to follow
hard copies of all procedures that can be easily followed by both employees
and contract personnel should be stored at the recovery site. A supply of
special forms, such as invoice or order forms, should also be secured at an
off-site location.
Communication Networks
The plan must contain details of the telecommunication networks required to
restore operations, and this should be given a high priority.
Telecommunications are not only susceptible to the same disasters as data
centers, but also to special events such as cut cables. The local provider is
normally not required to provide backup services, so redundant paths must be
planned. Uninterruptible power supplies, or UPSs, are useful for providing
backup power sources for these networks.
Some telecommunications to consider are:
Wide-area
Local-area networks,
networks, or
or WANs
LANs
Third-party EDI providers
Satellite and microwave links
Wireless links
cellular paths.
Diverse routing is a method in which we route traffic through split or
duplicate cables. A split cable is comprised of two cables running through the
same conduit, which mitigates the risk of a cable breaking or degrading, but
both are still at-risk from the same physical event. A duplicate cable is a
separate cable usually run through an entirely different path.
Long-haul network diversity is achieved when we subscribe to two or more
network service providers at the same time. This ensures that if the
infrastructure of one provider is compromised, we can depend on the second
provider’s infrastructure.
Last-mile circuit protection protects an organization from a local disaster that
takes out the communications infrastructure connected directly to a facility.
By having redundant local connections to larger networks, the impact of a
local disruption can be mitigated.
Voice recovery is specific to voice networks but is essentially has the same
focus – providing redundancy for voice lines.
High-Availability Considerations
The technology used inside of networks can directly impact availability even
when expected maintenance actions are being performed. We therefore need
to consider some options for keeping services available.
Beyond providing multiple power providers, within our network UPSs can
provide decent level of continued operation for a short time in the event of a
power outage.
Direct attached storage, or DAS, is data storage device that is connected
directly to a server or client. The typical hard drive installed within a
computer is a great example. With DAS, if we need to reconfigure or increase
storage, the entire device must be taken offline, resulting in down time.
Network attached storage, or NAS, is a storage device that is actually a self-
contained server, usually running some flavor of Linux, and is accessed
through a network connection. Reconfiguring or adding storage to a NAS
results in no down time.
A storage
mass area
storage network
using , or SAN of
any number , isinternal
a self-contained network
media such as hardthat provides
drives, optical
disks or tape drives. Adding new media is invisible to clients connected to the
SAN. SANs typically offer redundant fail safes such as disk mirroring, and
backup and restore functions.
A redundant array of inexpensive disks, or RAID, provides great redundancy
and performance improvements by writing data to multiple disks
simultaneously. RAID can be used with DAS, NAS or SAN solutions.
The relationship between RPO and RTO will dictate what solution is
required, as is shown in Figure 7. For example, if RTO is instantaneous with
no RPO loss, meaning we can experience no downtime or data loss, then tape
backups are not going to work. The only viable solutions are those in which
the primary system communicates in real-time with the fail-over system,
called fault-tolerant storage solutions. This strategy works well but does
result in wasted cost as we have a perfectly functional system do nothing but
‘mirroring’ the primary system. Instead, we usually employ load balancing
or clustering in which the primary and fail-over system both process load
during normal use, and on failure of either system the remaining system takes
on all load. Care must be taken that all load can be handled by either system
by itself.
Figure 7:Tech
7:Techniques
niques Implemented in Relation to RTOs
RTOs and RPOs
While fault-tolerant systems are great at mitigating risk, they are also very
costly. If the RPO and RTO can be a little more flexible, we can save quite a
bit of money by implementing a high-availabilitys torage solution. In this
configuration, we still have two systems, but only one is in active use and the
second is not necessarily kept up to date in real-time. Instead, when the
primary storage system fails, the application is restarted and uses the
secondary storage system. This results in some down time, but it can be only
a few seconds. It may also result in the loss of a small amount of data –
whatever data was collected since the last time the two systems synchronized.
Insurance
profit it would
Business have made
interruption during reimburses
insurance that time. lost profit as a result
of an IT malfunction or security incident that causes the loss of
computing resources.
Valuable papers and records policies that covers the actual cash
value of papers and records that have been disclosed, or physically
damaged or lost.
Errors and omissions insurance that legally protects a business in
case it commits an act, error or omission that results in a loss.
Fidelity coverage policies that covers loss from dishonest or
fraudulent acts by employees and is most commonly carried by
financial institutions.
Create recommendations
Make sure to improve
recommendations effectiveness
were implemented
Types offive
There are Tests
types of basic tests, which are:
Security is enforced through both technical and procedural controls, and the
security manager must stay in close contact with this committee.
between them.
Spyware is a form of malware but specifically watches whatever the user
does, usually to steal credentials.
Virtualization is a way to create a computer in-memory, such that multiple
virtual computers are running simultaneously on one physical computer. It is
a great way to do two things:
1) Save money
2) Allow a server farm to grow or shrink in real-time as needed
VoIP stands for voice over IP, the protocol that soft phones use. A soft phone
is a software phone that runs on a computer.
Wireless security is represented by network protocols such as WEP, WPA
and WPA2, and is specifically designed to protect computer traffic traveling
through the air.
COBIT 5 Principles
Figure 8: COBIT
The first principle – meeting stakeholder needs– illustrates the need for the
organization to balance achieving business goals while managing risk and
resources.
The second principle – covering the enterprise end-to-end– highlights that
governance from the top must include all parts of the business, including IT.
COBIT 5 does not focus only on IT, but looks at information and
technologies as assets right along with tangible assets such as warehouses or
inventory.
The third principle – applying a single, integrated framework – recognizes
that a successful framework must play nicely with other frameworks and
standards. For example, COBIT 5 aligns well with the ISO 27000 series.
The fourth principle – enabling a holistic approach– reveals the fact that an
effective and efficient governance of enterprise IT requires a holistic
Enablers
COBIT 5 defines enablers as factors that individually or collectively
influence whether something will work – in our case the governance and
management of information security. Enablers are driven by the goals
cascade – an approach where higher-level goals define what the different
enablers should achieve. For example, if our goal is to protect our incoming
supply chain, then the goals cascade might call out the willingness of our
shipper to add security guards at their facilities, which is an enabler. If the
shipper is not willing to incur this cost, it directly influences how successful
we will be at protecting our supply chain.
COBIT 5 describes seven categories of enablers:
It is important
constraints. to remember
Figure thatthe
9 illustrates enablers can function
relationships as both
between resources
all seven and
enabler
categories.
Figure 9: COBIT
COBIT 5 Enterprise
Enterprise Enablers
Balanced Scorecard
The balanced scorecard is a management system that helps organizations to
create clear goals and translate them into action. It provides feedback around
both internal processes and external outcomes, thereby moving from an
academic exercise into something real and actionable.
Balanced Scorecard
Figure 13: Balanced Scorecard Dimensions
OCTAVE
The Operationally Critical Threat Asset and Vulnerability Evaluation, or
OCTAVE, is another approach to risk assessment. OCTAVE is great when we
need a well-established process to identify, prioritize and manage information
security risk, and contains three phases:
Phase 1 locates all assets and builds a threat profile for each.
Phase 2 locates all network paths and IT components required for
each asset, and then figures out how vulnerable those components
are.
Phase 3 assigns risk to each asset and decides what to do about it.
ITIL
The Information Technology Infrastructure Library, or ITIL, is a set of
detailed practices for managing IT services with a special focus on aligning
accidentally
security-awareor culture
purposefully
is only– possible
but you can’t avoid having
if individuals one.their
perform Creating a a
jobs in
way that protects information assets. Everyone – from the top to the bottom -
should be able to quickly articulate how information security relates to their
role(s). For this to happen, the security manager must actively foster
communications, participate in committees and projects, and make sure that
end user needs are met. This requires ‘soft skills’ above and beyond those
required by security. In other words, an effective security manager must be
able to build relationships and foster collaborative attitudes with other
employees and departments. If done properly, the security department can
quickly answer questions such as “What’s in it for me?” and “Why should I
care?”.
How do you know if your organization has a successful security culture?
That’s easy – look for these four clues:
1) Other departments routinely include information security
representatives in their internal projects without you having to prod
them
2) Users know how to identify and reporti ncidents
3) People know who the security manager is
4) People can tell you their role in protecting information security
Culture is comprised of seven things:
Organizational behavior
How people influence the organization’s structure so that work
can get done
Attitudes
Norms
How well teams work together
The existence or lack of turf wars
Geographic dispersion
The single most element that impacts culture is the experience and belief of
as the number of password resets, but the IT security manager might. But
senior management will be keenly interested in strategic metrics such as
emerging risks that may impact business goals.
only COBIT to capture a picture of the current state. If we don’t do this, then
the subsequent gap analysis will be completely meaningless, since we will
not be comparing apples-to-apples. This approach also gives us a leg-up
when it comes time to capture metrics, since we can use the same approach to
generate those values. Bottom line – choose the approach or approaches and
stick to them all the way. A mid-stream changeup is your worst governance
nightmare.
When we measure the current state of security, we must also measure the
current state of risk. A full risk assessment includes a threat, vulnerability and
impact analyses. Many organizations encounter resistance to the cost of
carrying this out before mitigation steps are executed, but it is an absolute
necessity and will allow us to choose the most cost-effective strategy.
Additionally, existing controls must be inventoried and tested so we can
know how much they help in getting us to the desired state. Some of the most
Provide structure
Serve as a road map
Ensure strategic alignment
Support the business strategy
Implement security policies and strategies
Ensure traceability back to business requirements and goals
Provide a level of abstraction over technologies
Establish a common language for information security
Allow many contributors to work together
There are several architectural approaches that have been developed over the
years, and they can be grouped into three categories:
Enterprise
Figure 16: Enterprise Architecture
Architecture Domains
Classic Architecture
Figure 17: Classic Architecture vs. Cloud Computing
Computing
Platform as a Service, or PaaS, takes it one step further and manages the
operating systems, middleware and other run-time components. PaaS is ready
for a custom application to be deployed.
Software as a Service, or SaaS, is essentially an application that someone
hosts and maintains. The customer simply manages user accounts, and
employees log in and use the application.
There are four types of cloud deployment models, as shown in Figure 18.
A private cloud is entirely hosted inside of a company’s intranet and is not
accessible externally. Employee-only applications, such as an HR website,
are hosted in a private cloud.
If you take a private cloud and allow a select few other companies to access
it, it becomes a community cloud. Private networks between multiple
companies are examples of this model.
If an application is hosted across the Internet and is publicly accessible, it is
in the public cloud. This represents the majority of SaaS applications.
The last model, a hybrid model, is achieved when a private cloud connects
across the public Internet into another application. This is the model normally
chosen when companies want to host their custom applications in the public
cloud but need to maintain a constant connection between employees and the
application.
Overtime, new classes of services have evolved using the ‘as a Service’
core business
Although it is function,
hosted in the
the ROI canthe
cloud, often be considerable.
servers must be physically
located somewhere, and if those backup servers are not in the
same general area as the company’s primary servers, then a
disaster is less likely to affect both.
Identity as a Service, or IDaaS, has two different interpretations:
The IAM
identity. itself is hosted in the cloud. This is called a federated
Data Storage and Data Analytics as a Service, or big data, is delivered when
the storage and analysis of huge amounts of data is performed in the cloud.
The primary advantage of big data is that it delivers an almost unlimited
amount of storage capacity so that any amount of data can be mined for
patterns.
Cloud access security brokers, or CASBs, provide an easy and comprehensive
way to secure the path between a company and hosted cloud services. CASBs
provide the following services:
Authentication
Authorization
Single Sign-On (SSO)
Tokenization
Logging
Notification and alerts
Malware detection and prevention
Information as a Service, or IaaS – not to be confused with Infrastructure as a
Service – builds on big data and takes it one step further. Whereas big data
provides the processing power to sift through data and answer a question,
IaaS only requires you to ask the question – it takes care of the analysis itself.
Integration Platform as a Service, or IPaaS, comes into play when a hybrid
cloud model is used. Because systems in a hybrid model are accessed across
company boundaries and into the public cloud, connecting systems and
applications together while maintaining a cohesive IT approach can be
daunting. IPaaS by providing a virtual environment on which to host all of
these systems.
Computer forensics can be a tricky proposition unless you have the right
tools, which are often very expensive, and the experience needed to analyze
and store evidence that will hold up in court. Forensics as a Service, or
FRaaS, provides those tools and optionally the needed expertise.
Advantages of Cloud Computing
Some have compared the advent of cloud computing to the introduction of
the personal computer or even the Internet. However, there is one big
difference – personal computers and the Internet took decades to develop, but
cloud computing has popped up and made its way into everyday use over the
course of just a few years. Let’s discuss a few of the reasons why that is so.
First of all, by using cloud-based resources that can scale up or down at a
moment’s notice, we have a virtually unlimited resource pool to draw from
whenever we need to. Add to that the ability to pay for only what we use, and
the value proposition goes through the roof.
Secondly, companies operate on two types of expenditures – capital and
operational. Capital expenditures are not favored for a variety of reasons, but
that is how money spent on hardware and software is categorized. On the
other hand, if we take that same money and pay for cloud-hosted solutions,
then we can claim it is an operational expenditure since we are not actually
purchasing anything. Not only that, but we can ‘dip our toes in the water’ and
try out new capabilities without having to spend huge amounts of money.
Add to that the ability to quickly implement new solutions, and we have the
makings of a major win-win.
Next, because we can scale up at any time, our applications become that
much more performant, responsive and scalable basically for free. All of
those adjectives – performant, responsive, scalable and most of all, free- are
things IT managers love to hear.
Another advantage is the ease with which we can upgrade software versions
and apply patches. Without going into a lot of explanation, virtualization and
virtual images are behind that.
And finally, cloud services such as Amazon’s AWS or Microsoft’s Azure are
famously redundant with fail-over data centers located around the globe. This
takes resiliency to a whole new level.
Unfortunately, all of this high-praise does come at a cost in terms of
increased risk. Due to the inherent nature of intentionally hiding the
complexity of hosting cloud services, we also have to deal with a lack of
transparency on the CSP’s side. If we were to host data in our own data
center, the data owner would have full access to and knowledge about that
data. When we store this data in the cloud, we rarely have any type of
knowledge of where the data is stored and in what manner. As a result,
certain types of data and processes should not be stored in the cloud
regardless of the economics due to increased security risks.
Another factor to consider when dealing with global cloud providers is that
our data may now cross jurisdictional boundaries without us even knowing it.
That could get us in real trouble if regulatory offices hear about it and decide
to enforce some rather stiff penalties.
One last negative note about security and CSPs. The availability of audit logs
will almost certainly be a challenge to overcome, and the actual level of
secure controls being implemented will more than likely be completely
invisible to the customer.
If you take all of the above advantages and disadvantages together along with
both the cloud and deployment models, we can come up with a two-
dimensional matrix to help us map and describe the risk/benefit discussion.
This is shown in Figure 20.
To help with the selection of a CSP, there are a number of frameworks
available for us to use that are built specifically for cloud providers, such as
the CSA Cloud Control Matrix and the Jericho Forum Self-Assessment
Scheme.
Who
What needs to need
do they knowtowhat?
know?
When do they need to know it?
In short, we need to define the who, what, and when. Beyond that, there are
three levels at which metrics can inform us – strategic, management and
operational. Let’s take a look at each.
Strategic metrics provide the information necessary to guide decisions at the
senior management level. While often comprised of multiple management
metrics, strategic metrics let us know if the security program is headed in the
right direction.
Management metrics, sometimes called tactical metrics, is used by the
security manager to determine if the security program is remaining in
compliance, tackling emerging risk and is in alignment with business goals.
There is also a need at the management level to look at technical metrics to
ensure the various mechanisms are operating at the right level. For example,
while driving a car we need to keep an eye on the gas gauge, because while
the level of fuel says nothing about where we are headed, if we run out of gas
we are sure to never get there.
Operational metrics are comprised of technical and procedural metrics such
as existing vulnerabilities and the progress of our patch management
processes. There are a number of attributes that a useful metric should
contain. We are going to use the fuel gauge in a car to illustrate each
attribute.
considered.
Because of its value, BMIS provides the basis for frameworks such as
COBIT. As can be seen in Figure 21, COBIT contains four primary elements
– Organization, People, Process and Technology, and each element is
connected to all other elements by dynamic relationships. If any one
relationship changes and is not managed, the overall equilibrium becomes
unstable. Let’s dig into each element a little further.
Organization Design and Strategy
The first element in BMIS is organization design and strategy. A good
definition of an organization is…
…a network of people, assets and processes interacting with each
other in defined roles and working toward a common goal.
An organization’s strategy is made up of a list of goals to be reached, and the
values that will be adhered to along the way. Another way of putting it is that
strategy is the basic direction in which we will be heading. Designi s how an
organization implements the strategy and includes processes, culture and
architecture. Design tells us what the ‘boots on the ground’ are going to be
doing.
So, how do we get from strategy to design? That’s where resources come
into play – people, equipment and know-how. In summary, a strategy is
created, and resources take that strategy and create a design.
People
The second element is people, which represents the humans in the equation
along with all of the security problems they bring with them. The value of
this element is that it tells us who will implement each part of the strategy
using our design. Because humans are involved, the information security
manager must work closely with the Human Resources and Legal
departments to address three things:
comprised
applied, theoffailure
multiple layers
of any oneofcontrol
risk controls.
does notIf result
defensein in-depth hasbreach
a security been
because there is always a secondary control that should kick in. Often
companies have 4 or 5 different layers. An example of securing a database
with a defense-in-depth approach might be the following layers:
amazing
protectingthings with path
the entire it. Information
of ‘data to security governance
information is all about
to knowledge’, and the
Governance Relationships
Figure 22: Governance Relationships
difficulty with
to different GRC is thatIneach
organizations. ofof
spite thethis,
three
theterms canindustry
security mean different things
has pretty
much settled on using GRC in the following three areas:
Good Goals
This is why it is so crucial to state security goals in business terms, so that
senior management can clearly see the link between ‘avoiding bad things’
and the resulting positive revenue impact. Another approach is to use security
to enable activities that would otherwise be too risky. For example, if we use
public key infrastructure (PKI) to enable real-time communication between
high-value partners, or we implement a virtual private network (VPN) to
allow employees to work remotely, our security capabilities have just allowed
us to reach business goals that would have been otherwise impossible due to
the risks involved.
Yet another approach is to examine business linkages and to couch security
goals in terms of facilitating those linkages. For example, let’s say that one of
our operations unit churns out blue widgets 24 hours a day, and relies on the
raw materials to arrive on-time based on automated supply orders.
Furthermore, shipping of the completed blue widgets depends on an
automated system to contact trucking companies and arrange for pickup. This
represents two separate
confidentiality (don’t letlinkages. All of
competitors this infrastructure
know), integrity (the relies on to be
data needs
accurate) and availability (the connections need to always be available) –
core tenants for information security. Information security now has the task
of ensuring uninterrupted manufacturing of blue widgets, and an interruption
in the entire supply chain can be easily quantified in terms of lost sales or idle
employees. We have now tied our security value proposition to business
linkages.
The most important thing to note here is how security goals align with
business
provides goals.
an inputThe business
into the riskstrategy not only
management andleads to business
information goalsstrategy
security but
block as well. Note also how both the current and desired state of security
feeds into that block as well. While not clearl
clearlyy shown here, the
organization’s appetite for risk acts as a constant constraint over the entire
process. Be sure to note all ‘Strategy Inputs’ which are:
1) SOX, HIPPA, GLBA and FISMA are designed for federal
agencies, although some have seen extensive use in the private sector.
2) COSO and OCEG provide a governance framework only.
3) COBIT, ITIL, ISO 27000 series and CMMI provide goals for
controls.
4) ISO 27002 and NIST 800-53 provide a list of very specific
controls.
security.
Another method for ensuring that the entire organization remains engaged
with security is to form a steering committeet hat is made up of senior
representatives from all impacted groups. This makes it much easier to arrive
at a consensus on priorities and tradeoffs and is a great method for
establishing communication channels. Some common topics this committee
addresses are:
and making sure we have redundant stores so that data is not lost, even at the
expense of speed or usability. A rule of thumb says that as security increases,
ease of use decreases. It is very difficult to achieve a nice balance between
the two.
Now, just imagine you have two people trying to carry out each viewpoint –
one whose job it is to make technology easy to use, and one whose job it is to
make data safe. They will be forever getting in each other’s way. But there is
a much more concerning scenario – what if one person was tasked to do both
obs? Talk about a conflicted person! When that happens, that individual will
always choose the path that will be the least painful, which will be ease of
use. After all, employees will always gripe when things are hard, but when is
the last time you heard a hacker call up IT and say ‘You know, you should
really put in a firewall. You’re making my life way too easy.’ That is why it
is so crucial that you have separate people assigned to each role.
But even if you assign the roles to different people, it can still get
complicated. Imagine both of these people reporting to the same boss. Guess
what direction the boss is going to give? You got it – whatever will make the
most people happy. Therefore, not only must you give each role to different
people, they must also each report up through different C-level executives.
Never have a security manager report up to the same executive that the IT
manager reports to. In fact, it is not uncommon for a security manager to
report directly to the CEO or the board, instead of up through the chief
information officer, or CIO. Alternatively, we are seeing more CISOs than
ever before existing right alongside the chief technology officer, or CTO.
The primary goal for information security governance is to manage risks
effectively at an acceptable cost. A balance between risk mitigation and how
much it costs to carry that out must be discovered over time, and this can be
achieved only if everyone is involved. When carried out properly, risk
management activities are integrated together and fall under a clear set of
rules and goals. This in turn prevents gaps in coverage, redundant effort and
departments working against each other.
Roles – Top to Bottom
NIST has created a number of publications, one of which is particularly
relevant to risk assessments – NIST 800-30: Guide for Conducting Risk
ssessments. This special publication describes the key roles that support the
physical assets
New technologies blurring functional boundaries
New compliance and regulatory requirements
The pressure to reduce cost
Good Presentations
A crucial aspect to the security manager’s job is to educate senior
management. Often security information systems are not taken seriously until
they fail. Therefore, the security manager must be vigilant on making sure
senior management understands applicable regulations and how critical it is
to properly secure IT systems and information. What does it look like when a
security manager has achieved these goals? Some signs are:
place
Security effectiveness is routinely reviewed by executives
Security awareness and training is not considered optional
Highlight budget
Use tools such items
as the socost
total the cost can be clearly
of ownership, seen, or return
or TCO
on investment, or ROI, to cut through the noise
Be clear on how success will be measured
Even though we have already stated it, it is worth repeating: employees must
see senior management abiding by the security policies. The example starts at
the top.
Once you, as the security manager, have senior management’s full support,
you must periodically report to that group on how implementation is going.
Ideally, you will use the same format and talking points you used in the
original presentation that won their support in the first place. Some things
that should be covered are:
Senior Management
Business Process Owners
Other Management (such as line supervisors, department heads,
and supervisors)
Employees
Making the Business Case
A business case presents the value a project can deliver in terms of a cost-
benefit analysis. In other words, it shows what the company will gain if it
chooses to invest in the project. This is often the first step in a project, but at
times may be presented directly before the project commences.
The initial business case is usually based on a feasibility study – an activity to
figure out if a project will meet a specific need at a reasonable cost and
within an acceptable time frame. It consists of the following 6 elements:
1) The project scope defines the business problem or opportunity to
be addressed. It should be clear, concise and to the point.
2) The current analysis describes our current understanding of the
problem or opportunity, and its strengths and weaknesses will
determine our goal(s).
3) Requirements are defined based on needs and constraints. Note
that software requirements are quite different than system
requirements.
4) The approach is the recommended system or software solution
that will satisfy our requirements. Included is a description of
alternatives and why each was not chosen. The ‘build vs. buy’ question
is answered here if both are options.
5) An evaluation brings together all the previous elements to
produce a feasibility study report telling us how cost-effective the
proposition will be.
6) A formal review of the feasibility study report is carried out with
all stakeholders, and a final approval or rejection for the project is
provided. If rejected, the rational should be attached to aid in future
project proposals.
The business case is not just a one-time deal, however. It should be
referenced throughout the project whenever increased costs or reduced
benefits are encountered. Additionally, well-planned projects have built-in
decision points, called stage gates or kill points, that force a review to make
sure the business case is still valid.
A formal presentation by the information security manager is the most
common technique to obtain approval and can be used to both educate and
gain acceptance simultaneously.
Communicating Up and Down the Food Chain
After a project has been approved by senior management, the information
security manager must establish reliable reporting and communication
channels downward throughout the organization. Both reporting from and
communication to various parts of the organization are essential if we are
going to recognize emerging security issues. Effective communication is
needed to broadcast changes in policies, standards or procedures, and to
notify employees of emerging threats. Upward reporting from the
information security manager to senior management must happen on a
recurring basis to make sure that the top decision makers are kept in the loop.
There are four groups that need communications tailored to that specific
audience. The first is senior management. It is important that the
information security manager attend business strategy meetings to stay on top
of business strategies and goals. One-to-one meetings with individuals are
important to gain an understanding of business goals from their perspective.
The second are business process owners. The information security manager
should join operation review meetings to gain an understanding of the daily
struggles this group deals with. Monthly one-to-one meetings are important
to gain their continued support with security initiatives.
The third group are other management personnel, including line managers,
supervisors and department heads charged with carrying out security and risk
management-related activities. It is important that the information security
manager inform them of their individual security-related responsibilities.
The final, and fourth group are the remaining employees, which need the
following:
An on-boarding
Updated program
strategies for new
and policies hires
communicated using
appropriate materials
An information security governance coordinator assigned to
each business unit to retrieve accurate feedback of daily practices
in a timely manner
ISO 9001
Six Sigma
NIST publications
Information Security Forum (ISF) publications
US Federal Information Security Modernization Act (FISMA)
It may be useful to use a combination of different approaches as a way to
cross-check goals and make sure that all elements have been considered.
Policies, Standards and Guidelines
We have already discussed procedures, standards and guidelines in Section 1,
but there are a couple of points we need to point out that will help us be
successful.
First, a standard dictate how we measure procedures, processes or systems to
see if they meet requirements. We can use three types of measurements:
Metrics, which provide a yes/no answer
Using Controls
When developing an information security strategy, controls are the primary
components we deal with. If you recall, a control mitigates a risk, and can be
technical, physical or procedural. COBIT focuses on IT controls, which
represents most controls required in organizations. But information security
managers must be aware that controls must be developed for non-IT
processes as well. This includes physical information (such as hardcopies) in
terms of marking, handling and storage. Environmental issues such as
physical security are important so that systems are not simply stolen as
opposed to being compromised.
Using Technologies
Technologies are the cornerstone of an effective security strategy. However,
there is no technology that can compensate for management, cultural or
operational problems, and the information security manager should never rely
on technology to overcome those deficiencies. An effective defense requires
a combination of policies, standards and procedures to be properly melded
with technology.
People Are Expensive
The majority of security incidents are not technological in nature - they are
the result of people. The most costly and damaging compromises are usually
caused by insider
first defense in thisactivities,
area is towhether
try and intentional or accidental. That
ensure the trustworthiness and is why the
integrity
of new and existing employees. Limited background checks can provide
security
essentialdeficiencies
resources inin terms of controls
development and compliancy
of a strategy. The focusand is one ofonthe
is usually
people, processes and technology.
External audits are usually conducted by the finance department, and often
the results do not make it back to information security. That is why it is
important for the information security manager to maintain a good working
relationship with finance.
Because of increasing regulation, many companies are required to
periodically file various audit reports to regulatory agencies. These reports
are sometimes a goldmine when it comes to informing us on the performance
of information security, and so making the results available to the
information security manager should be part of security strategy
considerations.
Compliance Enforcement
It is important to develop procedures for handling security violations as part
of the security strategy. The biggest problem with enforcement is lack of buy-
in from management, so that must be a priority for the information security
manager. If management buy-in is achieved, and the organization values
openness and trust, the simplest approach to compliance is that of self-
reporting. For this to happen, everyone must understand that security is in
their own best interest.
Prioritization of compliance issues must be executed, as some issues must
experience 100% compliance while others may not be as important. For
example, keeping unauthorized people out of the control room at a nuclear
reactor facility is probably much more important than making sure office
computers are always locked before you walk away.
Threat and Vulnerability Assessments
For the next few paragraphs, keep in mind that threats are constant and
always with us, while vulnerabilities come and go as policies and technology
change. For example, on the California coast the threat from earthquakes is a
given, but if we move offices to a building that has been constructed to be
particularly resistant
mitigated enough thattowe
earthquake
no longerdamage, the vulnerability
have to worry about it. could be
The second step is the risk identification phase, where we estimate the
likelihood each threat will occur and how big of an impact each might make.
To arrive at the frequency and magnitude for a given threat, we can use both
our own organization’s experience as well as the experiences of like
organizations. Special attention must be paid to frequency, even if magnitude
is not that large, because small numbers can add up quickly.
Insurance
Insurance is a viable resource to consider during strategy development for
risks such as rare, high-impact events. Examples are floods, hurricanes, fire,
embezzlement and lawsuits. There are three types of insurance:
Legal
Compliance
Audit
Procurement
Insurance
Disaster recovery
Physical security
Training
Project office
Human resources
These departments are usually not very well integrated in terms of assurance
functions, and any strategy must include preventing gaps or overlaps between
them.
2.
3. Technology
How incompatibilities
incompatibil
incidences ities
are responded to in terms of speed,
documentation and prosecution
4. The level of acceptable business continuity and disaster recovery
To overcome these challenges, the information security manager must ensure
that all responsibilities for both the company and third-parties are clearly
documented prior to the relationship being approved. This allows risk to be
identified and either accepted or mitigated. Additionally, there should be a
formalized engagement model describing and controlling the relationship.
Legal and Regulatory Requirements
Any effort to design and implement a good security strategy must be built on
a solid grasp of applicable legal requirements. For example, privacy rules can
change drastically between jurisdictions. Some countries prohibit many
background checks that are legal in other countries. We can choose to allow
different strategies based on geographical locations or apply the most
restrictive requirements across the entire enterprise. There are also a number
of legal and regulatory issues related to Internet businesses, global
transmissions and transborder data flows. Regulatory compliance should be
treated just like any other risk, with the risk being that we might not achieve
full compliance.
Let’s discuss information retention issues. There are two primary aspects to
Let s discuss information retention issues. There are two primary aspects to
consider when deciding how long to keep business records:
1. Business requirements
2. Legal and regulatory requirements
Legal and regulatory requirements represent the minimum amount of time to
keep records. Business requirements may extend that time but can never
shorten it. Regulations such as Sarbanes-Oxley, or SOX, requires us to retain
information for a certain amount of time, but doesn’t really care how we store
it. Additionally, specific legal requests from law enforcement may require
that records be kept even longer. Regardless of the retention length, archived
information must be properly indexed so that relevant data can be quickly
located and retrieved.
E-discovery is the term used to describe locating and delivering information
in response to a request in which the company is legally bound to comply
with. If information has been archived without indexing, the cost for e-
discovery can be extensive. On the flip side, an organization may want to
intentionally destroy information after a set time period to limit liability, but
great care must be made to not violate regulatory or legal laws when doing
so. The best option is to have a policy requiring destruction of any data not
required to be retained by law or for a specific business purpose.
Physical Constraints
With regards to physical constraints, storage capacity, physical space,
environmental hazards and availability of infrastructure must all be
considered during strategy planning. Personnel and resource safety must also
remain a consideration.
Company Image
Any organization must take care to cultivate a good image among its
customers and the public at-large. If care is not taken, it can have a negative
impact on a company’s value. These perceptions are often influenced by
location and culture. Both the internal business culture and the external
culture in which a business operates must be taken into consideration when
developing a security strategy. If the strategy is at odds with culture, a
successful implementation will be very difficult unless that culture is
changed.
Organizational Structure
At times various assurance functions within an organization live in a silo that
have different reporting structures and authority. In these cases, the
way to prevent
departments them from
on-board withmaking more
a security profit.isThe
strategy only way
to appeal to get
to the both
senior
management that oversees both – if management is bought-in, then both
departments will get on-board as well.
Costs
The actual implementation of a successful strategy will consume resources,
time and money. Obviously, we need to find the most cost-effective way to
get there. With normal projects, we can point to the project’s value to justify
cost. But with security projects, there is not a direct line to value. Instead, we
must point to the control of specific risks or compliance with regulations. A
cost-benefit or some other financial analysis is usually the best approach. A
traditional approach is to calculate the annual loss expectancy (ALE) and use
that dollar amount as the upper limit on the cost of controls – basically an
ROI.
However, another school of thought thinks that an ROI approach is not very
helpful, particularly when dealing with programs designed to meet some type
of regulatory compliance. For example, under SOX some penalties consist of
long sentences in federal prison for senior executives. It is a given that senior
management will have a great interest in executing a project to mitigate such
a risk - regardless of the ROI.
People, Budget and Time
Additional constraints we need to look at are people, budget, time and
capabilities. People will always present some constraints since we humans
dislike change and additional rules – this must be accounted for when
developing the security strategy.
The available budget is also a key constraint that must be taken into
consideration. This includes two things:
Interpret policies for us
Provide a way to measure policy compliance
Are a great basis for audits
Set bounds for procedures and practices
Govern the creation of procedures and guidelines
Set the security baselines
Reflect acceptable risk and control goals
Provide the criteria for evaluating if risk is acceptable
Provide boundaries for procedures without restricting options
Must be owned by the information security manager
Remember, when we encounter a standard for which there is not a readily
available technology, or there is some other reason for which we cannot
2.
