bengt berg, cybercom security, polen

21
Compliance-driven Security Requirements Warzaw 12 Oct 2010 22-05-08 [email protected] 1 Bengt Berg, M.Sc, CISM, CISSP, QSA, ... Head of Compliance Management Services Cybercom Sweden East AB

Upload: cybercom-group

Post on 11-Nov-2014

1.167 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Bengt Berg, Cybercom Security, Polen

Compliance-driven Security RequirementsWarzaw 12 Oct 2010

23-04-08 [email protected]

Bengt Berg, M.Sc, CISM, CISSP, QSA, ... Head of Compliance Management Services

Cybercom Sweden East AB

Page 2: Bengt Berg, Cybercom Security, Polen

Who is Bengt Berg?

What is Cybercom?

• 1800 employees, 11 countries, 28 offices

• Turnover – ≈60 M€/2006– ≈200 M€/2009

• Cybercom Secure: 80 full-time consultants– Compliance Management and PCI DSS– IAM– Forensics– Development of secure software components– ...and some other areas of expertise

So... Who’s Talking?

23-04-08 [email protected]

Page 3: Bengt Berg, Cybercom Security, Polen

External Compliance Requirements

23-04-08 [email protected]

Sarbanes-Oxley Act

ISO/EIC 27001:2006

CE certification

FDA/Part11

Basel3

Public Sector Procurement Laws

ISO 14001

PCI DSS, Payment Card Industry Data Security Standard,

Page 4: Bengt Berg, Cybercom Security, Polen

How PCI DSS has Transformed the Payment Security Area

23-04-08 [email protected]

Page 5: Bengt Berg, Cybercom Security, Polen

PCI DSS

23-04-08 [email protected]

Brands

Bank

PSP

Merchant

Solutionvendor

Service provider

PA-QSA

PTS

PFI

QSA

ASV

Page 6: Bengt Berg, Cybercom Security, Polen

But What are These Requirements?

23-04-08 [email protected]

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Requirement 3: Protect stored cardholder dataRequirement 4: Encrypt transmission of cardholder data across open,

public networks Requirement 5: Use and regularly update anti-virus softwareRequirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict access to cardholder data by business need-to-

know:Requirement 8 Assign a unique ID to each person with computer

accessRequirement 9: Restrict physical access to cardholder data Requirement 10: Track and monitor all access to network resources and

cardholder dataRequirement 11: Regularly test security systems and processes Requirement 12: Maintain a policy that addresses information security

• Requires solutions for change• Documentation of systems, firewalls, ... • ...

• Requires solutions for change• Documentation of systems, firewalls, ... • ...• Staging of systems, databases, routers, ...

• System hardening• ...

• Staging of systems, databases, routers, ...• System hardening• ...

• Encryption of stored cardholder data, ...• Never EVER store some data...• Key management...• ...

• Encryption of stored cardholder data, ...• Never EVER store some data...• Key management...• ...

• Encryption of cardholder data sent over public networks• Some policies must exist

• Encryption of cardholder data sent over public networks• Some policies must exist• Anti-virus requirements • Centralized logs for AV solutions• Anti-virus requirements • Centralized logs for AV solutions• Secure development methods• OWASP Top10 (www.owasp.org) • Test data, and test systems, requirements

• Secure development methods• OWASP Top10 (www.owasp.org) • Test data, and test systems, requirements

• Change management for access requests• ”Need to know”• Policies, procedures, instructions

• Change management for access requests• ”Need to know”• Policies, procedures, instructions

• Access and identity management • Users, roles, logs• Access and identity management • Users, roles, logs• Physical security

• Surveillance cameras• Visitor badges

• Physical security• Surveillance cameras• Visitor badges

• IDS/IPS 7/24• Centralized logging• File integrity monitoring

• IDS/IPS 7/24• Centralized logging• File integrity monitoring

• Wireless analyzer• ASV Scans (int/ext) quarterly• Penetration test yearly

• Wireless analyzer• ASV Scans (int/ext) quarterly• Penetration test yearly• Yearly risk assessments • Security policies• Security organization• Incident response plans

• Yearly risk assessments • Security policies• Security organization• Incident response plans

Page 7: Bengt Berg, Cybercom Security, Polen

• Conflict of interests• Banks initially uncoordinated

– Caused great problems

– Situation fixed by PAN Nordic

• Self assessments (In Norway: ”self betrayal” ) – Almost always too nice

• First PA-DSS self-assessment: 45 minutes.

