copyright maximus consulting (hong kong) ltd. talk 090421.pdf · iso 27001 a corporate approach in...

33
Copyright 2009 Maximus Consulting (Hong Kong) Limited 1 Copyright © Maximus Consulting (Hong Kong) Ltd. The right of Maximus Consulting (Hong Kong) Ltd. to be identified as the authors of this presentation has been asserted by them in accordance the Copyright Ordinance (Cap. 568) 2001 under the law of Hong Kong SAR, PRC. Also they assert recognition of this right as authors in accordance with any international copyright laws or conventions. This publication is Copyright © Maximus Consulting (Hong Kong) Ltd. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, or used in any way or form (including presentation of this material as a course, training seminar, lecture or tutorial) or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior knowledge and written permission and consent of Maximus Consulting. Maximus Consulting (Hong Kong) - Tel: +852 2802 3954 - Email: [email protected] While every precaution has been taken in the preparation of this material, Maximus Consulting Hong Kong Ltd. accept no liability or assumes no responsibility for errors or omissions or for any loss or damage caused, arising directly or indirectly, in connection with the use, application and reliance on the information contained herein. Any personal opinions or views expressed in this workshop case study have been formed on the basis of information that was either made available to the authors or was freely publicly available.

Upload: phamkiet

Post on 29-Aug-2019

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

1

Copyright © Maximus Consulting (Hong Kong) Ltd.

The right of Maximus Consulting (Hong Kong) Ltd. to be identified as the authors of this presentation has been asserted by them in accordance the Copyright Ordinance (Cap. 568) 2001 under the law of Hong Kong SAR, PRC. Also they assert recognition of this right as authors in accordance with any international copyright laws or conventions.

This publication is Copyright © Maximus Consulting (Hong Kong) Ltd. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, or used in any way or form (including presentation of this material as a course, training seminar, lecture or tutorial) or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior knowledge and written permission and consent of Maximus Consulting.

Maximus Consulting (Hong Kong) - Tel: +852 2802 3954 - Email: [email protected]

While every precaution has been taken in the preparation of this material, Maximus Consulting Hong Kong Ltd. accept no liability or assumes no responsibility for errors or omissions or for any loss or damage caused, arising directly or indirectly, in connection with the use, application and reliance on the information contained herein. Any personal opinions or views expressed in this workshop case study have been formed on the basis of information that was either made available to the authors or was freely publicly available.

Page 2: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

ISO 27001 ISO 27001 A Corporate Approach in Developing ISMSA Corporate Approach in Developing ISMS

Speaker: Roger Chung

Chief Executive Officer

Maximus Consulting (Hong Kong) Ltd

Date: 21 April 2009

Page 3: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

3

TodayToday’’s Agendas Agenda

� Preparing your Information Security Management

System (ISMS)

� Tips for ISMS Implementation

� Case Study: Data Loss Prevention

Page 4: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

4

HACKED!

Hi Master (: Your System 0wned by Hackers!Hi Master (: Your System 0wned by Hackers!Hi Master (: Your System 0wned by Hackers!Hi Master (: Your System 0wned by Hackers!

xHackxHackxHackxHack 0wnz You0wnz You0wnz You0wnz You

HacKErABCHacKErABCHacKErABCHacKErABC HacKErXYZHacKErXYZHacKErXYZHacKErXYZ with me in Herewith me in Herewith me in Herewith me in Here

www.xxxhack.comwww.xxxhack.comwww.xxxhack.comwww.xxxhack.com or or or or www.xxxsecurity.comwww.xxxsecurity.comwww.xxxsecurity.comwww.xxxsecurity.com

WE WERE HERE....WE WERE HERE....WE WERE HERE....WE WERE HERE....

Hacked by Hacked by Hacked by Hacked by nOBoDynOBoDynOBoDynOBoDy ;);););)

Page 5: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Preparing your ISMSPreparing your ISMS

Page 6: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

6

The basic questionThe basic question

ISMS documentation Conduct risk assessment

Find an experienced ISMS consultant Management support

What is the most important component in establishing your ISMS?

Page 7: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

7

Establishing your ISMS in 9 stepsEstablishing your ISMS in 9 steps

� 9 steps to implement ISO 27001

� Initial approach (Why information security is important and why ISO 27001?)