3. Policies
For each that covera set
policy, strategy, controlst oand
of standards regulations
ensure that procedures and
guidelines line up with the policy
4. A security organization that has sufficient authority and
resources, and that does not have conflicts of interest
5. Defined workflows and structures so we can assign
responsibilities and hold people accountable
6. A way to measure compliance and effectiveness that is useful
when making management decisions
Using such a framework allows us to develop a cost-effective information
security program that lines up nicely with the company’s business goals and
makes sure that information is protected according to its value to the
company.
Relationship of Governance
Figure 25: Relationship Governance Elements
Let’s discuss the differences between IT security and information security for
a second. IT security is all about how to keep information secure using
technology. Information security is concerned not only with that, but also
with information that might be overhead in an elevator conversation, or
perhaps that is faxed to the wrong number. IT security is a subset of
information security, but governance of each is completely separate – this
will become clearer as we go.
Figure 25 illustrates the relationships between IT, information security,
First, senior
security management
separately, must
meaning setthey
that the are
goals for bothindependently.
governed IT and information
We’re
going to discuss why in a few minutes, but just know that those are two very
different roles with competing priorities. IT goals almost always center
around performance – how much up-time systems have, how fast they work,
how responsive IT staff are to trouble tickets, etc. So, senior management
defines high-level performance-based goals and gives them to the IT
manager.
Meanwhile, senior management also decides how much risk they are willing
to tolerate with the organization’s information, and how to mitigate (reduce)
that risk if it is too much. Those goals are given to the information security
manager. So now we have two tracks operating in parallel – IT and
information security. Both tracks now follow the exact same eight steps –
outcomes, requirements, objectives, strategy, road map, policies, standards
and procedures. Each track at this point is a mirror of the other. Let’s follow
those eight steps.
First, lower management defines outcomes that will meet senior
management’s direction. Second, then come up with requirementst hat if met,
will result in the outcomes they desire. Third, goals, or objectives, are defined
based on those requirements, and fourth, a strategyi s developed to meet
those goals. The fifth step includes creating a road mapi llustrating when and
how specific goals will be met. A road map is simply a timeline of when
goals will be delivered. The remaining three steps are where we develop
olicies, standards and procedures that will allow them to successfully
execute the road map. All this feeds into an operational architecture across
the entire organization.
We should note that information security strategy, road map, policies and
standards all flow into their IT counterpart steps. For example, the
information security road map is used as an input into the IT road map, and
information security policies are used as an input for IT policies. As a result,
the information security strategy will have a direct impact on IT strategy,
because IT systems fall under the information security umbrella, even though
Strategic alignment
Effective risk management
Value delivery
Resource optimization
Performance measurement
Assurance process integration (convergence)
effective, or if those programs even align with our business goals. To get
answers to those questions, we have to develop metrics that represent
management’s requirements, as opposed to metrics simply taken from some
device. One source for these metrics can be obtained by executing full audits
and comprehensive risk assessments. Unfortunately, these only provide a
historical view, or at best a snapshot in time – not enough to provide us what
is needed to guide day-to-day security management decisions. So, let’s talk
about how to get metrics that are usable.
How to Get Security Metrics That Help
As examples of security metrics that do not meet all of the criteria we just
mentioned, consider some standard metrics organizations often collect:
Probabilities of penetration
A list of exposures that must be mitigated
Value at Risk (VAR)
Return on Security Investment (ROSI)
Annual Loss Expectancy (ALE)
The last three – VAR, ROSI and ALE – are the most useful as they can be
employed as justification for expending resources and carrying out certain
activities.
It has become apparent over the past decade that the lack of useful metrics in
information security has really held back effective management. Four major
efforts have been carried out to provide guidance in this are:
ISO 27004 is a standard that has not seen wide-spread acceptance
measuring, then how can you possibly measure it? Once we have clear goals,
any measure we come up with is valid as long as it tells us if we are making
progress (of any kind) towards our goals. We should note that a given metric
will be useful only at a single level – strategic, tactical or operational. For
example, strategic metrics will help us measure high-level outcomes, but the
number of DDoS attacks we experienced yesterday won’t help us with this.
However, the DDoS metric is of extreme value at the tactical level.
So, how exactly do we capture usable security metrics? It turns out that there
four steps – each building on the one before – that we can climb and wind up
with great metrics. Figure 26 shows the four components in a stacked model.
Starting at the bottom, we have Strong Upper-Level Management Support.
Without this, the rest of the organization will not see security as valuable and
will therefore not buy into it. Additionally, funding and other resources will
be extremely difficult to obtain if the drive for better security does not come
directly from upper management.
Once we have senior management support, we can move to the second block,
Practical Security Policies and Procedures. This stresses the need for
realistic policies and procedures along with the authority needed to enforce
them. Those policies and procedures must be reachable and provide useful
security by using the correct controls. Without procedures, there is little hope
of collecting useful metrics.
Once policies and procedures are in-place, we can execute the third block,
Quantifiablee Performance Metrics. This represents IT security performance
Quantifiabl
goals, which should be easy to capture. Repeatability over time is a key
attribute of these metrics.
Requirement
Control – roll –out
implement a 3-layer defense-in-depth control
3 firewalls
Now, if anyone asks, “Why the heck did we just buy 3 firewalls?”, we can
ust point to the requirement, which points to the goal. This makes life easier
for everyone.
Some indicators of good alignment between security and the business are the
following six:
We
We efficiently rediscovering
don’t keep capture the same
knowledge a nd problem
disseminate it
Security processes are standardized
We have clearly-defined roles and responsibilities for security
functions
Every project plan incorporates information security
Security activities address a high percentage of information
assets and related threats
Information security has the appropriate authority,
organizational level and people
The per-seat cost of security services is kept low
defined criteria
There is effective
assurance communication
communication and cooperation between
functions
four things:
Strategy goals, or KGIs
Processes that will be used
KPIs
Critical success factors (CSFs)*
* CSFs are the elements or events that must occur to achieve the KGIs
things
we cango wrong.
figure out Typically, higher
how to bring that risk
risk means potentially
down to a level wehigher rewards
can live with. if
At the core of risk management is a risk assessment process, were we seek to
understand the nature of the risk we are facing and the potential impact.
Organizations can manage risk centrally using a single enterprise risk
management group of people or take a decentralized approach by distributing
the work among multiple business units. The decentralized approach requires
less commitment up-front but takes more effort to make sure that risk
management activities are properly carried out.
Looking into risk assessment a little deeper, we discover that it includes three
phases – identification, analysis and evaluation. For the risk identification
hase, we create a list of vulnerabilities and take inventory of current threats.
By combining the results of the two lists of vulnerabilities and threats, we can
create a set of plausible scenarios, and figure out probable ways in which a
compromise might happen. In the risk analysis phase phase, we take each risk
identified in the first phase and perform a BIA to come up with the possible
impact. Finally, in the risk evaluation phase
phase, we look at the impact from each
risk and decide if it falls within an acceptable range based on our risk
appetite, tolerance and capacity. In short, we list things that can go wrong,
then figure out how bad it would be if they did go wrong, and finally decide
if we should do something about each.
After we have assessed risk using the three phases, we then need to execute a
risk response for each risk that falls outside of our ranges. We can take one of
four actions that we discussed in Section 1. If you recall, they are:
physical facilities.
Some common areas that often are not updated to reflect changes are the
following seven:
we may need to establish the baseline at 2%. Ultimately, the goal of baselines
and a standard approach is to ensure that the level of residual risk is
consistent across the entire organization.
Is It Secure?
When creating an information security program, it can be very helpful to
have a consistent method for reviewing the various aspects of a program. A
good security review process will have the following five components:
An objective
A scope
A list of constraints
An approach
A result
Let’s walk through those components and describe each.
The review objective is what the security manager hopes to get out of the
review. For example, a useful objective might be to determine if an Internet-
facing application can really be exploited using a known vulnerability.
Scope ties the objective to the systems or processes being looked at. In the
example above, scope would tell us which infrastructure, people and
processes are fair game. If we find it hard to define scope, then perhaps we
need to revisit the objective.
A constraint is a boundary restricting what the reviewer can do or have
access
systemto. In ourtoexample,
at night perhaps theduring
prevent downtime reviewer is only
business able Or
hours. to access thethe
perhaps,
reviewer is not allowed to have internal knowledge of the network. In either
case, the constraint might render the review meaningless, so they are
important to call out.
There might very well be multiple ways in which we can achieve the
objective. In our example, we might choose to assume an attacker is unable to
login, which means they will have to find alternative ways to steal data – the
lack of credentials would be listed as a constraint. Or, we can provide
credentials to a penetration testing team, so they can focus on other areas
once logged in – in this case scope would include the credentials. Each option
is considered a different approach, with a specific set of activities to be
carried out. Regardless of the selected approach, it must achieve the objective
Maps controls to objectives
Describes what the team did to test those controls
Links the test results to the final assessment of effectiveness
Work papers may or may not be included in the final report, but often they
are more useful than the final report itself.
If an information security program is mature and has established policies and
procedures, an audit helps to tell us if those policies and procedures have
been fully implemented. On the other hand, if we have an immature program
that is still being developed, an audit will normally measure the program’s
level of compliance against an external set of standards. Examples of external
standards or frameworks might be the following, listed in order of a wide
scope, down to a scope specific to certain technologies:
COBIT
The Standard of Good practice for information Security
ISO 27001 and 27002, which are specific to IT security
For example, COBIT has a very wide scope, while the ISO 27000 series is
Whattake
Let’s Duea look
Diligence
at whatLooks Like looks like in terms of a security
due diligence
program. In this example, exercising due diligence means that the following
twelve components must be in-place:
Enforcement procedures
procedures. That are designed
can be a little to enforce
confusing, compliance
so let’s state with
it another existing
way. To
make sure that a given procedure is being followed, we can create a different
procedure to carry out that enforcement, and we call those enforcement
rocedures. For example, suppose we we have a procedure that help desk
employees should follow when resetting a password over the phone. To make
sure the help desk employees are following the password reset procedure, we
design an enforcement procedure that requires a supervisor to randomly listen
in on phone calls to see if those help desk employees are following the
procedure. Now, how do we make sure that supervisors are carrying out the
enforcement procedure? Well, there comes a point at which additional
procedures introduce too much overhead and we simply have to trust our key
employees.
Remember that procedures and processes should always derive from a high-
level policy. That policy must be comprehensive enough to cover all
information that needs to be secured, but still remain flexible enough for the
procedures and processes to choose their own technologies and still remain
in-compliance with the policy.
However, there are always exceptions to every rule, and a good policy must
take this into account. When writing a policy, the organization should try as
much as possible to cover all foreseen scenarios, but in the end a policy
process will need to be allowed. This provides a means for
exception process
exception
Normal monitoring
Audit reports
Security reviews
Vulnerability scans
Due diligence work
Because of the tight relationship between policies and standards, compliance
is concerned that processes and procedures fully align with both unless an
exception
compliancehas
in been
time,made. While enforcement
compliance an audit simply
is aprovides a snapshot
never-ending of and
activity,
is normally shared across the entire organization.
Because the information security program is concerned with compliance
enforcement across the organization, it should be audited itself to determine
compliance with applicable standards and regulations. The results of this
audit should be expressed in terms of risk, mitigating factors and acceptable
control objectives.
Assessment of Risk and Impact
Vulnerability Assessment
All information systems should be continuously monitored using automated
means to detect vulnerabilities. Part of this activity should be to look for
security manager
particularly wheremust evaluateparty
an external all technical andThe
is involved. organizational changes,
ability of existing
controls is evaluated against this comprehensive list of vulnerabilities. Threat
sources can include the following five examples:
Technical
Human
Facility-based
Natural and environmental
Pandemic events
For each threat evaluated, the following four aspects should be considered:
If it is real
How likely it is to happen
How large the impact might be
Which systems, operations, personnel and facilities will be
affected
Risk Assessment and Business Impact Analysis
When discussing risk, a BIA does four things:
1. It determines the impact of losing the availability of any
resource
result from
incidents a single
and eventscatastrophic event,
that contribute butmajor
to the ratherevent.
from aThe
number of smaller
take-away from
this nugget of wisdom is that while individual residual risks might be
acceptable, they tend to aggregate to a level that can be disastrous.
The ultimate decision on whether to apply some type of mitigation controls
around a given risk must consider the cost/benefit ratio that a control would
provide. Unfortunately, mapping a specific control’s benefit to a security
business goal is not always easy. In these cases, it will probably be necessary
to create a business case before approval will be given. One of the key points
a business case can make is to state that while there will always be residual
risk, and all residual risk tends to aggregate, the control in question will
reduce the overall amount of residual risk. This will tend to overcome the
lack of direct correlation a risk has with a security goal and redirect the
conversation to look at overall residual risk.
The information security manager must take care to continuously
communicate the effect of emerging risk to security stakeholders. This can be
done all at once each year or it can be broken up into sections to be carried
out each month or quarter.
Resource Dependency Assessment
If an organization cannot carry out a comprehensive BIA, a business resource
dependency assessment might be a better option. This activity looks at all
business functions, and for the most important figures out what resources
(such as database and servers) are critical for that function to continue
operating. However, one thing this approach does not provide is the impact if
those resources were no longer available, which a BIA does provide.
Outsourcing and Service Providers
There are two types of outsourcing that a security manager will have to deal
with:
manner.
Special attention should be paid to indemnity clauses within the contract.
Indemnity is the act of protecting one’s self against loss or damage in the
event of a security incident. Service providers will normally try to write a
contract in a way that favors them by limiting the amount of compensation
the provider must pay if it fails to meet contractual obligations. Another
indemnity ‘gotcha’ to look out for is a ‘choice of law’ provision that may
require any potential litigation to take place in a jurisdiction favorable to the
provider.
Third-Party Access
Access to an organization’s information, systems and facilities by third-
parties must be strictly controlled and monitored. Any access should be
granted using the principles of least-privilege and need-to-know. Any access
must be authorized by the asset owner. All usage should be fully logged and
routinely reviewed by the security team on a regular basis. The frequency is
based on three factors:
1) Criticality of information
2) Criticality of privileges
3) Length of the contract
All access rights should never be granted until after the contract has been
signed and should be removed immediately upon the termination of the
contract.
which can
multiple handleprojects
smaller complexity.
into aItsingle,
also acts as a road
cohesive mapallowing
whole, that brings together
multiple
project teams to coordinate.
Getting a little deeper, information systems architecture considers three
things:
Define Authority,
Authority Structure and
below the information Reporting
security manager must also be established,
and the same RACI chart can help. Additionally, it is crucial that
organizational structure and reporting hierarchies be established to prevent
turf wars and missed communications. This often happens when people
report up through different senior managers, resulting in conflicting
directions being provided, as well as important information making its way
up the chain never reaching the right people.
Ensure Asset Identification, Classification and Ownership
If we don’t know what to protect, then gaps will form, and all of our efforts
will be rendered useless. This is why an information asset register must be
created and filled in. Following the identification of all information, we then
need to classify each asset by sensitivity and criticality. Lastly, a single owner
must be identified, preferably as a role and not an individual.
Determine Objectives
There
meansisisathat
saying,
if we‘If everything
attempt is a priority,
to address then we
everything, nothing is.’ due
will fail Whatto this
lack of
resources and time. Therefore, we must prioritize our goals – in this case
risks – and work from the top down.
Determine Methodologies
There are many choices for the methodology we select to assess, analyze and
mitigate risks. But beware – just because one is already in-use and known
should not prevent us from tossing it in favor of a distinctly better candidate.
Designate Program Development Team
An individual
information or management
risk team must beprogram.
selected to develop
Because and implement
security goals mustthealign
with business goals, it is important that non-security representatives from the
business side be involved.
Liability
The need for compliance
Due care
Due diligence
Setting the tone and culture
They are responsible for setting risk acceptance levels
Most
risks, organizations have
such as business interruption insuranceThe
purchasedinsurance. t o mitigate
securitycertain
managertypes of
must
remain aware of the types and coverage of such insurance policies, so they
are included in risk analysis and recovery planning.
Any outsourced function is a possible source of severe risk, and the
information security manager must remain informed of new and updated
third-party relationships.
If a security department is not aware of new or ongoing projects, then it
cannot ensure a proper level of security. The one department that usually is
‘in the know’ for these types of activities will be the project management
office, or the PMO. The security manager must maintain a good working
relationship with the PMO so that new or updated changes are pushed to the
security department.
Cross-Organizational Responsibilities
It is important that an organization keeps too much responsibility from
residing in a single role or individual. Separation of duties, or SoD, is a
control designed to ensure just such a thing by dividing dependent
responsibilities between two different parties. If SoD is not properly carried,
unhealthy conflicts of interest can develop. For example, giving the same
individual responsibility
result in performance for chosen
being securityover
andsecurity,
performance willaalmost
because alwaysin
degradation
performance is always immediately noticeable, whereas security weaknesses
may not be visible for some time. Another example is in the case of security,
audit and quality control – these functions cannot be under the control of
those responsible for monitoring them. It does no good for a fox to guard the
henhouse – when that happens, hens start to mysteriously disappear!
As each phase of a security program is reached, the content should be
actively spread among various parties in the organization so that areas of
responsibility can be assigned. The information security manager will need to
work with senior management to ensure that those responsible for specific
activities understand, accept and have the resources necessary to carry out
those activities. The security steering committee can be invaluable with this.
Management
Management can be loosely defined as…
…achieving definedtogoals
financial resources makeby
thebringing together human, physical and
best decisions.
Managing a security program includes both short and long-term planning –
from daily activities to governance responsibilities. Senior management must
make sure that enough resources are made available for the security manager
to do her job effectively. Management activities include the following six:
Oversight and omonitoring
Development f policies and standards
Creation of procedures and general rules
Administration
While management is all about strategy and planning, and bringing the right
resources together, administration describes the repetitive, often times daily
tasks that need to be executed to keep the mechanisms moving so that we
ultimately achieve our goals. Using our car example, management would
identify the people to create the various parts, and setup the processes and
how they work together. Administration ensures that each person shows up
on-time and has the necessary raw materials.
However, administration of developing programs will not be the same as
Personnel performance
Time tracking
Purchasing
Inventory management
Project monitoring and tracking
Budgeting control
Business case development
Project management (this is a not s ecurity program management!)
Some technical and operational administrative duties are the following, also
not a comprehensive list:
Top
Figure 28: Top Layer of Business
Business Risk Structure
Structure
In our example, Business Unit B is rated as the most important – this rating
usually correlates to revenue generated by the unit, but it could be based on
other attributes instead. This rating should be done by senior management.
The second step is to identify the critical functions across the organization
and note each under the appropriate business unit, as shown in Figure 29. Of
course, when we say, ‘critical function’ we’re referring to whatever tasks are
absolutely required for that business unit to function. Each critical function is
assigned a priority within each business unit. For example, Business Unit A
has two critical functions, and we assign one function a priority of ‘1’ and the
other ‘2’.
Likewise, Business Unit B has two critical functions, and the most important
one is assigned a ranking value of ‘1’, and the other ‘2’. We are not
Figure 29: Cr
Critical
itical Function Layer
Layer of Business
Business Risk Structure
Structure
Next, we need the required assets and resources for each critical function. We
also must rank all assets and resources within each business unit as shown in
Figure 30.
Assets and resources can contain vulnerabilities, and therefore they represent
a source of risk as shown in Figure 31.
Asset Vulnerabilities
Figure 31: Asset
At this point, we can map specific risks all the way up to business operations.
This allows us to easily see where risk originates, particularly when we view
the entire organization map as shown in Figure 32. Using this approach, it is
much easier to prioritize risk.
Figure 32: Combined
Combined Impact Risk
Risk Structure
Qualitative
Advantage – prioritizes risk and identifies areas for immediate
improvement
Disadvantage – does not provide a measurable magnitude, making
a cost-benefit analysis difficult
Quantitative
Risk Assessment
Figure 33 illustrates a standard approach to risk assessment.
eventually come back to haunt us when they are compromised – all because
we didn’t know they should be protected! Determining the value of each
asset will be important later when assessing risk to this asset – after all, do we
really want to spend $5,000 each year to protect something we can simply
replace for $500? Value will also be used later to classify the asset.
For some assets, valuation into a common financial form (e.g. dollars) is
easy, such as with hardware – how much does it cost to replace?
Unfortunately, information assets can be much harder to valuate. Valuation
can simply be the cost of recreating it or restoring it from a backup, or it
might be based on how much it contributes to generating revenue. In other
cases, the value is related to consequences or regulatory fines if confidential
information or trade secrets are compromised.
Personally identifiable information (PII), such as social security numbers or
full names, are particularly troublesome as the organization may incur
regulatory fines as well as lawsuits resulting from identity theft. Slightly less
tangible are reputation losses, which result in share losses. In these cases, the
value is not in the data itself, but in the impact of leaking the data.
Marketing materials, while having little intrinsic value, can create unintended
consequences and therefore represent risk. For example, inaccurate
descriptions of products or services, or information leading to wrong
investment decisions can bring on lawsuits, resulting in significant financial
hardship.
Typical information asset categories that should be looked at are:
managers
assigning ause a combination
subjective label ofoflow,
the two. In fact,
medium andin some
high cases
works simply
quite well.
The most direct approach is to use a quantitative value based on purchase or
replacement price. An alternative approach is to consider value-add or other
more intangible values. For example, a hardware server and the software
running on it may cost only $20,000, but if we lost the use of it, we would
experience a monthly loss of millions of dollars. In this case value would be
based on the lost revenue during the down-time, not simply the cost of
replacement.
Intangible assets are usually intellectual property such as trade secrets,
patents, copyrights, brand reputation, and customer loyalty. Auditors may
represent intangibles under the heading of ‘goodwill’.
In a publicly traded company, intangible assets represent the difference
between tangibles recorded in financials and the company’s market
capitalization.
Risk Assessment and Management Approaches
There are several risk management models that we can choose from,
including:
COBIT
OCTAVE
NIST 800-39
HB 158-2010
ISO/IEC 31000
ITIL
CRAMM
FAIR
VAR
Identification of Risk
Risk identification is the act of determining the type and nature of viable
threats, and which vulnerabilities might be exploited by each threat – a
vulnerability that can be exploited by a viable threat is a risk . Exposurei s the
potential loss when a vulnerability is exploited by a threat.
A viable threat has two factors:
specific threat should still be listed to be analyzed, since a threat may simply
not have been identified yet. We should have the attitude of “if it can go
wrong, it will”. Even the process of risk identification itself is subject to error
and could represent a vulnerability!
Some hints for a successful outcome when developing scenarios are the
following:
Team-based brainstorming
Flowcharting and modeling
What-if scenarios
Mapping threats to both identified and suspected vulnerabilities
Risk scenarios are created by describing a potential risk event and then
writing down the assets that might be affected. Some examples of risk events
are:
System failure
Loss of key personnel
Theft
Network outages
Power failures
Natural disasters
Each risk scenario should be related to a business goal or impact. Only real
and relevant scenarios should be considered. For example, while it is
technically possible for Canada to invade the U.S., it is highly unlikely.
However, it could be a very real threat that the Canadian government could
pass a law that restricts import of our product – that’s a risk that definitely
should be “what-if’d”. Figure 35 represents inputs that should be considered
when creating scenarios.
Plan-Do-Check-Act
Information security is a great candidate for using something called total
quality management , or TQM . TQM is based on the plan-do-check-act
( PDCA
PDCA) process as shown in Figure 36.
PDCA
Figure 36: PDCA Methodology
The components of TQM as carried out with information security are shown
in Figure 37.
KGIs.
Disconnect of Responsibilities
Figure 38: Disconnect Responsibilities with Outsourced
Outsourced Providers
Providers
those functions that are outside of the organization’s core expertise. Do what
we do best internally, and potentially outsource other processes only.
The exit strategy needs to be considered before an agreement is finalized and
must be specified
continues in the contract
to be available to ensure that
while transitioning the from
away outsourced process
the third-party.
Because few businesses remain static, the information security manager
needs to stay on top of the contract and make sure that it reflects the current
relationship.
Keep in mind one very important detail – while we can outsource information
risk management to a third-party, we can never outsource ultimate
responsibility. Even if we do a great job of dictating controls and making sure
the third-party implements them properly, if a security event occurs, we are
still responsible for any fallout from that event, particularly in the eyes of the
law.
Outsourcing providers may be reluctant to share details on the nature and
extent of their internal protection mechanisms. This makes it even more
important to include service-level agreements (SLAs) and other performance
requirements in the contract. Since we will not be able to peer inside of their
day-to-day operations, we must rely on the contract to force the provider to
behave properly. One common approach for this is to require specific audits
such as SOC 2, or perhaps require the outsourced business to acquire an ISO
27001 certification. Care must be taken with SOC 2 audits, as the outsourced
provider is the one who defines the criteria. Even with ISO 27001, it is
important to review the external audit report performed on the provider for
comments.
If the organization operates in a regulated industry such as finances, there
will probably be requirements on reporting security events such as the time
allowed before the report is submitted to the governing agency. In these
cases, the contract must reference such notifications.
The financial viability of providers must also be addressed to ensure they will
be able to operate and meet the requirements of the contract. Since
outsourcing often is awarded to the lowest bidder, this is a very important
aspect to consider. The BC and DR plans should reference all outsourced
relationships, and should cover the loss of critical outsourcing providers,
including insolvency or bankruptcy scenarios.
Sensitivity of information
Significance of applications
Cost of replacement hardware
Availability of backup equipment
Control of physical security may reside with the information security group
or not, but regardless it is the responsibility of the information security
manager to ensure security policies, standards and activities sufficiently
protect those assets. Physical control of access to computing resources should
be determined by the sensitivity of the information being accessed and should
always be on an as-needed basis.
The physical location within a facility is important as well. For example,
putting servers in a room prone to flooding is not such a great idea. The
ability to control temperature, humidity and electrical power needs to be
looked at as well. Personal computers with special access should not be
placed in heavily-trafficked areas. Physically locking a device down or
disabling methods for copying data off (such as USB ports and removable
media drives) should be considered. Laptops and other mobile devices are
particularly problematic as they are designed to be taken out of a secure
facility. Encryption of the entire storage disk in such devices is one option to
mitigate the risk of a device being stolen.
Physical media such as optical disks, magnetic disks, USB drives and even
printed hardcopies are as great a risk as online compromises, so they should
be stored in a secure location. The transport and storage of backup media
must be encrypted, particularly if stored at an off-site location. A clean desk
policy in which no cluttered desks are allowed should be enforced in less
secure office spaces. This prevents sticky fingers or wandering eyes from
accessing sensitive information.
Locations that reside in a geographical area prone to earthquakes, flooding,
hurricanes or other natural disasters should be avoided when selecting sites
for facilities. Even if an area is safe geographically but located next to special
risk infrastructure, such as nuclear power plants, airports or chemical
production facilities, then additional consideration must be applied before
selecting it as a site for a facility. Finally, primary and backup facilities
should be located far enough from each other that a single disaster event does
not take out both locations.
‘Components’ wouldsecurity
procedures (SOPs), be things like roles, policies,
architectures, standard
etc. However, operating also
a framework
facilitates deliverables that are more short-term, such as possible risk
mitigation options, facilitation of conversations with subject matter experts
(SMEs), or ensuring policies are followed. Some other goals a framework
helps with are ensuring that:
units
Stakeholder understand their roles
Continuity of business is addressed
Components
The various components of a security management framework can be broken
down into five areas:
Technical
Operational
Management
Administrative
Educational and Informational
Let’s dive into each area one at a time.
Technical Components
For our purposes, ‘technical’ refers to IT systems, which have an owner and a
custodian. The owner is responsible for costs and behavior of the system,
while the custodian is responsible for the day-to-day management of the
system. IT is always the custodian of an IT system, but often the business
unit that requires a system is the owner. Regardless of who it may be, it is
crucial that all systems have an identified owner. Otherwise, there is no one
accountable for ensuring that a system remains compliant with security
policies and that risk is properly addressed. Given that the vast majority of
information resides in systems maintained by IT, that department is a major
focus of an information security framework.
Operational Components
Operational components of a security program are the management and
administrative activities conducted either daily or weekly such as
maintenance of security technologies, security practices and keeping
procedures updated. The information security manager manages these areas,
but since the actual execution usually requires a different department (such as
applying security patches) he will need to work with and provide oversight of
those departments.
Some examples of operational components are:
Credential administration
Security event monitoring
System patching procedures
Change control procedures
Collection of security metrics and reporting
Maintenance of control technologies
Security incident response, investigation and resolution
Retirement and sanitization of hardware
For each operational component, the information security manager will need
to identify the owner and ensure documentation is kept up to date.
Additionally, the security manager must ensure that procedures for
appropriate security-related areas are created and maintained, and that roles
and responsibilities documentation is kept current.
Management Components
While operational components are addressed on a daily or weekly basis,
management components are visited periodically every few months, quarters
or even years. Examples are the development of standards, reviewing
policies, and executing oversight of initiatives or programs.
Management goals shape the security program, which in turn defines what
must be managed. Often, early versions of a security program are too lenient
or strict and the management components must allow for timely modification.
When developing the management components, it is important that proper
oversight from senior management takes place.
Administrative Components
We have discussed to a great extent how the information security
management role needs to provide oversight for other departments, but we
need to keep in mind that information security is itself a department, and so
we can’t ignore all of the normal functions that come along with a group of
people trying to accomplish a mission. This means we need to manage
resources, personnel and the financial aspect of running a business unit.
Rarely does an information security program have a sufficient number of
resources, and so security efforts must be prioritized.
It is not uncommon for the information security manager to experience
pressure to take shortcuts, and if this cannot be handled between the two
departments, the manager needs to escalate it to senior management so that a
success.
To illustrate this approach further, let’s explore an example in which we
implement the road map in four stages.
Stage 1 will highlight how security will align with business goals, and how
we will start improvements over what is in place today. This will require the
security manager to interview various stakeholders and will provide a great
deal of insight to possible members of the steering committee.
Stage 2 leverages the steering committee to draft policies for a security
program for senior management to approve. Since business unit owners are
part of that committee, we will also have identified business goals.
Stage 3 sees the committee members conducting internal reviews to see how
far away they are from
from the goals that they
they themselves have identified. A nice
side-effect is that they are now promoting awareness of the security program.
Stage 4 implements change to address the gaps revealed in the previous
stage, while a monitoring approach is developed at the same time. The
security manager can then get consensus on roles and responsibilities,
processes and procedures.
Job done!
Elements of a Road Map
If some type of a security strategy is already in place, then a road map should
also exist. In this case, the manager simply needs to turn the conceptual
architecture into reality. Basically, we have been given a blueprint, and we
need to simply build it.
On the other hand, if a security strategy does not exist, we need to recognize
that there is a risk that the elements and work needed for a successful security
program may not be prioritized. Add to that a lack of metrics, and we are
setting ourselves up for failure. So, a security strategy is essential to success.
A lot of the effort required for developing a security program is in designing
controls that meet our control goals, and then creating, deploying and testing
those controls. All of this means that the organization is going to need to be
receptive to the addition of new security activities, including the inevitable
disruptions.
mitigation steps.
The sixth, and last, step is to communicate about and monitor risk.
Communication happens between decision makers and other internal and
external stakeholders.
For any security program to be successful, we must be sure that it is a
continuous process as shown in Figure 39.
Figure 39: C
Continuous
ontinuous Risk Management Steps
Steps
COBIT 5
ISO 31000 Risk Management
IEC 21010: Risk Management
NIST SP 800-39: Managing Information Security Risk
HB 158-2010: Delivering Assurance based on ISO 31000
External stakeholders
Additionally, we must also consider the perceptions and values of external
stakeholders, and any externally generated threats or opportunities.
participating in risk
How risk-averse ormanagement
risk-aggressivet he organization is
Once that is done, we can establish the criteria by which risk will be
evaluated. There are three considerations we must consider when selecting
criteria:
Gap Analysis
A ‘gap analysis’ means measuring the difference between two states. When it
comes to risk management, we are measuring the difference between existing
controls and our control goals – the current state and the desired state.
Control objectives should result in acceptable risk, which in turn establishes
the information security baseline.
Control objectives can change during the risk management process, so we
must be sure to periodically review previous gap analysis to ensure they
remain accurate. This should be automatically covered when testing for
control effectiveness.
Costs and Benefits
Three common measurements of potential losses are:
The security manager must ensure that security programs properly integrate
with other assurance functions within the organization. These interfaces are
bidirectional, in that while security-related information is provided to other
departments, those departments also provide information back to the security
department. For example, a business unit may provide requirements to the
security department, while the security manager may provide meaningful
metrics back to the business unit.
Security added after the fact is usually not effective security at all. That is
why it is important to bake security into projects from the beginning of the
system development life cycle, or SDLC. However, the SDLC is seldom
controlled by the security manager, and therefore he must foster collaborative
relationships with his colleagues in other departments.
The traditional SDLC goes through five stages:
Initiation
Development or acquisition
Implementation
Operation or maintenance
End of life or disposition
Change management needs to be an area in which the security manager takes
special interest, since it is through change management processes that she
will be able to inject risk assessments and apply the appropriate treatments.
Another approach is to make sure that security implications are part of the
standard practice when making changes. This can be done by requiring all
changes to be accompanied by the results of a risk analysis. In addition, it is a
wise precaution for the security manager to identify where changes are
initiated, funded and deployed. By hooking into these locations, the manager
has a much greater chance at detecting changes as they occur.
Security controls lose their effectiveness over time due to changes in the
systems and processes they are designed to protect, and therefore a periodic
review of all existing controls is absolutely essential to keep a proper security
posture.
