Security Principles & Practices (21%) Flashcards
Who is accountable for protecting the organization?
Leaders of Each Operating Unit
The Organization’s Security Function
Risk assessment, Policy & Supporting Infrastructure
Who reports to a senior-level executive to ensure a strong liaison with leadership, demonstrate commitment and support and highlight the importance of security?
CSD
Security department placement in the organization impacts its ability to:
- Expert influence
- Remain informed
- Garner resources to support programs and strategies
Key competencies of the CSO
- Staff developer
- More strategies than tactical
- Highly ethical
- Responsible & dedicated
- Risk and crisis handler
Security Managers
- Security managers are security specialists and business managers
- Effective security managers are the business partner
- Security managers should be in Senior management
Ratio of direct reports to a single supervisor
Span of Control
A limited number of direct reports
Effective Management
The number depends on:
- Mature of work
- Type of organization
Generally 1 ; 10 is best, but…
1 to 100 is possible with technology & flattened organization
Management is less important in team environments and flat organizations
And individual reports to only one supervisor
Unity of Command
Three tools of a strategically-managed assets protection program
- Planning
- Management
- Evaluation
Assets Protection Program Management
A single office (or person) should be the assets protection focal point
Convergence
- 2005 definition (ASIS): the integration of traditional & IT security
- Contemporary definition: the merging of various fields to protect critical assets
Factors that change the understanding of and approach to assets protection:
- Threats mutate
- Technology advances
- Management evolves
- Business transforms
Five avenues to address risk:
- Acceptance
- Avoidance
- Reduction (mitigation)
- Spreading
- Transfer
Balancing security and legal considerations:
- Strong security alleviates the need for legal protection
- Strong legal protections alleviate the need for security
- Finding the appropriate mix of both solutions is the key
Five D’s (used to be 3 D’s)
Deter
Deny
Detect
Delay
Destroy
Five forces shaping assets protection:
- Technology and touch
- Globalization in business (increases risks to)
- Standards & regulation
- Convergence of security solutions
- Homeland Security & the international security environment
Globalization in business (increases risks to)
- Business transactions
- Information assets
- Product integrity
- Corporate ethics
- Liability
- Far-flung people and facilitiates
The most effective defense-in-depth program mixes
- Physical measures
- Procedural measures
- Electronic measures
Defense - in - Depth
Effective Security measures are not oppressive or burdensome
Sarbanes-Oxley Act of 2002
- Formerly known as the Public Company Accounting Reform & Investor Protection Acts of 2002
- Became Law on July 30, 2002
- Passed in response to accounting Scandals at public companies in the late 1990’s and 2000’s
- Established new accounting standards and business practices for US public companies, their beards, and the public accounting firms that serve them
- Requires CEO to certify, the accuracy of their organization’s financial statements
Surbanes-Oxley Act of 2002 (Ctd..)
- Compliance (particularly w/ Section 404) significantly burdens companies’ officers and boards and imposes both civil a criminal penalties on violators who commit fraud
- Established the Public Company Accounting Oversight Board
Sarbanes - Oxley Acts of 2002 (Ctd…)
- Requires all publicly traded companies to have anonymous reporting methods for questionable accounting or auditing activities
- Limits an organization’s ability to provide strictly internal reporting mechanisms
Standards in General
Address specific needs (like technical issues) health, safety, or environmental concerns, quality or compatibility require
Compliance with a standard is voluntary but a regulation may require compliance with a standard
Nine main types of standards
- Basic
- Product
- Design
- Process
- Specification
- Code
- Managment systems
- Conformity assessment
- Personal certification
International Organization for Standardization (ISO)
- ISO is not an acronym “ISO’s” Greek for “equal”
- The world’s largest standards developer, based in Geneva, Switzerland
- Non-governmental organizations; participants are volunteers
- Does not regulate legislate or enforce
ISO (cntd…)
- A network of national standards institutes from 159 member countries; each has one vote - the US representatives is the American National Standards Institute (ANSI)
- ISO standards often become recognized as industry best practices and defacto market requirements
ISO (cntd…)
- Based on international consensus, ISO standards address the global business community & are developed only when there is an identified market need or to facilitate international or domestic trade; ISO standards are designed to be globally relevant
- Employs a transparent process for developing standards based on consensus among the interested parties, not by majority vote: all major concerns & objections must be addressed
ISO (cntd…)
- Approximately 1000 technical groups in which more than 50,000 experts participate annually
Forged in 1916 as “clearing house” for Standards Developing Organizations (SDO’s) in the U.S.