� Management support

� Scoping

� Planning

� Communication

� Risk Assessment

� Control Selection

� Documentation

� Testing

Nine Steps to Success Nine Steps to Success –– An ISO 27001 Implementation OverviewAn ISO 27001 Implementation Overview

By Alan Calder, Director, IT Governance Ltd.By Alan Calder, Director, IT Governance Ltd.

Page 8: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

8

Management support for ISMSManagement support for ISMS

� Management support is essential for ISMS

project

� ISMS project is a business project, not an IT

project

� The project should aligned with the business

model, strategy and goals

� Appropriate level of resources should be

allocated to the project

Page 9: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

9

People Information Equipment

Network connections

Business processesServices

Physical location

Software

ScopingScoping

Page 10: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

10

Scoping Scoping –– uunderstand your nderstand your rrequirementsequirements

� Driving force of ISMS? � Marketing, Corporate Governance, Regulatory compliance, etc.

� Scope of ISMS?

� Physical Location(s)?

� IDC, Back office, Warehouse, Showroom, etc.

� Business Unit(s)/ Department(s) / Number of people involved?

� Sales, Marketing, Finance, HR, Executives, etc.

� Business Process(es)?

� Financial reporting, payroll, ERP, mission critical IT

services, IT Infrastructure, Application development and

support, etc.

Page 11: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

11

PlanningPlanning

� Plan-Do-Check-Act cycle

� Gap analysis

� Project management

� Project team

� Project plan

� Resources

PlanPlan

DoDo CheckCheck

ActAct

Page 12: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

12

Information Security Management Committee (ISMC)(CEO, COO, IT Director, Head of Compliance)

Information Security Management Representative (ISMR)

[IT Manager, Security Officer]

Application Development andSupport Team Representative

System and Network TeamRepresentative

Business UserRepresentative

Security Advisor Internal Auditor

DC Operation and Facility Team Representative

Information Security Working Committee (ISWC)

Build your ISMS committeeBuild your ISMS committee

Page 13: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Tips Tips for ISMS Implementationfor ISMS Implementation

Page 14: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

14

First, get to know the factFirst, get to know the fact

Insider Theft Hacking

Data on the Move Accidental Exposure

What is major type of security breach?

Page 15: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

15

Types of security breaches in 2008 (US)Types of security breaches in 2008 (US)

� Insider Theft – 15.7%

� Hacking – 13.9%

� Data on the Move – 20.7%

� Accidental Exposure – 14.4%

Source: The Identity Theft Resource Center

http://www.idtheftcenter.org/artman2/publish/m_press/2008_Data_Breach_Totals_Soar.shtml

The bottom lines:

1. Insider theft, now at 15.7%, has more than doubled between 2007 and 2008.

2. Data on the move and accidental exposure, both human error categories,

account for 35.2% of those breaches that indicate cause.

3. Electronic breaches (82.3%) continue to outnumber paper breaches (17.7%).

Page 16: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

16

What is your weakest link? What is your weakest link?

� No information security policies

� Unidentified or un-managed risks

� Lack of security awareness among staff

� Lack of technical control

enforcement

Page 17: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

17

Requirements for risk assessment (1)Requirements for risk assessment (1)

� Asset identification� Identify the assets within the scope of the ISMS

� Identify the owners of these assets

� Threat, vulnerability and requirement identification� Identify the threats to those assets

� Identify the vulnerabilities that might be exploited by the threats

� Identify the impacts that losses of confidentiality, integrity and availability may have on the assets

� Asset valuation, impact assessment and risk assessment� Analyse and evaluate the risks

Page 18: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

18

Requirements for Requirements for rrisk assessmentisk assessment (2)(2)

� Risk treatment

� Identify and evaluate options for the treatment of risks

� Select control objectives and controls for the treatment of risks

� Review and approval

� Obtain management approval of the proposed residual risks

� Obtain management authorization to implement and operate the ISMS

� Control selection

� Prepare a Statement of Applicability (SoA)

� Select controls from Annex A or other sources

Page 19: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

19

If you donIf you donIf you donIf you don’’’’t attack the riskst attack the riskst attack the riskst attack the risksthe risks will attack you.the risks will attack you.the risks will attack you.the risks will attack you.

