Managing a “Data Spill”

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

How to Manage a Contamination Incident Defense Security Service Carolyn Shugart Information Technology Specialist Standards & Quality Branch.
Managing a “Data Spill” Corrie Velez Technical Security Orlando, Florida March 14, 2012.
Section Six: Foreign Ownership, Control, or Influence (FOCI)
What’s the path to a SSP? Information System Profile Contractor: Lockheed Martin, Missiles and Fire Control Address: 1701 W. Marshall Dr. Grand Prairie,
1 © Jetico, Inc. Oy Military-Standard Data Protection Software Customer Challenges with Classified Data Spills.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Chapter 5: Asset Classification
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
Information Systems Security Officer
Florida Industrial Security Workgroup Self-Inspections What are Self-Inspections Why should Self-Inspections be conducted When should Self-Inspections.
Security Policies Group 1 - Week 8 policy for use of technology.
Network security policy: best practices
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Unit Introduction and Overview
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Incident Reporting Procedure
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Basics of OHSAS Occupational Health & Safety Management System
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
MARKING CLASSIFIED MATERIAL
1. Objectives  Describe the responsibilities and procedures for reporting and investigating ◦ incidents / near-miss incidents ◦ spills, releases, ◦ injuries,
Unit 5.6 Evidence and Sampling.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Developing Plans and Procedures
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Administrative Inquiries
ISO/IEC 27001:2013 Annex A.8 Asset management
1 Role of the Data Protection Officer Donald Henderson Information Compliance Manager 30 September 2010.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Written Hazard Communication Program What are the requirements.
Disaster Recovery 2015 Indiana Statewide Payroll Conference Michael Ievoli-Client Support Specialist IV, Major Accounts September 16, 2015 Copyright ©
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Information Management and the Departing Employee.
Business Continuity Planning 101
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
Incident Reporting And Investigation Program
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Managing a Security Container
practice-questions.html If you Are Thinking about your dumps? Introduction:
Derivative Classification Overview
Reporting personal data breaches to the ICO
Red Flags Rule An Introduction County College of Morris
Incident Reporting And Investigation Program
Emergency Planning Steps
Developing and testing the Plan
County Wide Safety Program
HQ Expectations of DOE Site IRBs
Presentation transcript:

Managing a “Data Spill” Florida Industrial Security Working Group (FISWG) 2015 Fall Training Session Orlando, Florida September 24, 2015 Presented by: Randy Riley Lockheed Martin Missiles and Fire Control

Objectives We will Review and Discuss A description or definition of a classified data spill Some common causes of data spills Personnel responsibilities Facility reporting requirements Incident response plans Additional spill cleanup considerations The “Final Report,” or administrative inquiry 2

What is a Classified Data Spill? A “spill” is classified data introduced onto a system operating at a lower classification level. The most common spill scenario is classified data introduced onto an unclassified system. A spill is also referred to as a contamination or classified message incident. SECRET Unclassified 3 Ref: DSS ISFO Process Man Rev 3.2 4.5.1 (p. 43)

Some Common Causes of Spills Not following procedures Didn’t understand requirements Inadequate SME data review Data received from outside source (i.e. email, CD/DVD) Compilation of data Other examples? 4

Ref: DSS ISFO Process Man Rev 3.2 4.5.5 (p. 47) When a Spill Occurs All personnel involved should Immediately open lines of communication Participate in, and support, response efforts Not delete data until instructed to do so Assess risk and follow data owner (customer) guidelines and/or approved procedures Assign cleared people to assist with cleanup 5 Ref: DSS ISFO Process Man Rev 3.2 4.5.5 (p. 47)

ISSM/ISSO Responsibilities Assess extent of spill and plan cleanup actions Isolate the spill to prevent contamination spread Confiscate and protect affected PEDs Ensure personnel with appropriate clearance conduct spill cleanup Contact GCA for spill clean up guidance and/or to obtain concurrence with contractors’ existing procedures Report findings and description of cleanup actions through the FSO 6 Ref: DSS ISFO Process Man Rev 3.2 4.5.5 (p. 47)

Ref: DSS ISFO Process Man Rev 3.2 4.5.5 (p. 47) FSO Responsibilities Notify government agencies as required Determine the classification level of data Identify individuals and communication channels involved in the spill Act as incident lead for multi-site spills originating from local facility Other actions depending upon situation and guidance received 7 Ref: DSS ISFO Process Man Rev 3.2 4.5.5 (p. 47)

Where to begin? Determine scope of spill, classification level, and enough detail to make an initial report Assemble the (cleared) response team Protect all contaminated equipment Prevent access by unauthorized personnel

Loss, Compromise, or Suspected Compromise Loss: material can’t be located within a reasonable period of time Compromise: disclosure to unauthorized person(s) Suspected compromise: disclosure can’t reasonably be precluded or ruled out 9

Preliminary Inquiry Conducted Immediately Determine Who, What, Where, Why, and How Did a loss, compromise, or suspected compromise occur? - if yes, prepare an initial report If no loss/compromise occurred - document the incident and close the report - discuss with DSS ISR What happened? NISPOM 1-303

Initial Report Timeline for Initial Report Top Secret: 24 hours Secret / Confidential: 72 hours Use secure communication channel if available Including details such as spill location and classification level will make the report classified “Confidential!” 11

Requirements DoD 5220.22-M, NISPOM 1-303, Reports of Loss, Compromise, or Suspected Compromise ISFO Process Manual Rev. 3.2 (p. 47) Job Aid: http://www.dss.mil/documents/cdse/ai-job-aid-for-industry.pdf 12

What to expect from DSS Guidance (if needed) to prevent spread to other systems Review of actions taken (or planned) to help ensure contaminated systems are properly cleaned Questions to help guide the entire process to proper closure 2

Incident Response Plans Prepared in advance, before an incident Provides a roadmap to follow when responding to incidents such as spills Meets unique organizational requirements Defines incidents, resources, and support May be pre-approved by Data Owners, Customers, and/or DSS Ref: ISFO Process Manual, Rev 3.2, (p. 44) 14

Utilize Available Checklists Review information contained in the ISFO ODAA Process Manual…and be familiar with it! Some Data Owners / customers may provide specific guidance / checklists to be used 2

Many Spills Involve Email What type of email system is involved? Are the System Administrators cleared? Where may backup copies of email be stored? MS Exchange deleted item recovery Offline storage and PSTs Other examples? Is my email system hosted internally, or by a third party outside of the company? Internal systems are under complete control of facility May not want to notify third-party companies of spills 16 5

Other Information to Consider What platforms and O/S’ are involved? Are there any remote dial-ins/vpns? Are there any other network connections? How was the file or e-mail received and where was it placed or copied to? Was the file or email deleted by the recipient? Is RAID storage technology involved? Identities of personnel involved and clearance levels of those individuals. Was the information forwarded to others? 17 5

Preparing to Clean Up the Spill Overwrite utilities are typically used to “clean up” the spill on desktop and server magnetic media by overwriting the storage location Not considered the same thing as sanitizing a classified hard drive (like we did in the “old days”) May not be used some systems (i.e. email servers) that automatically reclaim/overwrite space after deletions Identify/acquire approved media overwrite utilities to clean the suspect data from systems Contact your DSS ISSP or the Gov’t Customer for assistance if needed Examples of Utilities Unishred Pro 3.3.1 (EAL1) BCWipe Total WipeOut White Canyon Wipe Drive (EAL4)

Cleaning Up the Spill Follow your incident response plan or other “pre-approved” procedure for spill cleanup Utilize appropriate cleanup methods for the media involved in the incident Approved overwrite utility based on media type In some cases, destruction may be necessary Third-party service providers may complicate matters Should external providers be contacted? Will the provider allow cleared employees access to clean up the spill? Can the spill be eradicated from a “cloud” environment?

Prepare the Final Report After spill clean up actions are completed. Assist with information needed for damage assessment if requested Details of what, who when, why, how, etc Culpability determination and other adverse history for personnel Were the responsible individuals disciplined or retrained? Due within 15 days of initial notification Don’t forget to include a mention of GCA or Data Owner notification and response received

Sample Administrative Inquiry 21 NISPOM Para 8-103b,c

Summary We Reviewed and Discussed The description or definition of a classified data spill Some common causes of data spills Personnel responsibilities during a spill Facility reporting requirements for spills Incident response plans Additional spill cleanup considerations The “Final Report,” or administrative inquiry