Lesson learned: Patience... Endurance...

Initial Backlashes

23-04-08 [email protected]

Page 8: Bengt Berg, Cybercom Security, Polen

Response From Product Suppliers and Consultancy Companies

23-04-08 [email protected]

Page 9: Bengt Berg, Cybercom Security, Polen

• Retailers now have a very high level of security

• Leveraging the investments into other business areas– Using the IDS for the whole company – Incident management methods covers the whole company

23-04-08 [email protected]

What Results Have Been Achieved?

Investments in IS/IT Security

Page 10: Bengt Berg, Cybercom Security, Polen

• Not possible to sell insecure software to retailers anymore

23-04-08 [email protected]

What Results Have Been Achieved?

Page 11: Bengt Berg, Cybercom Security, Polen

• Software developers know about security nowadays

23-04-08 [email protected]

What Results Have Been Achieved?

Page 12: Bengt Berg, Cybercom Security, Polen

• Increased security amongst outsourcing companies– And they make good business out of it!

23-04-08 [email protected]

What Results Have Been Achieved?

Brands

Bank

PSP

Merchant

SolutionvendorService

provider

QSA

ASV

Page 13: Bengt Berg, Cybercom Security, Polen

Emerging Methods for Managing External Compliance Requirements

23-04-08 [email protected]

Page 14: Bengt Berg, Cybercom Security, Polen

A few trends growing more solid every day:

1.Portal solutions for compliance management

2.Extreme use of issue management solutions

3.Using wikis for policies and other documentation..

4.Trend-oriented tests of compliance status

Emerging methods

23-04-08 [email protected]

Page 15: Bengt Berg, Cybercom Security, Polen

• Cybercom, Acrea, ARIS, and numerous others– Binders in a bookshelf isn’t enough

Portal Solutions for Compliance Management

23-04-08 [email protected]

Page 16: Bengt Berg, Cybercom Security, Polen

27 workflows neccessary to implement ISO 27001

Use of Issue Management Systems

23-04-08 [email protected]

Report IncidentReport Incident

Incidentresponse

team

Incidentresponse

teamW

ebb

team

Web

b te

amN

etw

ork

team

Net

wor

k te

amH

/RH/R

Closed IncidentsClosed Incidents

CISOCISO

Page 17: Bengt Berg, Cybercom Security, Polen

Use of Issue Management Systems

23-04-08 [email protected]

Page 18: Bengt Berg, Cybercom Security, Polen

All Documentation in Wiki format

23-04-08 [email protected]

• All documents easily accessible (read) – Policy documents

– Instructions

• Edit only by document owner– Easy to allow ”free for all” in draft mode

• Built-in discussion forum! – Let people help each other...

• Built-in functionality for version control

Page 19: Bengt Berg, Cybercom Security, Polen

All Documentation in Wiki format

23-04-08 [email protected]

Page 20: Bengt Berg, Cybercom Security, Polen

Trend-oriented tests

23-04-08 [email protected]

Page 21: Bengt Berg, Cybercom Security, Polen

• What are the effects of external compliance requirements?

Conclusions

23-04-08 [email protected]

New compliance-oriented business models

New compliance-oriented business models

Will always benefit the outsourcing providersWill always benefit the outsourcing providers

The leader gets a competitive advantage

The leader gets a competitive advantage

Rational methods decrease investment

Rational methods decrease investment

Success depends on the governance framework

Success depends on the governance framework

Nobody wants to be a problem for their customer

Nobody wants to be a problem for their customer