Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tammy Clark, Chief Information Security Officer,

Similar presentations

Presentation on theme: "Tammy Clark, Chief Information Security Officer,"— Presentation transcript:

1 GSU's Roadmap for a World-Class Information Security Management System– ISO/IEC 27001:2005
Tammy Clark, Chief Information Security Officer, William Monahan, Lead Information Security Administrator “You will now have a starting place and a destination, and you will be able to determine what it will cost you to get there. You will be going someplace.” H. Stanley Judd Background: GSU is located in downtown Atlanta – approximately 27,000 students (undergraduate & graduate) - second largest university in Georgia. CIO – JL Albert Information Security Program – Tammy Clark (CISO), William Monahan (Information Security Lead Admin), Miss Nancy Chang (Information Security Intermediate). Started aligning the university’s security plan with ISO (now ISO 27002) in September of 2004 (what the standard says – current state of security– strategic & tactical goals) – incrementally have addressed the 133 controls (risk assessments, data classification, incident response, security awareness training…) – taking it to the next level with ISO ((ISMS) = controls + governance))

2 GSU’s Information Security Roadmap
JL Albert’s (CIO) Vision and Support Strategic & Tactical Planning Alignment with academic/ business objectives Incremental and distributed deployments Continuous cycles of reviews and improvements Can only provide a 3000’ view of our ISMS activities in 45 minutes. It is all about governance – In the early stages of the GSU Information Security program ( ), a myriad of initiatives, processes (technology/people/processes) were introduced to the enterprise. The program evolved from reactive mode (chasing the threats and problems) to proactive (managing information security, large scale incident reductions, preventive and corrective actions). From late 2004 – 2006, the next phase of the program was a campus wide effort to comply with ISO (17799), through assessing the control objectives, individual controls and ensuring that GSU was either mitigating risk, accepting risk, transferring risk, or not affected…all of which had to be justified by top management and University IT department heads and managers. Finally, in 2007, our CIO JL Albert went forward in championing the initiative to get 2 areas of the University certified under ISO From Nov 2005 going forward, a major paradigm shift happened at GSU, when the Security Review policy was brought forward by JL to the President, and sanctioned/mandated security reviews on IT projects that cost over $ JL instituted an ITPR process which included a security review and approval as the final step in the process. This allowed Information Security to recommend controls and re-engineered processes that integrated information security into the departments’ business processes. The resultant effect has been that the university’s information security program is viewed as a business enabler, a change agent, and integral to the success of the University’s academic and business objectives.

3 Strategic Choices Determine Our Direction…
WHY develop a World-Class Information Security Management System (ISMS)? Critical success factors Using the ISO/IEC Overview of ISO 27002 Advantages of Using ISO 27001/27002 Deming’s “Plan, Do, Check, Act” model Building an Information Security Management System HOW DO I GET THERE??! WHICH ROAD DO I CHOOSE??! WHERE DO I WANT TO GO? Strategic planning ensures that University information security program objectives are met in a consistent, measureable, and cost effective manner. It provides an umbrella framework that allows for prioritization, gap analysis, metrics, and effective integration of security processes and solutions into the University’s infrastructure. At the strategic operational level, there is a consistent push each year to prioritize action items based on the results of targeted risk assessments, regulatory and policy implications and/or guidance, and University strategic academic and business goals. This all works behind the scenes to keep the information security program poised to take advantage of opportunities to integrate into business processes, influence decisions of top management about future directions of information technology, and build the perception that information security adds value to the overall enterprise.

4 What a Long and Exhausting Road Trip! (Why Implement an ISMS?!)
Protect the university’s reputation Stop chasing compliance (with legal and contractual requirements) Ensure CIA (confidentiality, integrity, and availability) and reduce the chances of business disruptions Reduce exposure for illegal or malicious acts committed with the university's information technology resources Ensure effective control and continuous improvement of information security Implement a comprehensive approach (far beyond technical sphere) –close the gaps Meeting between Mao and Dr. Kissinger – you have to sell Selling Points for Top Management – Protecting the university’s reputation. Compliance More robust and reliable infrastructure due to the reduction of business discontinuities that arise when security defenses are breached. Avoid liability for illegal or malicious acts committed with the university's computer or network resources. Selling Points for Key Enterprise Stakeholders – Protecting their department’s reputation. Understanding of Key Strategic and Business Goals – Business objectives and ISMS objectives should be aligned – not just CIA – privacy, nonrepudiation, transparency, ethics, democracy… Researcher example - Identity management/digital signatures/federation via smart card technologies

5 Navigate Around Traffic Jams and Slow Downs (Critical Success Factors)
Align your course in parallel with strategic information technology and business goals & objectives Provide a good set of directions to your navigator (and convince him to drive)! Set realistic and attainable milestones upfront—and be prepared to handle obstacles Get everyone traveling in the same direction Advance your initiative down the road successfully through collaborations with key University stakeholders Avoid accidents and dead ends! Continually work behind the scenes to promote the synergy of people, processes & technology Top Management support is critical. At GSU, our CIO ‘sells’ our ISMS initiative to top management at the University (President, Provost, Deans, VP’s, etc.), while CISO and staff continually promote the concepts and initiatives to middle tier managers and below. All in all, without that level of support and participation that our CIO provides, the chances for success would measurably decrease. You’ve got to find a myriad of ways to demonstrate to your CIO/top management that information security governance is a top priority and critical to the success of your program and initiatives to protect confidential data. COMMUNICATE, COLLABORATE, AND CELEBRATE THE ACHIEVEMENT OF GOALS , SMALL OR LARGE, ALONG THE PATHWAYS TO YOUR FINAL DESTINATION!

6 Chart a Course to Your Destination Using ISO/IEC 27001 and 27002
Requirements Certification This process involves the auditing of an ISO/IEC 27002:2005 compliant ISMS to the requirements of ISO/IEC 27001:2005. The ISMS will be audited by an accredited certification body Uses the word “shall”. ISO/IEC 27002 Code of Practice Compliance Users of the ISO/IEC framework need to carry out a risk assessment to identify which controls are relevant to their own business environment and implement them. The standard is also intended to provide a guide for the development of "organizational security standards and effective security management practices” Uses the word “should”. ISO Certification The ISO 27001: 2005 certification process is comprised of two steps, which at minimum provides one control into the organization, dependent of its size and its objectives concerning risk management (ISMS scope and limits). The first stage has as a goal the purpose of enabling auditors to understand how an ISMS is registered in the policy, and the risk management objectives of the organization. In this regard, the auditors will have knowledge of documents relating to the creation (definition of scope and limits, control objectives…) and ISMS implementation (assessment report, treatment plans…). An assessment report could be produced. The second stage will be to confirm that the organization, in the process of installing and improving its ISMS, acts in accordance with its policies, objectives, and business processes. It is based on the results of the first stage. This organizational audit will seek to confirm that ISMS complies with the requirements of the ISO 27001: 2005 standard. The auditors will obtain knowledge of the ISMS performance reports, its controls, procedures, and processes. A report audit will be produced, and the certification from the appreciation of certification chosen. The ISO 27001: 2005 certification requires 3 years (repeatable after audit) during which the organization receives monitoring control. Revised in 2005 and renamed in 2007, ISO is a guide of good practices for information security management which can represent an interest for any type of organization (companies, governmental bodies…) no matter its size or its branch of industry. This standard defines objectives and recommendations in terms of information security and its ambition is to answer global information security concerns in regards to the organizations total activities.

7 Quick Overview of ISO 27002 Covers 11 information security ‘domains’:
Information Security Policy Organization of information security Asset Management Human resource security Physical and environmental security Communication and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business continuity management Compliance 39 security objectives and a total of 133 separate controls Using its baseline security approach enables an enterprise to increase security levels using existing resources without additional costs Comprehensive & holistic Favors incremental deployment of controls Control Objectives (Annex A of ISO 27001)corresponding with the domains in ISO 27002, along with a description of controls: See

8 Advantages of Using ISO 27001
A Framework which provides a structure that organizations can follow. Helps everyone to be “on the same page” because they can see what is expected. Information security best practices Auditable Flexible and comprehensive ‘umbrella’ framework for your information security program Integrated into ITIL v3 (ISO 20000) Same process approach as ISO 9000 Total Quality Management Series and ISO Service Management Process (Plan-Do-Check-Act) Using the ISO series to framework your information security program: Compatible with other standards and guidelines Assists with compliance Customizable—not a ‘one size fits all’ approach Favors incremental deployment of controls Assists in integrating business requirements with IT and information security goals/objectives Helps you to prioritize areas of greatest risk/need Consistent and measurable

9 Plan-Do-Check-Act A ‘cycle’ of continuous review and improvements
Plan—Establish Do—Implement and Operate Check—Monitor and Review Act—Maintain and Improve The use of the PDCA model not only assists in the development of a comprehensive and effective Information Security Management System—it also emphasizes development and improvement of policies, objectives, processes and procedures, routine reviews and continuous improvements

10 PLAN Phase - Establish Your ISMS
Define the Scope and Boundary of the ISMS. Define an ISMS Policy. Define the risk assessment approach Identify, analyze and evaluate the risks to the assets identified in your scope and select risk treatment options. Select controls and control objectives, reasons for selection and prepare a Statement of Applicability. Obtain management approval of the proposed residual risks. Obtain management authorization to implement and operate ISMS. The Plan phase The plan phase represents the development of the information security management system framework and takes into account the characteristics of the organization (mission, location, assets, activities, corporate culture…) as well as any laws, regulations, and contractual obligations to which it is subjected. When the global framework of information security management is established, it must determine the specific settings of ISMS. Scope—definition is up to you—suggest you take an incremental approach of incorporating two or three areas of your campus such as Information Security, Finance, Alumni and focus on building the framework out before you add additional areas. Should be defined in terms of characteristics of the business: location, assets, technology, take into account interfaces and dependencies ISMS has with other parts of your campus that are not within the scope (HR, Legal, etc.), third parties your campus partners with (in Georgia, the Board of Regents supplies IT support and services to many of the USG campuses) Policy—Keep it clear and succinct; include scope and boundaries; provide management support and direction; set objectives; establish risk assessment criteria Risk Assessment Approach—Up to you to choose the method that works best for your university—with expectation that results are comparable and reproducible

11 DO Phase-Implement Your ISMS
Formulate and implement your Risk Treatment Plan (RTP) Implement selected controls to meet your control objectives Define metrics to measure the effectiveness of your controls Implement a training and awareness program Manage operations in accordance with identified controls, policies and procedures Implement procedures and controls to manage incidents The Do phase This step concerns the ISMS implementation and integration within the organization. In this regard, the fist step is the definition of a risk treatment plan, measure system, and efficiency assessment in regards to implemented controls. The measure and assessment system of controls efficiency should enable the production of reproducible and comparable results. This system should consider the rapport between control costs and their efficiency. The second step in the ISMS introduction phase is the implementation regarding the risk treatment plan containing the chosen controls and also a training program. A training program will ensure that individuals are skilled in order to carry out the tasks assigned to them. It also determines the necessary skills for the achievement of their tasks and if necessary to propose training and to evaluate this efficiency. The organization will keep an outline of competences and qualifications acquired. The last step concerns ISMS management and resource sufficiency. It is advisable to make sure that the ISMS established is compatible not only with identified controls but also with the policies and procedures selected. Moreover, in order to ensure the longevity of continuous improvement processes, the organization must identify and provide the necessary resources to introduce, review, maintain and improve the ISMS.

12 CHECK Phase-Monitor and Review Your ISMS
Execute monitoring and review procedures: Documentary evidence of monitoring such as logs, records, files Measure effectiveness (metrics) Review risk assessments Conduct internal ISMS audits Management Reviews Update Security Plans Record actions and events The Check phase Opportunity to forge a partnership/collaborative working relationship with your internal auditors. We found that the following encouraged their active participation and interest: --Clearly defined objectives and goals --Attainable scope/certification timeframe --Automated process to audit ISMS that would save time and effort --Future state: demonstrated value of project in terms of time savings for auditors as we bring departments in under our project, all of the objective evidence will be within our automated system and our internal auditors, provisioned with accounts, will be able to examine a myriad of supporting documentation and processes that allow them to assess risk, compliance, controls, etc. Auditable requirements in ISO 27001: --Required processes: Document control Internal audits Corrective Actions Preventive Actions --Required documentation: Statements of policy and objectives Scope and boundaries Procedures and controls Description of Risk Assessment Methodology Risk Assessment Report and RTP Metrics Objective evidence SOA

13 ACT Phase-Maintain and Improve the ISMS
Implement identified improvements Take appropriate corrective and preventive actions Communicate actions & improvements to interested parties Ensure improvements meet objectives The Act phase The Check phase should identify any necessary ISMS improvements in order to ensure that the information security risks are correctly managed. An organization must not only implement improvements but also preventive actions in order to anticipate all incapability’s between the different ISMS processes. In this regard, it must consider controls, processes, policies, and procedures already established in order to ensure that ISMS functions will work correctly. It is then necessary to communicate with key stakeholders in connection with actions and implemented improvements in order to preserve the dynamic of continuous improvement. Indeed, the success of this management’s information security approach depends on the full comprehension of ISMS components. Finally, as for each process or action, the organization should ensure, by means of assessment that the evaluation achieves its objectives. This measurement step will allow the documentation of the organization’s risk management progression.

14 Tactical Actions Moving Us Closer to Our Destination…
Annual Security Plan based on ISO 27002 Risk Management Automated Governance, Risk and Compliance (Proteus) Communicate/Cooperate/ Collaborate Do You Have a Plan??! What Areas Pose the Greatest Risk??! Can We All Work Together?

15 Annual Security Plan based on ISO (If You Don't Know Where You're Going, Any Road Will Get You There) Began in 2004 – First Plan was Painful Incremental Approach – Requirements – Status of Security – Proposed Action Items Plan is a Moving Target – New Legislation, Standard, & Compliance Requirements Tool to Solicit/Incorporate Feedback If You Don't Know Where You're Going, Any Road Will Get You There In December of 2004, we developed a holistic, comprehensive security plan based on ISO 17799—133 controls and 11 domain areas As we developed the initial plan, we conducted a ‘state of security’ assessment in each domain area and developed action plans to address deficiencies We modify our plan each year to incorporate changes in the ISO standard, as well as new requirements due to compliance legislation, university policies, risk analyses We also develop action plans each year which lead to the addition of policies, procedures, and new solutions being layered into our security infrastructure

16 Risk Assessments (Vote early and vote often)
Risk Assessment Policy in 2005 – Required in ISO 17799:2005 update – Approximately 50 Reviews/Year (and growing) A Lot of Benefits from Proactive Approach – More Secure/Robust Services – Found/Curtailed Some Craziness – The Auditor Effect – Foster/Strengthen Relationships & Understanding Vote early and vote often GSU implemented a Risk Assessment policy in November of 2005 (as a byproduct of updated ISO 17799:2005 updates) – are conducting approximately 50 risk assessments per year – this proactive approach has yielded big dividends Not just about recommending managerial and technical controls – have improved efficiencies via Risk Assessments (secure LDAP) Most nonconformities are a result of recommendations not being implemented or undue delay. High Risk – mitigation plan immediately Medium Risk – do it within one year Low Risk – not going to worry about it

17 Risk Management System (Trust But Verify)
Trusted Third Party (Internal Audit) is Required – Ensures Controls Were Adequate/Commensurate – Ensures Controls Were Implemented in Timely Manner We Must Continuously Reevaluate Risk Would rate GSU as a 2.5 out of 5 on the Capability Maturity Model. We just started having a third party (internal audit) following up on our High Risk projects to ensure that controls were adequate/commensurate with risk and that they were implemented in a timely manner – will be done before preassessment in December. ISO mandates that we reevaluate risk – lessons learned from shredders. We are migrating from NIST to BS :2005 for our Risk Assessments. NIST Special Publication , "Risk Management Guide for Information Technology Systems." BS :2005 Information security management systems. Guidelines for information security risk management". Internal auditors and BSI will keep everyone honest – what gets checked gets done

18 Automated Governance, Risk and Compliance (Proteus)
Online audit any part of your organization against any standard Create an Information Security focused asset register Define roles with meaning Do business impact analysis simply & easily Identify the key services, assets & data which need Business Continuity or DR Perform Risk Assessments, simply & easily Incident reporting with a difference Build a central policy register Helps you plan your security investment Provides you with a real time RiskView Online audit of external suppliers, saves time & money Links assets to legislation/controls Roles linked to controls/policy/procedures Quick win, keeps risk business focused Reduce exposure Reduces risks with countermeasures Instantaneously sizes problem Supports the audit process Spend effectively & wisely Manage more effectively

19 Some of the Benefits of Proteus “The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency.” - Bill Gates One Repository for ISMS Materials - Policies, Procedures, Objective Evidence, Action Plans… Good Discretionary Access Control – Can Assign Access to Sites (Audit Points) – Centralized Control/Distributed Administration Workflow Engine helps you collect information and stay in compliance

20 Communicate/Cooperate/Collaborate
Centralized Control/Distributed Administration Model – IntruShield IPS, ISS SiteProtector, Symantec System Center Console, Proteus, On Line Security Awareness Classes, PGP Full Disk Encryption... Hyper Communicate – Monthly ITSSS, NEO, Web Presence… It is all about Relationships! – Know/Trust/Like

21 Governance Training BSI Americas Information Security Training – ISO 27001/ISMS HISP (Holistic Information Security Practitioner) Training/Certification

22 References ISO/IEC 27001 standard BS 7799-3:2006 (Risk Mgt)
BS (Business Continuity) BIP (ISMS Guidance Series from BSI) ISO/IEC standard (ISO/IEC 27001:2005 in plain English) (ISO/IEC 27002:2005 in plain English)

23 Questions? Feel free to write us! Tammy Clark (
William Monahan T Copyright Tammy L. Clark, October Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and with permission of author. Copyright Tammy Clark, May Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by pe

Download ppt "Tammy Clark, Chief Information Security Officer,"

Similar presentations

Ads by Google