Top Banner
The Art of Information S i G Security Governance Qatar Information Security Qatar Information Security Forum 24 February 2008 24 February 2008 Julia H. Allen © 2008 Carnegie Mellon University
45

The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

May 02, 2018

Download

Documents

trinhcong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

The Art of Information S i GSecurity Governance

Qatar Information SecurityQatar Information Security Forum24 February 200824 February 2008

Julia H. Allen

© 2008 Carnegie Mellon University

Page 2: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

2

Page 3: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

3

Page 4: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Recent Security Breaches

Societe Generale insider fraud (January 2008)• Separation of dutiesSeparation of duties• Password controls• Transaction tracking to individual workstations g(and monitoring)

Middle east Internet outage (business continuity, operational resilience) (Jan ar 2008)operational resilience) (January 2008)UK HM Revenue & Customs security breach due to loss of 25M child benefit records (HMRC chairmanloss of 25M child benefit records (HMRC chairman resignation) (October 2007)

4

Page 5: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Malicious Software on the Rise

5

http://news.bbc.co.uk/1/hi/technology/7232752.stm

Page 6: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

What Is At Risk?

• Trust • Reputation, brand, imageReputation, brand, image • Competitive advantage; market & investor

confidence• Ethics and duty of care• Relationships with business partners• Customer retention & growth• Business continuity & resilience

Abilit t ff f lfill t ti— Ability to offer, fulfill transactions

6

Page 7: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

ITU Perspective

“Gaps in access to, and the use of, ICT do not only hinder countries’ socio-economiconly hinder countries socio-economic development, but can also diminish the effectiveness of cooperation in buildingeffectiveness of cooperation in building confidence and security in the use of ICT and promoting a global culture of cybersecurity.p g g y y

Our developing and least developed countries are increasingly at risk.”are increasingly at risk.

Sami Al Basheer Al Morshid

Director, ITU Telecommunication Development Bureau

7

, phttp://www.itu.int/ITU-D/cyb/cybersecurity/docs/cybersecurity-watch-september-2007.pdf

Page 8: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Operational Risk – Core Concerns

Are you confident that your security program is sufficient to protect againstprogram is sufficient to protect against

• failed internal processes?i d t t d lib t ti f l ?• inadvertent or deliberate actions of people?

• problems with systems and technology?t l t ?• external events?

Are your business continuity plans sufficient?

According to Basel II, operational risks are risks of loss resulting from inadequate or failed internal

8

g p g qprocesses, people, and systems or from external events.http://www.bis.org/publ/bcbs107.htm

Page 9: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

A Resilient Business Is Able To. . .• withstand disruptions and adapt to new risk

environments [1][ ]

• be sensing, agile, networked, prepared [1]

• dynamically reinvent business models and• dynamically reinvent business models and strategies as circumstances change [2]

• have the capacity to change before the case forhave the capacity to change before the case for change becomes desperately obvious [2]

• sustain the mission in the face of operational risksp

[1] “Enterprise Resilience: Managing Risk in the Networked Economy” by Randy Starr, Jim Newfrock, and Michael Delurey, strategy + business Reader, issue 30, Booz-Allen.

9

[2] “The Quest for Resilience” by Gary Hamel and Lisa Valinkangas, Harvard Business Review, September 2003.

Page 10: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Shift the Security Perspective

ToFrom

Business problemBusiness

Scope: Technical problemOwnership: IT

InvestmentIntegrated, continuousProcess based

Costs: ExpenseExecution: IntermittentApproach: Practice based Process-based

Business continuity/resilience

Approach: Practice-basedObjective: IT security

y

10

Page 11: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

11

Page 12: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Governance Defined

Senior leader responsibilitiesP id t t i di ti• Provide strategic direction

• Ensure objectives are hi dachieved

• Ascertain that risks are managed appropriatelmanaged appropriately

• Verify that resources are used responsiblyare used responsibly

International Federation of Acco ntants Enterprise Go ernance Getting the Balance Right

12

International Federation of Accountants. Enterprise Governance: Getting the Balance Right, 2004. http://www.ifac.org/Members/DownLoads/EnterpriseGovernance.pdf

Page 13: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Information Security Governance Defined - 1

Directing and controlling an organization toDirecting and controlling an organization to establish and sustain a culture of security in the organization's conduct (beliefs, behaviors, g (capabilities, and actions)

Information security governance means viewing adequate security as a non-negotiable requirement of being in business.

13

Allen, Julia. Governing for Enterprise Security (CMU/SEI-TN-023), June 2005. http://www.cert.org/governance.

Page 14: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Information Security Governance Defined - 2

. . . the process of establishing and maintaining a framework and supporting management structureframework and supporting management structure and processes to provide assurance that information security strategies

are aligned with and support business objectives• are aligned with and support business objectives• adhere to policies, standards, and internal controls• provide assignment of authority and responsibility

all in an effort to manage risk.

