security lifecycle management

40
ISM in the ILM (Information Lifecycle Security Management) Barry Caplin Chief Information Security Officer Minnesota Department of Human Services [email protected] May 18, 2006 10:00-11:00 a.m. Secure360

Upload: barry-caplin

Post on 15-Jan-2015

2.490 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Security Lifecycle Management

ISM in the ILM(Information Lifecycle Security

Management)Barry Caplin

Chief Information Security OfficerMinnesota Department of Human Services

[email protected]

May 18, 2006 10:00-11:00 a.m.

Secure360

Page 2: Security Lifecycle Management
Page 3: Security Lifecycle Management

Agenda

• DHS Overview

• Enterprise Security Strategy

• Build Security In?

• Information Lifecycle Security Management

Page 4: Security Lifecycle Management

MN DHS

• Mission - helps people meet their basic needs so they can live in dignity and achieve their highest potential

• Consumers include:– seniors who need help paying for hospital and nursing

home bills or who need home-delivered meals– families with children in a financial crisis– parents who need child support enforcement or child

care money– people with physical or developmental disabilities who

need assistance to live as independently as possible

Page 5: Security Lifecycle Management

MN DHS

Direct service through:• DHHS – Deaf and Hard of Hearing Services• SOS – State Operated Services includes

– RTC’s – Regional Treatment Centers, including St. Peter, Moose Lake

– Forensics – St. Peter, Moose Lake, METO (MN Extended Treatment Options)

– State-run group homes– New community-based treatment centers– State-run nursing home – Ah-Gwah-Ching

Page 6: Security Lifecycle Management

MN DHS

Administrations (Divisions):• CFS – Children and Family Services – Child

Support Enforcement, Endangerment, Social Services, Medical/Welfare Eligibility

• Chemical and Mental Health Services– including SOS

• Health Care Administration and Operations• Continuing Care• FMO – Finance and Management Operations –

including Information Security, IT

Page 7: Security Lifecycle Management

MN DHS

• Programs are state-administered, county-delivered

– Including MinnesotaCare, Medical Assistance, General Assistance Medical Care, mental health services, alternative care services, chemical dependency services and regional treatment center services

• One of the largest state agencies• 2500 CO, 5000 SOS distributed staff• State and Federal funding

Page 8: Security Lifecycle Management

Enterprise Security Strategy

Page 9: Security Lifecycle Management

Security Strategy - The 10000 Foot View

Information Security Governance Framework (COBIT Security Baseline)– People

• Organization• Awareness

– Technology• Operations• Architecture

– Enterprise High-Level Functions• Information Risk Management• Information Policy• Information Lifecycle Management• Process

Page 10: Security Lifecycle Management

Security StrategyGovernance

orga

niza

tion

operationsarchitecture

awar

enes

s

people technology

IRM

Policy

ILM

Processes

Page 11: Security Lifecycle Management

Security StrategyGovernance

orga

niza

tion

operationsarchitecture

awar

enes

s

people technology

IRM

Policy

ILM

Processes

4 C’s

Confidence

Credibility

Communication

Compliance

Page 12: Security Lifecycle Management

Build Security In?

Page 13: Security Lifecycle Management

Build Security In

• What do we mean by this?

• Everyone says it… but how?

• https://buildsecurityin.us-cert.gov/portal/

Page 14: Security Lifecycle Management

Why Build Security In?

Page 15: Security Lifecycle Management

Why Build Security In?

Page 16: Security Lifecycle Management

• Cost – “measure twice, cut once”

• Efficiency – build it “right” the first time

• Time – fixing problems later will likely delay production use

Why Build Security In?

Page 17: Security Lifecycle Management

SDLC

• SEI-CMMI (formerly CMM) (http://www.sei.cmu.edu/cmmi/)

• IEEE and ISO 12207 standards (http://www.acm.org/tsc/lifecycle.html).

