overview of information security management by bm rao senior technical director national informatics...

30
Overview Of Information Security Management By BM RAO BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information Technology Government of India Email : [email protected]

Upload: lee-richard

Post on 27-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Overview Of

Information Security Management

By

BM RAOBM RAOSenior Technical Director

National Informatics CentreMinistry of Communications and Information Technology

Government of India Email : [email protected]

Phone No : 040 23494406

INFORMATION SECURITY

Generating information for the organization involves various components,

processes and persons .

INFORMATION SECURITY

• Information that can exist in many forms

Data stored on computers Transmitted Across Networks Print Outs Written on a Paper Sent by Fax Stored on Disks

INFORMATION SECURITY

INFORMATION SECURITY

Information asset

•An information asset is a body of information, defined and managed as a single unit so it can be understood, shared, protected and exploited effectively.• Information assets have certain value.

Value of asset

• Each organization has its own asset valuation scale (e.g. ‘high’, ‘medium’, ‘low’ etc.)

• The value expresses the potential impact and damage to the business from a loss of- Confidentiality- Integrity- Availability

• Values associated with breach of legislation

• Dependent on loss/damage- Financial loss- Loss of sales/market share- Service availability & disruption to operations- Processing capability & productivity- Damage to image and reputation

Value of asset

VulnerabilitiesVulnerabilities are weaknesses associated organization’s

assets.Vulnerabilities may be identified in following areas

Processes and procedures Personnel Physical environment Information system configuration Hardware, software or communications equipment Dependence on external parties

Threats• Threats are anything that could cause

damage/harm/loss to assets

• Threats can be accidental or deliberate

• Assets are subject to many kinds of threats which exploit vulnerabilities associated with them

Security Risk

•A security risk is the potential that a given threat will exploit vulnerabilities to cause loos/damage to asset.• It is a function of the impact of the undesirable event and the probability the event occurred.

Information assets

Security

Security

Security

Safeguarding the accuracy and completeness of information and processing methods

Confidentiality

Ensuring that information is accessible only to those authorized to have access

Ensuring that authorized users have access to information and associated assets when required

Threats

Security Risks

Vulnerabilities

INFORMATION SECURITY

Integrity

Availability

Threats & Vulnerabilities : Human Resources Security

Vulnerabilities ThreatsUnsupervised work Theft

Insufficient security training Operational support staff error

Poorly documented software Operational support staff error

Lack of monitoring mechanism Use of facilities in unauthorised way

Lack of policies for correct use of internet/

e-mail

Use of facilities in unauthorised way

Threats & Vulnerabilities : Physical Security

Vulnerabilities ThreatsUnprotected storage Theft

Unstable power grid Power fluctuation

Lack of physical protection of building Theft

Susceptibility to voltage Power fluctuation

Susceptibility to temperature variation Temperature extremes

Location in flood susceptible area Flooding

Risk Assessment

•Assessment of threats to, impacts on and vulnerabilities of assets and the likelihood of their occurrence• It produces an estimate of the risk to an asset at a given point in time.

Risk is function of asset value, Threat value and Vulnerability value

R=f(A,T,V)

R = Risk Value T = Threat Value

A = Asset Value V = Vulnerability Value

Organization is free to chose the function ‘f’ as long as the out put of Risk Assessment is relevant.

Risk Assessment

Sometimes threats and vulnerabilities are commonly called as Security concern and assessed as single entry S(Sc/SI/SA)

Security control• Measures to Prevent, Detect or Reduce the Risk• Effective security generally requires combinations of

the following :detection Correctiondeterrence recoveryPrevention monitoringLimitation awareness

Information Security Management

• Information security that can be achieved through technical means is limited• Security also depends on people, policies, processes and

procedures• Resources are not unlimited• It is not a once off exercise but an ongoing activity

Steps involved in establishing security management system for the organization

• Listing of information assets and categorization

• Identifying vulnerabilities

• Identifying threats

• Valuate threats

• Valuate vulnerabilities

• Valuate production policies

• Determine threat loss

• Arrival risk factors

• Select controls

Security Policy

Organization of Information Security

Asset Management

Human Resource Security

Physical & environmental

security

Communications & operations management

Info. Systems Acquisition

development & maintenanceAccess control

Information Security Incident Management

Business Continuity Management

Compliance

Security frame work

How to Select Controls• Baseline controls

⁻ Gap analysisoControls not or partially in place, but needed⁻ Legal and business requirements• Risk assessment controls₋ Selected to reduce specific risks₋ Aiming at identified security problemso Threats, vulnerabilities, assets protection, insurance etc.

Selection of Control Objectives and Controls

• Review the risk and identify control options• The selection of controls should be made to bring down the risk to

acceptable level• The selection of controls should be cost effective

Implementing the controls

• A plan of implantation should be developed containing‒ Priorities (input from risk assessment)‒ Implementing schedule‒ The budget needed‒ Responsibilities‒ Necessary training activities

Setting of objectives and controls ExamplePhysical and environmental security

Secure areasObjective: To prevent unauthorized physical access, damage and interference to the organization’s premises and information.

Physical security perimeter ControlSecurity perimeters (barriers such as walls, card controlled entry gates or manned reception desks) shall be used to protect areas that contain information and information processing facilities.

Physical entry controls ControlSecure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access.

Securing offices, room and facilities

ControlPhysical security for offices, room and facilities shall be designed and applied.

Protecting against external and environmental threats

ControlsPhysical protection against damage from fire, flood, earthquake, explosion, civil unrest and other forms of natural or natural or man-made disaster shall be designed and applied.

Working in secure areas ControlsPhysical protection and guidelines for working in secure areas shall be designed and applied.

Public access, delivery and loading areas

ControlsAccess points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and , if possible, isolated from information processing facilities to avoid unauthorized access.

Setting of objectives and controls Example

ISMS is•That part of overall management system based on a business risk approach to

- Establish- Implement- Operate- Monitor- Review- Maintain & Improve

- ISO/IEC 27001 : 2005 - A Specification ( Specifies requirements for implementing, operating, monitoring, reviewing, maintaining & improving,

a documented ISMS) - Specifies the requirements of implementing of Security

control, customised to the needs of individual organisation of part thereof. - Used as a basis for certification- ISO/IEC 27002 : 2005 ( Originally ISO/IEC 17799 : 2005) - A code of practice for Information Security management

- Provides best practice guidance

ISMS Standards

A.5 Security Policy

A.6 Organization of Information Security

A.7 Asset Management

A.8 Human Resource Security

A.9 Physical & environmental

security

A.10 Communications &

operations management

A.12 Info. Systems Acquisition

development & maintenance

A.11 Access control

A.13 Information Security Incident Management

A.14 Business Continuity Management

A.15 Compliance

Security Control Clauses of ISO 27001

Effective Implementation of ISMS •Management Commitment•Organisation•Resources•Focus on Prevention•Training•Communication•Participation•System Review

THANK YOUTHANK YOU