Closely relatedculprit
is the primary to change
that management
contribute to is configuration
security management,
breaches. which
The main two
reason systems are improperly configured are:
still experiencing
the time poorly
constraints configured
placed systems,
on the existing then
staff. we need
It may to take
be they are asolook at
overworked that they do not have the time to perform the configuration
operations properly.
Release management is the process of rolling out new capabilities or updates
to existing capabilities. The key component for success is proper testing
before deployment. The security manager should ensure that proper
procedures and standards exist to prevent products from being deployed to
the production environment prematurely. Proper monitoring to ensure staff
are following the procedures must also be carried out.
Security Awareness Training and Education
Security can never be addressed solely through technical mechanisms. The
behavioral aspect – meaning the behavior of people – must be addressed as
well through engaging and repeated training. Security awareness programs
should focus on topics such as:
Password selection
Appropriate use of computers
Email safety
Web browsing safety
Social engineering
Since employees are the ones who will be in the best position to recognize
threats that automated mechanisms may miss, they should be taught how to
recognize and escalate security events.
Special attention needs to be paid to the positions that have unlimited data
access. Examples of duties that often require this are:
Scheduling
Programmersbatch jobs application code
changing
Since security management seldom has oversight into these areas,
managers,
What is theIT staff, ormessage
intended end users?
? Is it policies, procedures or
perhaps recent events?
What is the intended result? For example, improved policy
compliance, changing a behavior, or executing better practices?
What communicatio
communication n method will be used? Possibilities include
computer-based training, or CBT, an all-hands meeting, using the
intranet, or newsletters.
What is the organizational structure and culture?
There are a number of effective mechanisms we can use to raise awareness
for information security, including:
Computer-based training
Email reminders
Written security policies
Non-disclosure agreements signed by employees
Newsletters, web pages, videos, posters, login reminders
Visible enforcement of security policies
Simulated security incidents
Rewarding employees for reporting suspicious behavior
Job descriptions
Performance reviews
Classification
Marking and ohandling
f information
of documents and information
Reporting requirements
Disclosure constraints
Email and Internet usage policy
Ethics
Ethics training is usually provided for employees who engage in activities of
a particularly sensitive nature, such as monitoring user activities, performing
penetration testing, or having access to sensitive personal data, such as those
in HR. Additionally, information security personnel must be aware of
potential conflicts of interest or activities. A signed acceptance of the code of
ethics should remain a permanent part of the employee’s records.
Documentation
An important part of a good information security program is ensuring
effective oversight of the creation and maintenance of security-related
documentation. Some document examples are:
the budget
budget is managed.
management We’representing
includes not talkingtojust
andspreadsheets
convincing here – effective
senior
management to approve a budget. This is why self-education and advanced
planning are so important. Well-before the fiscal cycle starts the information
security manager must be sure he or she is familiar with the processes and
methods the organization uses. Another crucial aspect is to ensure the
security strategy is laid out in a well thought-through road map. If the
strategy has been reviewed and approved before the budgeting cycle begins,
we have a much better chance of getting a budget that aligns with that
strategy approved.
Most budgetary expenses for an information security program are pretty easy
to understand - we have personnel, hardware, software and subscription costs.
Slightly more difficult to get a grasp on are expenses related to projects with
timed deliverables. The security manager must work with the PMO and
SMEs to estimate reasonably accurate costs for each fiscal year. Some
elements that need to be considered are the following:
Employee time
Contractor and consultant fees
Hardware and software costs
Hardware space requirements
Testing resources
Training costs
Travel
Creation of supporting documentation
Ongoing maintenance
Contingencies for unexpected costs
One area that is the most problematic to estimate are the costs involved with
responding to incidents, because often the need arises to engage with external
resources. The best way to estimate this type of costs is to use historical data
and extrapolate for the coming year. If historical data within the organization
is not available, estimates can be based on information from peer
organizations.
Information Security Problem Management Practices
Problem management is focused on finding the root cause of an emerging
issue. As information systems get updated and are enhanced, it is likely that
security controls will start having problems or stop working altogether. The
security manager will then need to identify the problem and assign a priority
to it. The steps involved are:
Understanding the issue
Defining the problem
Designing an action program
Assigning responsibility
Assigning due dates for resolution
Some type of reporting process needs to track the issue until it is resolved.
At times, the security manager will need to take immediate steps to
implement a secondary control if the primary fails. For example, if a firewall
stops filtering traffic, the security manager might disconnect certain systems
from the network until the firewall has been replaced. Of course, this will
almost certainly result in a business interruption, so the authority to take such
an action would need to be assigned to the security manager before the event
took place.
Vendor Management
External vendors often provide a valuable benefit in either capabilities an
organization does not yet possess, or by providing capabilities at a lower cost
than the organization could provide for itself. Security service providers can
provide a range of functions such as:
Financial viability
Quality of service
Adequate staffing
Adherence to security policies
Right to audit
By monitoring these services, the security manager ensures that risk
Program objectives
Compliance requirements
Program management
Security
Technicaloperations management
security management
Resource levels
Program Objectives
The first evaluation area, program objectives, deals with ensuring that the
program’s security goals are sound. Here, we need to ensure that there is a
solid security strategy and road map, and that there is well-defined criterion
for acceptable risk. Once we have that established we then need to make sure
that the program’s goals align with governance goals, and that those goals are
SMART. When defining those goals, we need to be sure that they are
developed collaboratively among all stakeholders so that we can reach
consensus. If policies, standards and procedures do not exist, then this is the
time to create them. This is also the time to define whatever metrics we will
be using to measure success.
Compliance Requirements
The second evaluation area, compliance requirements, comes into play if the
purpose of a program is to ensure compliance with a regulatory standard. If
compliance is not a concern, then we can skip this step.
Assuming compliance is needed, then we will first need to determine the
level of compliance we will need to meet. As part of that effort, the program
will need to be examined to see if its components align with the components
required by regulatory standards. Looking at the results from recent audit and
The final evaluation area is that of resource levels, including financial, human
and technical resources. This area examines current funding levels and makes
sure that the budget and available money line up. This is carried out by
ensuring that resources align with business goals, and that program functions
are prioritized by the amount of money available.
Specific to human resources, the resource level evaluation area will inquire
about the current staffing level to see if existing resources are being fully
utilized. Part of this activity is to ensure that existing resources are adequately
skilled for the roles they are assigned, and to search for low value tasks that
other resources could carry out. A special consideration is finding out if there
are other HR resources the program is dependent on to succeed.
When it comes to technical resources, this area will ask about any
the most
Using an limited
externalview.
assessment or audit, which is the most
comprehensive approach.
Past incidents can provide a wealth of knowledge on trends, types of events
encountered in the past and the subsequent impact on the business. This
information can then be used as an input to decide on the types of events we
need to plan for.
Developing an Incident Response Plan
The incident response plan, or IRP, is the operational component of incident
management.
Elements of an Incident Response Plan
A common approach to develop an incident response plan is based on a six-
phase model or preparation, identification, containment, eradication, recovery
and lessons learned. Let’s walk through each of the six phases.
The first phase, preparation, prepares an organization to develop the
incident response plan prior to an incident. Activities include:
The second phase, identification, verifies that an incident has happened and
tries to find out more details about it – not all reports are real incidents.
Activities include:
What happened
What measures were taken
Results after the plan was executed
The report also contains a list of lessons learned that should be developed
into a plan to change the incident management responses. Activities include:
A typical BIA will include the following information about each business
unit:
this
Work function
backlogwere no longer
– when wouldavailable?
the backlog of work start being
felt?
Senior management
Response and recovery teams
HR
Insurance companies
Backup facilities
Vendors
Customers
The process continues until either the emergency is resolved, or the last alert
notification has been sent.
The exact escalation process will vary based on the level of the emergency
event, which in turn depends on the severity, the number of organizations
affected, and their need to be notified. If email is used for notifications, the
security manager may wish to encrypt such messages as email is sent in clear
text by default.
Help or Service Desk Processes for Identifying Security Incidents
Since help or service desk employees are likely to be the first to receive an
incident report, they should have guidelines on what looks like a typical
request and what is a possible security incident. This also serves to reduce the
risk that the service or help desk will be targeted in a social engineering
attack.
activities they are capable of carrying out, as this will assist the response
process in quickly activating the correct teams. There are five common teams
in this matrix:
Documentation
Documentation for a security program is a must if we hope for it to be
effective. At any stage of the risk management process, we should have the
following elements documented:
Objectives
Audience
Information resources
Assumptions
Decisions
A risk register
Consequences and likelihood of compromise
Initial risk rating
Vulnerability to internal/external factors
An inventory of information assets
A risk mitigation and action plan
Monitoring and audit documents
All documentation must be properly versioned so that we can determine what
policies were in effect at any given time.
Training and Awareness
People will probably always be the number one security risk due to either
accidents or malicious intent. Training and awareness programs are the most
effective methods to combat this top risk but must be targeted to different
audiences. End-user information security training should include the
following:
The importance of following policies
How to respond to emergency situations
The importance of restricting access in an IT environment
Privacy and confidentiality requirements
Authentication
Logging
Role-based access
Data transmission confidentiality, such as encryption
The information security manager should use both internal and external
resources to ensure secure coding practices and logic during software
development.
Just before deploying a new system, there are a series of steps that should be
followed:
If no viable
reassess the resolution is available
issue periodically at if
to see deployment, track and
a solution becomes
available
Code reviews from a security perspective must be carried out, often with the
aid of an external party.
Regulatory compliance
Security incidents increasing in frequency and cost
Concern over damage to reputation
Compliance with Payment Card Industry Data Security Standard
(PCI DSS), which is not a governmental agency by the way – it is
purely commercial
Goals that may increase risk
Steps to Information
Figure 40: Steps Information Security Program
Program Development
addressed:
There is no value in security investments
Security is a low-cost center
We don’t understand where the money is going
There is no need for a security investment
Our industry is not investing in security
Sometimes the security manager may have senior management’s full support,
but the money is just simply not there. In this case we can try three different
approaches:
Figure 41: In
Incident
cident Response
Response Plan Process Flow
Detect
We then detect suspicious activity, which includes two subprocesses:
1) Execute proactive detection by carrying out vulnerability scans,
network device alerts and log reviews
2) Execute reactive detection by tapping into reports from users
inside of our organization and from other organizations
Triage
Triage is next, where we sort incoming reports into three categories:
1) Problems that cannot be easily solved
2) Problems that can wait
3) Problems that can be addressed with our current resources
prosecution, liability
to the corporate legal or other legal issues. This is usually referred
team.
Monitoring
We have previously stressed that if you can’t measure something, then you
will never know if it is successful or not. The same applies to a security
program, but not all metrics are equal. While technical metrics are great for
measuring how well specific controls are working, they do little to tell us
how well our security program is aligned with organizational goals. To
illustrate this, consider the following questions and see how we would
determine the answer based on technical measurements alone:
do we need to course correct? Are there gaps we have not closed yet?
Qualitative metrics that are properly monitored can be used to discover
trends, and are represented by the following possibilities:
CMMI levels
KGIs
KPIs
KRIs
Business balanced scorecard (BSC)
Six Sigma quality indicators
ISO 9001
COBIT quality indicators
5 PAM
While there are different ways to determine how effective a security program
could be monitored,
acceptable butcommonly
size. Some a subset should be selected
monitored events to keep scope within an
are:
A well-thought-out
and process
all analysts should for responding
be properly trained. to
Theevents shouldpath
escalation be established,
for security
events should be tested regularly.
The focus should not always be on real-time events, however. Figure out
which are the most frequently targeted resources, or the types of attacks seen
the most frequently. Keep in mind that log reviews, even if happening in real-
time, will only reflect what has already happened – their main value is in
figuring out how it happened. Even an IDS may not trigger a warning soon
enough.
Strategic alignment
Risk management
Value delivery
Resource management
Performance measurement
Assurance process integration
Let’s go through each outcome individually.
Strategic Alignment
Strategic alignment refers to the degree that security goals align with
business goals. This requires frequent interaction with business owners so
that we can understand their plans and goals. Topics to discuss include:
Risk Management
We have already covered risk management in great detail, as it is a core
function for a security program. Enough said.
Value Delivery
Value delivery simply means that the security program delivers what it
promises – to create the desired level of security effectively and efficiently.
While even mentioning this might seem slightly obtuse, if it is not defined as
an objective a program could easily focus on side-goals and not deliver the
obvious. Continued delivery of value means that a security program is seen as
‘normal’ by everyone in the organization and is in fact expected because
standards are in place. Security management cannot remain static and must
purposefully strive to be in a state of constant improvement, because the
nature of threats is always changing as well.
Resource Management
Recall that resources encompass people, technology and processes – all
required to develop as
further categorized and manage
human, a security
financial, program.
technical andThose resources
knowledge. can
That be
last
one – knowledge – is particularly important, as good resource management
captures knowledge and makes it available to those who need it. Applying
that to security programs, we need to make sure that practices and processes
are well-documented and consistently applied using standards and policies.
Performance Measurement
Any good information security strategy must identify how it will be
monitored, and the metrics to be collected should be spelled out. Along the
way, more metrics will become available or identified, and we will need
processes for adding those to our strategy.
Not only do we need to measure how effective our security program is, we
need to measure how we are doing in implementing that program itself. Sort
of like making sure the building we are constructing will meet our needs
when it is done, while simultaneously measuring progress with the
construction process. We are measuring what we are building as well as how
we are building. Independent auditors will need to be called in once we
think we are done building the program to tell us if we really are.
Assurance Process Integration
An assurance provider is an individual or group that has an expertise level of
knowledge and skills in a given area, and as a result helps us to identify and
manage risk as well as monitor the effectiveness of mitigation controls in that
area. Basically, they are the subject matter experts that the information
security manager relies on to create an effective security program. Some
examples might be a business manager, IT manager, or finance director –
IT department
Internal audit
HR department
Legal department
Physical security
Risk management
Insurance department
PR department
Sales and marketing
Senior management
Compliance officer
Privacy officer
When an incident occurs, it is due to the failure or absence of a control, and
security staff must act quickly. We usually think of incident management as
the actions that take place during this time. However, the full scope of
incident management are all actions taken before, during and after an
incident. Those actions should all be designed with five goals in mind:
1) Provide
2) Provide enough
a way toinformation
minimize the
so impact
we can make the right decisions
3) Maintain or restore continuity of enterprise services
4) Provide a defense against subsequent attacks
5) Provide additional deterrence through technology, investigation
and prosecution
Events deserving of an incident management response can be technical
attacks, accidents, mistakes or the failure of a system or process. Any type of
incident that can disrupt the normal operation of the business must be
considered by the information security manager. Just like risk management,
risk assessments and BIAs form the basis for how we prioritize the protection
of resources and how we carry out response activities.
The more we use information systems, the more important it becomes on how
regulatory mandates
and capabilities require increased
of for-profit security
and nation-state vigilance.
attackers The sophistication
is growing, and they
are using more and more zero-day attacks.
Incident Response Concepts
Let’s cover some key concepts related to incident management.
Incident handling is a service that covers all processes or tasks associated
with handling events and incidents. It involves four functions:
enables us tofrom
information take the
disciplinary or legal
incident has beenaction, because
preserved all the that
in a format forensics
is
acceptable. Additionally, the assigned priority ensures that any resulting work
is addressed in an acceptable timeframe. This information can also be
checked against known errors to provide possible short-term work-arounds.
Incident management may also involve other functions such as vulnerability
management and security awareness training.
Incident response is the last step in handling an incident, and carries out
mitigation (stop the pain), containment (stop the threat), and recovery (repair
the damage) actions.
Incident Response Technology Concepts
There are eight security principles the incident response team must
understand, which were covered in Section 1, such as CIA, privacy,
validation,
redirects. SQL injection, XSS, broken authentication and unvalidated
This chapter may have included a number of terms that you are unfamiliar
with, but an in-depth definition of each is beyond the scope of this book and
the exam. But, you need to be very familiar with the details behind each if
you are to be a successful CISM candidate.
Strategic Alignment
To ensure that incident management’s goals are aligned with the
organization, the following components should be examined.
management
Risk Management
Incident management
management. When allisprevention
the last lineefforts
of defense for cost-effective
fail, incident management risksteps in
to handle the fallout. To deliver value, incident management must seamlessly
integrate with business processes and the BCP. It must provide a greater
ability to manage risk and provide assurance to stakeholders, and it must
become part of an organization’s overall strategy to protect critical functions
and assets.
Objectives
Some goals of incident management are to detect and diagnose incidents
quickly and accurately. This should be followed by activities that contain and
minimize damage so that affected services can be restored. Determination of
the root cause of an incident is central to this process, and the job is not
complete until we have implemented improvements to prevent a recurrence
of the incident and documented and reported the entire event properly.
In short, the goal of incident management is to prevent incidents from
becoming problems, and problems from becoming disasters. Figure 42
illustrates the steps to effectively handle incidents.
