02 Administrative Network Security Flashcards
Why organizations need compliance:
- Improves Security
- Minimizes Losses
- Maintain trust
Regulatory Frameworks:
- HIPPA
- Sarbanes Oxley Act (SOX)
- FISMA
- GLBA
- PCI-DSS
HIPPA:
Health insurance portability and accountability act (HIPPA): doctor’s office, insurance companies, business associates, and employers
SOX:
Sarbanes Oxley Act (SOX): US Public company boards, management, and public accounting firms
SOX Section 302:
- A mandate that requires senior management to certify the accuracy of the reported financial statement.
- CEOS and CFOs of accounting company’s clients must sign statements verifying the completeness and accuracy of the financial reports.
SOX Section 404:
- A requirement that management and auditors establish internal controls and reporting methods on the adequacy of those controls.
- CEOS, CFPs and auditors must report on and attest to the effectiveness of internal controls for financial reporting.
FISMA:
Federal Information Security Management act of 2002 (FISMA): All federal agencies must develop a method of protecting information systems.
It includes:
- Standards for categorizing info systems by mission impact.
- Standards for minimizing security requirements for information and info systems.
- Guidance for selecting appropriate security controls for info systems.
- Guidance for assessing security controls in information systems and determining security control effectiveness.
- Guidance for the security authorization of information systems
GLBA:
Gramm Leach Bliley Act (GLBA): Companies that offer financial products or services to individuals such as loans, investment advice, or insurance.
Key Points:
- Protecting consumers personal financial information held by financial institutions and their services providers.
- The officers and directors of the financial institution shall be subject to, and personally liable for, a civil penalty of not more than $10,000 for each violation.
PCI-DSS
Payment Card Industry Data Security Standard (PCI-DSS): Companies handling credit card information.
ISO/IEC 27004:
Information security metrics
ISO/IEC 27005:
Information security risk management
ISO/IEC 27014:
Information security governance
ISO/IEC 27016:
Info sec economics
ISO/IEC 27032:
Cyber Security
DMCA:
The digital Millennium Copyright ACT (DMCA)
Is a united states copyright law that implements two 1996 treaties of the world intellectual property organization.
Defines legal prohibitions against the circumvent of technological protection measures employed by copyright owners to protect their works, and against the removal or alteration of copyright management information.
Additional Information Security Acts and Laws:
- USA Patriot Act 2001
- Freedom of Information Act (FOIA)
- The electronic communications privacy act
- The human Rights act of 1998
- The freedom of information act 2000
- Computer fraud and abuse act
Characters of a Security Policy:
- Clear and Concise
- Usable
- Economically feasible
- Understandable
- Realistic
- Consistent
- Procedurally tolerable
- Legal compliance
- Based on standards and regulations
Contents of a Security Policy:
- High-level security requirements: This features the requirements of a system when implementing security policies that include discipline security, safeguard security, procedural and assurance security.
- Policy description based on requirements: Focuses on the security disciplines, safeguards, procedures, continuity of operations, and documentation.
- Security concept of operation: Defines the roles, responsibilities, and functions of a security policy.
- Allocation of security enforcement to architecture elements provides a computer system architecture allocation to each system in the program.
Typical Security Policy Document Contents:
- Document control
- Document location
- Revision history
- Approvals
- Distribution
- Document history
- Overview
- Purpose
- Scope
- Definitions
- Roles & responsibilities
- Target Audience
- Policy Statements
- Sanctions and Violations
- Related standards, Policies, and Processes
- Contact Information
- Where to find more information
- Glossary/ acronyms
Policy Statements Examples:
- All computers must have anti-virus protection activated to provide real-time, continuous protection
- All servers must have the minimum services configured to perform their designated functions
- All access to data is based on a valid business need and subject to formal approval process
- All computer software must be purchased by the IT department in accordance with the organizations procurement policy
- A copy of all backup and restoration media must be kept with the off-site backup media
- while using the internet, no user is permitted to abuse, defame, stalk, harass, threaten anyone, or violate local and international cyber laws.
Steps to Create and Implement a Security Policy:
- Performs risk assessment.
- Learn from standard guidelines and other orgs.
- Include senior management in policy development.
- Set clear penalties and enforce them.
- Publish the final version to everyone in org.
- Ensure everyone reads, signs and understands the policy.
- Deploy tools to enforce policies.
- Train employees on policy
- Regularly review & update
Security Policy Design Structure Points:
- Detailed description of policy issues
- Functionalities of those affected by the policy.
- Compatibility level of the policy is necessary.
- Consequences of non-compliance
- Applicability of policy to the environment
- Descriptions of policy status
Types of Information Security Policies:
- EISP
- ISSP
- SSSP
EISP:
Enterprise Info Security Policy (EISP)
Drives an organizations scope and provides direction to their security policy
Examples of EISP:
- App policy
- Network and network device security policy
- Security policy auditing
- Back up and restore policy
- System security policy
ISSP:
Issue specific Security Policy (ISSP):
Directs the audience on the usage of technology-based systems with the help of guidelines.
Examples of ISSP:
Remote access and wireless policy, incident response plan, password policy, policies for personal devices, user account policies
SSSP:
System Specific Security Policy (SSSP):
Directs users while configuring or maintaining a system
Examples of SSSP:
DMZ policy, encryption policy, acceptable use policy, secure cloud computing, access control policy
4 Types of Internet Access Policies:
- Promiscuous Policy
- Permissive Policy
- Paranoid Policy
- Prudent Policy