how to share best security practices
play

How to Share Best Security Practices Urpo Kaila, EUDAT Security - PowerPoint PPT Presentation

How to Share Best Security Practices Urpo Kaila, EUDAT Security Officer urpo.kaila@csc.fi, security@eudat.eu WISE W orkshop for I nformation S ecurity for E -infrastructures 2015-10-22, Barcelona This work is licensed under the Creative Commons


  1. How to Share Best Security Practices Urpo Kaila, EUDAT Security Officer urpo.kaila@csc.fi, security@eudat.eu WISE W orkshop for I nformation S ecurity for E -infrastructures 2015-10-22, Barcelona This work is licensed under the Creative Commons CC-BY 4.0 licence. Attribution: EUDAT – www.eudat.eu www.eudat.eu EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No. 654065

  2. Standard Building Blocks of Information Security Several ¡ ¡frameworks ¡available ¡ ¡ Security ¡Reviews ¡ and ¡Tes9ng ¡ Security ¡and ¡Risk ¡ Governance ¡ ¡ ¡Management ¡ & ¡ITSM ¡ ¡ So<ware ¡and ¡Service ¡ Access ¡ Development ¡Security ¡ Controls ¡ ¡ Asset ¡Management ¡ C onfiden9ality ¡ I ntegrity ¡ A vailability ¡ Computer ¡Security ¡ Network ¡Security ¡ Opera9onal ¡Security ¡ Assets ¡-­‑> ¡Risks ¡-­‑> ¡Controls ¡-­‑> ¡Metrics ¡

  3. Different kind and levels of security skills IT Security Managers Directors Auditors Service Managers Programmers Administrators, IT - Support Operators Experts on Security Managers, Users technical security Operating Engineers

  4. Well known legacy professional security skills definitions and certifications Generic Security Management CISSP (ISC) ² CBK CISM ISACA COBIT GCED PECB GCIH … GSNA … Technical Security Vendor specific (includes security) SANS MTA CEH BoK RHCSE … …

  5. How do you measure security skills? By bragging? By experience? CV? By trainings obtained? By certifications achieved? Skills certifications are standard requirements in the private sector Obtaining and maintaining such certification is somewhat expensive A certification shows that a person knows at least the basics of the trade – it does not prove that the person is a senior professional, which requires more experience.

  6. A common problem with generic security skills and security guidelines It is difficult to apply them efficiently in your organisation Proceed from outlining to to implementation

  7. How can skills become practice? The principles and theoretical skills must be adapted in your context in an reasonable and in an efficient way Best practices should be implemented Definition (wikipedia): A best practice is a method that has consistently shown superior. Best practices are used to maintain quality and can be based on benchmarking. Best practices are a feature in many of accredited management standards.

  8. How could implementation be easier? Necessary prerequisites Skills Management support A plan with check-ups Leadership (it will not just happen) Share experiences on how to implement with your peers Also cover confidential/sensitive information Informal information often more crucial than formal documents Apply the House of Chatham rule One size does not fit all

  9. A successful track record I’ve had rewarding experiences in sharing best practices with Several government agencies • Private companies • NREN’s • Universities • Research infrastructures • It would probably have been extremely difficult for us to achieve ISO 27001 without sharing best practices earlier • The standards and frameworks tell you what to do • Best practices tells you, by examples, how to do it

  10. Methods of sharing best practices Articles, books Presentations Trainings Reviews and audits Guidelines Site visits Workshops Informal communication N.B. Everything does not need to be formalised, informal f2f meetings are also very valuable

  11. Suggestions for joint ISMS activities Joint skills transfer program on operational security A training kit for Site Security Officers A non-profit lightweight skills certification for Site- Security Officers A voluntary practice sharing program for Site visits for ISMS sharing Peer reviews/audits of ISMS Articles on current ISMS practices Develop a multilateral NDA covering all of above An effort to apply resources and funding for all above I personally volunteer to contribute if feasible

  12. Thank you! All comments are welcome to: urpo.kaila@csc.fi EUDAT related security incidents -> csirt@eudat.eu Other EUDAT security related -> security@eudat.eu www.eudat.eu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend