lesson 9-information security best practices. overview understanding administrative security....

41
Lesson 9-Information Security Best Practices

Upload: arleen-fowler

Post on 03-Jan-2016

224 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Lesson 9-Information Security Best Practices

Page 2: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Overview

Understanding administrative security.

Security project plans.

Understanding technical security.

Making use of ISO 17799.

Page 3: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Understanding Administrative Security

Administrative security policies:

Define the importance of information and information systems

to the company and its employees.

Define the resources required to accomplish appropriate risk

management activities.

Identify the individuals responsible for managing the

information security risk for the organization.

Page 4: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Understanding Administrative Security

Administrative security policies fall under the following areas:

Policies and procedures.

Resources.

Responsibility.

Education.

Contingency plans.

Page 5: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Policies and Procedures

The most important policies that organizations must draft are:

Information policy - Defines the level of sensitivity of

information assets within the organization.

Security policy - Defines the technical controls and security

configurations to be implemented on all computer systems.

Page 6: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Policies and Procedures

The most important policies that organizations must draft

are (continued):

Use policy - Identifies the approved uses of organization

computer systems and the penalties for misusing such

systems.

Backup policy - Defines the frequency of information backups

and the method of moving backups to an off-site storage.

Page 7: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Policies and Procedures

Organizations must define the following procedures:

User management - Includes information about individuals who

can authorize access to the organization’s computer systems.

System administration - Defines the process of implementing

the organization’s security policy on various systems.

Configuration management - Defines the steps for making

changes to production systems.

Page 8: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Resources

Determining required resources depends on:

The size of the organization.

The organization’s business.

The risk to the organization.

The full risk assessment of the organization.

The plan to manage risk.

Page 9: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Resources

The project management triangle

Page 10: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Resources

The security department staff members should have the

following skills:

Security administration - A thorough understanding of day-to-

day administration of security devices.

Policy development - Hands-on experience in the development

and maintenance of security policies, procedures, and plans.

Architecture - An understanding of network and system

architectures and implementation of new systems.

Page 11: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Resources

The security department staff members should have the

following skills (continued):

Research - The examination of new security technologies for

risk assessment.

Assessment - Experience in conducting risk assessment

activities, such as penetration and security testing.

Audit - Experience in conducting system and procedure audits.

Page 12: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Resources

An organization’s security budget is based on:

The scope and time frame of the security project.

The capital expenditures, current operations, and cost of

training.

The security project plans.

Page 13: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Responsibility

An executive-level position must own security

responsibilities within an organization.

They should have the authority to define the organization’s

policy and sign off on all security-related policies.

They should also have the authority to enforce policy.

They should develop metrics to track the progress toward

security goals.

Page 14: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Education

The best practices for education includes:

Preventive measures.

Enforcement measures.

Incentive measures.

Page 15: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Preventive Measures

Preventive measures can be used to explain the importance

and need to protect an organization’s information assets.

It will make employees comply with policies and

procedures.

It includes awareness programs, publicity campaigns,

electronic mail messages, and pop-up windows.

Page 16: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Enforcement Measures

Enforcement measures force employees to abide by the

organization’s policies and procedures.

It can be enforced in the form of security-awareness

training.

Employees can also be provided copies of relevant policies.

They can also be asked to sign a security statement.

Page 17: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Incentive Programs

Incentive programs:

Can increase the reporting of security issues.

Can be in the form of monetary incentives or verbal

encouragement.

Can also be used for suggestions on how to improve security.

Page 18: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Contingency Plans

Contingency plans include:

Incident response - Defines the series of steps to be taken in

the event of a compromise.

Backup and data archival - Defines how and when backups are

to be taken. It also specifies the backup storage and restore

mechanisms.

Disaster recovery - Identifies the most critical resources and

states the need and objectives in the event of a disaster.

Page 19: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Security Project Plans

Best practices recommend that the security department

must establish the following plans:

Improvement plans - Address the risk areas and implement

appropriate changes to the environment.

Vulnerability assessment - Includes regular scans of the

organization’s systems. It also includes regular follow-up

with system administrators to ensure corrective actions are

being taken.

Page 20: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Security Project Plans

Best practices recommend that the security department

must establish the following plans (continued):

Assessment plans - Frequently assess the risk to the

organization.

Audit plans - Ensures policy compliance.

Training - Includes schedules for awareness training classes

and publicity campaigns.

Policy evaluation - Includes built-in review schedules.

Page 21: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Understanding Technical Security

Network connectivity.

Malicious code protection.

Authentication.

Monitoring.

Page 22: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Understanding Technical Security

Encryption.

Patching systems.

Backup and recovery.

Physical security.

Page 23: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Network Connectivity

To protect an organization from unwanted intrusions, the

following network connectivity practices are recommended:

Permanent connections - Network connection to other

organizations or the Internet is protected by a firewall. This

prevents damage in one network to spread to others.

Remote access connections - These connections can be dial-in

connections or connections across the Internet. Two-factor

authentication, such as dial-back modems or dynamic passwords

is recommended.

Page 24: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Malicious Code Protection

To protect systems from computer viruses or Trojan horse

programs:

Use anti-virus programs for servers, desktops, and e-mail

systems.

Allow frequent signature updates and the delivery of

updates.

Page 25: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Authentication

The following are the recommended best practices for

password usage:

Passwords must be a minimum of eight characters in length.

The last ten passwords should not be reused.

It should always be stored in encrypted form, which is

inaccessible to normal users.

It should not be more than 60 days old.

It should be composed of alphanumeric characters.

Page 26: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Authentication

The following are the recommended best practices for

password usage (continued):

Dynamic passwords or other two-factor authentication

mechanisms offer added security.

Systems should be configured to start a screen saver while

the employee is away. The system should require re-

authentication to access the system.

Page 27: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Monitoring

Auditing is a mechanism of monitoring actions that occur on a computer

system. The audit log or files must keep track of the following events:

Login/logoff.

Failed login attempts.

Dial-in connection attempts.

Supervisor/administrator/root login.

Supervisor/administrator/root privileged functions.

Sensitive file access.

Page 28: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Monitoring

Intrusion detection systems (IDS) monitor networks or

systems.

They trigger an alarm when security is compromised.

Host-based IDS may be used to examine log files.

Network-based IDS helps monitor the network for attacks or

unusual traffic.

Page 29: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Encryption

Encrypt information while transmitting over unsecured lines

or electronic mail.

Choose an algorithm that matches the sensitivity of the

information being protected. Use well-known and well-

tested encryption algorithms.

Page 30: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Encryption

Use link encryption for transmission lines between

organization facilities.

Follow regulatory standards, such as HIPAA while

transmitting over open networks.

Page 31: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Patching Systems

Patches correct vulnerabilities.

Install patches only after testing.

Install patches according to the organization’s change

control procedures.

Check for new patches frequently.

Page 32: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Backup and Recovery

Information on servers should be backed up regularly.

Verify all backups to determine if the backup successfully

copied the important files.

Establish regular schedules of tests.

Backups must be accessible to restore systems in the event

of system failures.

Backups should be stored off-site for protection.

Page 33: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Physical Security

The following physical security mechanisms are

recommended:

Physical access - Restrict access to data center, where all

sensitive computers are kept.

Climate - Configure climate control units to notify

administrators if a failure occurs.

Page 34: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Physical Security

The following physical security mechanisms are

recommended (continued):

Fire suppression - Configure fire-suppression systems to

prevent any damage to the systems in the data center.

Electrical power - Size battery backups to provide sufficient

power for computer systems to shut down.

Page 35: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Making Use of ISO 17799

The Information Technology - Code of Practice for

Information Security Management (ISO 17799) covers the

following areas:

Security policy - Covers the need for a security policy. It

also recommends regular reviews and evaluation of the

document.

Page 36: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Making Use of ISO 17799

The Information Technology - Code of Practice for

Information Security Management (ISO 17799) covers the

following areas (continued):

Organizational security - Covers how information security

functions are managed within an organization.

Asset classification and control - Covers the need to

properly protect both physical and information assets.

Page 37: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Making Use of ISO 17799

ISO 17799 key concepts include:

Personal security - Discusses the need to manage the risk

within the hiring process and ongoing employee education.

Physical and environmental security - Discusses the need to

protect all physical assets from theft, fire, and other hazards.

Communication and operations management- Covers the need

for documented management procedures for computers and

networks.

Page 38: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Making Use of ISO 17799

ISO 17799 key concepts include (continued):

Access control - Discusses the control of access to information,

systems, networks, and applications.

Systems development and maintenance - Discusses the

inclusion of security in development projects.

Page 39: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Making Use of ISO 17799

ISO 17799 key concepts include (continued):

Business continuity management - Discusses the risks of

business interruptions and various alternatives for continuity

management.

Compliance - Discusses how the organization should enforce

policy and check compliance.

Page 40: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Summary

Administrative security practices include policies and

procedures, resources, responsibility, education, and

contingency plans.

The security department must establish plans for

improvement, assessment, vulnerability assessment,

audits, training, and policy evaluation.

Page 41: Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security

Summary

Technical security measures deal with the implementation

of security controls on computers and networked systems.

ISO 17799 standards help establish an effective security

program.