- IA - Information Assurance
- IS - Infosec Standard
- Asset registers
- What are we securing and why?
- Risk and threat analysis and modelling
- What are we securing against?
- Who are the attackers?
- How motivated/prepared are they?
- Change management
- Dealing with new assets and threats
- Maintain existing security mechanisms and current systems
- Metrics and audit
- How do we know how well we are doing?
- Is 'it' being done at all?
- ISO 27001 - information security management systems
- ISO 27005 - risk modelling
- HMG Information Security Standard 1 (UK gov certified programme)
- ISO 22301/22313 - business continuity
- Confidentiality
- Can data only be read by authorised?
- Integrity
- Can data only be changed by authorised?
- Availability
- Is data always available to authorised?
- Rated on 5, sometimes 6 point scale of "impact"
- 1 = "no or weak impact"
- 5 can = "major loss of life or vast economic harm
- Scales are decided for domain
- 334 is UK "RESTRICTED"
- 444 is UK "CONFIDENTIAL"
- 554 is UK "SECRET"
- 664 is UK "TOP SECRET"
- "Risk to an individual’s personal safety or liberty"
- "Loss to HMG/Public Sector of £millions"
- "Undermine the financial viability of a minor UK based or UK-owned organisation"
- "Lead directly to widespread loss of life"
- "Major, long term damage to the UK economy (to an estimated total in excess of £10 billion)"
- "Major, long term damage to global trade or commerce, leading to prolonged recession or hyperinflation in the UK"
-
Plan
- Identify assets, risks, threats
- Associate controls
-
Do
- Run the system with new controls
-
Check
- Design and collect metrics
- Design and collect audit info
- Assess the security of the system
-
Act
- Improve the system
- Return to "do" or "plan"
- Repeat
-
ISO 9001
- Policies: state objectives and criteria of system
- Procedures: state how to do things, check to ensure fulfilment of
policy objectives
- Sometimes Work Instructions or Method Statements: done in more detail
- Quality Records audited: compliance checked with policies and procedures
- Internal auditors procedures are being followed
- External auditors check:
- Policies are adequate
- Procedures support policies
- Procedures are followed
- Helped by quality records and internal audit
- External auditors give certificate deeming quality system fit for purpose
- Documents approved by named people who are accountable
- Document review dates
- Document issue/version control
- A way to get "latest" copy, protection against old copies
- Documents flow from requirements
- 27001 offers guidance, other standards may be considered
-
How things should be, not how to do them
-
Set objectives and high-level operational requirements
-
Written by senior managers, approved by other senior managers or board-level directors
-
Short in length, long in duration
-
Clear and unambiguous
-
Short as possible
-
Cover majority of cases, process for dealing with exceptions
-
No lengthy background material
Examples
- Why are we securing things, and who from?
- Do we prefer cloud or on-premises solutions?
- What legislation do we need to comply with?
- Who approves changes to our security system?
-
How to do something correctly
-
Can be checked against policies to confirm they implement requirements and objectives (should state which policies they are derived from)
-
Generate quality records
-
Written by operational managers
-
Approved by their line managers
-
Step-by-step descriptions of what needs to be done
-
Always accurate and up-to-date
-
Immediately flagged for review if not working
-
Minimise opportunity for people to make inconsistent decisions
Examples
- How to deal with new staff
- How to manage departure of staff
- Who can be let into the building at night
- How to provision a new laptop
- Register of all info assets in the business
- Define scope of an information management system
- Should include everything that can affect security of information
- Everything you might want to record a threat against
- Things an attacker may want to control/destroy/compromise
- Things that might stop working
- Everything you might want to apply a control to
- Things to consider
- Systems and databases
- Payroll, HR, source control
- Expand downwards
- "What you can see"
- Boxes ("tin"), buildings, people, cabling
- Expand upwards
- Iterate and improve
- End up finding a lot of things you didn't know about
- Legacy systems and infrastructure
- Hard to add new systems and new dependencies
- Requires active co-operation
- Keeping up-to-date important to present current systems in use
- This often doesn't get done because...who can be bothered?
- Threats: people who might do things
- Compromise methods: how they might do things
- Risk: consequence to defender of threat's success
- Something that an attacker might attempt to do to an asset
- To assess, look at attacker capability and intent
- Attackers need both to be a danger
HMG #1
- Threat source: a person/organisation that desires to breach security and benefit
- Threat actor: a person that performs an attack
- Threat level: a level attributed to the to capability/motivation of a threat actor/source to an asset
Deterrable?
- Threat to lose job, clearance, livelihood, liberty...
- Appeal to "better nature", ethical codes, etc.
- How an attack may be carried out
- Only considers methods plausible for identified threat sources
- Risks are things that might happen to an asset, combining likelihood with impact
- Risks for ISO 27001 include fire and flood that don't have threat actors
- A list of things that might happen to assets, looking at likelihood and impact
- Multiplication is OK, breaks down for high impact/low likelihood events
- Sometimes need to consider high impact events even if low likelihood
- Weigh outcomes in light of likelihood
- A list of people that may attack you, looking at capability and motives
- Nation states have capability but for most people, limited intent
- Random fired dude likely has lots of intent, limited capability
FoI = focus of interest
- Authorised physical access to equipment
- No business to handle or logically access
- e.g. Cleaners, visitors
- Business role requires physical access to equipment
- No logical access to system
- May have temporary supervised access for test purposes
- e.g. people that transport, test, repair or replace hardware
- No legitimate or authorised business connectivity to the FoI
- May be able to access via business partners etc.