Page 20: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Case Study: Data Loss PreventionCase Study: Data Loss Prevention

Page 21: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

21

Multi sources of security breachesMulti sources of security breaches

Page 22: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

22

FOXY 再再再再洩洩洩洩警警警警方方方方機機機機密密密密60 文文文文件件件件披披披披露露露露毒毒毒毒案案案案資資資資料料料料及及及及個個個個人人人人私私私私隱隱隱隱

[蘋果日報2009年3月8日]近六十份警務處內部文件經 FOXY 流出,這是警隊十個月內第七次「與眾分享」保密檔案。文件披露了警方處理毒品的程序、涉案人士的姓名、地址及身份證號碼。立法會議員認為,警方屢次洩密,足以動搖市民對執法機關保障報案人安全的信心。有警務人員質疑,洩漏文件的可能是律師或者司法機構。但司法機構指該等資料並非法庭文件。

FOXY 再再再再洩洩洩洩警警警警方方方方機機機機密密密密60 文文文文件件件件披披披披露露露露毒毒毒毒案案案案資資資資料料料料及及及及個個個個人人人人私私私私隱隱隱隱

[蘋果日報2009年3月8日]近六十份警務處內部文件經 FOXY 流出,這是警隊十個月內第七次「與眾分享」保密檔案。文件披露了警方處理毒品的程序、涉案人士的姓名、地址及身份證號碼。立法會議員認為,警方屢次洩密,足以動搖市民對執法機關保障報案人安全的信心。有警務人員質疑,洩漏文件的可能是律師或者司法機構。但司法機構指該等資料並非法庭文件。

不不不不自自自自覺覺覺覺經經經經 FOXY 洩洩洩洩密密密密 警警警警署署署署警警警警長長長長或或或或被被被被處處處處分分分分

[蘋果日報2009年3月10日]日前揭發經 FOXY 洩漏的警務處內部文件,其中多個檔案懷疑由上水警署的警務人員流出。大埔警區重案組人員追查發現,是一名曾駐守上水警署的警署警長將檔案資料帶回家中的電腦工作引致外洩,警隊對此非常重視,不排除稍後作出處分。

不不不不自自自自覺覺覺覺經經經經 FOXY 洩洩洩洩密密密密 警警警警署署署署警警警警長長長長或或或或被被被被處處處處分分分分

[蘋果日報2009年3月10日]日前揭發經 FOXY 洩漏的警務處內部文件,其中多個檔案懷疑由上水警署的警務人員流出。大埔警區重案組人員追查發現,是一名曾駐守上水警署的警署警長將檔案資料帶回家中的電腦工作引致外洩,警隊對此非常重視,不排除稍後作出處分。

Security breaches are all aroundSecurity breaches are all around

聯聯聯聯合合合合醫醫醫醫護護護護再再再再失失失失「「「「手手手手指指指指」」」」洩洩洩洩 47 病病病病人人人人資資資資料料料料

[蘋果日報2009年3月25日]聯合醫院繼 07 年有醫護遺失存有 26 名病人資料的 USB 記憶體後,事隔一年半再爆出遺失病人資料醜聞。該院一名 26 歲女眼科醫生上周五遺失一隻儲存 47 名病人個人資料的 USB 記憶體(俗稱 USB 手指),事隔三日才向上級呈報,九龍東醫院聯網即時報警,對今次事件深表遺憾,向受影響病人致歉,並成立專責小組調查,若發現有人為錯誤,會作出適當處分。

聯聯聯聯合合合合醫醫醫醫護護護護再再再再失失失失「「「「手手手手指指指指」」」」洩洩洩洩 47 病病病病人人人人資資資資料料料料

[蘋果日報2009年3月25日]聯合醫院繼 07 年有醫護遺失存有 26 名病人資料的 USB 記憶體後,事隔一年半再爆出遺失病人資料醜聞。該院一名 26 歲女眼科醫生上周五遺失一隻儲存 47 名病人個人資料的 USB 記憶體(俗稱 USB 手指),事隔三日才向上級呈報,九龍東醫院聯網即時報警,對今次事件深表遺憾,向受影響病人致歉,並成立專責小組調查,若發現有人為錯誤,會作出適當處分。

聯聯聯聯合合合合再再再再失失失失載載載載病病病病人人人人資資資資料料料料 USB 手手手手指指指指第第第第三三三三次次次次出出出出事事事事 涉涉涉涉事事事事女女女女醫醫醫醫生生生生疑疑疑疑違違違違反反反反守守守守則則則則

