control design for data protection and privacy version 1 release 2

13
Mark E.S. Bernard, CISSP, CISM, CRISC, CISA, CGEIT, CNA Skype; Mark_E_S_Bernard Twitter; @MESB_TechSecure LinkedIn; http://ca.linkedin.com/in/markesbernard *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Upload: mark-es-bernard-cissp-cism-cisa-cgeit-crisc

Post on 12-May-2015

2.423 views

Category:

Business


0 download

DESCRIPTION

Control design for data protection and privacy version 1 release 2

TRANSCRIPT

Page 1: Control design for data protection and privacy version 1 release 2

Mark E.S. Bernard, CISSP, CISM, CRISC, CISA, CGEIT, CNA

Skype; Mark_E_S_Bernard Twitter; @MESB_TechSecure

LinkedIn; http://ca.linkedin.com/in/markesbernard

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 2: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

1. Accountability - An organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organization's compliance with the following principles. 2. Identifying Purposes - The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected. 3. Consent - The knowledge and consent of the individual are required for the collection, use, or disclosure of personal information, except where inappropriate. 4. Limiting Collection - The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means. 5. Limiting Use, Disclosure, and Retention - Personal information shall not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law. Personal information shall be retained only as long as necessary for the fulfillment of those purposes.

Page 3: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

6. Accuracy - Personal information shall be as accurate, complete, and up-to-date as is necessary for the purposes for which it is to be used. 7. Safeguards - Personal information shall be protected by security safeguards appropriate to the sensitivity of the information. 8. Openness - An organization shall make readily available to individuals specific information about its policies and practices relating to the management of personal information. 9. Individual Access - Upon request, an individual shall be informed of the existence, use, and disclosure of his or her personal information and shall be given access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it amended as appropriate. 10. Challenging - Compliance An individual shall be able to address a challenge concerning compliance with the above principles to the designated individual or individuals accountable for the organization's compliance.

Page 4: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

The Assets at risk potentially leading to

a breach of Data Protection & loss of

Confidentiality include ‘People’,

‘Information’, ‘Property /Facilities’, ’Software /Systems’,

‘Hardware’, ‘Telecommunications’

.

Page 5: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

The Assets at risk potentially leading to

a breach of Data Protection & loss of

Data Integrity include ‘People’,

‘Information’, ‘Property /Facilities’, ’Software /Systems’,

‘Hardware’, ‘Telecommunications’

.

Page 6: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

The Assets at risk potentially leading to

a breach of Data Protection & loss of Availability include

‘People’, ‘Information’,

‘Property /Facilities’, ’Software /Systems’,

‘Hardware’, ‘Telecommunications’

.

Page 7: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

During the execution of a standard process

or operation procedure risks are

exposed and with the proper control design

mitigated to acceptable levels

within the risk appetite. Identity &

Access Management is one example of a

crucial process.

Page 8: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

To achieve the effective and efficient integration between Quality Management & Risk Management

while addressing Compliance with Legal Obligations during the Design

Control process it will be necessary to

assess risk identify threats and matching

vulnerabilities.

Page 9: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

It is necessary to define the testing scenarios to help

frame the evaluated threats and vulnerabilities ensuring

the Control Design is achieving its intended

purpose. Reiterating the mitigation control and

mapping it to the testing scenario is an important step

in validation controls and establishing a tractability

matrix for the Control Design.

Page 10: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Leveraging proven best practices for Governance like the RACI Chart is extremely useful to establishing who is accountable, responsible or who needs to be consulted

ad informed about the Control Design.

Page 11: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Taking the Control Design for Data Protection and Privacy

one step further by establishing and

communicating the security controls to those on the RACI Chart that must be informed is essential to

elevating the Control design effectiveness. Additional

testing can be added to the testing scenarios that

encompassed these security tools and techniques.

Page 12: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

A feedback loop can ensure continuous

improvement as part of the Quality Management integration. The fishbone chart is extremely useful to communicate, track

and update the essential Control Design. This chart may also facilitate Root-Cause Analysis, Incident

Management and Problem Management.

Page 13: Control design for data protection and privacy version 1 release 2

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Mark E.S. Bernard, CISSP, CISM, CRISC, CISA, CGEIT, CNA

Skype; Mark_E_S_Bernard Twitter; @MESB_TechSecure

LinkedIn; http://ca.linkedin.com/in/markesbernard