Top Banner
1 11/17/2006 Dr. Awajan Arafat 1 Security Risks Analysis Dr. Arafat Awajan 2006 11/17/2006 Dr. Awajan Arafat 2 Contingency Planning
29

Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

Jul 22, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

1

11/17/2006 Dr. Awajan Arafat 1

Security Risks Analysis

Dr. Arafat Awajan2006

11/17/2006 Dr. Awajan Arafat 2

Contingency Planning

Page 2: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

2

11/17/2006 Dr. Awajan Arafat 3

Introduction

Planning for the unexpected event, when the use of information technology is disrupted and business operations become in danger Procedures are required that will permit the organization to continue essential functions if information technology support is interruptedOver 40% of businesses that don't have a disaster plan go out of business after a major loss

11/17/2006 Dr. Awajan Arafat 4

What is Contingency Planning?The overall planning for unexpected events is called contingency planning (CP)It is how organizational planners position their organizations to prepare for, detect, react to, and recover from events that threaten the security of information resources and assetsMain goal: restoration to normal modes of operation with minimum cost and disruption to normal business activities after an unexpected event

Page 3: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

3

11/17/2006 Dr. Awajan Arafat 5

CP Components

Incident response planning (IRP) focuses on immediate response Disaster recovery planning (DRP) focuses on restoring operations at the primary site after disasters occurBusiness continuity planning (BCP) facilitates establishment of operations at an alternate site

11/17/2006 Dr. Awajan Arafat 6

Contingency Planning

Page 4: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

4

11/17/2006 Dr. Awajan Arafat 7

CP Components (Continued)

To ensure continuity across all CP processes during planning process, contingency planners should:

Identify the mission- or business-critical functionsIdentify resources that support critical functionsAnticipate potential contingencies or disastersSelect contingency planning strategiesImplement selected strategyTest and revise contingency plans

11/17/2006 Dr. Awajan Arafat 8

CP Operations

Four teams are involved in contingency planning and contingency operations:

CP team Incident recovery (IR) teamDisaster recovery (DR) team Business continuity plan (BC) team

Page 5: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

5

11/17/2006 Dr. Awajan Arafat 9

Incident Response

11/17/2006 Dr. Awajan Arafat 10

Incident Response Plan

IRP:Detailed set of processes and procedures that anticipate, detect, and mitigate the impact of an unexpected event that might compromise information resources and assets

Incident response (IR):Set of procedures that commence when an incident is detected

Page 6: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

6

11/17/2006 Dr. Awajan Arafat 11

Incident Response Plan

When a threat becomes a valid attack, it is classified as an information security incident if:

It is directed against information assetsIt has a realistic chance of successIt threatens the confidentiality, integrity, or availability of information assets

It is important to understand that IR is a reactive measure, not a preventive one

11/17/2006 Dr. Awajan Arafat 12

Before the IncidentPlanners draft a third set of procedures, those tasks that must be performed in advance of the incidentInclude:

Details of data backup schedulesDisaster recovery preparationTraining schedulesTesting plansCopies of service agreementsBusiness continuity plans

Page 7: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

7

11/17/2006 Dr. Awajan Arafat 13

During the Incident

Planners develop and document the procedures that must be performed during the incidentThese procedures are grouped and assigned to various rolesPlanning committee drafts a set of function-specific procedures

11/17/2006 Dr. Awajan Arafat 14

After the Incident

Once the procedures for handling an incident are drafted, planners develop and document the procedures that must be performed immediately after the incident has ceasedSeparate functional areas may develop different procedures

Page 8: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

8

11/17/2006 Dr. Awajan Arafat 15

11/17/2006 Dr. Awajan Arafat 16

Preparing to Plan

Planning requires detailed understanding of information systems and threats they faceIR planning team seeks to develop pre-defined responses that guide users through steps needed to respond to an incidentPre-defining incident responses enables rapid reaction without confusion or wasted time and effort

