William List www.gammassl.co.uk w.list@ntlworld.com

Transcription

William List www.gammassl.co.uk w.list@ntlworld.com
Security - Who is in
charge? - The users?
Or the system?
William List
www.gammassl.co.uk
w.list@ntlworld.com
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Agenda
Q Introduction
Q Fast Track ISMS
Q Internal Control and
Corporate Governance
Q Results
Q Time Metrics
Q Risk Treatment Plans
Q An Exercise
Q Summary and
conclusions
Q Overview of the 7799
Standards
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Introduction
©Wm. List & Co, Gamma Secure Systems Limited, 2004
We all live in an insecure
world
Nothing is really secure
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Old Threats
Q Breakdowns
Q Mistakes
Q Thieves
Q Fraudsters
Q Terrorists - bombers
Q Acts of God - flood, fire, etc
©Wm. List & Co, Gamma Secure Systems Limited, 2004
New Threats
Q Hackers - spammers
Q Viruses
Q Impersonation - pfishing
Q Bugs and gremlins in the systems
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Traditional Solution
Secure the perimeter of the computer
(system)
©Wm. List & Co, Gamma Secure Systems Limited, 2004
And elsewhere for
E-Commerce
©Wm. List & Co, Gamma Secure Systems Limited, 2004
e-Business Structure
Customer
WWW
Call Centre
Shop Front
Internet Technology (delivery platform)
Kiosk
Work
Flow
CRM
Profile
Middleware
Marketing
Distribution
Finance
Sales
Service
©Wm. List & Co, Gamma Secure Systems Limited, 2004
TYPICAL EC ARCHITECTURE
Content
building
tools
Product
Catalog
Database &
Data
warehousing
Internet
Mainframe
Accounting
Fulfillment
ERP
ERM
EDI
Consumer
Browser
Router
E-Commerce
server
Web Server
Merchant A/C
Authorisation &
Settlement Server
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Issuing
Bank
Consumer A/C
Acquiring
Bank
Three Tier Architectures
Backend Layer
Mid-tier Layer
Web Server Layer
E-Commerce
servers
Internet
Loadbalancing
DNS
Mainframe
Router
ERP
Syustem
Analysis and
decision support
interface
Catalog Database
©Wm. List & Co, Gamma Secure Systems Limited, 2004
And we must remember
that the programs are
(heavily) patched
and may be unstable
©Wm. List & Co, Gamma Secure Systems Limited, 2004
What is the system doing?
QIs it right?
QIs it authorised?
QCan I find out?
©Wm. List & Co, Gamma Secure Systems Limited, 2004
So what are we told?
Q Rogue users compromise security
Q Emails contain bad things
Q Boards must be involved
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Internal Control &
Corporate Governance
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Internal Control is an old
concept
©Wm. List & Co, Gamma Secure Systems Limited, 2004
What is Internal Control?
Q Way in which management deploys resources to
achieve the organisation's objectives
Q Two basic parts:
¾Procedures to perform the work necessary to
conduct the organisations business
(operational procedures)
¾Procedures to ensure that the business is
conducted as expected (controls)
Q It is this second part that concerns us today
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Audit Practice Board
Q This is their advice:
Mission
Mission
Business
BusinessObjectives
Objectives
Business
BusinessRisks
Risks
Applicable
ApplicableRisks
Risks
Internal
InternalControls
Controls
Review
Review
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Risks – a Taxonomy
Q Following Basel II
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Applicable Risks
Q and non-applicable risks
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Controls – Fundamentals
“… detect the event in
sufficient time to do something
positive about it… “
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Types of Control
Q Preventive
¾ Either prevent the event from occurring or affecting the
organisation, or
¾ Detect the event as it happens and prevent any further activity
that may lead to an impact
Q Detective
¾ Identify when some event, or events have occurred … and
invoke appropriate actions to arrest (or mitigate) the situation
Q Reactive
¾ Identify that the impact has occurred and invoke appropriate
actions to recover (or mitigate) the situation
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Why Corporate Governance
Q … a result of scandals … investing public … being
"ripped off" … conduct of senior executives
¾ South Sea Bubble, Kruger, Salad Oil company, Equity
funding, Polly Peck, Maxwell Pensions, Enron,
WorldCom …
Q New laws/regulations … anti discrimination, privacy
protection, product quality etc.
Q Turnbull, OECD, Sarbanes-Oxley, EU directive
©Wm. List & Co, Gamma Secure Systems Limited, 2004
The OECD Principles (2004)
Q The rights of shareholders and key ownership functions
Q The equitable treatment of shareholders
Q The role of stakeholders in corporate governance
Q Disclosure and transparency
Q The responsibilities of the Board
¾ It is an important function of the board to establish
internal control systems covering the use of corporate
assets and to guard against abusive related party
transactions.
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Turnbull
Q FTSE only (Yellow Book) requirement
Q IC part
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Sarbanes-Oxley/EC Directive
Q An act “to protect investors by improving the
accuracy and reliability of corporate disclosures
made pursuant to the security laws, and for
other purposes”
Q Places heavy emphasis on internal control, e.g.
¾ §404 (a) (1) state the responsibility of management
for establishing and maintaining an adequate internal
control structure and procedures for financial
reporting.
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Time Metrics
©Wm. List & Co, Gamma Secure Systems Limited, 2004
The Fundamental Principle
“… detect the event in
sufficient time to do something
positive about it… “
See http://www.gammassl.co.uk/topics/time/index.html
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Parameter Definition (Time)
Q Time that event occurs, TE
Q Time of detection, TD or TM
Q Time problem is fixed, TF
Q Time at which impact occurs (if not fixed), TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Parameter Definition (Money)
Q Cost of doing business,
CBA
Q Cost of internal control,
CICS
Q Impact penalty,
Q Cost of fix,
IP
CF
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Fundamental Model
P
Rev
e,
u
n
e
R
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Cost of ICS, CICS
Fundamental Model
P
Rev
e,
u
n
e
R
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Cost of ICS, CICS
Fundamental Model
P
Rev
e,
u
n
e
R
Cost of ICS, CICS
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Fundamental Model
P
Rev
e,
u
n
e
P
R
Cost of ICS, CICS
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
P
TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Fundamental Model
P
Rev
e,
u
n
e
P
R
Cost of ICS, CICS
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
P
TW TM
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Fundamental Model
P
Rev
e,
u
n
e
P
R
Cost of ICS, CICS
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
P
TW TM TF
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Fundamental Model
P
Rev
e,
u
n
e
PP
R
Cost of ICS, CICS
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
TW TM TF
©Wm. List & Co, Gamma Secure Systems Limited, 2004
P
Fundamental Model
P
Rev
e,
u
n
e
R
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Cost of ICS, CICS
Fundamental Model
P
Rev
e,
u
n
e
R
Cost of ICS, CICS
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE
TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Fundamental Model
P
Rev
e,
u
n
e
R
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE TD
TF TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Cost of ICS, CICS
Fundamental Model
P
Rev
e,
u
n
e
R
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE TD
TF TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Cost of ICS, CICS
Fundamental Model
P
P
Rev
e,
u
n
e
R
Money (£)
ies, C BA
t
i
v
i
t
c
ess a
n
i
s
u
b
f
Cost o
Time
TE TD
TF TW
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Cost of ICS, CICS
Continuum of Classes
Class Ability to detect the event and take
recovery action
Type
1
Prevents the event, or detects the event as it
happens and prevents it from having any impact
Preventive
2
Detects the event and reacts fast enough to fix it
well within the time window
Detective
3
Detects the event and just reacts fast enough to fix
it within the time window
4
Detects the event but cannot react fast enough to
fix it within the time window
5
Fails to detect the event but has a partially deployed
BCP
6
Fails to detect the event but does have a BCP
7
Fails to detect the event and does not have a BCP
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Reactive
Risk Treatment
Plans
©Wm. List & Co, Gamma Secure Systems Limited, 2004
What is a Risk Treatment Plan?
Q Risk Treatment: treatment process of selection and
implementation of measures to modify risk [ISO Guide
73]
Q Identification of risk
Q Prevention of occurrence
Q Detection of occurrence
Q Limitation of Impact
Q Recovery
©Wm. List & Co, Gamma Secure Systems Limited, 2004
What is a Good Risk Analysis?
