cs-unit-1
cs-unit-1
Unit-1 - unit 1
AAMEC/CA/SEM/II/TVN Page 1 of 38
AAMEC/CA/SEM/II/TVN Page 2 of 38
AAMEC/CA/SEM/II/TVN Page 3 of 38
Basis for the ISF Standard of Good Practice for Information Security
AAMEC/CA/SEM/II/TVN Page 4 of 38
ISF Standard of Good Practice for Information Security: Categories and Areas
The SGP is organized into 17 categories, each of which is broken
down into 2 areas
Each area is further broken down into a number of topics, or
business activities.
Areas
Category
Security Governance (SG) Security Governance Approach
Security Governance Components
AAMEC/CA/SEM/II/TVN Page 5 of 38
AAMEC/CA/SEM/II/TVN Page 6 of 38
Requirement Topics
4 Context of the Organization 4.1 Understanding the Organization
and Its Context
4.2 Understanding the Needs and
Expectations of Interested Parties
5 Leadership 5.1 Leadership and Commitment
5.2 Policy
6 Planning 6.1 Actions to Address Risks and
Opportunities
6.2 Information Security Objectives
and Planning to Achieve Them
AAMEC/CA/SEM/II/TVN Page 7 of 38
Control Topics
5 Information Security Policies 5.1 Management Direction for Information
Security
6 Organization of Information 6.1 Internal Organization
Security 6.2 Mobile Devices and Teleworking
7 Human Resource Security 7.1 Prior to Employment
7.2 During Employment
7.3 Termination and Change of Employment
8 Asset Management 8.1 Responsibility for Assets
8.2 Information Classification
8.3 Media Handling
9 Access Control 9.1 Business Requirements of Access Control
9.2 User Access Management
10 Cryptography 10.1 Cryptographic Controls
11 Physical and Environmental 11.1 Secure Areas
Security 11.2 Equipment
12.1 Operational Procedures and Responsibilities
12 Operations Security 12.2 Protection from Malware
1.5 MAPPING THE ISO 27000 SERIES TO THE ISF SGP
The ISO 27001 requirements to the ISF SGP security controls.
For each of the detailed requirements, this table indicates the
controls that can be used to satisfy those requirements, as
documented in the ISF SGP. Mapping ISO 27001 to the ISF SGP
AAMEC/CA/SEM/II/TVN Page 8 of 38
AAMEC/CA/SEM/II/TVN Page 9 of 38
AAMEC/CA/SEM/II/TVN Page 10 of 38
AAMEC/CA/SEM/II/TVN Page 11 of 38
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade,
or destroy information system resources or the information itself.
o Share insight into attacks and attackers, identify root causes,
and translate that into classes of defensive action.
o Document stories of adoption and share tools to solve problems.
o Track the evolution of threats, the capabilities of adversaries,
and current vectors of intrusions
AAMEC/CA/SEM/II/TVN Page 12 of 38
AAMEC/CA/SEM/II/TVN Page 13 of 38
AAMEC/CA/SEM/II/TVN Page 14 of 38
Goal Requirements
Build and Maintain a Secure Network and 1. Install and maintain a firewall
Systems configuration to protect cardholder
data
2. Do not use vendor-supplied
defaults for system passwords and
other security parameters
Protect Cardholder Data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder
data across open, public networks
Maintain a Vulnerability Management 5. Protect all systems against malware and
Program regularly update anti-virus software or
programs
6. Develop and maintain secure systems
and applications
Implement Strong Access Control 7. Restrict access to cardholder data by
Measures business need to know
8. Identify and authenticate access to
system components
Regularly Monitor and Test Networks 10. Track and monitor all access to
network resources and cardholder data
11. Regularly test security systems and
processes
Maintain an Information Security Policy 12. Maintain a policy that addresses
information security for all personnel
AAMEC/CA/SEM/II/TVN Page 15 of 38
Topic Subtopics
Security requirements Threats, risks, and vulnerabilities
Personnel and physical security
requirements
Security architectures Open systems security
architecture Security services
Security management Information security
management Risk management
Role of the directory Directory concepts Public-
key security mechanisms
Examples of approaches to authentication Secure password-based authentication
protocol with key exchange One-time
and non-repudiation password authentication
Securing the network infrastructure The telecommunications
management network
Securing monitoring and control activities
Some specific approaches to network Next-generation network security
security Mobile communications security
Application security Voice over IP (VoIP) and
multimedia Web services
Security aspects of cloud computing Key characteristics of cloud
computing Generic cloud computing
capabilities and services
AAMEC/CA/SEM/II/TVN Page 16 of 38
AAMEC/CA/SEM/II/TVN Page 17 of 38
1. Updating controls
2. Improving controls
Cyber security Information and Decision Flows Within an Organization
2.SECURITY GOVERNANCE
AAMEC/CA/SEM/II/TVN Page 18 of 38
2. Desired Outcomes
• The IT Governance Institute defines four basic outcomes of
information security governance that lead to successful integration
of information security with the organization’s mission .