Responsibilities
Related to incident management, the responsibilities for the information
security manager can be divided into three areas - before an incident happens,
while an incident is underway, and after the incident has been handled.
Responsibilities before an incident occurs include the development of
incident management and response plans and ensuring that both technical and
administrative solutions are handled properly – all while taking care of
budgeting and development. Maintaining response readiness is crucial, but
Roles
Table 5and
listsResponsibilities
all roles and responsibilities related to security incident
activities.
Position Roles Responsibilities
Security steering group Highest structure of 1. Takes responsibility for overall
an organization’s incident management and response
functions related to concept
information security 2. Approves IMT charter
3. Approves exceptions/deviations
4. Makes final decisions
Information security manager IMT leader and 1. Develops and maintains incident
main interface to management and response capability
SSG 2. Effectively manages risk and
incidents
3. Performs proactive and reactive
measures to control information risk
level
Incident response manager IRT leader 1. Supervises incident response tasks
2. Coordinates resources to effectively
perform incident response tasks
3. Takes responsibility for successful
execution of IRP
4. Presents incident response report
and lessons learned to SSG members
Incident handler IMT/IRT team 1. Performs incident response tasks to
member contain exposures from an incident
Skills
The set of skills that IRT members need to possess can be divided into two
groups – personal and technical. Let’s cover the personal skills first.
One primary personal skill is communication, in both directions – speaking
and listening. Communications can take many forms, including email,
documentation, notifications and policies and procedures. Members need to
be good listeners in order to get all of the necessary details related to an
incident. This applies to both in what is being said as well as what is not
being said, and the targeted audiences include:
Let’s discuss some other important incident response team member skills.
Leadership skills are essential, as team members must often direct and get
support from other members of the organization. The ability to present
information is crucial, ranging
and court appearances. from
Of course, thetechnical
ability tooverviews,
followp public
olicies conferences
and
procedures is a given, as well as the ability to be a teamp layer. An often-
overlooked quality is that of possessing integrityd ue to the sensitive nature
of the information team members will be expected to handle. Having a
healthy level of self-understanding in terms of recognizing limitations will
go a long way to ensuring success, as will the ability to cope with stress,
solve problems and manage time effectively.
The second group of skills are technical and are comprised of two types.
First, technical foundation skills refer to the ability of members to
understand the basic technologies used in the organization, followed by
ing skills, which we have already covered in abundance.
incident-handling
incident-handl
Post-Incident Activities and Investigation
The basic, and fairly obvious, principles the security manager should adhere
to when approaching post-incident reviews are to identify a problem, create a
plan to mitigate the problem and then implement the solution. A less obvious
activity in following up on incidents is to calculate the total loss. This
provides a very useful metric as it provides a tool to justify the existence of
the response team to senior management and will be valuable information if a
court case results from an incident.
Identifying Causes and Corrective Actions
For each security event, a review team should examine the evidence and find
a root cause for the security failure. This in turn is used to enhance the
security program and to prevent a recurrence. This analysis should ask:
Why
How did
wasitthe
happen?
system vulnerable or how did the attack happen?
What was the reason for the attack?
by a system
confirm administrator
an incident, should
followed be to
by the retrieve information
identification needed
of the scope and to
size of
the affected environment. This is followed by determining the degree of loss,
modification or damage as well as identifying the possible path or means of
attack.
Requirements for Evidence
If care is not taken to keep evidence free of contamination, it may prevent us
from carrying out forensics activities required to identify and prosecute the
perpetrator. It can also prevent us from understanding how the attack
occurred and what changes we should make to stop it next time.
When a computer has been compromised, the usual recommendation is to
unplug it to preserve the evidence on the hard drive. This prevents the
operating system swap files from overwriting the data as well as stopping the
attacker from covering his tracks. However, it is not always the best action to
take. By killing power, we risk corruption of data on the disk, and if malware
is resident in memory only, that evidence will be lost when power is
removed. As both actions are reasonable, the information security manager
will need to establish the correct approach and make sure personnel are
trained to take that action.
When it comes
is important thattime
the for a forensics
analysis expert toonstart
be performed analyzing
a copy digital
and never the media,
originalit
data. The original media should be given to an ‘evidence custodian’ who will
store it in a safe and secure location. If the original media is ever changed in
any way after the incident, that evidence will no longer be admissible in
court.
The copy of a hard drive must be a bit-level image taken by a write-protected
cable to prevent even one byte from being written back to the source media.
Hash values of both the source and copy are calculated to ensure the copy is
exactly the same as the original.
Legal Aspects of Forensic Evidence
The required documentation to establish that evidence is legally admissible in
court requires us to follow some very stringent rules. This starts with a chain
of custody form tracking the who, what, when, and where of access to the
evidence and why the evidence was accessed. All acquiring technicians must
sign nondisclosure and confidentiality forms, follow a very specific checklist
and
whenmaintain
requestsa were
detailed activity
received, log.investigations
dates A case log must be assigned
were created totooutline
investigators, and investigator information. Investigation report templates for
investigators to fill out should be used, and a process needs to be established
to ensure that all investigations are fair, unbiased and well-documented.
Audits
Put simply, audits are performed to make sure an organization is in
compliance with policies, standards and procedures. Internal audits are
usually carried out by an employed specialist, while external audits are
executed by a third party. While most external audits are a result of proving
compliance with some type of legal or regulatory rule, they are sometimes
required by a business partner.
Related to incident management, an audit can validate that we should not be
compromised if an event happens and that we will remain in compliance. It
can also show the presence of gaps in response plans.
Outsourced Security Providers
If an organization outsources both IT operations and incident management to
the same vendor, there may be some advantages due to tighter integration
between the two. The information security manager should consider several
things when partially or fully outsourcing security functions. The
organization’s incident number should be matched to the vendor’s incident
number, and the organization’s change management workflow should be tied
with the vendor’s. A periodic review of incidents should also be performed
with the vendor.
Acronyms
The following list of acronyms is taken directly from the CISM Review
Manual, 15th edition. Not all acronyms are found in this book, but it is
recommended that you be familiar with this list in case a term is used on the
exam.
ASCII American
A
merican Standard Code for Information Interchange
ASIC Application-specific
Application-specific integrated circuit
ASP Application service provider
Application
ATM Asynchronous Transfer Mode
Asynchronous
AV Asset value
Asset
BCI Business Continuity Institute
Business
BCM Business continuity management
Business
BCP Business continuity planning
Business
BGP Border Gateway Protocol
Border
BI B
Business
usiness intelligence
BIA Business impact analysis
Business
BIMS Biometric information management and security
Biometric
BIOS Basic input/output system
Basic
BITS Banking Information Technology Standards
Banking
BLP Bell-LaPadula
Bell-LaPadula
BLP Bypass label process
Bypass
BS British Standard
British
CA Certificate authority
Certificate
CASPR Commonly accepted security practices and recommendations
Commonly
CD Compact disk
Compact
COOP Continuity
C ontinuity of operations plan
Common Object Request Broker Architecture
CORBA Common
COSO Committee of Sponsoring Organizations of the Treadway Commission
Committee
CPO Chief privacy officer
Chief
CPU Central processing unit
Central
CRM Customer relationship management
Customer
CSA Control self-assessment
Control
CSF Critical success factor
Critical
CSIRT Computer security incident response team
Computer
CSO C
Chief
hief security officer
CSRC Computer Security Resources Center (USA)
Computer
CRO Chief risk officer
Chief
CTO Chief Technology officer
Chief
CVE Common vulnerabilities and exposures
Common
DAC Discretionary access controls
Discretionary
DBMS Database management system
Database
DCE Distributed control environment
Distributed
DCE Data communications equipment
Data
DCE Distributed computing environment
Distributed
DCL Digital command language
Digital
DDoS Distributed denial of service
Distributed
EER E
Equal
qual error rate
EFT EElectronic
lectronic funds transfer
EF Exposure factor
Exposure
EGRP External Gateway Routing Protocol
External
EIGRP Enhanced Interior Gateway Routing Protocol
Enhanced
EU European Union
European
FAIR Factor analysis of information risk
Factor
FAR False-acceptance rate
False-acceptance
FCPA Foreign Corrupt Practices Act
Foreign
FIPS F
Federal
ederal Information Processing Standards (USA)
FISMA Federal Information Security Modernization Act
Federal
FSA Financial Security Authority (USA)
Financial
GLBA Gramm-Leach-Bliley Act (USA)
Gramm-Leach-Bliley
GMI Governance Metrics International
Governance
High definition/high-density-digital video disc
HD-DVD High
HIDS Host-based intrusion detection system
Host-based
HIPAA Health Insurance Portability and Accountability
Health
HIPO Hierarchy Input-Process-Output
Hierarchy
HR Human resources
Human
HTML Hypertext Markup Language
Hypertext
HTTP Hypertext Transfer Protocol
Hypertext
I/O Input/output
Input/output
ICMP Internet Control Message Protocol
Internet
ICT Information and communication technologies
Information
ID Identification
Identification
Integration Definition for Information Modeling
IDEFIX Integration
IDS Intrusion detection system
Intrusion
IEC International Electrotechnical Commission
International
IETF Internet engineering task force
Internet
IFAC International Federation of Accountants
International
IIA Institute of Internal Auditors
Institute
IMT Incident management team
Incident
IP IInternet
nternet Protocol
IPF Information
Information processing facility
IPL Initial program load
Initial
IPMA International Project Management Association
International
IPRs Intellectual property rights
Intellectual
IPS Intrusion prevention system
Intrusion
IPSec Internet Protocol Security
Internet
IRP Incident response plan
Incident
IRT Incident response team
Incident
IS Information
Information systems
ISF Information Security Forum
Information
ISO International Organization for Standardization
International
ISP Internet service provider
Internet
ISSA Information Systems Security Association
Information
ISSEA International Systems Security Engineering Association
International
IT Information technology
Information
ITGI IT Governance Institute
IT
ITIL Information Technology Infrastructure Library
Information
JCL Job control language
Job
KGI Key goal indicator
Key
KLOC Kilo lines of code
Kilo
MTD Maximum
M
aximum tolerable downtime
MTO Maximum
Maximum tolerable outage
NAT Network address translation
Network
NCP Network Control Protocol
Network
NDA Nondisclosure agreement
Nondisclosure
NIC Network interface card
Network
NIDS Network intrusion detection system
Network
NIST N
National
ational Institute of Standards and Technology (USA)
NPV Net
Net present value
OCSP O
Online
nline Certificate Status Protocol
Operationally Critical Threat, Asset and Vulnerability Evaluation
OCTAVE Operationally
OECD Organization for Economic Co-Operation and Development
Organization
OEP Occupant emergency plan
Occupant
OSPF Open Shortest Path First
Open
PaaS Platform as a Service
Platform
PAN Personal area network
Personal
PCI Payment Card Industry
Payment
PDCA Plan-Do-Check-Act
Plan-Do-Check-Act
PKI Public key infrastructure
Public
PMBOK Project Management Body of Knowledge
Project
PoS Point-of-sale
Point-of-sale
RSA
names)
Rivest, Shamir and Adleman (RSA stands for the initials of the developers last
Rivest,
SEC Securities
S
ecurities and Exchange Commission (USA)
SIEM Security
Security information and event management
SIM Security information management
Security
SLA Service level agreement
Service
SMART Specific, measurable, achievable, relevant, time-bound
Specific,
SMF System management facility
System
SOP Standard operating procedure
Standard
SPI Security Parameter Index
Security
SPICE Software process improvement and capability determination
Software
SPOC S
Single
ingle point of contact
SPOOL Simultaneous peripheral operations online
Simultaneous
SQL Structured Query Language
Structured
VPN Virtual
V
irtual private network
XBRL Extensible
Extensible Business Reporting Language
XML Extensible Markup Language
Extensible
XSS Cross-site scripting
Cross-site
Definitions
The following list of terms and definitions is taken directly from the CISM
Review Manual, 15th edition. Not all terms are found in this book, but it is
recommended that you be familiar with this list in case a term is used on the
exam.
Access controls
The processes, rules and deployment mechanisms that control access to
information systems, resources and physical access to premises
Access path
The logical route that an end user takes to access computerized information.
Typically, it includes a route through the operating system,
telecommunications software, selected application software and the access
control system.
Access rights
The permission or privileges granted to users, programs or workstations to
create, change, delete or view data and files within a system, as defined by
rules established by data owners and the information security policy
Accountability
The ability to map a given activity or event back to the responsible party
Address Resolution Protocol (ARP)
Defines the exchanges between network interfaces connected to an Ethernet
Administrative control
The rules, procedures and practices dealing with operational effectiveness,
efficiency and adherence to regulations and management policies
Alert situation
The point in an emergency procedure when the elapsed time and the
interruption is not resolved. The organization entering into an alert situation
initiates a series of escalation steps.
Algorithm
A finite set of step-by-step instructions for a problem-solving or
computational procedure, especially one that can be implemented by a
computer.
Alternate facilities
Locations and infrastructures from which emergency or backup processes are
executed, when the main premises are unavailable or destroyed. This includes
other buildings, offices or data processing centers.
Alternate process
Automatic or manual process designed and established to continue critical
business processes from point-of-failure to return-to-normal
abnormal
Anonymous File Transfer Protocol (AFTP)
A method of downloading public files using the File Transfer Protocol (FTP).
AFTP does not require users to identify themselves before accessing files
from a particular server. In general, users enter the word “anonymous” when
the host prompts for a username. Anything can be entered for the password
such as the user's email address or simply the word “guest.” In many cases,
an AFFP site will not prompt a user for a name and password.
Antivirus software
An application software deployed at multiple points in an IT architecture. it is
designed to detect and potentially eliminate virus code before damage is
done, and repair or quarantine files that have already been infected.
Application controls
Application layer
in the Open Systems interconnection (OSI) communications model, the
application layer provides services for an application program to ensure that
effective communication with another application program in a network is
possible. The application layer is not the application that is doing the
communication; it is a service layer that provides these services.
Architecture
Description of the fundamental underlying design of the components of the
business system, or of one element of the business system (e.g., technology),
the relationships among them, and the manner in which they support the
organization’s objectives
Asymmetric key
Attack signature
A specific sequence of events indicative of an unauthorized access attempt.
Typically, a characteristic byte pattern used in malicious code or an indicator,
or set of indicators, that allows the identification of malicious network
activities.
Audit trail
A visible trail of evidence enabling one to trace information contained in
statements or reports back to the original input source
Authentication
The act of verifying the identity (i.e., user, system)
Authorization
Access privileges granted to a user, program or process, or the act of granting
those privileges
Availability
Information that is accessible when required by the business process now and
in the future
Backup center
An alternate facility to continue IT/IS operations when the primary data
processing (DP) center is unavailable
Baseline security
The minimum security controls required for safeguarding an IT system based
on its identified needs for confidentiality, integrity and/or availability
protection
Benchmarking
A systematic approach to comparing an organization’s performance against
peers and competitors in an effort to learn the best ways of conducting
Bit
The smallest unit of information storage; a contraction of the term “binary
digit”; one of two symbols “0" (zero) and “I” (one) that are used to represent
binary numbers
Bit copy
Provides an exact image of the original and is a requirement for legally
ustifiable forensics
Bit-stream image
Bit-stream backups, also referred to as mirror image backups, involve the
backup of all areas of a computer hard disk drive or other type of storage
media. Such backups exactly replicate all sectors on a given storage device
including all files and ambient data storage areas.
Botnet
A large number of compromised computers that are used to create and send
Business case
Documentation of the rationale for making a business investment, used both
to support a business decision on whether to proceed with the investment and
as an operational tool to support management of the investment through its
full economic life cycle
Business impact
digital certificates that are no longer valid. The time gap between two updates
is very critical and is also a risk in digital certificates verification.
Chain of custody
A legal principle regarding the validity and integrity of evidence. It requires
accountability for anything that will be used as evidence in a legal proceeding
to ensure that it can be accounted for from the time it was collected until the
time it is presented in a court of law. This includes documentation as to who
had access to the evidence and when, as well as the ability to identify
evidence as being the exact item that was recovered or tested. Lack of control
over evidence can lead to it being discredited. Chain of custody depends on
the ability to verify that evidence could not have been tampered with. This is
accomplished by sealing off the evidence, so it cannot be changed, and
providing a documentary record of custody to prove that the evidence was, at
all times, under strict control and not subject to tampering.
Chain of evidence
A process and record that shows who obtained the evidence, where and when
the evidence was obtained, who secured the evidence, and who had control or
possession of the evidence. The “sequencing” of the chain of evidence
follows this order: collection and identification, analysis, storage,
preservation, presentation in court, return to owner.
