Presentation on theme: "Tammy Clark, Chief Information Security Officer,"— Presentation transcript:
1GSU's Roadmap for a World-Class Information Security Management System– ISO/IEC 27001:2005 Tammy Clark, Chief Information Security Officer,William Monahan, Lead Information Security Administrator“You will now have a starting place and a destination, and you will be able to determine what it will cost you to get there. You will be going someplace.” H. Stanley JuddBackground:GSU is located in downtown Atlanta – approximately 27,000 students (undergraduate & graduate) - second largest university in Georgia.CIO – JL AlbertInformation Security Program – Tammy Clark (CISO), William Monahan (Information Security Lead Admin), Miss Nancy Chang (Information Security Intermediate).Started aligning the university’s security plan with ISO (now ISO 27002) in September of 2004 (what the standard says – current state of security– strategic & tactical goals) – incrementally have addressed the 133 controls (risk assessments, data classification, incident response, security awareness training…) – taking it to the next level with ISO ((ISMS) = controls + governance))
2GSU’s Information Security Roadmap JL Albert’s (CIO) Vision and SupportStrategic & Tactical PlanningAlignment with academic/ business objectivesIncremental and distributed deploymentsContinuous cycles of reviews and improvementsCan only provide a 3000’ view of our ISMS activities in 45 minutes.It is all about governance –In the early stages of the GSU Information Security program ( ), a myriad of initiatives, processes (technology/people/processes) were introduced to the enterprise. The program evolved from reactive mode (chasing the threats and problems) to proactive (managing information security, large scale incident reductions, preventive and corrective actions). From late 2004 – 2006, the next phase of the program was a campus wide effort to comply with ISO (17799), through assessing the control objectives, individual controls and ensuring that GSU was either mitigating risk, accepting risk, transferring risk, or not affected…all of which had to be justified by top management and University IT department heads and managers.Finally, in 2007, our CIO JL Albert went forward in championing the initiative to get 2 areas of the University certified under ISO From Nov 2005 going forward, a major paradigm shift happened at GSU, when the Security Review policy was brought forward by JL to the President, and sanctioned/mandated security reviews on IT projects that cost over $ JL instituted an ITPR process which included a security review and approval as the final step in the process. This allowed Information Security to recommend controls and re-engineered processes that integrated information security into the departments’ business processes. The resultant effect has been that the university’s information security program is viewed as a business enabler, a change agent, and integral to the success of the University’s academic and business objectives.
3Strategic Choices Determine Our Direction… WHY develop a World-Class Information Security Management System (ISMS)?Critical success factorsUsing the ISO/IECOverview of ISO 27002Advantages of Using ISO 27001/27002Deming’s “Plan, Do, Check, Act” modelBuilding an Information Security Management SystemHOW DO I GET THERE??!WHICH ROAD DO I CHOOSE??!WHERE DO I WANT TO GO?Strategic planning ensures that University information security program objectives are met in a consistent, measureable, and cost effective manner. It provides an umbrella framework that allows for prioritization, gap analysis, metrics, and effective integration of security processes and solutions into the University’s infrastructure.At the strategic operational level, there is a consistent push each year to prioritize action items based on the results of targeted risk assessments, regulatory and policy implications and/or guidance, and University strategic academic and business goals.This all works behind the scenes to keep the information security program poised to take advantage of opportunities to integrate into business processes, influence decisions of top management about future directions of information technology, and build the perception that information security adds value to the overall enterprise.
4What a Long and Exhausting Road Trip! (Why Implement an ISMS?!) Protect the university’s reputationStop chasing compliance (with legal and contractual requirements)Ensure CIA (confidentiality, integrity, and availability) and reduce the chances of business disruptionsReduce exposure for illegal or malicious acts committed with the university's information technology resourcesEnsure effective control and continuous improvement of information securityImplement a comprehensive approach (far beyond technical sphere) –close the gapsMeeting between Mao and Dr. Kissinger – you have to sellSelling Points for Top Management –Protecting the university’s reputation.ComplianceMore robust and reliable infrastructure due to the reduction of business discontinuities that arise when security defenses are breached.Avoid liability for illegal or malicious acts committed with the university's computer or network resources.Selling Points for Key Enterprise Stakeholders –Protecting their department’s reputation.Understanding of Key Strategic and Business Goals –Business objectives and ISMS objectives should be aligned – not just CIA – privacy, nonrepudiation, transparency, ethics, democracy…Researcher example - Identity management/digital signatures/federation via smart card technologies
5Navigate Around Traffic Jams and Slow Downs (Critical Success Factors) Align your course in parallel with strategic information technology and business goals & objectivesProvide a good set of directions to your navigator (and convince him to drive)!Set realistic and attainable milestones upfront—and be prepared to handle obstaclesGet everyone traveling in the same directionAdvance your initiative down the road successfully through collaborations with key University stakeholdersAvoid accidents and dead ends! Continually work behind the scenes to promote the synergy of people, processes & technologyTop Management support is critical. At GSU, our CIO ‘sells’ our ISMS initiative to top management at the University (President, Provost, Deans, VP’s, etc.), while CISO and staff continually promote the concepts and initiatives to middle tier managers and below. All in all, without that level of support and participation that our CIO provides, the chances for success would measurably decrease. You’ve got to find a myriad of ways to demonstrate to your CIO/top management that information security governance is a top priority and critical to the success of your program and initiatives to protect confidential data.COMMUNICATE, COLLABORATE, AND CELEBRATE THE ACHIEVEMENT OF GOALS , SMALL OR LARGE, ALONG THE PATHWAYS TO YOUR FINAL DESTINATION!