1.Risk management
2.Resource management:
3.Value delivery:
4.Performance measurement:
2.2 SECURITY GOVERNANCE COMPONENTS
SP 800-100 lists the following key activities, or components that
constitute effective security governances.
AAMEC/CA/SEM/II/TVN Page 19 of 38
o Strategic planning
o Organizational structure
o Establishment of roles and responsibilities
o Integration with the enterprise architecture
o Documentation of security objectives in policies and
guidance 1.Strategic Planning
It is useful for this discussion to define three hierarchically related
aspects of strategic planning.
o Enterprise strategic planning
o Information technology (IT) strategic planning
o Cyber security or information security strategic planning
Strategic plan
IT strategic planning is the alignment of IT management and
operation with enterprise strategic planning.
The need to move beyond IT management and to ensure that the IT
planning process is integrated with enterprise strategic planning follows
from two strategic factors: mission necessity and enterprise maturity.
AAMEC/CA/SEM/II/TVN Page 20 of 38
• Definition
– Mission, vision, and objectives
– Priorities
– Success criteria
– Integration
– Threat defense
– Execution
• Operations plan
• Monitoring plan
• Adjustment plan
– Review
• Review plan
2. Organizational Structure
AAMEC/CA/SEM/II/TVN Page 21 of 38
C-level
AAMEC/CA/SEM/II/TVN Page 22 of 38
AAMEC/CA/SEM/II/TVN Page 23 of 38
AAMEC/CA/SEM/II/TVN Page 24 of 38
Security Direction
AAMEC/CA/SEM/II/TVN Page 25 of 38
3.1ASSET IDENTIFICATION
Hardware Assets
Hardware assets include servers, workstations, laptops, mobile
devices, removable media, networking and telecommunications
equipment, and peripheral equipment.
They are loss of a device, through theft or damage, and lack of
availability of the device for an extended period.
Software Assets
Software assets include applications, operating systems and other
system software,
– virtual machine
– container virtualization software,
– software for software-defined networking (SDN)
– network function virtualization (NFV),
– database management systems,
– file systems, and client and server software.
Information Assets
AAMEC/CA/SEM/II/TVN Page 26 of 38
Asset Register
AAMEC/CA/SEM/II/TVN Page 27 of 38
– Spyware
Other cyber security threat terms frequently encountered include
the following:
– Remote access attacks
– .Denial-of-service (DoS) attack
– Distributed denial-of-service (DDoS)
– DNS attacks
– Code injection
– Password attack:
3. Sources of Information
Information on environmental threats is typically available from a
variety of government and trade groups
Verizon Data Breach Investigations Report
This authoritative and highly respected report is based on data on security
incidents systematically collected from a wide variety of organizations.
– Pattern
– Action
– Asset
Threat Horizon Report
it is a more broad-brush treatment, identifying key threat of the
detailed target profiles.
– Disruption
– Distortion
– Deterioration
ENISA Threat Landscape Report
Another very useful source of information is several threat documents from
European Union Agency for Network and Information Security (ENISA).
kill chain-A systematic process used to target and engage an adversary to
create desired effects.
