Top Banner
Office of the Government Chief Information Officer (OGCIO) Information Security Best Practices for SMEs Presented by Sammy Leung
44

Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Sep 13, 2018

Download

Documents

ngodat
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Office of the Government Chief Information Officer (OGCIO)

Information Security Best Practices for SMEs

Presented by Sammy Leung

Page 2: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Important Notice All rights, including copyright, in this PowerPoint file are owned and reserved by the Office of the Government Chief Information Officer (OGCIO). Unless prior permission in writing is given by OGCIO, you may not use the materials other than for your personal learning and in the course of your official duty.

重 要 告 示 政府資訊科技總監辦公室持有並保留本簡報檔案包括版權在內的所有權益。除預先獲得本辦公室書面許可外,本簡報檔案只可用作個人學習及處 理公務上用途。

Page 3: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Disclaimer The security sharing follows is based on well known security practices in the industry. It has no relations with the security measures in the OGCIO.

聲 明 這個講座所分享的內容是基於行業提倡的安全實踐,它與政府資訊科技總監辦公室的保安措施無關。

Page 4: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security

Management Quartet

Web Security

Cloud Security

Bring Your

Own Device

(BYOD)

Page 5: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

個案一:全球擁有超過三千萬用戶的另類交友網站被黑客入侵,報道稱,有些敏感的個人資料更一度被公諸網上。

Why Does Information Security Concern Me?

個案二 :酒店集團旗下2間香港酒店,去年6月至今年2月均有住客的信用卡資料被黑客盜取。

Page 6: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Why Does Information Security Concern Me?

Source: 賽門鐵克 - 2015 年網路安全威脅研究報告,第 20 期 https://www.symantec.com/zh/tw/security_response/publications/threatreport.jsp

Page 7: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management

Quartet

Page 8: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet

Assessing Security Risks

Implementing & Maintaining a

Secure Framework

Monitoring & Recording

Reviewing

&

Improving

Page 9: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet

Assessing Security Risks

Implementing & Maintaining a

Secure Framework

Monitoring & Recording

Reviewing

&

Improving

Page 10: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet • Assessing Security Risks

Information Asset

Confidentiality Integrity Availability

Personal Data Privacy

Intellectual property (design, art work)

Price List

Client Contact Database

Page 11: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet

Assessing Security Risks

Implementing & Maintaining a

Secure Framework

Monitoring & Recording

Reviewing

&

Improving

Policy, guidelines

Technical measures

Page 12: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet • Implementing & Maintaining a Secure Framework

• Security Policy

• Ensure everyone has a common set of expectation and objectives • Specify requirements • Define the roles and responsibilities • Accepted and validated by the board and executive management

• Examples • Baseline IT Security Policy (S17) • IT Security Guidelines (G3) http://www.ogcio.gov.hk/en/information_security/policy_and_gui

delines/

• Guidelines

• Provide general guidance

Page 13: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

OGCIO’s IT Security Policy and Guidelines

Page 14: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Baseline IT Security Policy (S17)

Page 15: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Baseline IT Security Policy (S17)

Page 16: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet • Implementing & Maintaining a Secure Framework

• Example of Policy, Standards, Guidelines

• ISO/IEC 27000 Family • ISO/IEC 27001:2013

• ISMS Requirements • ISO/IEC 27002:2013

• Code of practice for information security controls

• Collection of policies and guidelines available at InfoSec http://www.infosec.gov.hk/english/technical/standards.html

Page 17: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

InfoSec > Technical References > IT Security Standards and Best Practices

Page 18: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet • Implementing & Maintaining a Secure Framework

• Example of Policy, Standards, Guidelines

• HKCERT • Bring Your Own Device (BYOD) Security Guidelines • Cloud Storage Security • Guideline of Web Security • Guideline of Mobile Security https://www.hkcert.org/security-guideline

Page 19: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

HKCERT > Publications > Security Guideline

Page 20: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Information Security Management Quartet • Implementing & Maintaining a Secure Framework

• Select and Implement Technological Measures

Cloud Security Web Security BYOD Security

Page 21: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Bring Your Own Device (BYOD)

Security

Page 22: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Bring Your Own Device (BYOD)

• Risk

• Data leakage • Remote intrusion • Cross platform infection • Strategy

• Which information and system are available for BYOD • BYOD Policy, Best Practices • User awareness and user buy-in

Page 23: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

- Encrypted WiFi network (e.g. WPA2) - MAC address filtering

- Setup VPN

WPA2 VPN

Page 24: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

- Setup a firewall for BYOD to connect to company network

- Adopt Mobile Device Management (MDM) - detect jailbroken device - create security profile - track and control running apps

Firewall MDM

Page 25: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Update

圖片來源: GuidingTech - [Quick Tip] How to Delay Android Screen Lock Time http://www.guidingtech.com/16416/delay-android-screen-lock-time/

Page 26: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Web Security

Page 27: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Web Security • User-side

• Update web browser

• Update Adobe Flash • Update Java

• Remove all unused plug-in and extension

Page 28: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

• Enable browser's anti-phishing feature

Page 29: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

• Disable browser's plugins autorun feature

Page 30: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Web Security Guideline • User-side

Page 31: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Web Security • User-side

• Beware of shortened URL

http://tinyurl.com/XXXXXX into http://preview.tinyurl.com/XXXXXX http://bit.ly/XXXXXX+ http://bit.ly/XXXXXX into http://bit.ly/info/XXXXXX http://goo.gl/XXXXX+ http://goo.gl/XXXXX into http://goo.gl/info/XXXXX

• Use preview feature

Page 33: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Cloud Security

Page 34: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Cloud Security • Cloud Service

• Selecting Cloud Service Providers

• Read the Terms of Service and Security & Privacy Policy • How is your data stored and protected?

• Clear policy on data protection • Good reputation

• How to report an incident?

• Clear reporting mechanism • Provide incident problem report

• Does the Privacy Policy follow the data protection principles of the Personal Data (Privacy) Ordinance?

• PCPD’s Cloud Computing leaflet http://www.pcpd.org.hk/english/resources_centre/publications/information_leaflet/flipbook/cloud_computing/index.html#1/z

Page 35: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Cloud Security • Cloud Service

• Selecting Cloud Service Providers

• Data Ownership • Check whether the service provider can use, disclose, or make your information public • Check whether data can be permanently erased from the cloud, backup, when data are deleted or when you terminate the service.

• Other concerns: • Data in motion – Support SSL • Strong authentication – 2-factor authentication; 2-step verification • Access control - different access privilege for different users/groups

Page 36: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Cloud Security • Cloud Service

• Selecting Cloud Service Providers

• Supported by an independent information security management certification (e.g. ISO/IEC 27001)

• Read the scope statement carefully

Page 37: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Cloud Security • Cloud Service

• Selecting Cloud Service Providers

• Other References:

• ISO/IEC 27000 Family • ISO/IEC 27017:2013

• Code of practice for information security controls based on ISO/IEC 27002 for cloud services • Under development

• ISO/IEC 27018:2014 • Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

Page 39: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Other Resources

Page 40: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Twitter

https://twitter.com/cybersecurityhk

Page 41: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

www.infosec.gov.hk

Youtube Channel

infosecgovhk

Page 42: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

香港電腦保安事故協調中心 (HKCERT) https://www.hkcert.org 香港警務處 - 預防科技罪案 http://www.police.gov.hk/ppp_tc/04_crime_matters/tcd/index.html 香港警務處 - 童叟無欺 http://www.police.gov.hk/ppp_tc/04_crime_matters/ccb/index.html 香港個人資料私隱專員公署 http://www.pcpd.org.hk

Page 43: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Thank You

Page 44: Information Security Best Practices for SMEs€¢ ISO/IEC 27002:2013 • Code of practice for information security controls • Collection of policies and guidelines available at ...

Presentation template and clipart from PresenterMedia