• Extreme Programming (http://www.xprogramming.com/, http://www.extremeprogramming.org/)

• On Wikipedia

(http://en.wikipedia.org/wiki/Software_development_life_cycle)

Page 18: Security Lifecycle Management

Information Lifecycle Security Management

Page 19: Security Lifecycle Management

Information Lifecycle Security Management

Page 20: Security Lifecycle Management

Operate

MajorRelease

DeployDevelopDesignAnalysisConcept

Software Development Lifecycle (SDLC)Maintenance Lifecycle

Dispose

Information Lifecycle Security Management

Page 21: Security Lifecycle Management

OperateMajor

ReleaseDeployDevelopDesignAnalysisConcept

PreliminaryRisk

Analysis

BusinessImpact

Analysis

Privacy andSecurity

Requirements

BCP/COOP

Privacy and Security

MitigationPlans

IncidentResponse

Plans

SecurityTestPlans

BCP/COOPTesting &

Maintenance

IT AuditBusinessRequirements

SecuritySignoff

SecuritySignoff

Information Lifecycle Security Management

Page 22: Security Lifecycle Management

Business Requirements

• A statement of the business problem or challenge the business area needs to solve

• Should not include recommended technical solutions

• Constraints/Assumptions

BusinessRequirements

Concept

Page 23: Security Lifecycle Management

Preliminary Risk Analysis

• Security Questionnaire• Preliminary Privacy Analysis• Preliminary Security Risk Analysis• Risk Briefing

PreliminaryRisk

Analysis

Concept

• Risk of not doing

Page 24: Security Lifecycle Management

Privacy andSecurity

Requirements

Privacy and Security Requirements

• Preliminary Privacy Assessment• Preliminary Security Risk Assessment• Privacy Requirements• Security Requirements• Preliminary Design Requirements

Analysis

Words To Live By:“Minimum Necessary”

Page 25: Security Lifecycle Management

Business Impact Analysis

• Business/System Impact Analysis BusinessImpact

Analysis

Analysis

Page 26: Security Lifecycle Management

Security Sign-Off

• Keys:– Business Requirements received– Requirements understood (by business area)– Risks acknowledged

SecuritySignoff

Page 27: Security Lifecycle Management

Privacy andSecurity

Requirements

Privacy and Security Requirements

• Vendor Security Questionnaire• Security Architecture Assessment• Information Policy Analysis• Risk Assessment (OCTAVE)• HIPAA Assessment• Detailed Design Requirements• Project Security Roadmap & Required Doc

List

Design

Page 28: Security Lifecycle Management

• Detailed Security Architecture Design• Design Review• Security Risk Mitigation Plans• Action Plan for compliance design

Privacy and Security

MitigationPlans

Design

Privacy and Security Mitigation Plans

Page 29: Security Lifecycle Management

Business Continuity/Disaster Recovery

• Business Continuity Planning• Disaster Recovery Planning• Preliminary COOP (Continuity Of Operations

Plan) Document

BCP/COOP

Design

Page 30: Security Lifecycle Management

Security Test Plans

• Test Data Plans• Security Testing Plan• Security Testing

– Use/Abuse Cases– Code Review Tools

• Vulnerability Assessment

SecurityTestPlans

Develop

Page 31: Security Lifecycle Management

Incident Response Plans

• Incident Response Plans• Final COOP

IncidentResponse

Plans

Develop

Page 32: Security Lifecycle Management

Security Sign-Off

• Keys:– Identified issues mitigated– Assessments completed– Security Requirements met– Documentation completed– BCP/COOP completed

SecuritySignoff

Page 33: Security Lifecycle Management

Deploy

• Change Management• Monitoring

Deploy

Page 34: Security Lifecycle Management

IT Audit

• Security Policy Compliance Review (COBIT Audit Guideline)

IT Audit

Operate

Page 35: Security Lifecycle Management

BCP/COOP Testing & Maintenance

• Plan Testing• Plan Updates & Review• BIA Updates

BCP/COOPTesting &

Maintenance

Operate

Page 36: Security Lifecycle Management

Major Release

• What is a Major Release?– Significant new functionality– Code rewrites– Significant architecture or design changes

• Site Dependent• May require any/all ILSM steps

MajorRelease

Page 37: Security Lifecycle Management

Information Disposal

• Measures based on:– Business type– Data classification

• Regulatory issues:– PHI– FTI– Others…

Dispose

Page 38: Security Lifecycle Management

OperateMajor

ReleaseDeployDevelopDesignAnalysisConcept

PreliminaryRisk

Analysis

BusinessImpact

Analysis

Privacy andSecurity

Requirements

BCP/COOP

Privacy and Security

MitigationPlans

IncidentResponse

Plans

SecurityTestPlans

BCP/COOPTesting &

Maintenance

IT AuditBusinessRequirements

SecuritySignoff

SecuritySignoff

Information Lifecycle Security Management

Page 39: Security Lifecycle Management

Final Thoughts

• SMT buy in is critical• Be consistent• Advertise, advertise, advertise

Page 40: Security Lifecycle Management

Discussion?