Domain 3: Information Security Program Development and Management Flashcards
ISC2 Canons of Ethics
Code of Ethics Canons:
- Protect society, the common good, necessary public trust and confidence, and the infrastructure.
- Act honorably, honestly, justly, responsibly, and legally.
- Provide diligent and competent service to principals.
- Advance and protect the profession.
3 essential elements of an information security program
3 essential elements of an information security program
- Strategy closely aligned with objectives
- Support from Senior Management
- Effective metrics to monitor effectiveness of program and achieving of objectives and goals
6 Outcomes of Information Security Governance/Program Management
ACRONYM (RRAPS-V)
- These 6 outcomes should be considered as the basis for developing the objectives of an effective information security program;
- Strategic Alignment - effective alignment of security with business objectives require regular interaction with business owners or steering committee and an understanding of their plans and objectives; regular reports to management should include performance metrics of issues and objective; alignment must take into consideration cost, culture, governance, existing technology, structure, and processes;
- Risk Management - Risk landscape is always changing and there important to have continuous process of Risk Management during program Development, Implementation, and Evolution; ISM must have a clear understanding of threats, vulnerabilities, the organization’s risk profile, and risk appetite; Risk analysis must be based on business requirements;
- Value Delivery - program should deliver clear value to organization; ISM should ensure standard set of practices are followed and the security baseline is proportionate to risk; prioritizing efforts to allocate limited resources to areas of greatest need and benefit
- Resource Management - use of people, technology, and processes efficiently by documenting processes, practices, security architecture to show resource needs or shortfalls for good resource management
- Performance Measurement - After a strategy has been developed, there should be meaningful metrics to measure progress and monitor activities to demonstrate whether objectives have been met; Metrics should be agreed on by management;
- Assurance Process Integration - ISM should develop formal relationships with other assurance providers and integrate those activities with information security; This might include physical security, HR, Risk Mgmt, DR, insurance, etc; Goal is to increase information assurance and predictability of business operations; reduce all risk to an acceptable level
- Information Security Program Objectives
- Defining Objectives
- Examples of Primary Drivers
- Scope and Charter of an Information Security Program
- Steps in Information Security Program Development
-
Information Security Program Objectives - the primary task sit to turn high-level strategy into logical and physical reality through a series of projects and initiatives
- Defining Objectives - determining forces that drive business needs will help clarify objectives; Once objectives have been defined, develop projects that close the gap between current state and the objectives; define meaningful metrics to measure effectiveness of program
- Examples of Primary Drivers
- regulatory compliance
- high frequency and cost of security incidents
- concerns over reputational damage
- Commercial demands of PCI DSS
- Business processes that may increase risk
- Scope and Charter of an Information Security Program - The scope of an IS Program is established by developing a Strategy with Risk Management responsibilities; The extent to which management supports the implementation of the strategy and Risk Management activities determines the charter; it is important to define responsibilities and for ISM to determine who they would report to in certain situations; ISM must understand and be understanding of organization’s culture; implementation of an IS program impacts an organization’s established way of already doing things, so expect push back;
- Information Security management Framework
- COBIT 5 and Key Principles
- ISO/IEC 27000 series
-
Information Security management Framework - defines all components and defines the interactions between them;
- Most popular frameworks are COBIT 5 and ISO 27001
- COBIT 5 - framework that helps maintain balance between realizing benefits and optimizing risk levels and resource use; Enables IT and information to be governed and managed in a holistic manner, addressing functional areas of responsibility while considering internal/external stakeholder needs;
- COBIT 5 Based on 5 key principles:
- Meeting the Stakeholder’s Needs
- Covering the Enterprise End to End
- Applying a Single Integrated Framework
- Enabling a Holistic Approach
- Separating Governance from Management
-
ISO/IEC 27001:2013 - Information Security Management Systems and ISO/IEC 27002:2013 - Code of Practice for Information Security Controls provide a widely accepted framework and approach to IS management;
- 14 domains and 114 controls less business oriented, but easily mapped to COBIT
- 27000 series provides for all of security at a high level
Information Security Framework Components