Bowen Pauline et al Information Security Handbook: A Guide for Managers (NIST Special Publication

14

Bowen, Pauline, et al. Information Security Handbook: A Guide for Managers (NIST Special Publication 800-100), October 2006. http://csrc.nist.gov/publications/nistpubs/index.html.

Page 15: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Characteristics of Effective Security Governance - 1

Managed as a business-wide issueH i t ll ti ll f ti ll• Horizontally, vertically, cross-functionally

Leaders are accountable• Visible own their risks conduct regular reviews• Visible, own their risks, conduct regular reviews

Viewed as business requirement• Aligns with business objectives and policiesAligns with business objectives and policies

Risk-based• Reputational, operational, financialp , p ,• Tolerances established and reviewed

Roles & responsibilities defined

15

• Clear segregation of duties

Page 16: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Characteristics of Effective Security Governance – 2

Addressed & enforced in policyAd t itt dAdequate resources committed

• Includes authority to act, time to maintain competenceStaff aware & trainedStaff aware & trained

• Awareness, motivation, compliance expectedAddressed throughout system development life cycle

• Acquisition -> retirementPlanned, managed, & measured

P t f t t i it l ti l l i & i l• Part of strategic, capital, operational planning & review cyclesReviewed & audited by oversight committees

• Desired state examined, sustained

16

Desired state examined, sustained

Page 17: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

17

Page 18: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Why a Framework for IS Governance?

Increasing operational risk exposureGro ing market demand for senior leadershipGrowing market demand for senior leadership

attention and duty of care Need for implementable guidanceNeed for implementable guidanceTo define:

A t t th t th ti t i• A structure that engages the entire enterprise • Clear roles, responsibilities & accountabilities• Actionable steps and outcomes

18

http://www.cert.org/governance

Page 19: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Information Security Program

Risk Management

Plan

BusinessSecurity Strategy

Business Security Plan

Business Unit Security PlansSystem Security PlansPolicies & Procedures

19

Page 20: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Governance StructureGoverning

Board

CEO &COO

Board Risk Committee

CPO

CSO

CIO

Board AuditCommittee

GC CFO

PRHR

X-Team

BLE

20

AOBM CA OP IA EA

Page 21: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Security Governance Key Roles

Chief operating officerCOOChief executive officerCEO

Chief (information) security officerC(I)SO

p g

Chief financial officerCFOChief information officerCIO

( ) y( )

General counselGCChief privacy officerCPO

VP, human resourcesHRBusiness line executivesBLE

21

VP, public relationsPR

Page 22: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Security Governance Supporting Roles

Asset OwnerAOBusiness Manager (reports to BLE)BM

Operational PersonnelOPCertification AgentCA

External AuditEAInternal AuditIA

p

22

Page 23: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Board Risk Committee

Mission• Protect shareholder/stakeholder investment

• Protect assets, people, processes, products, reputation from risk

Objectives• Establish IS Program governance structure; allocate

responsibilities; oversee security

• Set cultural and managerial tone

• Determine risk thresholds/tolerances

23

Page 24: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Cross-Organizational Team (X-team)

MissionD l d di h i• Develop and coordinate the security program

• Coordinate and respond to security p yrisks and incidents

Objectives• Ensure security risks are addressed

• Ensure that the security program is integrated with day-to-day businessintegrated with day-to-day business

• Manage the security of digital assets in accordance with plans and t t i

24

strategies

Page 25: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

IS Governance Implementation Framework

Ordered Categories and Activities• Governance

• Integration

• Implementation

• Capital Planning, Reviews, & AuditsCapital Planning, Reviews, & Audits

Activities are repeated at designated intervals

Some activities are continuous, ongoing

25

Page 26: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Governance ActivitiesEstablish organization structure

• Assign roles & responsibilities• Assign roles & responsibilities

• Ensure segregation of duties

Develop top-level policies

Inventory information assets• Establish ownership & custody

Determine standards/compliance requirementsDetermine standards/compliance requirements• Address cross border data flows & privacy

26

Result = Information Security Strategy

Page 27: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Integration ActivitiesCategorize assets

• Level of risk & magnitude of harmg

Conduct risk assessments

S l t it t l & k fSelect security controls & key performance indicators• Draw from standards & best practices

Develop supporting plans & requirements• Incident response, crisis communications, business

continuity, disaster recovery, service provider reqmts.

27

Result = Information Security Plan

Page 28: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Implementation Activities

Develop & execute security implementation & t i i ltraining plans

Enforce policies

Test controls (take corrective action when necessary)y)

Result = Implemented IS Plan

28

Page 29: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Capital Planning, Reviews, Audits

Determine security business case, ROI, & funding

Conduct formal reviews of the IS program

Conduct formal audits of the IS programConduct formal audits of the IS program

Result:• A sustainable IS program

• Confidence that the IS program ensures an adequate level of security

29

Page 30: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

30

Page 31: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

How Mature Are Your Processes?

Most organizations have some process forhave some process for governing operational risk (including security).( g y)

Processes may not be yeffective for meeting business goals.

