compliance versus security: looking for gold in a coal...

33
Compliance versus Security: Looking for Gold in a Coal Mine Kristy Westphal Information Security Officer Element Payment Services ISSA- January 14, 2014

Upload: others

Post on 19-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Compliance versus Security: Looking for Gold in a Coal Mine Kristy Westphal Information Security Officer Element Payment Services ISSA- January 14, 2014

Page 2: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Agenda

• What does it mean to be compliant or secure? •  Standards/regulations that apply •  Finding the gold in the coal •  Putting it to use in your organization

Page 3: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Houston…

•  There is a problem • We used to use compliance to get security tools

in place • But then we got the tools and didn’t do the right

thing with them •  I argue that we still are not communication risk

to upper management

Page 4: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Let’s get this straight

• Compliance DOES NOT EQUAL security •  Target • Heartland • Hannaford •  The Briar Group • Even the Federal Reserve….

• But why?

Page 5: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Because I said so!

•  PCI is prescriptive ▫  But limited in scope

• HIPAA, SOX, ISO27001 ▫  All provide a pathway, but don’t dig into the

details • NIST is VERY detailed ▫  But it’s not prioritized and many outside the Fed

won’t implement

Page 6: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Maybe audits look a little like..?

Page 7: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

My version of the compliance audit

PANIC Set audit date

Make up what’s missing

Prep team how to talk to an auditor

Convince auditor processes are pristine

Get clean audit/ remediation items

Organize phone books of docs

Scramble for remediation items not done from last time

Page 8: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

It sure doesn’t look like this

Page 9: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Or this…

Page 10: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

OK, it’s not ALL bad

• Regular review of documentation •  You do get to implement tools (they have to

produce a report somehow) • Compliance does avoid some fines and jail time

Page 11: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

But…

•  If you only document compliance related stuff • But do you know what the reports you produce

mean? • But if you still get attacked…then WTF?

Page 12: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

True Cost of Compliance •  We define a compliance activity as one that

organizations use to meet the specific rules, regulations, policies and contracts that are intended to protect information assets.

•  We define non-compliance cost as the cost that results when an organization fails to comply with rules, regulations, policies, contacts, and other legal obligations.

•  Although all organizations that participated in this study experienced both compliance and non-compliance costs, the findings demonstrate the value of investing in activities that may help an organization reduce the reactive costs of non-compliance.

Page 13: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a
Page 14: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a
Page 15: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Saying a lot while saying nothing

Page 16: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Where do we start mining?

• Understand the scope of your compliance environment ▫  Ensure it is well documented

• Understand the business priorities • Dissect your compliance reports ▫  Is the effort of what you are doing worth it? ▫  Is there a compliance aspect that should apply

elsewhere? ▫  Is there a better way to do things?

Page 17: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Let’s take a look at PCI (look at the pic! We’re done!)

Page 18: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Just kidding

Page 19: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Still messing with you

Page 20: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

HIPAA •  §164.308(a)(1): Security Management Process §164.308(a)(1)(ii)(a) -

Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.

•  Conduct Risk Assessment ▫  Inquire of management as to whether formal or informal policies or practices exist

to conduct an accurate assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI.

▫  Obtain and review relevant documentation and evaluate the content relative to the specified criteria for an assessment of potential risks and vulnerabilities of ePHI.

▫  Evidence of covered entity risk assessment process or methodology considers the elements in the criteria and has been updated or maintained to reflect changes in the covered entity's environment.

▫  Determine if the covered entity risk assessment has been conducted on a periodic basis.

▫  Determine if the covered entity has identified all systems that contain, process, or transmit ePHI

Page 21: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

More HIPAA! •  §164.308(a)(1)(ii)(b) - Implement security measures

sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with

•  §164.306(a)Implement a Risk Management Program ▫  Inquire of management as to whether current security

measures are sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with § 164.306(a). ▫  Obtain and review security policies and evaluate the

content relative to the specified criteria. ▫  Determine if the security policy has been approved and

updated on a periodic basis. ▫  Determine if security standards address data moved within

the organization and data sent out of the organization.

Page 22: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

SOX •  There is typically something related to: upper

management needs to understand what is going on.

•  So how do you dig deep into this enough to provide what they need? ▫  What metrics do you provide today? ▫  Do you explain what they mean? ▫  Better yet- are you sure they understand what they

mean?

Page 23: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

SOX

•  Tracking of security incidents •  Typically, this is just a process to show that

1)  You report security incidents 2)  You track them

•  But do you actually do anything like: ▫  Prepare ▫  Detect/Analyze ▫  Contain/Eradicate/Recover ▫  Post-mortem/Remediation

Page 24: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Top priorities

•  Use application “whitelisting” to help prevent malicious software and other unapproved programs from running.

•  Patch applications such as PDF readers, Microsoft Office, Java, Flash Player, and web browsers. These applications are in daily use in most companies.

•  Patch operating system vulnerabilities, for the same reasons discussed above.

•  Minimize the number of users with administrative privileges, the highest level of authority to make changes or undertake actions on a network.

Page 25: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

OK, great, now you have it

• But does anyone else? • How do you translate what you just did into

something management understands. • Get out the risk decoder ring!

Page 26: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

First, let’s try to explain the difference •  Security- protects stuff • Compliance- necessary due diligence- a cost of

doing business • But, we can reduce risk to the business by

prioritizing both

Page 27: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

What risks are truly at stake?

•  Tripwire/Poneman Institute paper says non-compliance far outweighs cost of compliance

•  So show that value •  Publish metrics: ▫  I bet an astounding number of spam and other

malicious emails get blocked every day ▫  How much do your WAFs block every day? ▫  DLP tools? ▫  What volume of log files are reviewed daily?

Page 28: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Also…

• Do a real risk assessment. Full stop. ▫  Don’t just do a random risk register ▫  Stand back and take a look at the whole business

from a security perspective ▫  This is one where you don’t want too much in the

weeds… ▫  But enough to express the bad stuff

Page 29: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

For example

• Do your developers push code directly into production without change management?

• Do you know what really goes on inside your network?

• How about what actually leaves your network? • Have you looked at indicators of compromise?

Page 30: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Align with business risk

•  IT risk should be hand in hand with other areas- like operational, reputational, financial risk

•  If you don’t know what these are- start asking people who would know

• Be prepared to show how your program ties back •  Let’s look at an example

Page 31: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Third party risk assessments

•  Should not only be for IT (and if they are…run away!)

•  Should start with the business risks and include a component of IT risk

•  IT risk may indicate problems where others aren’t looking:

•  Like a partner whose domain name is registered in the Ukraine

Page 32: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

In summary

• What have we learned? •  Time for the game of

Page 33: Compliance versus Security: Looking for Gold in a Coal Minephoenix.issa.org/wp-content/uploads/2014/01/ISSA-Compliance-vers… · Compliance versus Security: Looking for Gold in a

Resources

•  http://csis.org/publication/raising-bar-cybersecurity

•  http://www.tripwire.com/tripwire/assets/File/ponemon/True_Cost_of_Compliance_Report.pdf