sustainable protection of critical corporate information

45
Jeremy Hilton and Anas Tawileh (C) Cardiff University

Upload: anas-tawileh

Post on 12-May-2015

1.099 views

Category:

Technology


1 download

DESCRIPTION

Presented at the 5th Middle East CIO Summit

TRANSCRIPT

Page 1: Sustainable Protection of Critical Corporate Information

Jeremy Hilton and Anas Tawileh

(C) Cardiff University

Page 2: Sustainable Protection of Critical Corporate Information

“Relevant” security Identifying critical information Determining risks Developing the controls Sharing control information

(C) Cardiff University

Page 3: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 4: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 5: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 6: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 7: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 8: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 9: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 10: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

Page 11: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

Page 12: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

Page 13: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

Page 14: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

Page 15: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

LOCAL JUDGEMENT

Page 16: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

LOCAL JUDGEMENT

CRITICAL ACTIVITIES

Page 17: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

LOCAL JUDGEMENT

CRITICAL ACTIVITIES

CRITICALINFORMATION

REQUIREMENTS

Page 18: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 19: Sustainable Protection of Critical Corporate Information

(C) Cardiff Universityand much more..

Page 20: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

LOCAL JUDGEMENT

CRITICAL ACTIVITIES

CRITICALINFORMATION

REQUIREMENTS

A CONCEPT FOR INFORMATION ASSURANCE

Page 21: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

LOCAL JUDGEMENT

CRITICAL ACTIVITIES

CRITICALINFORMATION

REQUIREMENTS

A CONCEPT FOR INFORMATION ASSURANCE

Page 22: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

A REAL WORLD ORGANISATION

RDs

AN ‘ENTERPRISE’ MODEL RELEVANT TO THE REAL WORLD ORGANISATION

INFORMATION SUPPORT

LOCAL JUDGEMENT

CRITICAL ACTIVITIES

CRITICALINFORMATION

REQUIREMENTS

A CONCEPT FOR INFORMATION ASSURANCE

ASSESSMENT OF REAL WORLD

SECURITY MEASURES

Page 23: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 24: Sustainable Protection of Critical Corporate Information

Managers of SMEs are busy running their company, trying to survive in a very competitive environment

They rarely address anything that is not a legislative or regulatory requirement, and even then will often only comply if there is a penalty for not doing so

Will avoid spending money, and time is money, training is money

Rarely buy in expertise, staff left to help each other and ‘learn on the job’

(C) Cardiff University

Page 25: Sustainable Protection of Critical Corporate Information

When developing policy(rules), it is critical to consider if and how they can be implemented.

For example, if the policy is that: employees who breach a security rule, say,

disclose information to someone unauthorised to see it, then they will be fired

(C) Cardiff University

Page 26: Sustainable Protection of Critical Corporate Information

People generally do what they want to do, even at work. Hopefully this aligns with the

organisation’s needs

incentivising ; or applying suitable sanctions.

May achieve short term benefit, but the change is short-lived unless

fundamental change is achieved staff have a belief in the desired result

(C) Cardiff University

Page 27: Sustainable Protection of Critical Corporate Information

““Others inspire us, Others inspire us, information feeds us, information feeds us, practice improves our practice improves our performance, but we need performance, but we need quiet time to figure things quiet time to figure things out, to emerge with new out, to emerge with new discoveries, to unearth discoveries, to unearth original answers.”original answers.”

- Esther Buchholz- Esther Buchholz

(C) Cardiff University

Page 28: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 29: Sustainable Protection of Critical Corporate Information

Staff need to be involved, trained and supported.