6Chart a Course to Your Destination Using ISO/IEC 27001 and 27002 Requirements CertificationThis process involves the auditing of an ISO/IEC 27002:2005 compliant ISMS to the requirements of ISO/IEC 27001:2005.The ISMS will be audited by an accredited certification bodyUses the word “shall”.ISO/IEC 27002Code of Practice ComplianceUsers of the ISO/IEC framework need to carry out a risk assessment to identify which controls are relevant to their own business environment and implement them.The standard is also intended to provide a guide for the development of "organizational security standards and effective security management practices”Uses the word “should”.ISO CertificationThe ISO 27001: 2005 certification process is comprised of two steps, which at minimum provides one control into the organization, dependent of its size and its objectives concerning risk management (ISMS scope and limits).The first stage has as a goal the purpose of enabling auditors to understand how an ISMS is registered in the policy, and the risk management objectives of the organization. In this regard, the auditors will have knowledge of documents relating to the creation (definition of scope and limits, control objectives…) and ISMS implementation (assessment report, treatment plans…). An assessment report could be produced.The second stage will be to confirm that the organization, in the process of installing and improving its ISMS, acts in accordance with its policies, objectives, and business processes. It is based on the results of the first stage. This organizational audit will seek to confirm that ISMS complies with the requirements of the ISO 27001: 2005 standard. The auditors will obtain knowledge of the ISMS performance reports, its controls, procedures, and processes. A report audit will be produced, and the certification from the appreciation of certification chosen.The ISO 27001: 2005 certification requires 3 years (repeatable after audit) during which the organization receives monitoring control.Revised in 2005 and renamed in 2007, ISO is a guide of good practices for information security management which can represent an interest for any type of organization (companies, governmental bodies…) no matter its size or its branch of industry.This standard defines objectives and recommendations in terms of information security and its ambition is to answer global information security concerns in regards to the organizations total activities.
7Quick Overview of ISO 27002 Covers 11 information security ‘domains’: Information Security PolicyOrganization of information securityAsset ManagementHuman resource securityPhysical and environmental securityCommunication and operations managementAccess controlInformation systems acquisition, development and maintenanceInformation security incident managementBusiness continuity managementCompliance39 security objectives and a total of 133 separate controlsUsing its baseline security approach enables an enterprise to increase security levels using existing resources without additional costsComprehensive & holisticFavors incremental deployment of controlsControl Objectives (Annex A of ISO 27001)corresponding with the domains in ISO 27002, along with a description of controls:See
8Advantages of Using ISO 27001 A Framework which provides a structure that organizations can follow.Helps everyone to be “on the same page” because they can see what is expected.Information security best practicesAuditableFlexible and comprehensive ‘umbrella’ framework for your information security programIntegrated into ITIL v3 (ISO 20000)Same process approach as ISO 9000 Total Quality Management Series and ISO Service Management Process (Plan-Do-Check-Act)Using the ISO series to framework your information security program:Compatible with other standards and guidelinesAssists with complianceCustomizable—not a ‘one size fits all’ approachFavors incremental deployment of controlsAssists in integrating business requirements with IT and information security goals/objectivesHelps you to prioritize areas of greatest risk/needConsistent and measurable
9Plan-Do-Check-Act A ‘cycle’ of continuous review and improvements Plan—EstablishDo—Implement and OperateCheck—Monitor and ReviewAct—Maintain and ImproveThe use of the PDCA model not only assists in the development of a comprehensive and effective Information Security Management System—it also emphasizes development and improvement of policies, objectives, processes and procedures, routine reviews and continuous improvements
10PLAN Phase - Establish Your ISMS Define the Scope and Boundary of the ISMS.Define an ISMS Policy.Define the risk assessment approachIdentify, analyze and evaluate the risks to the assets identified in your scope and select risk treatment options.Select controls and control objectives, reasons for selection and prepare a Statement of Applicability.Obtain management approval of the proposed residual risks.Obtain management authorization to implement and operate ISMS.The Plan phaseThe plan phase represents the development of the information security management system framework and takes into account the characteristics of the organization (mission, location, assets, activities, corporate culture…) as well as any laws, regulations, and contractual obligations to which it is subjected.When the global framework of information security management is established, it must determine the specific settings of ISMS.Scope—definition is up to