31

Page 32: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Increasing Levels of Competency

32

Page 33: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Toward Continuous Improvement

33

Page 34: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Competitive Maturity Assessment: Best-in-Class - 170%: established, consistent security policies70%: executive as primary owner for security

governance & risk management78%: leaders regularly informed of IT-dependent

risks67%: controls implemented for monitoring policy

requirements & ensuring they are satisfied67%: all information for audit & reporting identified Aberdeen Group. “Security Governance and Risk Management: The Rewards of Doing the Right Things

and Doing Things Right.” November 2007. Survey of 140 organizations, range of roles, market

34

sectors, countries.

Page 35: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Competitive Maturity Assessment: Best-in-Class - 2Compared to one year ago:63%: reduced the number of actual security

incidents70%: reduced the average time to address incidents48%: reduced the total cost to address incidents74%: reduced audit failures (instances of non-

compliance)

35

Page 36: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

36

Page 37: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Prioritizing Security Investments

Make security investment decisions in the same fashion as otherin the same fashion as other business investment decisions

Use business based criteriaUse business-based criteria

Engage leaders in establishing criteria prioritiescriteria priorities

Track performance & regularly report resultsresults

Ensure that investments in security directly support business objectives

37

support business objectives.

Page 38: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Decision Categories - 1

Cost: What is the estimated total cost to accomplish this task? (initial life cycle cost of not doingthis task? (initial, life cycle, cost of not doing, savings)

Criticality & Risk: Degree to which investment inCriticality & Risk: Degree to which investment in meeting business objectives & risk management goals (mainstream, degree of risk mitigated)

38

Page 39: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Decision Categories - 2

Feasibility: Likelihood of investment success (first attempt subsequent attempts leadershipattempt, subsequent attempts, leadership turnover, roll back)

Positive Interdependencies: Reasonable changesPositive Interdependencies: Reasonable changes to existing processes? Pave the way for future work? (ability to accomplish other tasks, use

i ti f i tiexisting performance measures, use existing knowledge & skills)

39

Page 40: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Decision Categories - 3

Involvement: Level of required involvement and buy-in (narrow broad third parties review audit)buy in (narrow, broad, third parties, review, audit)

Measurability: How measurable is the investment outcome? (tangible intangible)outcome? (tangible, intangible)

Time & Effort Required: Level of staff hours & time to break even (senior leadership time buy-in timeto break even (senior leadership time, buy in time, demonstration of results, breakeven)

40

Page 41: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

AgendaThe Risks Governance DefinedGovernance DefinedImplementing Security Governance P M t itProcess Maturity Prioritizing Security Investments Questions To Ask

41

Page 42: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Security Strategy Questions

What needs to be protected? Why does it need to be protected? What happens if it is not protected?protected? What happens if it is not protected?

What potential adverse consequences need to be p qprevented? At what cost? How much disruption can we stand before we take action?

How do we determine and effectively manage the residual risk?residual risk?

42

Page 43: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Key Questions Senior Leaders Should Ask

Have we identified our critical information assets?Do we conduct periodic risk assessments?Do we conduct periodic risk assessments?Do our written security plans & policies address these risks?H i l t d it ? D itHave we implemented our security program? Do we monitor

it? Do we regularly reassess it?Have we addressed employee training issues?Have we addressed employee training issues?Have we addressed information security for our service

providers?Are we prepared for a security breach?Do we view security as part of our day-to-day business?

43

y p y ySmedinghoff, Thomas J. “Director Responsibilities for Data Security: Key Questions the Board Should

Ask.” NACD Directors Monthly, April 2007.

Page 44: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

Closing Thoughts

Because of its potential impact to business reputation, trust relationships, competitive advantage, and the confidence p , p g ,of investors and global trading partners, information security is no longer the sole province of the IT department. p

Security is becoming a core competency for senior leaders, who need to ensure business resilience and continuity d it ll ki d f th tdespite all kinds of threats.

Security is a business operation that should be run like a business operation [3]business operation. [3]

[3] Lindstrom Pete “Metrics: Practical Ways to Measure Security Success ” Spire Security LLC 2005

44

[3] Lindstrom, Pete. Metrics: Practical Ways to Measure Security Success. Spire Security, LLC, 2005. http://searchsecurity.techtarget.com/searchSecurity/downloads/EDITED_LINDSTROM_METRICS.pdf

Page 45: The Art of Information Security Governance Art of Information ... Booz-Allen. 9 [2] ... Information Security Program Risk Management Plan Business Security Strategy Business Security

For More InformationGoverning for Enterprise Security:

www.cert.org/governance

Resiliency Engineering: www.cert.org/resiliency_engineering

CERT P d t S i S it fCERT Podcast Series: Security for Business Leaders: www.cert.org/podcast

Q CERT: www qcert orgQ-CERT: www.qcert.org

ITU: www.itu.int/cybersecurity/

Julia Allen: [email protected]

45