- e.g. Internet users where FoI has internet connectivity
- Needs to exchange data with FoI through a media exchange
- May be originator, recipient or both
- e.g. Someone using a third-party email host
- Within range of electronic, electromagnetic, etc. emanations from equipment
- May be in a position to jam communication paths
- Can potentially steal data with specialist equipment
- e.g. reading CRT screens without line-of-sight
- Registered user or account holder that uses applications within FoI
- Data can be stolen and leaked
- Data can be deleted and modified
- Provided standard facilities and privileges
- Gains unauthorised physical access to equipment
- e.g. someone breaking into a data centre
- By gaining access they have already broken the law so are more likely to cause damage or being more brutal and leaving traces
- Registered user/account holder that manages applications etc. within the FoI
- Usually can't be constrained like a normal user
- e.g. System Administrators
- Provides services to the FoI
- Communications
- Shared databases
- Internet access
- Controllers of service, could compromise any security
- Makes use of services advertised/provided by the FoI
- e.g. user of 'walk in' kiosk
- Someone who is an authorised user of services used by the FoI
- Not a registered user of the systems/services within the FoI
- e.g. FoI may rely on same power distribution service as user, user could make it unavailable, affecting FoI
- Someone in supply chain that provides, maintains, has access to software/equipment
- May have knowledge to allow/facilitate compromise of security property
- Idea that multiple defences add security
- If one defense is breached, many still stand
- Defences must be independent
- Physically, logically and in tools required to break
- Build a tree with attacker goal at the top
- Various ways of achieving attack descend from the goal
- Transfer a risk, by outsourcing
- Accept a risk
- Iteratively develop a risk treatment plan
- Apply controls
- Look at residual risk (remaining likelihood/impact)
- Assess whether residual risk is OK
- Repeat
- Each step should reduce likelihood or impact of risk
- Zero risk is unachievable
- Get risk as low as reasonably possible
- Costs will get in the way of removing risk
- Simple to put price on risk treatments
- Hard to calculate return
- Direct
- Consequences of imposing the control, unrelated to use response
- e.g. tighter email policies, issues when staff travel
- Indirect
- Consequences of imposing control
- Users work around control etc.
- User's working around policy may be worse than original risk
- e.g. tighter email policies, staff redirect email to personal account
- Consequences of imposing control
- Bet on an event happening
- Person taking out insurance "wins" if even occurs and they receive payment
- Insurer prices their bet based on likelihood
- If you can afford the maximum payout
- Put money in the bank
- Not paying insurance for cheap risks
- Insurance for more expensive risk
- Decision on which risks to insure against depends on risk appetite
- Companies often take policies with large excesses to reduce insurance cost
- Partially self-insuring
- Fines from ICO
- Reputation harm
- Penetration testing - employed to break security
- Tests security policy and execution
- Positive results
- Presume good security measures
- Negative results
- Shows a flaw, how it was used, how to fix
- Could be policy, implementation or execution
- Problems
- Tiger team can't hold a gun to your head or blackmail :(
- Motivations different to an attacker
- Likely won't focus on personnel weaknesses or internal processes
- Attempt to abuse policies with paper copies to hand
- Unrealistic
- Easy to focus on what we see a lot of e.g. packets blocks, viruses detected
- If we see more viruses detected are we doing better or worse?
- Is process being followed, controls in place, records being kept?
- Is process worthwhile, controls meet objectives?
- Can graph number of successful audits and actions raised
- Owner, CEO, COO and shareholders may be same person or same small group
- Decisions signed off by them
- No oversight on decision making
- Big decisions by committees
- Board report to shareholders via AGM
- Operational committees report to CEO and other board members
- Security team led by Chief Security Officer (CSO)
- Team perform risk assessment, produce treatment plan, define residual risk
- Present findings to CEO/Board
- If agreed, Chief Info Officer (CIO) does what the board says
- Management must report financial risk to shareholders and the SEC
- Looks at threat actors aiming at company's money/success
- Looks at controls
- Establishes residual risk
- IT:
- Access to funds/stock
- Access to customer data
- Accuracy of reporting
- IT decision making, part of legally-accountable corporate structure
- IT governance needs same controls/accountabilities as finance
- Committee drawn from whole business
- IT, Finance, HR minimum
- Ideally report to board or CEO
- CEO resolves conflict
- CSO/CIO present paper for approval from committee on big decisions
- Detailed minutes for accountability
- Supporting standard of 27001 ("Plan Do Check Act")
- Provides info for designing own risk management system
- A means to check risk management strategy is sensible
- Clear definitions of often-used terms
- Very similar to IS1 impact levels
- We don't just use IS1 because that's aimed at government with super-uber classified data
- Determining scope/FoI
- Risk: consequences and likelihood
- 8.2.2 asset register, 8.2.3 threat actors, 8.2.4-5 existing position, 8.2.6 impact levels for CIA
- Slightly different wording
- Modification
- Risk reduction and mitigation
- Retention
- Reducing risk and accepting remaining
- Avoidance
- Transfer risk
- Don't do the thing that has risk...
- Sharing
- Transfer risk partially
- Residual risk to be formally signed off
- Training, governance and discussion
- Is anything changing?
- Is it working?
- Contains lots of useful stuff as a good starting point
- e.g. compromise methods, assets, threats
-
Scope the ISMS (Information Security Management Systems)
-
Build asset register
-
Analyse threats
-
Build risk register
-
Impose controls
-
Operate and measure
-
Improve
-
Hard to get existing company to:
- Rent kit
- Replace old kit (time and money was put into)
- Change everything in a short time
- Change in general
-
Existing processes
- Must be analysed
- May be useful
- May be a waste of time
- Must be analysed
-
Existing staff
- May need new staff with skills
- May no longer need old staff