you—suggest you take an incremental approach of incorporating two or three areas of your campus such as Information Security, Finance, Alumni and focus on building the framework out before you add additional areas. Should be defined in terms of characteristics of the business: location, assets, technology, take into account interfaces and dependencies ISMS has with other parts of your campus that are not within the scope (HR, Legal, etc.), third parties your campus partners with (in Georgia, the Board of Regents supplies IT support and services to many of the USG campuses)Policy—Keep it clear and succinct; include scope and boundaries; provide management support and direction; set objectives; establish risk assessment criteriaRisk Assessment Approach—Up to you to choose the method that works best for your university—with expectation that results are comparable and reproducible
11DO Phase-Implement Your ISMS Formulate and implement your Risk Treatment Plan (RTP)Implement selected controls to meet your control objectivesDefine metrics to measure the effectiveness of your controlsImplement a training and awareness programManage operations in accordance with identified controls, policies and proceduresImplement procedures and controls to manage incidentsThe Do phaseThis step concerns the ISMS implementation and integration within the organization.In this regard, the fist step is the definition of a risk treatment plan, measure system, and efficiency assessment in regards to implemented controls.The measure and assessment system of controls efficiency should enable the production of reproducible and comparable results. This system should consider the rapport between control costs and their efficiency.The second step in the ISMS introduction phase is the implementation regarding the risk treatment plan containing the chosen controls and also a training program. A training program will ensure that individuals are skilled in order to carry out the tasks assigned to them. It also determines the necessary skills for the achievement of their tasks and if necessary to propose training and to evaluate this efficiency. The organization will keep an outline of competences and qualifications acquired.The last step concerns ISMS management and resource sufficiency.It is advisable to make sure that the ISMS established is compatible not only with identified controls but also with the policies and procedures selected. Moreover, in order to ensure the longevity of continuous improvement processes, the organization must identify and provide the necessary resources to introduce, review, maintain and improve the ISMS.
12CHECK Phase-Monitor and Review Your ISMS Execute monitoring and review procedures:Documentary evidence of monitoring such as logs, records, filesMeasure effectiveness (metrics)Review risk assessmentsConduct internal ISMS auditsManagement ReviewsUpdate Security PlansRecord actions and eventsThe Check phaseOpportunity to forge a partnership/collaborative working relationship with your internal auditors. We found that the following encouraged their active participation and interest:--Clearly defined objectives and goals--Attainable scope/certification timeframe--Automated process to audit ISMS that would save time and effort--Future state: demonstrated value of project in terms of time savings for auditors as we bring departments in under our project, all of the objective evidence will be within our automated system and our internal auditors, provisioned with accounts, will be able to examine a myriad of supporting documentation and processes that allow them to assess risk, compliance, controls, etc.Auditable requirements in ISO 27001:--Required processes:Document controlInternal auditsCorrective ActionsPreventive Actions--Required documentation:Statements of policy and objectivesScope and boundariesProcedures and controlsDescription of Risk Assessment MethodologyRisk Assessment Report and RTPMetricsObjective evidenceSOA
13ACT Phase-Maintain and Improve the ISMS Implement identified improvementsTake appropriate corrective and preventive actionsCommunicate actions & improvements to interested partiesEnsure improvements meet objectivesThe Act phaseThe Check phase should identify any necessary ISMS improvements in order to ensure that the information security risks are correctly managed. An organization must not only implement improvements but also preventive actions in order to anticipate all incapability’s between the different ISMS processes. In this regard, it must consider controls, processes, policies, and procedures already established in order to ensure that ISMS functions will work correctly.It is then necessary to communicate with key stakeholders in connection with actions and implemented improvements in order to preserve the dynamic of continuous improvement.Indeed, the success of this management’s information security approach depends on the full comprehension of ISMS components. Finally, as for each process or action, the organization should ensure, by means of assessment that the evaluation achieves its objectives. This measurement step will allow the documentation of the organization’s risk management progression.
14Tactical Actions Moving Us Closer to Our Destination… Annual Security Plan based on ISO 27002Risk ManagementAutomated Governance, Risk and Compliance (Proteus)Communicate/Cooperate/CollaborateDo You Have a Plan??!What Areas Pose the Greatest Risk??!Can We All Work Together?