- Information Security Framework Components - Frameworks such as COBIT and ISO/IEC 27001 begin with Risk Assessments and the identification of control objectives; These frameworks serve as a guidance and should be modified as needed for the system; broken down into functional elements (technical, operational, managerial, administrative, & educational components)
- Technical Components - vast majority of organization’s information will reside in IT; Includes maintaining standards, procedures, policy compliance, designing, and implementing metrics; Addresses risk associated with technical components (i.e. configuration, monitoring, maintenance, & operation); While IT, data owners, or business owners “own” the system, it is the custodians that provide adequate protection & compliance; every component will have an identified owner, there are no “orphan systems”
- Operational Components - ongoing management and administrative activities (done on daily to weekly timeline) such as SOPs, business operations security practices, maintenance, metrics, and administration of security technologies; ISM is responsible for identifying owners and collaborating with them to document key information on management of necessary functions; ISM should document roles and responsibilities as new tasks arise in operational component development
- Management Components - typically done less frequently then operational components (monthly, quarterly, annually) (i.e. policy reviews, standards development, oversight of initiatives); ISM must ensure this process is executed with consideration to legal, regulatory, risk and resource issues and a suite of metrics needed for decision support; ongoing analysis of assets, threats, risks must continue; early versions of metrics are typically too permissive or too restrictive;
- Administrative Components - ISM ensures financial, HR (hiring, payroll, recruitment), etc functions are effective; includes budgeting, time line planning, TCO, ROI, updates throughout fiscal year as organizational goals change; ISM ensures support and compliance with financial policies and procedures;
- Educational and Informational Components - ISMs collaborate with HR and business units to determine education and training needs (i.e. Role-based training, IR training, CP training, AUP)
The Open Group Architecture Framework (TOGAF) Architecture Development Model (ADM) steps
The Open Group Architecture Framework (TOGAF) Architecture Development Model (ADM) -
- Preliminary Phase - define architecture, principles, overall scope, constraints, objectives, and assumptions
- Architecture Visions - define vision, scope of architecture, specific segments of work to be performed
- Business Architecture - gap analysis of business functions
- Technology Architecture - gap analysis of technology functions
- Opportunities and Solutions - formulation of high-level implementation and migration strategy to transform as-is architecture into the to-be architecture
- Migration Planning - formulation of detailed implementation and migration road map, including analysis of costs, benefits, and risk
- Implementation Governance - ensure implementation projects conform to defined architecture
- Architecture Change Management - keep architecture up to date as changes arise
- Requirements Management - ensure architecture projects are based on business requirements and validated against the architecture
- Elements of a road map
- Steps to define Information Security Program road map
Elements of a road map - a well developed strategy will have objectives, resources, and constraints defined; transform conceptual or logical architecture to a physical one; Initiatives must be planned, along with budgets, timetables, personnel, etc; should include various milestones such as KGIs, KPIs, and critical success factors (CSFs)
Steps to define Information Security Program road map
- Interview stakeholders to determine issues and concerns
- Use that information to draft security policies for implementation of security program for approval by upper management
- Steering committee promote awareness of the policy and conduct internal reviews to test compliance
- Identify gaps and an approach to monitor compliance
- ISM builds consensus around roles and responsibilities, processes, and procedures to support policy
- EISA
- 3 Basic Approaches to EISA
- 4 EISA Domains
Enterprise Information Security Architecture - overall enterprise IT system design; EISA objective is to address related elements of business structure in addition to managing security technology
3 Basic Approaches -
- process approach - more directive in the processes
- framework (Zachman, COBIT, SABSA, TOGAF); great deal of flexibility, describes how each element relates to one another;
- reference models - small-scale representation of actual implementation
4 EISA Domains
- Business Architecture - defines business strategy, governance. organization, key business processes
- Data Architecture - describes structure of logical and physical data assets and data management resources
- Applications Architecture - blueprint for individual application systems to be deployed and their relationships to core business processes
- Technology Architecture - describes architecture principles, component relationships, HW SW infrastructure used to support mission critical applications
- An effective approach always starts with Business Architecture; the others are subsets;
Objectives of Information Architecture
Objectives of Information Architecture -
*Serve as program development and road map
