IT Security Policy: Case Study March 2008 Copyright 2000-2008, All Rights Reserved.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Security Controls – What Works
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security: Principles and Practice
Factors to be taken into account when designing ICT Security Policies
Introduction to PCI DSS
Session 3 – Information Security Policies
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
MnSCU Audit Reports Presentation to the MnSCU Audit Committee Office of the Legislative Auditor September 21, 2004.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
Enforcing Concurrent Logon Policies with UserLock.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Scott Charney Cybercrime and Risk Management PwC.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Role Of Network IDS in Network Perimeter Defense.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Introduction to PCI DSS
Performing Risk Analysis and Testing: Outsource or In-house
Risk management.
CompTIA Security+ SY0-401 Real Exam Question Answer
Secure Software Confidentiality Integrity Data Security Authentication
Leverage What’s Out There
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved

Overview Policy Examples Case Study IT Security Policy Case Study

Overview Selected IT Security Policy Examples University of California - Berkeley SANS Institute

IT Security Policy Case Study UC – Berkeley IT Security Policy “Each member of the campus community is responsible for the security and protection of electronic information resources over which he or she has control. Resources to be protected include networks, computers, software, and data. The physical and logical integrity of these resources must be protected against threats such as unauthorized intrusions, malicious misuse, or inadvertent compromise. Activities outsourced to off- campus entities must comply with the same security requirements as in-house activities.”

IT Security Policy Case Study UC – Berkeley IT Security Policy “Logical Security: Computers must have the most recently available and appropriate software security patches, commensurate with the identified level of acceptable risk. For example, installations that allow unrestricted access to resources must be configured with extra care to minimize security risks.” Physical Security: Appropriate controls must be employed to protect physical access to resources, commensurate with the identified level of acceptable risk. These may range in scope and complexity from extensive security installations to protect a room or facility where server machines are located, to simple measures taken to protect a User's display screen.

IT Security Policy Case Study UC – Berkeley IT Security Policy “Roles and Responsibilities: Responsibilities range in scope from security controls administration for a large system to the protection of one's own access password. A particular individual often has more than one role.” Administrative Officials Providers Users

IT Security Policy Case Study SANS Institute – Policy Template

IT Security Policy Case Study SANS Institute – Policy Template

IT Security Policy Case Study SANS Institute – Policy Template

IT Security Policy Case Study SANS Institute – Policy Template

IT Security Policy Case Study SANS Institute – Policy Template

IT Security Policy Case Study Case Study – Financial Institution A financial services company maintains several physical offices, including a facility in Europe that houses servers and data entry terminals for processing of electronic funds transfers and issuance of credit cards. Initial contact is due to a desire to improve security for the facility, with a focus on securing servers and workstations. No known exploitation of security vulnerabilities at this time. Security audit indicates numerous problems with administration of systems, including no security policy, poor handling of paper records, inadequate physical security, obsolete and unsupported systems. No detection of abnormal activity within the company’s IT systems at this time.

IT Security Policy Case Study Case Study – Financial Institution The company receives the results of the audit along with recommendations for upgrading systems, improving architecture, improving records handling, and upgrading physical security. The company hires an independent contractor to design and implement a solution based around the recommendations. An intermediate audit is conducted, approximately half way through completion of the project. Some previous problems still exist, new problems are transient effects from the upgrade process, all known issues are addressed or in the process of being addressed. One new recommendation: have the contractor performing the upgrades provide systems management and security management training courses for company IT admins.

IT Security Policy Case Study Case Study – Financial Institution System upgrade and security system upgrade completed. A second auditing firm is brought in to conduct an audit of the systems and certify compliance with industry best practices, independent of the initial audit company and the contractor that designed and installed the new systems. No significant problems are detected Security policies are well defined and implemented All systems are fully patched, with appropriate access controls All activity on the networks is monitored and logged Firewalls are hardened and correctly configured Intrusion detection systems are installed and configured Physical security is improved Administrators are trained to manage and monitor the servers Final Audit Review states “Excellent design and implementation, no significant issues detected.”

IT Security Policy Case Study Case Study – Financial Institution Later: Administrators at the company decide to improve security by installing new security software on their workstations and servers. Installation of the product chosen breaks connectivity between mission critical systems. Transactions fail to clear, company loses millions in customer fees in a single day. Unable to implement their desired change, the company turns to the original auditing firm to re-examine their systems and perform the desired installation of security software.

IT Security Policy Case Study Case Study – Financial Institution Audit reveals penetration of the company’s network, and complete compromise of all servers and workstations, including intrusion detection systems and firewalls. Probable point of entry was an employee’s workstation, due to unsafe web surfing or opening spam . Compromise of the network and security appliances spread due to weak passwords among general employees and some administrators, and storage of administrative passwords for security appliances on the desktop of admin workstations in unencrypted files.

IT Security Policy Case Study Case Study – Financial Institution Detection of the intrusion and compromise of systems went unnoticed despite the intrusion detection system and logging. Administrators were convinced that the network was a hard target and failed to monitor the intrusion detection system or examine activity logs. This lax approach due to an exaggerated sense of their security precautions also created the conditions in which weak passwords were allowed, and critical passwords were not protected in the event of a single compromised system.