Page 9: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

9

11/17/2006 Dr. Awajan Arafat 17

Preparing to Plan

IR team consists of professionals capable of handling information systems and functional areas affected by an incidentEach member of the IR team must:

Know his or her specific roleWork in concert with each otherExecute the objectives of the IRP

11/17/2006 Dr. Awajan Arafat 18

Incident DetectionChallenge is determining whether an event is routine system use or an actual incidentIncident classification: process of examining a possible incident and determining whether or not it constitutes actual incidentInitial reports from end users, intrusion detection systems, host- and network-based virus detection software, and systems administrators are all ways to track and detect incident candidatesCareful training allows everyone to relay vital information to the IR team

Page 10: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

10

11/17/2006 Dr. Awajan Arafat 19

Incident Indicators

Probable IndicatorsPresence of unfamiliar filesPresence or execution of unknown programs or processesUnusual consumption of computing resourcesUnusual system crashesActivities at unexpected timesPresence of new accountsReported attacks

11/17/2006 Dr. Awajan Arafat 20

Incident IndicatorsDefinite Indicators

Use of dormant accountsChanges to logsPresence of hacker toolsNotifications by partner or peerNotification by hacker

Page 11: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

11

11/17/2006 Dr. Awajan Arafat 21

Occurrences of Incidents

Loss of availabilityLoss of integrityLoss of confidentialityViolation of policyViolation of rules

11/17/2006 Dr. Awajan Arafat 22

Incident ResponseOnce an actual incident has been confirmed and properly classified, the IR team moves from detection phase to reaction phaseIn the incident response phase, a number of action steps taken by the IR team and others must occur quickly and may occur concurrentlyThese steps include notification of key personnel, the assignment of tasks, and documentation of the incident

Page 12: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

12

11/17/2006 Dr. Awajan Arafat 23

Notification of Key PersonnelAs soon as incident is declared, the right people must be immediately notified in the right orderAlert list: document containing contact information of individuals to be notified in the event of actual incident either sequentially or hierarchicallyAlert message: scripted description of incidentOther key personnel: must also be notified only after incident has been confirmed, but before media or other external sources learn of it

11/17/2006 Dr. Awajan Arafat 24

Documenting an IncidentAs soon as an incident has been confirmed and the notification process is underway, the team should begin documentation

Record the who, what, when, where, why and how of each action taken while the incident is occurringThe documentation may serve as a case study after the fact to determine if right actions were taken and if they were effectiveIt also prove that the organization did everything possible to prevent the spread of the incident

Page 13: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

13

11/17/2006 Dr. Awajan Arafat 25

Incident Containment Strategies

Essential task of IR is to stop the incident or contain its impactIncident containment strategies focus on two tasks:

Stopping the incidentRecovering control of the systems

11/17/2006 Dr. Awajan Arafat 26

Incident Containment Strategies

IR team can stop the incident and attempt to recover control by means of several strategies:

Disconnect affected communication circuitsDynamically apply filtering rules to limit certain types of network accessDisable compromised user accounts Reconfigure firewalls to block problem trafficTemporarily disable compromised process or service Take down conduit application or serverStop all computers and network devices

Page 14: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

14

11/17/2006 Dr. Awajan Arafat 27

Incident Escalation

An incident may increase in scope or severity to the point that the IRP cannot adequately contain the incidentEach organization will have to determine, during the business impact analysis, the point at which the incident becomes a disasterThe organization must also document when to involve outside response

11/17/2006 Dr. Awajan Arafat 28

Initiating Incident RecoveryOnce the incident has been contained, and system control regained, incident recovery can beginIR team must assess full extent of damage in order to determine what must be done to restore systemsImmediate determination of the scope of the breach of confidentiality, integrity, and availability of information and information assets is called incident damage assessmentThose who document the damage must be trained to collect and preserve evidence, in case the incident is part of a crime or results in a civil action

Page 15: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

15

11/17/2006 Dr. Awajan Arafat 29

Recovery Process

Once the extent of the damage has been determined, the recovery process begins:

Identify and resolve vulnerabilities that allowed incident to occur and spreadAddress, install, and replace/upgrade safeguards that failed to stop or limit the incident, or were missing from system in the first placeEvaluate monitoring capabilities (if present) to improve detection and reporting methods, or install new monitoring capabilities

11/17/2006 Dr. Awajan Arafat 30

Recovery Process

Restore data from backups as neededRestore services and processes in use where compromised (and interrupted) services and processes must be examined, cleaned, and then restoredContinuously monitor systemRestore the confidence of the members of the organization’s communities of interest

Page 16: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

16

11/17/2006 Dr. Awajan Arafat 31

After Action Review

Before returning to routine duties, the IR team must conduct an after-action review, or AAR AAR: detailed examination of events that occurred All team members:

Review their actions during the incidentIdentify areas where the IR plan worked, didn’t work, or should improve

11/17/2006 Dr. Awajan Arafat 32

Law Enforcement Involvement

When incident violates civil or criminal law, it is organization’s responsibility to notify proper authoritiesSelecting appropriate law enforcement agency depends on the type of crime committed: international, or Local

Page 17: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

17

11/17/2006 Dr. Awajan Arafat 33

Disaster Recovery

11/17/2006 Dr. Awajan Arafat 34

Disaster RecoveryPrepare the organization for and recovery from a disaster, whether natural or man madeIn general, an incident is a disaster when:

organization is unable to contain or control the impact of an incidentORlevel of damage or destruction from incident is so severe, the organization is unable to quickly recover

Key role of DRP: defining how to reestablish operations of the organization

Page 18: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

18

11/17/2006 Dr. Awajan Arafat 35

Disaster Classifications

A DRP can classify disasters in a number of waysMost common method:

Natural disasters Man-made disasters

Another way: by speed of developmentRapid onset disasters Slow onset disasters

11/17/2006 Dr. Awajan Arafat 36

Planning for Disaster

Key points in the DRP:Clear delegation of roles and responsibilitiesExecution of alert list and notification of key personnelClear establishment of prioritiesDocumentation of the disasterAction steps to mitigate the impact Alternative implementations for various systems components

Page 19: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

19

11/17/2006 Dr. Awajan Arafat 37

Crisis Management

Set of focused steps taken during and after a disaster that deal primarily with people involvedTwo key tasks of crisis management team:

Verifying personnel statusActivating alert list

11/17/2006 Dr. Awajan Arafat 38

Crisis Management

Crisis management team manages event:Supporting personnel during crisis Determining event's impact on normal business operationsWhen necessary, making a disaster declarationKeeping public informed about event Communicating with outside parties

Page 20: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

20

11/17/2006 Dr. Awajan Arafat 39

Business Continuity

11/17/2006 Dr. Awajan Arafat 40

Business Continuity PlanningIt aims at ensuring that critical business functions can continue in a disaster managed by the CEO of organizationActivated and executed concurrently with the DRP when needed Reestablishes critical functions at alternate site (DRP focuses on reestablishment at primary site)Relies on identification of critical business functions and the resources to support them

Page 21: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

21

11/17/2006 Dr. Awajan Arafat 41

Continuity StrategiesSeveral continuity strategies for business continuity

Determining factor is usually costThree exclusive-use options:

Hot sitesWarm sitesCold sites

Three shared-use options:TimeshareService bureausMutual agreements

11/17/2006 Dr. Awajan Arafat 42

Exclusive Use Options

Hot Sites

Fully configured computer facility with all services

Warm Sites

Like hot site, but software applications not kept fully prepared

Cold Sites

Only basic services and facilities kept in readiness

Page 22: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

22

11/17/2006 Dr. Awajan Arafat 43

Shared Use Options

Service BureausAgency that provides physical facilities

Mutual AgreementsContract between two organizations to assist

Specialized alternatives:Rolling mobile site

Externally stored resources

11/17/2006 Dr. Awajan Arafat 44

Off-Site Disaster Data Storage

To get any BCP site running quickly, organization must be able to recover dataOptions include:

Electronic vaulting: bulk batch-transfer of data to an off-site facilityRemote Journaling: transfer of live transactions to an off-site facilityDatabase shadowing: storage of duplicate online transaction data

Page 23: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

23

11/17/2006 Dr. Awajan Arafat 45

Disaster Recovery and Business Continuity Planning

11/17/2006 Dr. Awajan Arafat 46

Contingency Plan Implementation Timeline

Page 24: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

24

11/17/2006 Dr. Awajan Arafat 47

Putting a Contingency Plan Together

The CP team should include:Team leaderProject ManagerTeam Members

Business managers Information technology managers Information security managers

11/17/2006 Dr. Awajan Arafat 48

Major Tasks in Contingency Planning

Page 25: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

25

11/17/2006 Dr. Awajan Arafat 49

Business Impact Analysis (BIA)

BIA Provides information about systems/threats and detailed scenarios for each potential attackAssumes controls have been bypassed or are ineffective and attack was successful

CP team conducts BIA in the following stages:Threat attack identificationBusiness unit analysisAttack success scenariosPotential damage assessmentSubordinate plan classification

11/17/2006 Dr. Awajan Arafat 50

Threat/Attack Identification and Prioritization

An organization that uses risk management process will have identified and prioritized threats These organizations update threat list and add one additional piece of information --the attack profileAttack profile: detailed description of activities that occur during an attack

Page 26: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

26

11/17/2006 Dr. Awajan Arafat 51

Business Unit Analysis

Second major BIA task is analysis and prioritization of business functions within the organization

11/17/2006 Dr. Awajan Arafat 52

Attack Success Scenario Development

Next create a series of scenarios depicting impact of successful attack on each functional areaAttack profiles should include scenarios depicting typical attack including:

MethodologyIndicatorsbroad consequences

More details are added including alternate outcomes—best, worst, and most likely

Page 27: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

27

11/17/2006 Dr. Awajan Arafat 53

Potential Damage Assessment

From detailed scenarios, the BIA planning team must estimate the cost of the best, worst, and most likely outcomes by preparing an attack scenario end caseThis will allow identification of what must be done to recover from each possible case

11/17/2006 Dr. Awajan Arafat 54

Combining the DRP and the BCP

Because DRP and BCP are closely related, most organizations prepare them concurrently and may combine them into a single documentSuch a comprehensive plan must be able to support reestablishment of operations at two different locations

1. Immediately at alternate site2. Eventually back at primary site

Therefore, although a single planning team can develop combined DRP/BRP, execution requires separate teams

Page 28: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

28

11/17/2006 Dr. Awajan Arafat 55

Sample Disaster Recovery PlanName of agencyDate of completion or update of the plan and test dateAgency staff to be called in the event of a disaster Emergency services to be called (if needed) in event of a disasterLocations of in-house emergency equipment and suppliesSources of off-site equipment and suppliesSalvage Priority ListAgency Disaster Recovery ProceduresFollow-up Assessment

11/17/2006 Dr. Awajan Arafat 56

Testing Contingency PlansOnce problems are identified during the testing process, improvements can be made, and the resulting plan can be relied on in times of needThere are five testing strategies that can be used to test contingency plans:

Desk CheckStructured walkthrough Simulation Parallel testingFull interruption

Page 29: Security Risks Analysis - JUSTtawalbeh/aabfs/iss6753/presentations/Ch03.pdf · Recovery Process Once the extent of the damage has been determined, the recovery process begins: Identify

29

11/17/2006 Dr. Awajan Arafat 57

A Single Contingency Plan Format

11/17/2006 Dr. Awajan Arafat 58

Continuous Improvement

Iteration results in improvementA formal implementation of this methodology is a process known as continuous process improvement (CPI)Each time plan is rehearsed, it should be improvedConstant evaluation and improvement leads to an improved outcome