*implementing policies, strategic alignment, traceability, common language
- Providing a framework and road map
- Simplicity and clarity through layering and modularization
- Business Focus beyond the technical domain
- Architecture and control objectives
Security Program Management and Administrative Activities
- Personnel
- Roles
- Skills
- Culture
- SAT
- AUP
- Ethics
- Documentation
- Document Maintenance
- Program Development and Project Management
- Risk Management
- Business Case Development
- Personnel - ISM develop positions according to program needs; personnel requirements for program development differ after the program is implemented; Consider outsourcing for Skills that are rarely needed
- Roles - RACI charts
- Skills - skills needed for a short time should be outsourced; once skills have been agreed upon for certain personnel, a formal employment agreement should be established
- Culture - impacted by individual BG, work ethics, past experiences
- SAT - users are the front line for identifying threats that automated mechanisms cannot; role-based training is important to target specific roles that have more unlimited access to data; 3rd party users also need training to keep up with policies
- AUP - summary of what user should and should not do
- Ethics - training on what organization considers legal and appropriate behavior; usually for users who engage in activities that are sensitive such as pen testing, monitoring user activity, sensitive personal data; have users sign Code of Ethics and Conduct
- Documentation - each document should have an owner; changes need to be approved by senior management prior to distribution; owner is responsible for ensuring access to documentation is appropriate, controls, and auditable; should follow organization classification and labeling;
- Document Maintenance - Version control is important to ensure users are working from and using the same document;
- Program Development and Project Management - IS programs are rarely static and changes need to be constantly integrated; basis for development is the strategy to achieve objectives; ISMs should employ project management techniques such as goal setting, tracking deadlines, measuring progress, assigning responsibilities in a controlled repeatable manner;
- Risk Management - managing risk to an acceptable level; all organizations will face threats, must focus on how to respond effectively to incidents; risk landscape constantly changing so organization must adapt to change
- Business Case Development - for major projects and initiatives, it is important to have a persuasive business case; the business case should have a clear value proposition (or cost benefit) based on the organization needs; important to identify risk and impacts if not undertaken; to be effective
Security Program Management and Administrative Activities CONTD.
- Program Budgeting
- IS Problem Management Practices
- Vendor Management
- Program Management Evaluation
- Program Budgeting - prior to entering budget process, ISM should have approval on strategy and objectives for a successful budget proposal; ISM should work with PMO, SMEs, etc to estimate costs as accurately as possible; parts of the program are unpredictable, looking at historical data can be helpful
- IS Problem Management Practices - identifying the root causes of problems, developing an action plan, assigning responsibility, due dates, reports to track results
- Vendor Management - outsourcing is sometimes more cost-effective and allows internal users to focus on their own projects; ISM may face issues with outsourcing such as quality of service, adherence to organization’s policy, etc
- Program Management Evaluation - ISM may be hired to evaluate the current existing IS Program. Critical areas to evaluate would be:
- Program objectives - i..e do goals align with strategies, how often are they reviewed, do policies exist, is there consensus, has acceptable risk criteria been established, do metrics exist
- Compliance Requirements - i.e. has level of compliance been determined, are there timelines and milestones to complete, are deficiencies documented and addressed, review results of last audit
- Program Management - very technical driven programs have fewer management whereas strategic programs driven by standards compliance and governance have more established programs; considerations include roles and responsibilities defined and understood, a steering committee, metrics to measure program, policies and standards all approved
- Security Operations Management - are there SOPs in place with security requirements and processes; is there a schedule for regularly performed procedure, is there segregation of duties; oversight metrics for management
- Technical Security Management - ensuring technology is implemented effectively; are there technical standards for configurations; architecture security standards, communication protocols, etc
- Resource Level - ISM assesses financial, human, and technical resources allocated to program; deficiencies must be identified and escalated to senior mgmt; Financial (what is current funding, what functions suffer from underfunding); HR (what is current staff level, Is there workload mgmt methodology); Technical (what technologies used to support, is it sufficient)
- What are two methods when combined allow ISM to implement highly effective security program?
