Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.

Similar presentations


Presentation on theme: "ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview."— Presentation transcript:

1 ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview ISMS Templates 69 Risks Identified 26 Risk Mitigations 7 Templates > 250 pages Password & Mobile Device Security SOPs Applicable Cyberlaw AGENDA

2 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 2 What is ISO/IEC 27001? INTERNATIONAL ISO/IEC STANDARD 27005 Information technology – Security Techniques – information security risk management ISO IEC INTERNATIONAL ISO/IEC STANDARD 27002 Information technology – Security Techniques – Code of practice for Information security management ISO IEC INTERNATIONAL ISO/IEC STANDARD 27001 Information technology – Security Techniques – information security Management systems - requirements ISO IEC ISO/IEC 27001 - gold standard guidance for information security management

3 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 3 What are Mobile Devices? Who uses them? Leverage ISO/IEC 27001 ISMS to address new information security risks created when workers use Mobile Devices around the world

4 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 4 New Risks Associated with Mobile Devices Small size -> easy to lose, easy to steal Bad mobile social media posts can ruin reputations, leak information, violate privacy and intellectual property laws… Malware downloaded from the cloud, communications networks, desktop synchronization and tainted storage media Spam Spyware can be used for electronic eavesdropping on phone calls, texts… Geotagging & location tracking allow the whereabouts of registered cell phones to be known and monitored Server-resident content such as email may expose sensitive information via server vulnerabilities

5 ISMS for Mobile Devices Page 5 Overview of ISMS Mobile 7 templates (>250 pages) per ISO/IEC 27001 Section 4.3 list of documents for robust security management, identification of risks & countermeasures, & support of ISMS certification: ISMS Mobile Policy (MS Word) ISMS Mobile Scope (MS Word) ISMS Mobile Project Plan (MS Project) ISMS Mobile Risk Assessment Methodology (MS Word) ISMS Mobile Risk Assessment (MS Excel) ISMS Mobile Risk Treatment Plan (MS Word) ISMS Mobile Statement of Applicability (SoA) (MS Word) Additional templates: ISMS Mobile Password Policy Template (MS Word) ISMS Mobile SOP - Mobile Device Security Template (MS Word) ISMS Mobile formally tested by an independent quality control specialist ISMS Mobile can jumpstart safeguarding mobile information for organizations

6 ISMS for Mobile Devices Page 6 Overview of ISMS Mobile ISMS Mobile templates are password protected files that can be downloaded from the ISMS Mobile website http://www.drdenenelson.com/ISMS-Template.htm

7 ISMS for Mobile Devices Page 7 Example from the ISMS Mobile Policy

8 ISMS for Mobile Devices Page 8 Risk Level: 1,2,3 Detectability: Low, Medium, High Risk Prioritization Risk Level Likelihood: Low, Medium, High Impact: Low, Medium, High ISMS Mobile Risk Evaluation

9 ISMS for Mobile Devices Page 9 Example from the ISMS Mobile Project Plan

10 ISMS for Mobile Devices Page 10 Example from the ISMS Mobile Risk Register

11 ISMS for Mobile Devices Page 11 Correlating Risk to Risk Treatment Ris k ID Risk Scenario (In order by Priority from High to Low) Likelihood (High 1.0, Medium 0.5 Low 0.1) Impact (High 100, Medium 50 Low 10) Clas s (1,2,3 ) Detecta bility (High 100, Mediu m 50, Low 10) Priorit y (High, Mediu m, Low) Risk Treatment 1 Mobile device victim of "hacking defaults" because the default settings were not changed 0.550210HighT1: Change Defaults ISMS Mobile Risk Register ISMS Mobile Risk Treatment Plan Find Risk Treatment Name & Number in Risk Treatment Column of Risk Register

12 ISMS for Mobile Devices Page 12 Example from the ISMS Mobile Statement of Applicability - Implemented

13 ISMS for Mobile Devices Page 13 Example from the ISMS Mobile Statement of Applicability – Outside Scope

14 ISMS for Mobile Devices Page 14 Special Strategies Used in ISMS Mobile Process used at NASA for safety-critical software was applied to security of mobile devices

15 ISMS for Mobile Devices Page 15 What is Included in ISMS for Mobile Devices 110 ISO/IEC 27001 Annex A Security Controls Investigated: 25 deemed out of ISMS Mobile project scope 85 security controls addressed 69 Risks Identified for Mobile Devices: 2 high priority 25 medium priority 42 low priority (but high impact should they occur) 26 Risk Treatments Devised & Justified (eg. cost vs. risk, already in use…) 2 Additional Templates: - ISMS Mobile Password Policy template - ISMS Mobile SOP - Mobile Devices Security template

16 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 16 Systems Security – 26 Risk Treatments for Mobile Devices – page 1 (Alphabetical Order) T1: Change Defaults T2: Disciplinary Action Procedure T3: Event Log T4: Forensics T5: Information Access Control Procedure T6: Mobile Malware Protection and Detection Software T7: Prevent Unauthorized Electronic Tracking T8: Prevention of Attagging T9: Prevention of Electronic Eavesdropping T10: Prevention of Jailbreaking T11: Prevention of Tapjacking (clickjacking) T12: Procedure for Lost or Stolen Mobile Device T13: Proper use of Geotagging

17 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 17 Systems Security – 26 Risk Treatments for Mobile Devices – page 2 T14: Retrieval of Information - Lost or Forgotten Passwords T15: Safeguarding Mobile Data T16: Secure Bluetooth T17: Secure Mobile Device Enterprise Server T18: Secure Wired Network T19: Secure Wireless Network Transactions T20: Securing Mobile Cloud Computing T21: Security Incident T22: Synchronization – ActiveSync T23: Synchronization Configuration T24: Synchronization - HotSync T25: Test Data Password Protected T26: Training for Mobile Social Media Usage (Alphabetical Order)

18 ISMS for Mobile Devices Page 18 Security Planning and Management Not always a 1-1 relationship between risks and countermeasures Security controls must be planned, implemented, tested, & monitored to ensure they protect data 1 SOP covers many risks 1 countermeasure for changing defaults required for many mobile devices

19 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 19 Applicable Cyberlaw, Regulations and Compliance – page 1 Cyberlaw struggles with privacy concepts such as when the needs of the many supercede the rights of the individual, for example: ECPA Section 2709 allows FBI to issue National Security Letters to ISPs ordering disclosure of customer records (Electronic Communications Privacy Act of 1986, 2012) In the USA, laws are specific to certain industries, for example: FISMA - Federal Information Systems Management Act of 2002 Graham-Leach-Bliley Act – personal financial security (Graham-Leach-Bliley Act, 2012) HIPAA - privacy of health data (Health Insurance Portability and Accountability Act, 2012) Sarbanes-Oxley Act of 2002 (SOX) – public financial security (Sarbanes-Oxley Act, 2012)

20 ISMS for Mobile Devices Page 20 Applicable Cyberlaw, Regulations and Compliance – page 2 ISO/IEC 27001 (ISMS) ISO/IEC 27002 (Security Controls) ISO/IEC 27005 - Information Security Risk Management NIST Guidelines on Mobile Security NIST Guidelines on PDA Forensics NIST National Vulnerability Database Generally Accepted Information Security Principles Guidelines Used for ISMS Mobile:

21 ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 21 Electronic Communications Privacy Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act. Federal Information Security Management Act of 2002. (2012). Retrieved from http://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002. GAISP. (2004). Generally Accepted Information Security Principles. Retrieved from http://all.net/books/standards/GAISP-v30.pdf. Graham-Leach-Bliley Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Blilehttp://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act. Health Insurance Portability and Accountability Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act. ISO/IEC 27001. (2005). Information Technology — Security Techniques — Information Security Management Systems – Requirements. Retrieved from http://www.iso27001security.com/html/27001.html ISO/IEC 27005. (2012). Information Technology — Security Techniques — Information Security Risk Management (Second Edition). Retrieved from http://www.iso27001security.com/html/27005.html NIST SP 800-30. (2002). Risk Management Guide for Information Technology Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdfhttp://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf Sarbanes–Oxley Act. (2012). Retrieved from http://en.wikipedia.org/wiki/Sarbanes%E2%80%93Oxley_Act.a References


Download ppt "ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview."

Similar presentations


Ads by Google