15Annual Security Plan based on ISO (If You Don't Know Where You're Going, Any Road Will Get You There)Began in 2004 – First Plan was PainfulIncremental Approach– Requirements– Status of Security– Proposed Action ItemsPlan is a Moving Target – New Legislation, Standard, & Compliance RequirementsTool to Solicit/Incorporate FeedbackIf You Don't Know Where You're Going, Any Road Will Get You ThereIn December of 2004, we developed a holistic, comprehensive security plan based on ISO 17799—133 controls and 11 domain areasAs we developed the initial plan, we conducted a ‘state of security’ assessment in each domain area and developed action plans to address deficienciesWe modify our plan each year to incorporate changes in the ISO standard, as well as new requirements due to compliance legislation, university policies, risk analysesWe also develop action plans each year which lead to the addition of policies, procedures, and new solutions being layered into our security infrastructure
16Risk Assessments (Vote early and vote often) Risk Assessment Policy in 2005– Required in ISO 17799:2005 update– Approximately 50 Reviews/Year (and growing)A Lot of Benefits from Proactive Approach– More Secure/Robust Services– Found/Curtailed Some Craziness– The Auditor Effect– Foster/Strengthen Relationships & Understanding–Vote early and vote oftenGSU implemented a Risk Assessment policy in November of 2005 (as a byproduct of updated ISO 17799:2005 updates) – are conducting approximately 50 risk assessments per year – this proactive approach has yielded big dividendsNot just about recommending managerial and technical controls – have improved efficiencies via Risk Assessments (secure LDAP)Most nonconformities are a result of recommendations not being implemented or undue delay.High Risk – mitigation plan immediatelyMedium Risk – do it within one yearLow Risk – not going to worry about it
17Risk Management System (Trust But Verify) Trusted Third Party (Internal Audit) is Required– Ensures Controls Were Adequate/Commensurate– Ensures Controls Were Implemented in Timely MannerWe Must Continuously Reevaluate RiskWould rate GSU as a 2.5 out of 5 on the Capability Maturity Model.We just started having a third party (internal audit) following up on our High Risk projects to ensure that controls were adequate/commensurate with risk and that they were implemented in a timely manner – will be done before preassessment in December.ISO mandates that we reevaluate risk – lessons learned from shredders.We are migrating from NIST to BS :2005 for our Risk Assessments.NIST Special Publication , "Risk Management Guide for Information Technology Systems."BS :2005 Information security management systems. Guidelines for information security risk management".Internal auditors and BSI will keep everyone honest – what gets checked gets done
18Automated Governance, Risk and Compliance (Proteus) Online audit any part of your organization against any standardCreate an Information Security focused asset registerDefine roles with meaningDo business impact analysis simply & easilyIdentify the key services, assets & data which need Business Continuity or DRPerform Risk Assessments, simply & easilyIncident reporting with a differenceBuild a central policy registerHelps you plan your security investmentProvides you with a real time RiskViewOnline audit of external suppliers, saves time & moneyLinks assets to legislation/controlsRoles linked to controls/policy/proceduresQuick win, keeps risk business focusedReduce exposureReduces risks with countermeasuresInstantaneously sizes problemSupports the audit processSpend effectively & wiselyManage more effectively
19Some of the Benefits of Proteus “The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency.” - Bill GatesOne Repository for ISMS Materials - Policies, Procedures, Objective Evidence, Action Plans…Good Discretionary Access Control – Can Assign Access to Sites (Audit Points) – Centralized Control/Distributed AdministrationWorkflow Engine helps you collect information and stay in compliance
20Communicate/Cooperate/Collaborate Centralized Control/Distributed Administration Model – IntruShield IPS, ISS SiteProtector, Symantec System Center Console, Proteus, On Line Security Awareness Classes, PGP Full Disk Encryption...Hyper Communicate – Monthly ITSSS, NEO, Web Presence…It is all about Relationships! – Know/Trust/Like
21Governance TrainingBSI Americas Information Security Training – ISO 27001/ISMSHISP (Holistic Information Security Practitioner) Training/Certification
22References ISO/IEC 27001 standard BS 7799-3:2006 (Risk Mgt) BS (Business Continuity)BIP (ISMS Guidance Series from BSI)ISO/IEC standard(ISO/IEC 27001:2005 in plain English)(ISO/IEC 27002:2005 in plain English)
23Questions? Feel free to write us! Tammy Clark (email@example.com) William MonahanTCopyright Tammy L. Clark, October Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and with permission of author.Copyright Tammy Clark, May Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by pe