[蘋果日報2009年4月12日]聯合醫院曾發生兩次遺失存有病人資料的 USB 手指事件,但該院職員未吸取教訓,前日再有一名婦產科駐院女醫生遺失一具私人 USB 手指,內存有八名病人的姓名及身份證號碼等個人資料,且未有進行加密措施。醫院管理層對事件表示失望,指該名醫生涉違反資料保安守則,會成立小組進行調查,並向受影響病人致歉。

聯聯聯聯合合合合再再再再失失失失載載載載病病病病人人人人資資資資料料料料 USB 手手手手指指指指第第第第三三三三次次次次出出出出事事事事 涉涉涉涉事事事事女女女女醫醫醫醫生生生生疑疑疑疑違違違違反反反反守守守守則則則則

[蘋果日報2009年4月12日]聯合醫院曾發生兩次遺失存有病人資料的 USB 手指事件,但該院職員未吸取教訓,前日再有一名婦產科駐院女醫生遺失一具私人 USB 手指,內存有八名病人的姓名及身份證號碼等個人資料,且未有進行加密措施。醫院管理層對事件表示失望,指該名醫生涉違反資料保安守則,會成立小組進行調查,並向受影響病人致歉。

Page 23: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

23

Even more Even more ……....

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 入 境處內 容 : 一 名 入 境 主 任 涉 違 規 將 機 密 資 料 帶 回 家輸 入 電 腦 , 文 件 載 有 入 境 處 監 視 黑 名 單 者 資料 、 旅 客 投 訴 等

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 入 境處內 容 : 一 名 入 境 主 任 涉 違 規 將 機 密 資 料 帶 回 家輸 入 電 腦 , 文 件 載 有 入 境 處 監 視 黑 名 單 者 資料 、 旅 客 投 訴 等

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 警 務處內 容 : 16 警 區共 兩 頁 的 總 督 察 及 警 長 的 手 機 名冊 流 出 , 另 有 4 頁 警 察 審 問 疑 犯 , 包 括 盤 問 走私 香 煙 犯 、 紅 油 走 私 犯 及 妓 女 等 的 指 引

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 警 務處內 容 : 16 警 區共 兩 頁 的 總 督 察 及 警 長 的 手 機 名冊 流 出 , 另 有 4 頁 警 察 審 問 疑 犯 , 包 括 盤 問 走私 香 煙 犯 、 紅 油 走 私 犯 及 妓 女 等 的 指 引外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 警 務處

內 容 : 多 份 警 方 機 密 檔 案 , 包 括 描 述 3 名 警 員多 次 去 旺 角 可 疑 的 士 高 放 蛇 買 毒 品 的 經 過 、 黃大 仙 車 內 盜 竊 案 疑 犯 駕 駛 汽 車 的 資 料 等

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 警 務處內 容 : 多 份 警 方 機 密 檔 案 , 包 括 描 述 3 名 警 員多 次 去 旺 角 可 疑 的 士 高 放 蛇 買 毒 品 的 經 過 、 黃大 仙 車 內 盜 竊 案 疑 犯 駕 駛 汽 車 的 資 料 等

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 警 務處內 容 : 3 個 檔 案 包 括 各 區 負 責 街 頭 騙 案 的 警 官名 單 和 電 話 , 其 中 兩 份 是 商 業 罪 案 調 查 科 向 法院 申 請 搜 查 令 的 文 件 , 清 楚 寫 明 搜 查 原 因 、 地址 , 甚 至 投 訴 人 的 姓 氏 和 公 司 資 料

外 洩 上 網 時 間 : 08 年 5 月 涉 及 部 門 : 警 務處內 容 : 3 個 檔 案 包 括 各 區 負 責 街 頭 騙 案 的 警 官名 單 和 電 話 , 其 中 兩 份 是 商 業 罪 案 調 查 科 向 法院 申 請 搜 查 令 的 文 件 , 清 楚 寫 明 搜 查 原 因 、 地址 , 甚 至 投 訴 人 的 姓 氏 和 公 司 資 料外 洩 上 網 時 間 : 08 年 6 月 涉 及 部 門 : 海 關