- Explain what is included in both
- Total Quality Management (TMS) system - aka PDCA
- Governance Methodology
- Vision - clear statement about organization’s purpose; includes desired outcomes of IS program
- Strategic Objectives - set of goals (KGIs) that are necessary to move towards vision
- CSFs - set of circumstances or events that are necessary to achieve the strategic objectives
- KPIs - metrics to ensure CSFs are achieved
- Key actions, including tactical and annual action plans - initiatives to be delivered to achieve the strategic objectives and KGIs
Security Program Management and Administrative Activities CONTD.
- Legal and Regulatory Requirements
- Physical and Environmental Factors
- Culture and Regional Variances
- Logistics
- Legal and Regulatory Requirements - legal departments often focused on contracts, stocks, securities of company and not aware of regulatory requirements; ISM should identify them and request legal review and interpretation to ensure clarity;
- Physical and Environmental Factors - implementation of physical controls (i.e. motions detectors, cameras, locks, cages, etc); location of primary site, off site data storage, disaster recovery sites should be far from each other
- Culture and Regional Variances - identify audience and determine acceptable behavior; culture is dependent on many things such as location, perception, up bringing; different privacy laws;
- Logistics - ISM should be able to manage: cross-organizational strategic planning, project and task management, committee meetings, schedules, track regularly performed procedures, resource prioritization, workload management, coordinate resources and activities; online scheduling and resource mgmt systems help with this
Security Program Services and Operational Activities
- Liaison Responsibilities
- Physical/Corporate Security
- IT Audit
- Information Technology
- Business Unit Managers
- Human Resources
- Legal Department
- Employees
- Procurement
- Compliance
- Privacy
- Training
- Quality Assurance
- Insurance
- Third-Party Management
- Project Management Office
Security Program Services and Operational Activities
- Liaison Responsibilities - important for ISM to maintain relationship with other departments and groups; ISM should maintain relationship with the following departments:
- Physical/Corporate Security - ISM should maintain close working relationship with physical security (i.e. guards); ISM should understand physical security policies, standards, procedures, etc
- IT Audit - auditing effects the IS program;
- Information Technology - ISM should build trust, understanding of common goals; IT often has conflicting interests; conflict between performance and safety which can result in sacrificing security to meet operational objectives; work with IT to fulfill both security and performance requirements
- Business Unit Managers - keeping in touch with the business unit managers ensures each unit continues to meet the security requirements and ensure unit managers understand their role and how to escalate incidents; ensures stakeholders are aware of matters; allows architecture to be modified if changes need to be made
- Human Resources - ensure HR and legal are monitoring employee’s actions and understand their roles to escalate as needed; work with HR to develop AUP and RoB; senior rep of HR should be assigned to IS steering committee
- Legal Department - keep in touch so legal team is aware of any security issues and so that they act with their consensus; legal deals with compliance, liability, corp responsibilities, due diligence, contract, service providers;
- Employees - they are the 1st line of defense in the security of information; essential they get proper training and testing on policies procedures; get feedback from employees on how to improve program; make sure they know how to escalate
- Procurement - ISM should be aware of procurement process in terms of product acquisition
- Compliance - independent or part of legal office;
- Privacy - may be part of compliance office; privacy laws different depending on location; ISM must ensure they are compliant
- Training - ISM can provide suggestions for training unit
- Quality Assurance - QA must include acceptable levels of security-related controls; ISM should ensure QA unit addresses risk as part of the standard process
- Insurance - ISM should be familiar with the type of insurance an organization has to include it in risk analysis and management and recovery planning because it serves as a compensating control
- Third-Party Management - ISM should clearly understand which services are provided by external parties so they can understand the associated risk and acquire preventive, detective, and compensatory controls, as needed, including oversight and monitoring
- Project Management Office - ISM should be aware of all projects, especially IT projects; allows security team to assist with projects and PM team to assist with IT projects if ISM has good working relationship;