ANSI
An organization’s, company, agency or group that develops standards
SDO
Administrator & coordinator of the U.S. private sector voluntary standardization system
ANSI
ANSI
Decentralized & partitioned into industrial sectors and supported by hundreds of private sector SDO’s
The only creditor of US Voluntary Consensus SDO’s
- 600 SDO’s in the US
- 200 SDO’s accredited by ANSI to develop American National Standards including ASIS NFPA & SIA
ANSI
The sole US representative to the two major non-treaty international standards
Organizations: ISO & IEC (International Electrotechnical Commission)
ANSI
Represents more than 125,000 companies and organizations & 3.5 million, professionals worldwide
ANSI
Provide broad descriptions of how operations will be conducted
Policies
May be affected by different regulations for different businesses such as:
- Minimum wage (Federal & State) FMLA OSHA
- Regulations for government data
- Building codes
Policies
- Should be useful & simple without overloading employees
- Should be developed closely with managers
- should provide details of operations & the efforts of policy changes
- Should create management buy-in through collaboration in development
Security Policies
- Establish strategic security objectives & priorities
- Identify those accountable for physical security
- Set forth responsibilities & expectations for managers, employees & others
Procedures
- Instruct employees how to react to various issues
- Are clearly articulated to prevent confusion
- Address a wide variety of topics including all topics important for daily functions
- Are widely promulgated & refreshed with employees regularly
Procedures
- Reflect the ideal functionality of the organizations
- Support proper staff behavior & facilitate a hospitable safe workplace
Security Procedures
- Are detailed implementation instructions for staff to carry out security policies
- Are often overlooked as an asset protection tools
revised procedures can enhance security while improving bottom-line
What has been extended into streets and other public areas?
Premises Liability of Owners
ASIS facilities Physical Security Measures guideline defines risk management as a business discipline consisting of what three major functions?
- Loss prevention
- Loss control
- Loss indemnificaiton
Risk Assessment
A proactive strategy for security/risk mitigation supports sustainable, healthy, productive organizations and is a critical responsibility of senior leadership & governing boards
What was developed in the insurance industry?
Risk Assessment
Who should be responsible for all of the organization’s security/risk strategy
Senior Executive
An uncertain situation with a number of possible outcomes, one or more of which is undesirable
Risk
What does risk include?
all negative events for an organization their impact likelihood & how soon they may occur (imminence)
Two things that risk assessment does with all risks
Defines & Quantifies
3 things risk assessment techniques may be
- Heuristic (ad hoc)
- Inductive (qualitative) (bottom-up approach)
- Deductive (quantitative) (top-down approach)
Inductive
(qualitative - bottom-up approach)
1. risks identified at the beginning of the analysis
2. Identified risks are the starting point not the result
3. This method may produce incomplete results
4. This method makes use of “event trees” that trace an initiating event through a sequence with different possible outcomes
5. Does not readily lend itself to feedback loops in the event trees
6. This method focuses on scenarios which may fail to account for concurrent attacks
Deductive
quantitative - top-down approach
- Risks result from a systemic deductive top-down approach
- Uses “logic diagrams” & “fault trees” along with event trees
When an entire population is at risk
Societal Risk
Risk assessments attempt to find answers to three primary questions
- What can go wrong?
- What is the likelihood of it going wrong?
- What is the impact if it goes wrong?