內 容 : 海 關 人 員 的 案 件 口 供 紀 錄 , 包 括 疑 犯 的身 份 證 號 碼 及 案 件 詳 情

外 洩 上 網 時 間 : 08 年 6 月 涉 及 部 門 : 海 關內 容 : 海 關 人 員 的 案 件 口 供 紀 錄 , 包 括 疑 犯 的身 份 證 號 碼 及 案 件 詳 情

外 洩 上 網 時 間 : 08 年 7 月 涉 及 部 門 : 入 境處內 容 : 11 份 懷疑 屬 一 名 曾 駐 守 深 圳 灣 口 岸 的 入境 主 任 的 檔 案 流 出 , 包 括 調 查 偽 證 個 案 報 告 ,披 露 旅 客 個 人 資 料 及 調 查 細 節

外 洩 上 網 時 間 : 08 年 7 月 涉 及 部 門 : 入 境處內 容 : 11 份 懷疑 屬 一 名 曾 駐 守 深 圳 灣 口 岸 的 入境 主 任 的 檔 案 流 出 , 包 括 調 查 偽 證 個 案 報 告 ,披 露 旅 客 個 人 資 料 及 調 查 細 節

外 洩 上 網 時 間 : 08 年 8 月 涉 及 部 門 : 警 務處內 容 : 多 份 07 年 機 密 文 件 , 包 括 協 助 警 方 拘 捕「 大 耳 窿 」 的 證 人 的 個 人 資 料 如 姓 名 、 電 話 、住 址 及 工 作 地 點

外 洩 上 網 時 間 : 08 年 8 月 涉 及 部 門 : 警 務處內 容 : 多 份 07 年 機 密 文 件 , 包 括 協 助 警 方 拘 捕「 大 耳 窿 」 的 證 人 的 個 人 資 料 如 姓 名 、 電 話 、住 址 及 工 作 地 點

外 洩 上 網 時 間 : 08 年 8 月 涉 及 部 門 : 警 務處內 容 : 多 份 07 年 機 密 文 件 , 包 括 協 助 警 方 拘捕 「 大 耳 窿 」 的 證 人 的 個 人 資 料 如 姓 名 、 電話 、 住 址 及 工 作 地 點

外 洩 上 網 時 間 : 08 年 8 月 涉 及 部 門 : 警 務處內 容 : 多 份 07 年 機 密 文 件 , 包 括 協 助 警 方 拘捕 「 大 耳 窿 」 的 證 人 的 個 人 資 料 如 姓 名 、 電話 、 住 址 及 工 作 地 點

外 洩 上 網 時 間 : 08 年 9 月 涉 及 部 門 : 警 務處內 容 : 西 九 龍 警 區 多 份 文 件 外 洩 , 內 容 包 括衝 鋒 隊 員 接 獲 炸 彈 恐 嚇 、 持 槍 行 劫 等 嚴 重 案件 的 處 理 程 序

外 洩 上 網 時 間 : 08 年 9 月 涉 及 部 門 : 警 務處內 容 : 西 九 龍 警 區 多 份 文 件 外 洩 , 內 容 包 括衝 鋒 隊 員 接 獲 炸 彈 恐 嚇 、 持 槍 行 劫 等 嚴 重 案件 的 處 理 程 序

外 洩 上 網 時 間 : 09 年 2 月 涉 及 部 門 : 消 防處內 容 : 60 多 份、 涉 及 逾 20 名消 防 員 考 核 報告 , 披 露 有 關 消 防 員 的 月 薪 及 職 級 等 個 人 資料 , 其 中 更 包 括 去 年 救 人 殉 職 的 英 雄 蕭 永 方

外 洩 上 網 時 間 : 09 年 2 月 涉 及 部 門 : 消 防處內 容 : 60 多 份、 涉 及 逾 20 名消 防 員 考 核 報告 , 披 露 有 關 消 防 員 的 月 薪 及 職 級 等 個 人 資料 , 其 中 更 包 括 去 年 救 人 殉 職 的 英 雄 蕭 永 方

外 洩 上 網 時 間 : 09 年 2 月 涉 及 部 門 : 警 務處內 容 : 一 份 警 務 處 會 面 紀 錄 , 內 容 是 天 水 圍 警署 一 名 警 員 , 向 聚 賭 疑 犯 錄 取 口 供 的 資 料

外 洩 上 網 時 間 : 09 年 2 月 涉 及 部 門 : 警 務處內 容 : 一 份 警 務 處 會 面 紀 錄 , 內 容 是 天 水 圍 警署 一 名 警 員 , 向 聚 賭 疑 犯 錄 取 口 供 的 資 料

