Policy Flashcards

1
Q

What is security policy?

A
  • high-level statement of beliefs, goals, & objectives &, general means for attainment for protection
  • set at a high level, what is desired to be achieved, and does not specify “how” to accomplish the objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is security policy needed?

A
  • to ensure money is spent in an appropriate manner to deliver expected outcomes
  • infrastructure increasingly connected & accessible, hence more prone to manipulation & destruction
  • crucial decisions and defensive action must be prompt and precise
  • a security policy establishes what must be done to protect infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure by design principles (10)

A
minimise attack surface
establish secure defaults
Principle of least privilege - only allow minimum access necessary
Principle of defence in depth - multiple controls that approach risk are preferable
Fail securely
Don't trust services
Separation of duties
Avoid security by obscurity
keep security simple
Fix security issues correctly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blackett review recommendations

A

• Improving awareness
Recommendation 1 Operators of CNI should review their reliance on GNSS, whether
direct or through other GNSS-dependent systems, and report it to the lead
government department for their sector. The Cabinet Office should assess overall
dependence of CNI on GNSS.

  • Recommendation 2 Loss or compromise of GNSS-derived PNT should be added to
    the National Risk Assessment in its own right, rather than as a dimension of space
    weather alone.

• Addressing vulnerabilities and threats
- Recommendation 3 The Department for Digital, Culture, Media and Sport (DCMS), with
Ofcom, should continue to address the risk of interference to GNSS-dependent users,
including CNI, in allocation of radio spectrum to new services and applications

  • Recommendation 4 DCMS should review, with Ofcom, the legality of sale, ownership and
    use of devices and software intended to cause deliberate interference to GNSS receivers
    or signals – to determine whether the Wireless Telegraphy Act 2006 requires revision.
  • Recommendation 5 CNI operators should assess – with guidance from the National Cyber
    Security Centre (NCSC) and the Centre for the Protection of National Infrastructure
    (CPNI) – whether they need to monitor interference of GNSS at key sites such as ports.
    Where operators do monitor, data should be shared with the relevant lead government
    department.

• Improving resilience
- Recommendation 7 The existing cross-government working group on PNT should be put on a
formal footing to monitor and identify ways to improve national resilience. It should report to the
Cabinet Office, which can coordinate necessary actions among departments.

  • Recommendation 8a Procurers of GNSS equipment and services for CNI applications – with
    guidance from the relevant lead government department and organisations such as NCSC and
    CPNI – should specify consistent requirements encompassing GNSS and PNT system issues of
    accuracy, integrity, availability and continuity, as well as requirements specific to the immediate
    equipment, system and application.
  • Recommendation 8b Government should ensure that, for GNSS and PNT equipment, a
    coordinated approach is taken to performance standards, terminology, validation criteria,
    independent testing and evaluation procedures, and the accreditation of test facilities. It should
    work with industry, trade associations, accreditation bodies and organisations that develop and
    set standards.
  • Recommendation 8c Government should adopt a facilitating role to ensure that legislation and
    regulations relevant to PNT and GNSS are appropriate and proportionate, and that due
    consideration is given to the needs of different sectors.
  • Recommendation 9 The Department for Business, Energy and Industrial Strategy, in
    partnership with Innovate UK & the cross-government working group on PNT, should map PNT
    testing facilities & explore how industry and critical services can better access them.

Preparing for the future
- Recommendation 10 Growing demand for time and geo-location create opportunities for the
UK to leverage its academic and industrial expertise in these areas. UK Research and
Innovation should invite the research community and industry to develop proposals to
achieve greater coordination among existing centres of excellence.

• Mitigating dependence on GNSS
- Recommendation 6 CNI operators should make provision – with guidance from NCSC and
CPNI – for the loss of GNSS by employing GNSS-independent back-up systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Principles of Security policy (6)

A

reflect widest security objectives
Enable the business of related entities
Risk management is key with appropriate owner
Account for statutory obligations and protections
Enable right attitudes and behaviours
Polices and processes for reporting issues/incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SecPol document components (9)

A

Development trade off (detailed vs brief)
Dependant on - size, services, tech, money (and other resources) available
Purpose
Scope
Background
Policy statement (overarching principles)
Enforcement
Responsibility
Related documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elements of good policy (13)

A

Clear, concise and realistic
defined scope and applicability
Consistent with other policy/guidance
Open to risk based change
Identifies areas of responsibility for users, admin and management
Sufficient guidance to develop procedures
Balances protection with productivity
How incidents are handled
Has an SRO
Flexible and adaptable to tech and procedural change
Involves relevant stakeholders
Doesn’t impede business on mission/goals
Provides organisation with assurance and acceptable protection from external and internal threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sec by Des - attack suraface

A

reduce nodes available to an attacker to enter a building/system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sec by Des - Secure defaults

A

Default is a secure experience with the user reducing their security if allowed

eg password aging and complexity as default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sec by Des - Least privilge

A

where need to know exists - eg a CEO probably does not need to access all the HR files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sec by Des - defence in depth

A

add layers of validation and control

e.g. 2 factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sec by Des - Fail securely

A

ensure that systems are not set to allow failure into admin roles etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sec by Des - don’t trust services

A

Check what data is being requested and used by external parties

e.g. reward schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sec by Des - Separation of duties

A

Fraud control approaches such as requestors cannot sign for assets, approvers cannot be requesters etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sec by Des - avoid sec by obscurity

A

nearly always fails, using other principles to ensure the security is generated, not through obscuring code (and generally fails poorly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sec by Des - keep sec simple

A

Attack surface and simplicity go hand in hand