Video Content Lesson 10 Flashcards
Administrative Management
Overview Duty Separation Least Access Accountability Privacy and Protection Legal Requirements Illegal Activities
Overview
Policies, Guidelines, and Procedures set tone for administration
Legal Requirements of Due Care and Due Diligence
Due Care - Reasonable care used to protect the assets of the organization
Due Diligence - Sufficient steps taken to ensure the standards of the due care are being perpetually upheld
Hiring Practices - set into security policy (job requirements, specifications for specific jobs; background checking)
Termination procedures
Duty Separation
Separation of duties and responsibilities (ensure that nay critical task cannot be completely executed by a single individual)
Changes in workstation/location (decreasing the probability that the users will store personal information on the PC)
Least Access
Least Privilege -( Subjects should be granted the least possible amount of access to complete their work tasks)
Need to Know - (A subject must possess a need to know information in addition to having an appropriate security clearance)
Accountability
Job Rotation - (Periodically rotate responsibilities; Allows subsequent job holders to audit predecessor)
Mandatory Vacation Increments - (Allows sufficient time for complete audit and validations of activity)
Security Policy must set forth standards of accountability for each employee
Use Auditing to validate policy compliance
Privacy and Protection
Privacy and protection issues cover how the organization handles sensitive materials
Organizations must protect private personal information from unauthorized disclosure
Some information is protected by statute or regulation (Personal medical records; Financial information)
Legal Requirements
Local, State, National, and International
A sound security policy will ensure all laws are upheld (Hiring Practices; Software Licensing; Hazardous materials storage and disposal)
Must have policies and procedures stating how you handle issues
Illegal Activities
How do you discourage illegal activities?
Organizations must make substantive attempts to prevent illegal activities (EX - fraud, theft, unauthorized disclosure)
Preventative Controls - can help prevent illegal activities
Detective Controls - can help discover such activities
Must be spelled out in Policies
Operation Controls
Record Retention Backups Data Removal Antivirus Controls Privileged Functions Resource Protection
Record Retention
Sensitive Records (Event Logs; Audit Trails; Backups of Critical Information)
It is necessary to retain such information for possible audits and investigations
Length of retention can vary, depending on local laws and regulations
Common Retention lengths are 3, 7, or 10 years
Backups
Backup of critical information
Make sure all sensitive data is backed up perpetually
Validate all backups (assume it fails unless validated)
Media Handling (Marking - be explicit)
Storage - Safe and secure
Destruction - when the useful life has expired, remove the data using an appropriate strategy
Data Removal
Erase Data - mark file deleted but NOT data is actually removed
Clearing - Overwriting media with unclassified information
Purging - Repeated clearing
Declassification - Process of clearing media for use in a less-secure environment; often uses purging)
Degaussing - Using strong magnetic field to remove all magnetic data from media; Returns magnetic media to a pristine state
Destruction - (Physically destroying media; shredding, incineration, crushing)
Sanitation (Series of processes to result in a pristine media or destruction)
Antivirus Controls
Control Types 1-Preventative 2-Detective 3-Deterrent 4-Corrective 5-Recovery (restore to previous state) Antivirus Management All servers/clients need antivirus protection (preventative and detective) antivirus shield (preventative) Scanning (detective) Fix the Virus (corrective and recovery) Up-to-date virus definitions (check back to antivirus site for updates) Administrative controls (restrict or prohibit installation of uncontrolled software on client machines)(preventative controls)
Privileged Functions
Administrator has extended access to resources required for specific job functions
Restrict these functions to specific users and monitor their use
Trusted Recover Process (Security maintained during crash and recovery)
Change control Management (Track and manage software and document changes)
SCM (Software Configuration Management) (log all events that result in changes or change requests)
Resource Protection
Software, Hardware, Data Operating System (backup, current patches) Source Code (archive current code; Maintain version change history) Purchased/proprietary (current patches) Hardware Limit Physical Access Limit Removable media access Data Access control Sensitive forms and reports Logs Databases
Auditing
Audit Procedures Frequency Audit Trails Audit Reporting Sampling Retention
Audit Procedures
What is auditing?
Ensures compliance with the company security policy and with local statutes and regulations
Internal audit are carried out by employees of organization in question
External audit utilizes auditors that are NOT associated with your organization
Generally viewed as unbiased
Frequency
Security policy should detail how frequently audits should take place
Recurring (scheduled)
Ad-hoc (specific) occur as needed for individual or sub organization or to satisfy legal proceedings