Challenge/response
Challenge/response token
A method of user authentication that IS carried out through use of the
Challenge Handshake Authentication Protocol (CHAP). When a user tries to
log onto the server using CHAR the server sends the user a “challenge,”
which is a random value. The user enters a password, which is used as an
encryption key to encrypt the “challenge” and return it to the server. The
server is aware of the password. It, therefore, encrypts the “challenge value
and compares it with the value received from the user. If the values match,
the user is authenticated. The challenge/response activity continues
throughout the session and this protects the session from password sniffing
attacks. In addition, CHAP IS not vulnerable to “man-in-the-middle” attacks
because the challenge value is a random value that changes on each access
attempt,
Change management
A holistic and proactive approach to managing the transition from a current
to a desired organizational state.
Checksum
A mathematical value that is assigned to a file and used to “test” the file at a
later date to verify that the data contained in the file have not been
maliciously changed.
A cryptographic checksum is created by performing a complicated series of
mathematical operations (known as a cryptographic algorithm) that translates
the data in the file into a fixed string of digits called a hash value, which is
then used as the checksum. Without knowing which cryptographic algorithm
was used to create the hash value, it is highly unlikely that an unauthorized
person would be able to change data without inadvertently changing the
corresponding checksum. Cryptographic checksums are used in data
transmission and data storage. Cryptographic checksums are also known as
message authentication codes, integrity check values, modification detection
codes or message integrity codes.
Cloud computing
An approach using external services for convenient on-demand [T operations
using a shared pool of configurable computing capability. Typical
capabilities include infrastructure as a service (laaS), platform as a service
(PaaS) and software as a service (SaaS) (cg, networks, servers, storage,
applications and services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction. This cloud model
is composed of five essential characteristics (on-demand self-service,
ubiquitous network access, location independent resource pooling, rapid
elasticity, and measured service). It allows users to access technology-based
services from the network cloud without knowledge of, expertise with, or
control over, the technology infrastructure that supports them and provides
four models for enterprise access (private cloud, community cloud, public
cloud and hybrid cloud).
COBIT 5
Formerly known as Control Objectives for Information and related
Technology (COBIT); now used only as the acronym in its fifth iteration. A
complete, internationally accepted framework for governing and managing
enterprise information and technology (IT) that supports enterprise executives
and management in their definition and achievement of business goals and
related IT goals. COBIT describes five principles and seven enablers that
support enterprises in the development, implementation, and continuous
improvement and monitoring of good IT-related governance and
management practices.
Earlier versions of COBIT focused on control objectives related to IT
providing a comprehensive
assurance model. IT governance,
COBIT describes management,
IT processes controlcontrol
and associated and
objectives, management guidelines (activities, accountabilities,
responsibilities and performance metrics) and maturity models. COBIT
supports enterprise management in the development, implementation,
continuous improvement and monitoring of good IT-related practices.
Common vulnerabilities
vulnerabilities and exposures (CVE)
A system that provides a reference method for publicly known information-
security vulnerabilities and exposures. MITRE Corporation maintains the
system, with funding from the National Cyber Security Division of the
United States Department of Homeland Security.
Compensating control
An internal control that reduces the risk of an existing or potential control
weakness resulting in errors and omissions
Computer forensics
The application of the scientific method to digital media to establish factual
information for judicial review. This process often involves investigating
computer systems to determine whether they are or have been used for illegal
or unauthorized activities. As a discipline, it combines elements of law and
computer science to collect and analyze data from information systems (cg,
personal computers, networks, wireless communication and digital storage
devices) in a way that is admissible as evidence in a court of law.
Confidentiality
The protection of sensitive or private information from unauthorized
disclosure
Configuration management
The control of changes to a set of configuration items over a system life cycle
Content filtering
Controlling access to a network by analyzing the contents of the incoming
and outgoing packets and either letting them pass or denying them based on a
list of rules. Differs from packet filtering in that it is the data in the packet
that are analyzed instead of the attributes of the packet itself (e. g,
source/target IP address, transmission control protocol [TCP] flags).
Contingency plan
A plan used by an organization or business unit to respond to a specific
Control
The means of managing risk, including policies, procedures, guidelines,
practices or organizational structures which can be of an administrative,
technical, management or legal nature
Control center
Hosts the recovery meetings where disaster recovery operations are managed
Controls policy
A policy defining control operational and failure modes (e.g., fail secure, fail
Corporate governance
The system by which enterprises are directed and controlled. The board of
directors is responsible for the governance of their enterprise. It consists of
the leadership and organizational structures and processes that ensure the
enterprise sustains and extends strategies and objectives.
COSO
Committee of Sponsoring Organizations of the Treadway Commission. Its
report “Internal Control-Integrated Framework” is an internationally accepted
standard for corporate governance. See WWW. coso.org.
Cost-benefit analysis
Countermeasures
Any process that directly reduces a threat or vulnerability
Criticality
A measure-of the impact that the failure of a system to function as required
will have on the organization
Criticality analysis
An analysis to evaluate resources or business functions to identify their
importance to the organization, and the impact if a function cannot be
completed or a resource is not available
Cryptographic algorithm
A well-defined computational procedure that takes variable inputs, including
a cryptographic key, and produces an output
Cryptographic strength
A measure of the expected number of operations required to defeat a
cryptographic mechanism
Cryptography
Damage evaluation
The determination of the extent of damage that is necessary to provide for an
estimation of the recovery time frame and the potential loss to the
organization
Data classification
The assignment of a level of sensitivity to data (or information) that results in
the specification of controls for each level of classification. Levels of
Data custodian
The individual(s) and/or department(s) responsible for the storage and
safeguarding of computerized data
Data integrity
The property that data meet with a priority expectation of quality and that the
data can be relied on
Data leakage
Siphoning out or leaking information by dumping computer files or stealing
computer reports and tapes
Data mining
A technique used to analyze ex1stmg information, usually with the intention
of pursuing new avenues to pursue business
Data normalizatio
normalization n
A structured process for organizing data rate tables in such a way that it
preserves the relationships among the data
Data owner
The individual(s), normally a manager or director, who has responsibility for
the integrity, accurate reporting and use of computerized data
Data warehouse
A generic term for a system that stores, retrieves and manages large volumes
of data. Data warehouse software often includes sophisticated comparison
and hashing techniques for fast searches, as well as advanced filtering.
Decentralization
The process of distributing computer processing to different locations within
an organization
Decryption key
A digital piece of information used to recover plain text from the
corresponding cipher text by decryption
Defense in depth
The practice of layering defenses to provide added protection. Defense in
depth increases security by raising the effort needed in an attack. This
strategy places multiple barriers between an attacker and an organization’s
computing and information resources.
Degauss
back to zero, leaving a very low residue of magnetic induction on the media.
Degauss loosely means: to erase.
Digital certificate
Disaster declaration
The communication to appropriate internal and external parties that the
disaster recovery plan is being put into operation
Disk mirroring
The practice of duplicating data in separate volumes on two hard disks to
make storage more fault tolerant. Mirroring provides data protection in the
case of disk failure because data are constantly updated to both disks.
Dual control
A procedure that uses two or more entities (usually persons) operating in
concert to protect a system resource so that no single entity acting alone can
access that resource
Due care
The level of care expected from a reasonable person of similar competency
under similar conditions
Due diligence
Encryption
Enterprise governance
A set of responsibilities and practices exercised by the board and executive
management with the goal of providing strategic direction, ensuring that
objectives are achieved, ascertaining that risks are managed appropriately and
verifying that the enterprise’s resources are used responsibly
Exposure
The potential loss to an area due to the occurrence of an adverse event
External storage
The location that contains the backup copies to be used in case recovery or
restoration is required in the event of a disaster
Fail-over
The transfer of service from an incapacitated primary component to its
backup component
Fail safe
Describes the design properties of a computer system that allow it to resist
active attempts to attack or bypass it
Fall-through logic
An optimized code based on a branch prediction that predicts which way a
program will branch when an application is presented
Firewall
A system or combination of systems that enforces a boundary between two or
more networks typically forming a barrier between a secure and an open
environment such as the Internet
Flooding
An attack that attempts to cause a failure in a system by providing more input
than the system can process properly
Forensic Copy
An accurate bit-for-bit reproduction of the information contained on an
electronic device or associated media, whose validity and integrity has been
verified using an acceptable algorithm
Forensic examination
examination
The process of collecting, assessing, digital evidence to assist in the
identification of an offender and the method of compromise
Guideline
A description of a particular way of accomplishing something that is less
prescriptive than a procedure
Harden
To configure a computer or other network device to resist attacks
Hash function
An algorithm that maps or translates one set of bits into another (generally
smaller) so that a message yields the same result every time the algorithm is
executed using the same message as input. It is computationally infeasible for
a message to be derived or reconstituted from the result produced by the
algorithm or to find two different messages that produce the same hash result
using the same algorithm.
Help desk
A service offered via telephone/Internet by an organization to its clients or
employees that provides information, assistance and troubleshooting advice
regarding software, hardware or networks. A help desk is staffed by people
who can either resolve the problem on their own or escalate the problem to
specialized personnel. A help desk is often equipped with dedicated customer
relationship management (CRM) software that logs the problems and tracks
them until they are solved.
Honeypot
A specially configured server, also known as a decoy server, designed to
attract and monitor intruders in a manner such that their actions do not affect
production systems
Hot site
A fully operational offsite data processing facility equipped with hardware
and system software to be used in the event of a disaster
Hypertext Transfer Protocol (HTTP)
A communication protocol used to connect to servers on the World Wide
Web. Its primary function is to establish a connection with a web server and
transmit hypertext markup language (HTML), extensible markup language
(XML) or other pages to the client browsers.
Identification
The process of verifying the identity of a user, process or device, usually as a
prerequisite for granting access to resources in an information system
Impact analysis
A study to prioritize the criticality of information resources for the
organization based on costs (or consequences) of adverse events. In an
impact analysis, threats to assets are identified and potential business losses
determined for different time periods. This assessment is used to justify the
extent of safeguards that are required and recovery time frames. This analysis
is the basis for establishing the recovery strategy.
Incident
Any event that is not part of the standard operation of a service and that
causes, or may cause, an interruption to, or a reduction in, the quality of that
service
Incident handling
An action plan for dealing with intrusions, cybertheft, denial-of-service
attack, fire, floods, and other security-related events. It is comprised of a six-
step process: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned.
Incident response
The response of an enterprise to a disaster or other significant event that may
significantly affect the enterprise, its people or its ability to function
productively. An incident response may include evacuation of a facility,
initiating a disaster recovery plan (DRP), performing damage assessment and
any other measures necessary to bring an enterprise to a more stable status.
Information security
Ensures that only authorized users (confidentiality) have access to accurate
and complete information (integrity) when required (availability)
Integrity
The accuracy, completeness and validity of information
Internal controls
The policies, procedures, practices and organizational structures designed to
provide reasonable assurance that business objectives will be achieved, and
Internet protocol
Specifies the format of packets and the addressing scheme
Internet service provider (ISP)
A third party that provides individuals and organizations access to the
Internet and a variety of other Internet-related services
Interruption window
The time the company can wait from the point of failure to the restoration of
the minimum and critical services or applications. After this time, the
progressive losses caused by the interruption are excessive for the
organization.
Intrusion detection
The process of monitoring the events occurring in a computer system or
network to detect signs of unauthorized access or attack
IP Security (IPSec)
A set of protocols developed by the Internet Engineering Task Force (IETF)
to support the secure exchange of packets
ISO/IEC 15504
ISO/IEC 15504 Information Technology-Process assessment.
ISO/IEC 15504 provides a framework for the assessment of processes. The
framework can be used by organizations involved in planning, managing,
ISO/IEC 17799
Originally released as part of the British Standard for Information Security in
1999 and then as the Code of Practice for Information Security Management
in October 2000, it was elevated by the International Organization for
Standardization (ISO) to an international code of practice for information
security management. This standard defines information’s confidentiality,
integrity and availability controls in a comprehensive information security
management system. The latest version is ISO/IEC 17799:2005.
ISO/IEC 27001
An international standard, released in 2005 and revised in 2013, that defines a
set of requirements for an information security management system. Prior its
adoption by the ISO, this standard was known as BS 17799 Part 2, which was
originally published in 1999
ISO/IEC 27002
A code of practice that contains a structured list of suggested information
security controls for organizations implementing an information security
ISO/I EC 31000
ISO 31000:22009 Risk Management-Principles and guidelines.
Provides principles and generic guidelines on risk management. It is industry-
and sector agnostic and can be used by any public, private or community
enterprise, association, group or individual.
IT governance
The responsibility of executives and the board of directors; consists of the
leadership, organizational structures and processes that ensure that the
enterprise’s IT sustains and extends the organization’s strategies and
objectives
IT steering committee
An executive management-level committee that assists the executive in the
delivery of the IT strategy, oversees day-to-day management of IT service
delivery and IT projects and focuses on implementation aspects
IT strategic plan
A long-term plan (i.e., three- to five-year horizon) in which business and IT
management cooperatively describe how IT resources contribute to the
enterprise’s strategic objectives (goals)
IT strategy committee
A committee at the level of the board of directors to ensure that the board is
involved in major IT matters and decisions. The committee is primarily
accountable for managing the portfolios of IT-enabled investments, IT
services and other IT resources. The committee is the owner of the portfolio.
Least privilege
Malicious code
Software (e.g., Trojan horse) that appears to perform a useful or desirable
function, but actually gains unauthorized access to system resources or tricks
a user into executing other malicious logic
Malware
Software designed to infiltrate, damage or obtain information from a
computer system without the owner’s Consent. Malware is commonly taken
to include computer viruses worms Trojan horses, spyware and adware.
Spyware is generally, used for marketing purposes and, as such, is not
malicious although it is generally unwanted. Spyware can, however, be used
to gather information for identity theft or other clearly illicit purposes.
Masqueraders
Attackers that penetrate systems by using the identity of legitimate users and
their login credentials
Message digest
A cryptographic checksum, typically generated for a file that can be used to
detect changes to the file; Secure Hash Algorithm-1 (SHA-l) is an example of
a message digest algorithm.
Mirrored site
An alternate site that contains the same information as the original. Mirror
sites are set up for backup and disaster recovery as well as to balance the
traffic load for numerous download requests. Such download mirrors are
often placed in different locations throughout the Internet.
Mobile site
The use of a mobile/temporary facility to serve as a business resumption
location.
technologyThey
andcan usually be delivered to any Site and can house information
staff.
Monitoring policy
Rules outlining or delineating the way in which Information about the use of
computers, networks, applications and information is captured and
interpreted.
periods during the life cycle of the investment. To arrive at a fair NPV
calculation, cash inflows accrued by the business up to about five years after
project deployment also should be considered.
Nonintrusive monitoring
The use of transported probes or traces to assemble information, track traffic
and identify vulnerabilities
Nonrepudiation
The assurance that a party cannot later deny originating data; that is, it is the
provision of proof of the integrity and origin of the data and can be verified
by a third party. A digital signature can provide nonrepudiation.
Offline files
Computer file storage media not physically connected to the computer;
typically tapes or tape cartridges used for backup purposes
Outcome measure
Represents the consequences of actions previously taken; alien referred to as
a lag indicator. An outcome measure frequently focuses on results at the end
of a time period and characterizes historical performance. It is also referred to
as a key goal indicator (K01) and is used to indicate whether goals have been
met. Can be measured only after the fact and, therefore, is called a lag
indicator.
Packet
Packet filtering
Controlling access to a network by analyzing the attributes of the incoming
and outgoing packets, and either letting them pass or denying them based on
a list of rules
Packet sniffer
Software that observes and records network traffic
Passive response
A response option in intrusion detection in which the system simply reports
and records the problem detected, relying on the user to take subsequent
action
Password cracker
A tool that tests the strength of user passwords searching for passwords that
are easy to guess. It repeatedly tries words from specially crafted dictionaries
and often also generates thousands (and in some cases, even millions) of
permutations of characters, numbers and symbols.
Penetration testing
A live test of the effectiveness of security defenses through mimicking the
actions of real-life attackers
Pharming
This is a more sophisticated form of a man-in-the-middle (MITM) attack. A
user s session is redirected to a masquerading web site. This can be achieved
by corrupting a domain name system (DNS) server on the Internet and
pointing a URL to the masquerading web site’s IP address.
Phishing
This is a type of electronic mail (email) attack that attempts to convince a
user that the originator is genuine, but with the intention of obtaining
information for use in social engineering. Phishing attacks may take the form
of masquerading as a lottery organization advising the recipient or the user’s
bank of a large win; in either case, the intent is to obtain account and personal
identification number (PIN) details. Alternative attacks may seek to obtain
apparently innocuous business information, which may be used in another
form of active attack.
Policy
Overall intention and direction as formally expressed by management
Port
A hardware interface between a CPU and a peripheral device. Can also refer
to a software (virtual) convention that allows remote services to connect to a
host operating system in a structured manner.
Privacy
Freedom from unauthorized intrusion or disclosure of information of an
individual
Private key
A mathematical key (kept secret by the holder) used to create digital
signatures and, depending on the algorithm, to decrypt messages or files
encrypted (for confidentiality) with the corresponding public key
Procedure
A document containing a detailed description of the steps necessary to
perform specific operations in conformance with applicable standards.