• In the context of cyber security Threats Reported by ENISA
– Malware
– Web-based attacks
– Web application attacks
– DoS attacks
Trust wave Global Security Report
The report is based on findings from extensive data sources,
including breach investigations, global threat intelligence, product
telemetry, and a number of research sources
AAMEC/CA/SEM/II/TVN Page 28 of 38
Technical vulnerabilities
Human-caused vulnerabilities
Physical and environmental
vulnerabilities Operational vulnerabilities
Business continuity and compliance vulnerabilities
National Vulnerability Database and Common Vulnerability Scoring
System
The NVD is a comprehensive list of known technical vulnerabilities
in systems, hardware, and software.
The CVSS provides an open framework for communicating the
characteristics of vulnerabilities.
The CVSS defines a vulnerability as a bug, a flaw, a weakness, or an
exposure of an application, a system device, or a service that could
lead to a failure of confidentiality, integrity, or availability.
It consists of three sets of metrics:
• Exploitability
• Impact
• Scope
3.4 RISK ASSESSMENT APPROACHES
1. Quantitative Versus Qualitative Risk
Assessment Two factors of risk assessment can be treated either
quantitatively or qualitatively:
Quantitative Risk Assessment
Level of risk = (Probability of adverse event) × (Impact value)
– This is a measure of the cost of security breaches, expressed
numerically.
AAMEC/CA/SEM/II/TVN Page 29 of 38
AAMEC/CA/SEM/II/TVN Page 30 of 38
AAMEC/CA/SEM/II/TVN Page 31 of 38
Value proposition
A statement that identifies clear, measurable, and demonstrable
benefits to consumers when they buy a particular product or service
Primary loss factor: Occurs directly as a result of the threat agent’s
action upon the asset.
Secondary loss factors: Occurs as a result of secondary stakeholders
1. Estimating the Primary Loss
The FAIR impact assessment begins with determining the primary
loss suffered as the result of the event
o Asset factors: The value of the asset under threat.
o Threat factors: Threat factors that contribute to the
loss. Possible actions include:
o Access
o access Misuse
o Disclosure
o Modification
o Deny access
2. Estimating the Secondary Loss
The estimation of secondary loss is more complex than the
estimation of the primary loss.
Secondary loss magnitude: Losses that are expected to materialize
from dealing with secondary stakeholder reactions
o Organizational factors: Characteristics of the organization that
determine the magnitude of the loss
o External factors: Entities that inflict a secondary form of harm
upon the organization as a result of an event
3. Business Impact Reference Table
A useful tool for performing impact assessment is the Business
Impact Reference Table (BIRT).
The BIRT was developed by the ISF to enable all involved in the risk
assessment process to have a common view of the risk elements.
o Unforeseen Impacts of Changes in Operations or Systems
o Delayed Delivery to Customers or Clients
o Loss of Customers or Clients
o Loss of Confidence by Key Institutions and Partners
o Damage to Corporate Image and Reputation
AAMEC/CA/SEM/II/TVN Page 32 of 38
AAMEC/CA/SEM/II/TVN Page 33 of 38
If the risk in a certain situation is considered too high and the costs of
mitigating the risk down to an acceptable level exceed the benefits, the
organization may choose to avoid the circumstance leading to the
risk exposure.
4. SECURITY MANAGEMENT
4.1THE SECURITY MANAGEMENT FUNCTION
The security management function enter establishing,
implementing, and monitoring an information security program,
under the direction of a senior responsible person.
–Chief information security officer (CISO)
–Information security manager (ISM )
AAMEC/CA/SEM/II/TVN Page 34 of 38
Capital planning
AAMEC/CA/SEM/II/TVN Page 35 of 38
CISO and a security manager are responsible for developing these policies
– Access control policy
– Contingency planning policy
– Data classification policy
– Change control policy
– Virus policy:
– Backup policy:
– Network security policy
– Encryption policy:
2.Security Policy Document Content
– Overview
– Purpose
– Targeted audience
– Policy
– Definitions:
– Version
AAMEC/CA/SEM/II/TVN Page 36 of 38
AAMEC/CA/SEM/II/TVN Page 37 of 38
*******
AAMEC/CA/SEM/II/TVN Page 38 of 38