policies
play

policies Security in Organizations 2011 Eric Verheul 1 - PowerPoint PPT Presentation

Information security policies Security in Organizations 2011 Eric Verheul 1 Literature Main literature for this lecture: 1. ISO 27001 and ISO 27002 2. Besluit voorschrift informatiebeveiliging rijksdienst 2007 (www.wetten.nl) 3.


  1. Information security policies Security in Organizations 2011 Eric Verheul 1

  2. Literature Main literature for this lecture: 1. ISO 27001 and ISO 27002 2. Besluit voorschrift informatiebeveiliging rijksdienst 2007 (www.wetten.nl) 3. Beveiligingsvoorschrift Rijksdienst 2005 (www.wetten.nl) Variants on ISO 2700* 2

  3. Outline • Introduction • Requirements on IS policies from ISO 2700x and VIR-2007 • Organization of information security • IS policy layout • Some first feed-back from assignment #1 3

  4. Introduction • Every organization needs an “IS policy” • Most organization have an IS policy but in many cases it is just a paper tiger: • not sufficiently concrete • not in line what is actual done operational • and most of all … not implemented • I am giving you my perspective on IS policy based experience and on ISO 2700x and Voorschrift Informatiebeveiliging Rijksdienst 2007 4

  5. Introduction Requirements Strategic IS Senior management IS policy Reporting IS guidelines, Tactical IS Line management parameters Operations Operational IS IS procedures (administrators, settings employees, external parties) • The IS policy is a means of communication IS requirements to organization • The organization communicates back through (progress) reports 5

  6. Requirements from ISO 2700x and VIR ISO 2700x • Recall ISO 27001 describes an ISMS that refers to ISO 27002 for security controls • Both ISO 27001 and ISO 27002 have requirements on IS policy • ISO 27002: Chapter 5 „Security Policy‟ • ISO 27001: Clause 4.2.1 b) 6

  7. Requirements from ISO 27002 Section 5.1.1 Control An information security policy document should be approved by management, and published and communicated to all employees and relevant external parties. Guidance • Definition of information security • Management intent and support • Framework for implementing IS • General principles to follow (e.g., legal, awareness, BCP, security incidents) • Definitions of roles and responsibilities • References to documentation 7

  8. Requirements from ISO 27002 Section 5.1.2 Control The information security policy should be reviewed at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness. Guidance on input • Feedback from interested parties • Results from (independent) reviews • Status of preventive and corrective actions • Results of previous management reviews • Changes that could affect the organization‟s IS approach • Trends related to threats and vulnerabilities • Reported information security incidents • Recommendations provided by relevant authorities 8

  9. Requirements from ISO 27002 Section 5.1.2 Control The information security policy should be reviewed at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness. Guidance on output • Improvement of the organization‟s approach to managing information security and its processes; • Improvement of control objectives and controls • Improvement in the allocation of resources and responsibilities. Note: the ISO 27002 Chapter 5 requirements resemble the ISO 27001 PDCA cycle. 9

  10. Requirements from ISO 27001 Clause 4.2.1 b) 10

  11. Requirements from ISO 2700x and VIR Voorschrift informatiebeveiliging rijksdienst 2007 (VIR) • Applicable to the „ Rijksdienst ‟ (central government) most notably the departments („ ministeries ‟) • Applicable to all information regardless of its form • Stipulates that information security is the responsibility of line management • Article 3 sets requirements on an information security policy • Article 4 describes responsibilities of line management 11

  12. Requirements from VIR article 3 An information security policy document includes: • Strategic principles and conditions on IS • Description of the IS organization including responsibilities • IS baselines • Frequency of IS policy review • Descriptions on how security awareness is increased The IS policy is approved by the Secretary General (=highest civil servant within department) and is end responsible for its implementation. 12

  13. Requirements from VIR article 4 Line management • is end responsible for information security of his/her information systems • sets security controls based on a risk assessment • is end responsible for the implementation of these security controls • Periodically evaluates information security and adjusts information accordingly 13

  14. Outline • Introduction • Requirements on IS policies from ISO 2700x and VIR-2007 • Organization of information security • IS policy layout • Some first feed-back from assignment #1 14

  15. The IS process in helicopter view • Setting the IS policy • Allocation of IS roles and responsibilities Plan • Setting security baselines • ISMS implementation ( inc. setting risk assessment methodology ) • Implementing security baselines • Conducting risk assessments Do • Implementation of additional controls • Reviewing compliance with policy • Reviewing IS effectiveness Check • Periodic review of IS by management Act • Planning of corrective actions Information Security & Risk Management

  16. Distinguished IS parties within organization • Senior Management • Security office • Line management (system owners) • Internal / external auditors • Supporting internal / external services • IS projects • Employees of the organization Information Security & Risk Management

  17. Senior Management What: • Giving commitment on information security • Approval of IS policy • Bootstrapping the ISMS (security officer) • Providing resources and budget • Management of serious security incidents • Periodic review of IS („Act‟), including adjusting the IS policy • Sponsoring of IS projects Reports to: • Stakeholders • Supervisory board Information Security & Risk Management

  18. Security Officer What: • IS center point; sits between senior management and the organization • Drafting / revising information security including security baselines (but not approval!) • Providing specific guidelines on information security • Daily supervision on information security • Security incident handling • Progress control on IS including IS projects • Initiation of IS projects • Arranging the periodic management review Reports to: Senior management Information Security & Risk Management

  19. Security Office CISO „ Headquarters ‟ Business Business Business Business BISO Unit Unit Unit Unit Locatie Locatie Locatie Locatie Locatie Locatie Locatie Locatie ISO Locatie Locatie Location Locatie Location Locatie Location Location

  20. Line management („system owners‟) What: • Conducting risk assessments on their systems • Implementing security (baselines, additional controls) • Agreements with internal / external parties on security, e.g. as arising from risk assessments • Supervision on information security, e.g. talking to non- compliant employees Reports to: Security Office Information Security & Risk Management

  21. Line management („system owners‟) Risk Criteria related to Confidentiality Risk Criteria related to Availability Risk Criteria related to Integrity Low Incorrectness of information can result in:  fraud of less than Euro 2.500  no bad publicity  no damage to the operational management due to incorrect management decisions  no risk for liability or non-compliance with rules and regulations Medium Incorrectness of information can result in:  fraud of less than Euro 25.000  bad publicity in local news media  limited damage to the operational management due to incorrect management decisions  limited risk for liability or non-compliance with rules and regulations High Incorrectness of information can result in:  fraud of substantially more than Euro 25.000  bad publicity in national news media  unacceptable damage to the operational management due to incorrect management decisions  high risk for liability or non-compliance with rules and regulations Information Security & Risk Management

  22. Internal / external audit What: • Conducting audits on compliance with IS policy • Conducting audits on ISMS: • are all parties doing the things they should do? • is the ISMS effective? • Conducting specific audits, e.g., compliance with baselines • Should be independent Reports to: Senior Management Information Security & Risk Management

  23. Supporting internal / external services Information Security & Risk Management

  24. Supporting internal / external services What: • IT department (!), facility department, HR, legal department etc. • employment agencies, contractors, couriers, security guards • Compare ISO 27002 chapters • Implementing security baselines • Implementing specific additional security controls arising from risk assessments Reports to: Security office „Clients‟ (line management) Information Security & Risk Management

  25. IS projects What: • Implementation of specific security (e.g. PKI, IPS, IAM) Reports to: • Project leaders • Security office Information Security & Risk Management

  26. Employees of the organization What: • Adhering to security baselines and specific controls arising from risk assessments • Reporting security incidents Reports to: • Security office • Line management Information Security & Risk Management

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend