Top Banner
OCTAVE-S OCTAVE-S on TradeSolution Inc.
13

OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Jan 02, 2016

Download

Documents

Marybeth Owens
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

OCTAVE-SOCTAVE-Son TradeSolution Inc.

Page 2: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

IntroductionIntroduction

• Phase 1: Critical Assets and threats

• Phase 2: Critical IT Components • Phase 3: Changes Required in current

strategy 

Page 3: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

TradeSolutions Inc. TradeSolutions Inc. 

• A mid sized company with an office in Sweden • Specialized in providing trading solution and

surveillance technology for marketplaces, banks.

 • Develops, customize and maintain trading

platform ‘TradePro’. • Customers access TradePro using the client

application to do trading

Page 4: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

TradeSolutions Inc. TradeSolutions Inc. 

• 200 local workstations with windows XP running• File Server, Web Server, Database Server, MS

Exchange 2007 mail server.•  Production server which hosts TradePro• Centrally stored data is located at two different

premises (sites 1 and 2)• Every employee can access the file server,

database server and web server from remote area using VPN

Page 5: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Impact CriteriaImpact Criteria

• Reputation: Customer loss >10%

• Finance: Annual financial loss > 5 Million SEK

• Productivity: Staff work hours increase > 20% • Fine: > 2.5 Million SEK

Page 6: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Critical AssetsCritical Assets

• Code Repository

• Production Server

• Mail Server

• Personal Computers

• TradePro teamPhase1: Asset-Based Threat Profiles

Page 7: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Phase 2: Identify Infrastructure Vulnerabilities

Critical IT componentCritical IT component

Page 8: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

ThreatsThreats with Highest Impact with Highest Impact

Code Repository• Disclosure of the code

o Competitors, hackers (External)o Employees (Internal)

• High impact on reputation, finance and productivity

Production server• Interruption or destruction 

o Competitors, hackers (External)o Internal IT team (Internal)o system problem, power supply and natural disaster

• High impact on reputation and finance

Phase 3: Develop Security Strategy and Plans

Page 9: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Personal Computers• Interruption or destruction 

o Competitors, hackers (External) o System problems and power supply

• High impact on reputation and finance.

Mail Server• Disclosure of the messages

o Hackers (External) o Developers and internal IT (Internal)

• High impact on reputation and finance

TradePro Team• Unavailability of the team due to illness, family problems,

retirement, resignation and lay off• High impact on productivity and finance

Phase 3: Develop Security Strategy and Plans

ThreatsThreats with Highest Impact with Highest Impact

Page 10: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Authentication and Authorization (Red)

• Introduce Role based authorization scheme as a formal mechanism to restrict unauthorized users to access critical assets.

• Employees should not be given administrative privileges.

• The security policy should include the proper procedures to review the access rights of any employee.

• Internal IT team must take care of these issues

Phase 3: Develop Security Strategy and Plans

Protection Strategy & Risk Mitigation PlansProtection Strategy & Risk Mitigation Plans

Page 11: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

System and Network management (Yellow)

• Formal mechanisms should be defined to enforce Security Policy

• Access to USB and CD ROMs should be limited• Checking the systems to remove any unnecessary

software.• Implement an auditing mechanism to verify whether

the security requirements are met.• Introduce new network managing and monitoring tools

to reduce the manual labor.• Implement a secure email system.• Internal IT decides and tracks this part.

Phase 3: Develop Security Strategy and Plans

Protection Strategy & Risk Mitigation PlansProtection Strategy & Risk Mitigation Plans

Page 12: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Security awareness and training (Yellow) For all employees• Conduct awareness courses.• Workshop for new secure email system• Trainers from inside the company • Responsibility of senior management

For Internal IT• Professional Workshop for new purchased security

tools to protect code repository, production server and secure mail server.

• Trainers from outside the company• Responsibility of security manager

Phase 3: Develop Security Strategy and Plans

Protection Strategy & Risk Mitigation PlansProtection Strategy & Risk Mitigation Plans

Page 13: OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.

Next StepNext Step

• Adequate funding should be allocated.• Senior and security management supervision is

needed.• Security courses should begin just after the

deployment of new tools and implementation of authorization policies.

• Conduct OCTAVE-S six months after the completion of general security awareness courses for all employees.