Q The senior management, as a whole can
¾ understand the risks
¾ together participate in determining optimum countermeasures to risk
¾ allocate the overall ‘control’ spend to various risks across the whole business
Q All staff concerned with design, implementation or
performance of controls
¾ to understand why the control is necessary
¾ to determine when an implementation of a control fails to meet its objective
¾ to understand how failures in a control are detected
Q Enables prompt revisions to be undertaken as
circumstances change or incidents occur
Q NOTE The risk analysis can be in tiers if complex
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Traditional risk analysis
Q Identify
¾Assets
¾Threats
¾Vulnerabilities
¾Probability of incident occurring
Q Estimate risk factor
¾Value of loss if risk occurs
¾Probability of risk occurring
¾Complex mathematics
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Who knows
Q All the threats - or their urgency
Q All the vulnerabilities - in purchased software
Q What are probabilities of occurrence
Q So 9/11
©Wm. List & Co, Gamma Secure Systems Limited, 2004
DO THE BOARD
UNDERSTAND
THE RESULTS?
©Wm. List & Co, Gamma Secure Systems Limited, 2004
There must be
a better way to
explain the
risk treatment plan
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Suppose we start with
what worries people
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Worries
No Sales
No Money
IT failed
Fraud
Regulators
Bad press
Info all to pot
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Wrong product
Competitors
Too expensive
No bribes
My Customers have not paid me
Why not?
Bad work
Did not deliver
Did not Invoice
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Customer broke
How to address worries
Q Identify what they are
Q Try to prevent
Q Detect if materialised
Q Limit impacts
Q Recover
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Recording the RTP
Q Tell the story:
¾ How I planned to save the business
Q For example:
¾ My airplane is broken - far away
¾ Impacts
‰Safety for crew and passengers
‰Customer satisfaction
‰Additional costs
Q This happen to us on BA 122 on
22nd November 2003 – read the
Time Paper
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Stylised RTPs
Q Business driven risk assessment/ treatment using
events and impacts Æ making it all worthwhile
Event
Organisation
Specific
Common (but treatment
might be different!)
•Aircraft broken down
•Bagage handler strike
•Theft
•Acts of God
•Regular Fraud
•IT failure
•Hacking
•etc
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Stylised RTPs
Q Business driven risk assessment/ treatment using
events and impacts Æ making it all worthwhile
Impacts
•Adverse press coverage
•Questions in parliament
•Court action against org
•Failure to prosecute
•Unanticipated costs
•etc
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Method
Q One RTP per event
Q Describe event
Q List assets that might be
affected
Q Document, order
applicable impacts
Q List applicable threats
Q Repeat until all impacts
dealt with, and residual
risk is acceptable:
¾ How can it happen?
¾ Do I prevent it?
¾ How do I detect it?
‰No preventive measure or
‰Preventive measure fails
or
‰Didn’t know it could
happen that way
¾ How do I fix/recover?
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Overview of the
7799 Standards
©Wm. List & Co, Gamma Secure Systems Limited, 2004
ISO/IEC 17799 and BS7799-2
Q BS 7799 Part 2 is a
management standard –
e.g. let’s party. Part 2
tells you what to do
Q IS 17799 is a super-
market of good things
to do
Q Certification is against Part
2 – is the party OK?
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Effective
Security in
tune with
the
business
BS 7799-2:2002
Scope •
Policy •
Risk Assessment (RA) •
Risk Treatment Plan (RTP) •
Statement of Applicability (SOA) •
•ISMS Improvements
•Preventive Action
•Corrective Action
Operate Controls •
Awareness Training •
Manage Resources •
Prompt Detection and Response to Incidents •
©Wm. List & Co, Gamma Secure Systems Limited, 2004
•Management Review
•Internal ISMS Audit
ISO/IEC 17799:2000
Provides guidance under 10 major headings
Q
Q
Q
Q
Q
Q
Q
Q
Q
Q
Security Policy
Security Organisation
Asset Classification and Control
Personnel Security
Physical and Environmental Security
Communications and Operational Management
Access Control
Systems Development and Maintenance
Business Continuity Management
Compliance
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Linking the Two Standards
Q The Statement of Applicability (SOA):
“a document describing the control objectives and
controls that are relevant and applicable to the
organization’s ISMS, based on the results and conclusions
of the risk assessment and risk treatment processes”
Q It is a certification requirement (EA7/03)
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Why is it Important?
Q You have to say, for all 127 ISO/IEC 17799 controls,
whether they are applicable or not
Q If YES, why (with reference to risk assessment)
Q Important because everyone uses the same laundry list
©Wm. List & Co, Gamma Secure Systems Limited, 2004
A Practical Implementation
Policy
Policy statements
statements
(could
(couldbe
beimposed
imposed
by
byhigher
higherauthority)
authority)
Risk
Risk assessment
assessment
risk
risk treatment
treatment plan
plan
Link backs
normative
A.x.x.x Clause
YES, policy xyz, events, abc
see reference
A.x.x.y Clause
N/A reason
informative
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Link forward
to procedure
manuals etc.
Fast Track ISMS
©Wm. List & Co, Gamma Secure Systems Limited, 2004
The Vital Ingredients
Q Role Model
Q Skeleton ISMS Manual
Q The event-impact driven RTPs (as previously
discussed)
Q Classroom and on-the-job training
Q Various quality assurance activities
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Role Model
Q Information Security Forum (ISF)
Q ISMS Administrator
Provide feedback
Provide feedback
Set Civil Servicewide policy
Q Internal ISMS Auditor
ISF
Provide feedback/
request policy
enhancements
Policy
Makers
Direct
Advise
Owns/looks after
Q ISMS Trainer
Owns
Internal
ISMS
Auditors
Q ISMS Advisor
Provides
management
information
ISMS
Administrator
Advise
ISMS Advisor
Manages
Advise
Audit
Q Certification Auditor
Information
users
ISMS
Certification
Auditors
Use
Certify
Instruct and monitor
Q Policy Maker
Acts to reduce risk
to acceptable level
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Information
Skeleton ISMS Manual
Parts for you to
complete
Checklists
Covers every requirement
©Wm. List & Co, Gamma Secure Systems Limited, 2004
of BS7799-2:2002
Contents
Q Pages associated with the
whole PDCA cycle
Q Facility for including training
and awareness
Q Built-in facility for document
control
Q Internal ISMS audit proforma
and checklist
Q Space to define ISMS scope
and context
Q Management system review
checklist
Q Prototype ISMS policy
Q Procedures for corrective
action etc.
Q Provision for RTPs
Q Virtually complete SOA (with
built-in hyperlinks to policy
statements and standard
events)
Q To-Do-List and associated
procedures
Q Compliance index
©Wm. List & Co, Gamma Secure Systems Limited, 2004
The “To-Do-List”
Q BS 7799-2 is a management standard – so is
internal control
Q Management processes must be in place, but
new security processes may be required because
risks change
Q At any point in time:
¾Existing security procedures in place
¾Newly identified ones still-to-do
Q Managed using a “To-Do-List”
©Wm. List & Co, Gamma Secure Systems Limited, 2004
The “To-Do-List”
Q BS 7799-2 is a management standard – so is
internal control
Q Management processes must be in place, but
new security processes may be required because
risks change
Q At any point in time:
¾Existing security procedures in place
¾Newly identified ones still-to-do
Q Managed using a “To-Do-List”
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Results
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Some Results
Q UK Logistics Company
¾ Initial development of
Skeleton
¾ First application of eventimpact driven RA/RTPs
¾ Engaged Board
¾ MD in control
Q UK start-up
¾ Up to speed in a day
¾ 2 day brainstorm for RTPs
¾ First BSI visit in September
Q Government of Mauritius
¾ 4 sites “attested” by MSB
¾ Chiefs empowered
¾ Rollout to all other
departments
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Principle can be extended
Q Overall ICS
Q Including
¾ISO 9000
¾Financials
¾General management issues
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Now an audience
participation exercise
Identity Cards
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Summary and
Conclusions
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Computers help people
Q PCs, mobile phones, mainframes, servers etc
Q Could we do without them?
¾Volume of transactions
¾Speed of communications
Q Criminals are businesses too
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Summary
Q Information security part of
internal control
Q Time metrics key to effectiveness
Q Event-impact driven RA/RTPs key
to Board engagement
Q Hypertext, web-technology
Skeleton key to rapid
development
Q Certification successes bear this
out
©Wm. List & Co, Gamma Secure Systems Limited, 2004
Effective
Security in
tune with
the
business
Security - Who is in
charge? - The users?
Or the system?
William List
www.gammassl.co.uk
w.list@ntlworld.com
©Wm. List & Co, Gamma Secure Systems Limited, 2004