外 洩 上 網 時 間 : 09 年 3 月 涉 及 部 門 : 警 務處內 容 : 近 60 份警 務 處 內 部 文 件 , 包 括 警 長 處理 毒 品 紀 錄 、 被 捕 人 身 份 等

外 洩 上 網 時 間 : 09 年 3 月 涉 及 部 門 : 警 務處內 容 : 近 60 份警 務 處 內 部 文 件 , 包 括 警 長 處理 毒 品 紀 錄 、 被 捕 人 身 份 等

Page 24: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

24

After the incidentAfter the incident……

Fire the staff who caused the incident Conceal the incident whatever possible

Implement sophisticated technical controls Perform IS incident management

What should be done when the incident occurred?

Page 25: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

25

Information Security Incident Management (A.13)Information Security Incident Management (A.13)

� What is the impact of the incident?� Very high (Major), High, Medium or Low

� What are corrective actions for the incident?� Perform actions to minimize the impact of the incident

� Recover the affected systems as soon as possible

� What is the root cause of the incident?� Identify the cause of the incident

� Accidental, staff ignorance, inappropriate policies, lack of audit and compliance checking, lack of technical controls, etc

� What are preventive actions to reduce the recurrence of similar incidents?� Administrative and technical controls

� Training and communication with staff, define clear disciplinary actions, etc

� Restrict USB drives usage, encrypt USB drives, centralized management solution for USB, etc

Page 26: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

26

Before the incidentBefore the incident……

Define a fit-for-purpose policies Block all USB drives

Proper training and communication Strict disciplinary action against breaches

How to prevent information leakage through USB drives?

Page 27: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

27

Controls and CommunicationsControls and Communications

� You need administrative controls� To define what and how to protect your information assets

� E.g. information security policies, acceptable use policy, information security incident management procedures, disciplinary actions

� You need technical controls� To enforce strict policies on system

� E.g. password policies, encryption on traffic, web filtering, prohibition of USB drives

� You need training and communication with staff� To get staff buy-in and increase the effectiveness of

controls� E.g. security awareness training, handling of confidential

information, protection of personal data, responsibility to report incidents

Page 28: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

28

Information security costs you less onInformation security costs you less onInformation security costs you less onInformation security costs you less onprevention rather than correction.prevention rather than correction.prevention rather than correction.prevention rather than correction.

Page 29: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

29

� Total Commitment

� Commitment from senior management

� Effective security marketing to managers and employees

� Customized Security Practice

� Security policy, objectives and activities that reflects

business objectives

� Consistent with organization culture

� Good understanding of security requirements and security

risks

Critical Success FactorCritical Success Factorss for ISMSfor ISMS

Page 30: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

30

Critical Success FactorCritical Success Factorss for ISMSfor ISMS

� Training

� Regular security education and awareness program

� Distribution and communication of security policies to employees and vendors

� Changing Mindset

� Giving true assessment of information security

� Keeping security awareness in day-to-day operation

� Reporting all security incidents

� Taking the security responsibilities

Page 31: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

31

Not every change is an improvement;

but every improvement is a change.

ISMS is a change management projectISMS is a change management project

Almost everyone dislikes changeAlmost everyone dislikes change…………

Page 32: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

32

SummarySummary

� Management support is essential for ISMS project

� ISMS project should aligned with the business model, strategy and goals

� Scoping – Identify the coverage of ISMS

� Planning – Follow the Plan-Do-Check-Act cycle, build your ISMS committee

� Risk assessment – Identify your weakest link

� Data Loss Prevention

� ISMS helps you to analyse the root cause of incidents and manage the risks in a cost effective manner

ISMS is a management system to manage allISMS is a management system to manage all

information security issues of your organizationinformation security issues of your organization

Page 33: Copyright Maximus Consulting (Hong Kong) Ltd. Talk 090421.pdf · ISO 27001 A Corporate Approach in Developing ISMS Speaker: Roger Chung Chief Executive Officer Maximus Consulting

Copyright 2009 Maximus Consulting (Hong Kong) Limited

33

Information security is not a luxury;Information security is not a luxury;Information security is not a luxury;Information security is not a luxury;

It is a necessity.It is a necessity.It is a necessity.It is a necessity.