Tools will be required in order to enable the desired controls on information and analysis/audit of use

Accountability and responsibility of staff must be clearly defined and agreed. Tell me and I’ll forget

Show me and I’ll rememberInvolve me and I’ll understand

Old Chinese saying(C) Cardiff University

Page 30: Sustainable Protection of Critical Corporate Information

(C) Cardiff University

Page 31: Sustainable Protection of Critical Corporate Information

#2 Define the information architecture

Page 32: Sustainable Protection of Critical Corporate Information
Page 33: Sustainable Protection of Critical Corporate Information
Page 34: Sustainable Protection of Critical Corporate Information

( 34 )How to Use the Creative Commons Licenses

Creative CommonsCreative Commons

Page 35: Sustainable Protection of Critical Corporate Information
Page 36: Sustainable Protection of Critical Corporate Information

Traffic Light Protocol Philosophymapped to the Business Impact and Control Categories

RED SENSITIVITY = HIGHLY

SENSITIVE

Personal for named recipients only

WHITE SENSITIVITY= PUBLIC

Unlimited Control(Apart from legal

recourse)

Uncontrolled

AMBER SENSITIVITY = SENSITIVE

Limited distribution

GREEN

SENSITIVITY = NORMAL BUSINESS

Business Community wide

CATASTROPHICSecured Segregated

MATERIALSecured

MAJORRestricted

MINORControlled

INSIGNIFICANTControlled

Developed to control information sharing between G8 countries, Business Impact levels added.

Page 37: Sustainable Protection of Critical Corporate Information

Generic “Org X” Architecture Trust Model

External SecuredThis zone is similar to the secured zone but is owned and operated by a business partner. The trust relationship between the Org X and the business partner is stronger than in the restricted zones. Information Assets: Distributed to named individuals only.

Secured

This zone is the most secured area within the architecture.

Access should be limited to highly trusted principals.

Information Access limited to named principals only.

External RestrictedSimilar to Restricted Zone but owned /operated by a business partner. The trust relationship is stronger that that in the External Controlled Zone. Information Access limited to Groups of authenticated principals

RestrictedThe restricted Zone is the next higher level of security above Controlled. Access is Restricted to authenticated users or processes.

Most data processing and storage occurs here.

Information Access limited to pre-defined groups made up of authenticated principals.

External ControlledSimilar to Controlled Zone but owned /operated by an external organisation.

ControlledThis is where the lowest levels of control are applied to manage Information Assets with the prime goals of managing Availability and Compliance

Uncontrolled (Public)The uncontrolled environment outside the control of Org X.

Managed Belongs to IT and is used to administer servers, network devices and other managed devices. May be implemented with secure sessions (SSH) separate out of band networks or greater controls on Admin devices.

Page 38: Sustainable Protection of Critical Corporate Information

A set of classifications that are flexible enough to enable to define and communicate the controls to be applied to your information

May be combined with creative commons licenses

Expressed in 3 different formats: Security Officer-readable Human-readable Machine readable

Page 39: Sustainable Protection of Critical Corporate Information

Confidentiality

Authentication

Use

Integrity

CA – Community Access

RA – Restricted Access PI – Personal Information

OO – Organisation Only ND – Non-Disclosure

CG – Corporate Governance

SD – Safe Disposal

CU – Controlled Until

AB – Authorised By ND – Non-Derivatives

BY – Attributioncc

cc

Page 40: Sustainable Protection of Critical Corporate Information

The information may be shared within the organisation, but is not to be disclosed outside

Organisation Only

Page 41: Sustainable Protection of Critical Corporate Information

The information is restricted to members of a community; generally multi-agency

Though it may change, membership of the community is controlled

All members of the community agree to specific terms and conditions

Community Access

Page 42: Sustainable Protection of Critical Corporate Information

The information contains personal information and consideration must be made before sharing the information

This classification is likely to be used in conjunction with other labels such as

Personal Information

cc

Page 43: Sustainable Protection of Critical Corporate Information

The information has been received under non-disclosure

The label will link to the specific terms of the NDA

This classification is likely to be used in conjunction with other labels such as

Non-Disclosure

cccc

Page 44: Sustainable Protection of Critical Corporate Information

Medical Record

Personnel record

Patent under development

Published Patent

Draft Annual Report

Approved report prior to release

Post Releasecc

cc DTG

cc cc

cccc cc

Page 45: Sustainable Protection of Critical Corporate Information

Thank You