Procedures are defined as part of processes.
Proxy server
Public key
In an asymmetric cryptographic scheme, the key that may be widely
published to enable the operation of the scheme
Reciprocal agreement
Emergency processing agreements among two or more organizations with
Recovery action
Execution of a response or task according to a written procedure
Redundant site
A recovery strategy involving the duplication of key information technology
components, including data or other key business processes, whereby fast
recovery can take place
Request for proposal (RFP)
A document distributed to software vendors requesting them to submit a
proposal to develop or provide a software product
Residual risk
The remaining risk after management has implemented risk response
Resilience
Risk
The combination of the probability of an event and its consequence.
(ISO/IEC 73). Risk has traditionally been expressed as Threats x
Vulnerabilities = Risk.
Risk analysis
The initial steps of risk management: analyzing the value of assets to the
business, identifying threats to those assets and evaluating how vulnerable
each asset is to those threats. It often involves an evaluation of the probable
frequency of a particular event, as well as the probable impact of that event.
Risk appetite
The amount of risk, on a broad level, that an entity is willing to accept in
pursuit of its mission
Risk assessment
A process used to identify and evaluate risk and potential effects. Risk
assessment includes assessing the critical functions necessary for an
organization to continue business operations, defining the controls in place to
reduce. organization exposure and evaluating the cost for such controls. Risk
analysis often involves an evaluation of the probabilities of a particular event.
Risk avoidance
Risk mitigation
The management and reduction of risk through the use of countermeasures
and controls
Risk tolerance
The acceptable level of variation that management is willing to allow for any
particular risk while pursuing its objective
Risk transfer
The process of assigning risk to another organization, usually through the
purchase of an insurance policy or outsourcing the service
Robustness
The ability of systems to withstand attack, operate reliably across a wide
range of operational conditions and to fail gracefully outside of the
operational range
Rootkit
A software suite designed to aid an intruder in gaining unauthorized
administrative access to a computer system
Secret key
A cryptographic key that is used with a secret key (symmetric) cryptographic
algorithm, that is uniquely associated with one or more entities and is not
made public. The same key is used to both encrypt and decrypt data. The use
of the term “secret” in this context does not imply a classification level, but
rather implies the need to protect the key from disclosure.
Security metrics
A standard of measurement used in management of security-related activities
Segregation/separation
Segregation/separation of duties (SOD)
Sensitivity
A measure of the impact that improper disclosure of information may have
on an organization
during the alternate process mode until the normal situation is restored.
Service level agreement (SLA)
An agreement, preferably documented, between a service provider and the
customer(s)/user(s) that defines minimum performance targets for a service
and how they will be measured
Session key
A single-use symmetric key used for a defined period of communication
between two computers, such as for the duration of a single communication
session or transaction set
Shell programming
A script written for the shell, or command line interpreter, of an operating
system; it is often considered a simple domain-specific programming
language. Typical operations performed by shell scripts include file
manipulation, program execution and printing text. Usually, shell script refers
to scripts written for a UNIX shell, while COMMANDCOM (DOS) and
cmd.exe (Windows) command line scripts are usually called batch files.
Sniffing
The process by which data traversing a network are captured or monitored
Social engineering
An attack based on deceiving users or administrators at the target site into
revealing confidential or sensitive information
Split knowledge/split key
A security technique in which two or more entities separately hold data items
have key components that individually convey no knowledge of the plain text
key that will be produced when the key components are combined m the
cryptographic module
Spoofing
Faking the sending address of a transmission in order to gain illegal entry into
a secure system
Software as a service (SaaS)
Offers the capability to use the provider’s applications running on cloud
infrastructure. The applications are accessible from various client devices
through a thin client interface such as a web browser (e.g., web-based email).
Standard
A mandatory requirement, code of practice or specification approved by a
recognized external standards organization, such as International
Organization for Standardization (ISO)
Symmetric key encryption
System in which a different key (or set of keys) is used by each pair of
trading partners to ensure that no one else can read their messages. The same
key is used for encryption and decryption.
System owner
Person or organization having responsibility for the development,
procurement, integration, modification, operation and maintenance, and/or
final disposition of an information system
Threat
Anything (e.g., object, substance, human) that is capable of acting against an
asset in a manner that can result in harm. A potential cause of an unwanted
incident. (ISO/IEC 13335)
Threat agent
Methods and things used to exploit a vulnerability. Examples include
determination, capability, motive and resources.
Threat analysis
An evaluation of the type, scope and nature of events or actions that can
Threat event
Any event where a threat element/actor acts against an asset in a manner that
Threat vector
The method a threat uses to exploit the target
Token
A device that is used to authenticate a user, typically in addition to a user
name and password. A token is usually a device that displays a pseudo
random number that changes every few minutes.
Two-factor authentication
The use of two independent mechanisms for authentication, (e.g., requiring a
smart card and a password); typically, the combination of something you
know, are or have
Voice-over IP (VoIP)
Also called IP Telephony, Internet Telephony and Broadband Phone, a
technology that makes it possible to have a voice conversation over the
Internet or over any dedicated Internet Protocol UP) network instead of over
dedicated voice transmission lines
Vulnerability
A weakness in the design, implementation, operation or internal controls in a
process that could be exploited to violate system security
Vulnerability analysis
A process of identifying and classifying vulnerabilities
Warm site
Similar to a hot site, but not fully equipped with all of the necessary hardware
needed for recovery
Web hosting
The business of providing the equipment and services required to host and
maintain files for one or more web sites and provide fast Internet connections
to those sites. Most hosting is “shared,” which means that web sites of
multiple companies are on the same server to share/reduce costs.
Web server
Using the client-server model and the World Wide Web’s Hypertext Transfer
Protocol (HTTP), Web server is a software program that serves web pages to
users.
Worm
A programmed network attack in which a self-replicating program does not
attach itself to programs, but rather spreads independently of users’ action
Index
(ISC) 2 90
ACCEPT 44, 173
ACCESS CONTROL 86
ADM 95
ADMINISTRA TIVE CONTROL
ADMINISTRATIVE 49
ADVANCED PERSISTENT THREAT
PERSISTENT THREAT 40
ADWARE 88
AESRM 140
RISK
AGGREGATED RISK 207
AIW 61
ALE 59, 163
ALLIANCE FOR
FOR ENTERPRISE
ENTERPRISE SECURITY MANAGEMENT
SECURITY RISK MANAGEMENT 140
ALLOWABLE INTERRUPTION WINDOW
INTERRUPTION WINDOW 61
ALTERNATIVE ROUTING
ALTERNATIVE 73
ANNUAL LOSS EXPECTANCY 59, 163
ANNUALIZED RATE OCCURRENCE
RATE OF OCCURRENCE 59
DEVICE
ANTISPAM DEVICE 88
ANTIVIRUS 88
APT 40
ARCHITECTURE
ARCHITECTURE CHANGE MANAGEMENT
MANAGEMENT PHA SE
PHASE 97
ARCHITECTURE
ARCHITEC DEVELOPMENT METHOD
TURE DEVELOPMENT 95
ARCHITECTURE
ARCHITEC VISION PHASE
TURE VISION 95
ARO 59
ASSURANCE
ASSURANC E 16
ASSURANCE
ASSURANC INTEGRATION
E INTEGRATION 140
ASSURANCE
ASSURANC E PROVIDER 273
AUDIT 150
AUTHENTICATE
AUTHENTICA TE 52, 85
AUTHORIZE 53
AVAILABILITY
AVAILABILITY 85
AVOID 45, 173
SCORECARD
BALANCED SCORECARD 98
BASELINE 176
BASELINE SECURITY 228
BAYESIAN ANALYSIS
BAYESIAN 34
BCP 64
BIA 64
BIASED ASSIMILATION
ASSIMILATION 24
EVALUATION
BIASED EVALUATION 24
BIG DATA 112
BMIS 118
BOUNDARIES 147
ANALYSIS
BOW TIE ANALYSIS 34
ARCHITECTURE PHASE
BUSINESS ARCHITECTURE 95
COSO 90
COUNTERMEASURE 50
CRITICAL SUCCESS FACTOR 87
CRITICALITY 15
CRO 137
CSF 87
CSO 135
CTO 136
CULTURE 100
DAC 53
DAS 74
DATA STORAGE
STORAGE AND DATA ANALYTICS
ANALYTICS AS A SERVICE 12
SERVICE 112
1
DEFENSE-I N-DEPTH
DEFENSE-IN-DEPTH 37, 121
METHOD
DELPHI METHOD 35
DESIGN 119
STATE
DESIRED STATE 103
DETECTIVE CONTROL 48
CONTROL
DETERRENT CONTROL 48
DIRECT ATTACHED STORAGE
ATTACHED STORAGE 74
DISASTER RECOVERY 64
DISASTER RECOVERY AS SERVICE
AS A SERVICE 111
DISASTER RECOVERY PLAN PLAN 64
DISCRETIONARY
DISCRETI ACCESS CONTROL
ONARY ACCESS 53
DISTRIBUTED
DISTRIBUT ED IRT MODEL 281
DIVERSE ROUTING 73
DRAAS 111
DRP 64
DUE CARE 83
DILIGENCE
DUE DILIGENCE 83
SITE
DUPLICATE SITE 69
E-DISCOVE RY
E-DISCOVERY 155
59
EF 59
EISA 144
THREAT
EMERGING THREAT 40
ENABLERS 92
EFFECT
ENDOWMENT EFFECT 24
ENFORCEMENT
ENFORCEMEN T PROCEDURES 182
ENTERPRISE GOVERNANCE
ENTERPRISE 126
ENTERPRISE
ENTERPRIS E INFORMATION ARCHITECTURE 106, 144
INFORMATION SECURITY ARCHITECTURE
ENTERPRISE
ENTERPRIS E RESOURCE PLANNING 180
ENTERPRISE
ENTERPRIS MANAGEMENT
E RISK MANAGEMENT 172
ENVIRONMENTAL
ENVIRONMENTA L CONTROLS 56
ERP 180
EVENT TREE ANALYSIS 35
EXPLOIT 37
EXPOSURE 37, 208
FACTOR
EXPOSURE FACTOR 59
FACTOR ANALYSIS
ANALYSIS OF INFORMATION RISK
INFORMATION RISK 207
SECURE
FAIL SECURE 53
UNSECURE
FAIL UNSECURE 53
FAIR 207
CONSENSUS
FALSE CONSENSUS 24
FAULT TREE ANALYSIS 35
FEDERAL INFORMATION
INFORMATION SECURITY MODERNIZATION ACT
SECURITY MODERNIZATION 90
INSURANCE
FIDELITY INSURANCE 152
FIREWALL 88
FIRST-PARTY
FIRST-PA INSURANCE
RTY INSURANCE 152
FISMA 90
SERVICE
FORENSICS AS A SERVICE 113
CONTROL
FORMAL CONTROL 55
FRAAS 113
INTERRUPTION TEST
FULL INTERRUPTION 79
OPERATIONAL TEST
FULL OPERATIONAL 79
GAP ANALYSIS 105, 158, 227
GATEWAY 88
GENERAL CONTROLS 50
GOAL 18
GOALS CASCADE 92
GOVERNANCE 17
GOVERNANCE FRAMEWORKS 159
GRC 127
GROUPTHINK 24
GUIDELINE 21
HEALTH INSURANCE
INSURANCE PORTABILITY
PORTABILITY AND ACCOUNTABILIT Y ACT 90
ACCOUNTABILITY
INSTINCT
HERDING INSTINCT 24
HIGH-AVAI LABILITY
HIGH-AVAILABILITY 75
HIPAA 90
HOT SITE 69
HYBRID MODEL 111
IAAS 110, 112
IDAAS 112
IDENTITY 52
SERVICE
IDENTITY AS A SERVICE 112
IDS 30, 88
IMPLEMENTATION
IMPLEMENTAT ION GOVERNANCE PHASE 97
HANDLING
INCIDENT HANDLING 275
MANAGEMENT
INCIDENT MANAGEMENT 275
RESPONSE
INCIDENT RESPONSE 275
RESPONSE PLAN
INCIDENT RESPONSE 239, 261
INDEMNITY 187
INFORMATION 125
SERVICE
INFORMATION AS A SERVICE 112
GOVERNANCE
INFORMATION SECURITY GOVERNANCE 125
MANAGER
INFORMATION SECURITY MANAGER 137
PROGRAM
INFORMATION SECURITY PROGRAM 251
INFORMATION SECURITY RESOURCE
RESOURCE MANAGEMENT
MANAGEMENT 168
MIRROR SITESITE 70
MITIGATE 44, 127, 173
SITE
MOBILE SITE 69
MONTE-CARLO ANALYSIS 35
MOTIVATION 43
MTD 61
MTO 61
NAS 74
NATIVE CONTROL TECHNOLOGIES
CONTROL TECHNOLOGIES 57
NETWORK AND INTERNET INTERNET PROTOC
PROTOCOLS OLS 88
NETWORK ATTACHED
ATTACHED STORAGESTORAGE 74
NIST 90
800-30
NIST 800-30 136
800-55
NIST SP 800-55 164
NONREPUDIATION
NONREPUDIATI ON 85
OCTAVE 34, 99
ONE-WAY HASH 88
OPEN GROUP ARCHITECTURE FRAMEWORK 95
OPERATIONAL METRICS 116
OPERATIONALLY CRITICAL THREAT ASSET AND VULNERABILITY EVALUATION 99
OPPORTUNITIES
OPPORTUNITIE S AND SOLUTIONS PHASE 96
OPTIMISTIC 23
ORGANIZATION 119
OUTSOURCED IRT MODEL 282
OVERCONFIDENCE 23
PAAS 110
PAM 93
PAPER TESTS 79
PARALLEL 79
PDCA 212
PERSONALLY IDENTIFIABLE INFORMATION 205
PHYSICAL CONTROL 50
PII 205
PKI 88
PLAN-DO-CHECK-ACT 212
PLATFORM AS A SERVICE 110
PMO 199
POLICY 18
POLICY EXCEPTION PROCESS 182
POSTTEST PHASE 80
PRA 208
PREDISPOSING CONDITIONS 41
PRELIMINARY PHASE 95
PREPAREDNESS TEST 79
PRETEST PHASE 80
PREVENTATIVE CONTROL 48
PRINCIPLE OF LEAST PRIVILEGE 15
PRIVACY 86
RTO 60
SAAS 110
SAN 74
SARBANES-OXLEY ACT 90
SDLC 174
SDO 61
SECAAS 111
SECURITY AS A SERVICE 111
SECURITY INFORMATION AND EVENT MANAGER 287
SECURITY PROGRAM 251
SEGREGATION
SEGREGATI ON OF DUTIES 15
SELECTIVE RECALL 24
SEMIQUANTITATIVE ANALYSIS 32
SERVICE DELIVERY OBJECTIVE 61
SIEM 287
SIMULATION TEST 79
SINGLE LOSS EXPECTANCY 59
SKILL 44, 82
SLE 59
SMART 102
SOD 15
SOFTWARE AS A SERVICE 110
SOX 90
SPYWARE 89
STAGE GATES 143
STATUS QUO BIAS 23
STATUTORY COMPLIANCE 267
STEERING COMMITTEE 135
STORAGE AREA NETWORK 74
STRATEGIC ALIGNMENT 271
STRATEGIC METRICS 116
STRATEGICALLY ALIGNED 170
STRATEGY 18, 23, 119
STRUCTURED WALKTHROUGH 79
SUPPLEMENTAL
SUPPLEMENTA L CONTROL TECHNOLOGY 57
SUPPORT TECHNOLOGIES 57
SWOT 227
SYSTEM DEVELOPMENT LIFE CYCLE 174
SYSTEM THEORY 118
SYSTEMIC RISK 209
SYSTEMS THINKING 118
TCO 16
TECHNICAL CONTROL 49
TECHNOLOGY 120
TECHNOLOGY ARCHITECTURE PHASE 96
TEST PHASE 80
THE CENTER FOR INTERNET SECURITY 164
THIRD-PARTY INSURANCE 152
THREAT 37
THREAT AGENT 37
TOGAF 95
TOTAL COST OF OWNERSHIP 16
TOTAL QUALITY MANAGEMENT 212
TQM 212
TRANSFER 45, 173
TRANSPARENCY 54
TRUST 54
TRUST NO ONE 54
UNAUTHORIZED DISCLOSURE 15
US NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 90
VALUE AT RISK 34, 163
VALUE DELIVERY 168, 272
VAR 34, 163
VELOCITY 43
VIRTUALIZATION 89
VISIBILITY 44
VOICE RECOVERY 74
VOIP 89
VOLATILITY 43
VULNERABILITY 36
VULNERABILITY MANAGEMENT 42
WARM SITE 69
WIRELESS SECURITY 89
VULNERABILITY
ZERO-DAY VULNERABILITY 40