Top Banner
The Increasing Problems of Controlling Access Presentation to RMAA Seminar 13 May 2008 Kylie Dunn Knowledge & Records Manager Department of State and Regional Development
58

The Increasing Problems Of Controlling Access

Oct 22, 2014

Download

Business

This was a presentation I gave at the Information Week RMAA Seminar 2008. It was on the increasing problems of trying to control access within organisations, focusing on sensitive and classified information.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Increasing Problems Of Controlling Access

The Increasing Problems of Controlling Access

Presentation to RMAA Seminar13 May 2008

Kylie DunnKnowledge & Records Manager

Department of State and Regional Development

Page 2: The Increasing Problems Of Controlling Access

Outline

PolicySystem access

controlsCommunication

Technology’s roleAccess Models

Staff development

Page 3: The Increasing Problems Of Controlling Access

…but I digress…

Page 4: The Increasing Problems Of Controlling Access

AS ISO 15489 Requirements

…both within an organization and to external users.

Page 5: The Increasing Problems Of Controlling Access

…assigning access status to both records and individuals.

Page 6: The Increasing Problems Of Controlling Access

…categorized according to their access status…

Page 7: The Increasing Problems Of Controlling Access

…specify access permissions to records relating to their

area of responsibility.

Page 8: The Increasing Problems Of Controlling Access

The ANAO

Audit Report No. 7 1999-2000 – Operation of Classification

System for Protecting Sensitive Information

Page 9: The Increasing Problems Of Controlling Access

Many staff did not have a detailed understanding…

Page 10: The Increasing Problems Of Controlling Access

All organisations incorrectly classified files with over-classification being the

most common occurrence.

Page 11: The Increasing Problems Of Controlling Access

2.27 To achieve an effective control environment over information

security it is expected…

Page 12: The Increasing Problems Of Controlling Access

Managing risk

Page 13: The Increasing Problems Of Controlling Access

Risk averse

Page 14: The Increasing Problems Of Controlling Access

Technology averse

Page 15: The Increasing Problems Of Controlling Access

Policies and training

Page 16: The Increasing Problems Of Controlling Access

Pre-digital age

Page 17: The Increasing Problems Of Controlling Access
Page 18: The Increasing Problems Of Controlling Access

The good old days?The good old days?

Page 19: The Increasing Problems Of Controlling Access

Applying electronic access

Page 20: The Increasing Problems Of Controlling Access

Shared drives

Time consumingLow fidelityNot simple

Page 21: The Increasing Problems Of Controlling Access

EDM Systems

Greater AuditingEasier privileges

Taking a record out?

Page 22: The Increasing Problems Of Controlling Access

Databases

Page 23: The Increasing Problems Of Controlling Access

ANAO Audit Report No.45 2001–02

Assurance and Control Assessment Audit -

Recordkeeping

…business records that were managed through systems that were not recognised and developed as recordkeeping systems

Page 24: The Increasing Problems Of Controlling Access

Databases

Depends on developerAnything is possible Relies on time & $$

Page 25: The Increasing Problems Of Controlling Access

Websites

Page lockdownsContent Management System

Some audit logs

Page 26: The Increasing Problems Of Controlling Access

Strong reliance on user

Page 27: The Increasing Problems Of Controlling Access

Communicating/transferring

Page 28: The Increasing Problems Of Controlling Access

Email

AccessStorageSecure

Page 29: The Increasing Problems Of Controlling Access

Using the “Cloud”

Page 30: The Increasing Problems Of Controlling Access

How safe is it?

“The breach is believed to have started when hackers intercepted wireless transfers of customer information at two Marshalls stores in Miami - an entry point that led the hackers to eventually break into TJX's central databases.”

theage.com.au (31/12/07)

Page 31: The Increasing Problems Of Controlling Access

Safer than our own staff?

Page 32: The Increasing Problems Of Controlling Access

Loss of control

Page 33: The Increasing Problems Of Controlling Access

Applying security

Page 34: The Increasing Problems Of Controlling Access

Staff need to get it right

Page 35: The Increasing Problems Of Controlling Access

Over-classification

Increased managementIncreased costs

Limits legitimate access

Page 36: The Increasing Problems Of Controlling Access

Under-classification

Permits non-legitimate accessReliance on others

Page 37: The Increasing Problems Of Controlling Access

Not all about systems

Page 38: The Increasing Problems Of Controlling Access

…but technology helps

Page 39: The Increasing Problems Of Controlling Access

Access Models

Page 40: The Increasing Problems Of Controlling Access
Page 41: The Increasing Problems Of Controlling Access

Anatomy of an Access Model

SystemSecurity Requirements Policy statementsDefinition of groupingsExceptionsDefined permissionsPermission allocations –

data/individuals

Page 42: The Increasing Problems Of Controlling Access

Hard to maintain accurately

Page 43: The Increasing Problems Of Controlling Access

Staff awareness

Page 44: The Increasing Problems Of Controlling Access

Storing

Page 45: The Increasing Problems Of Controlling Access

Transmitting

Page 46: The Increasing Problems Of Controlling Access

Cost of getting it wrong

Page 47: The Increasing Problems Of Controlling Access

Need-to-Know Need-to-Share

Page 48: The Increasing Problems Of Controlling Access

Needs to be easy

Page 49: The Increasing Problems Of Controlling Access

Role of Records Staff?

Page 50: The Increasing Problems Of Controlling Access

Advisory

Page 51: The Increasing Problems Of Controlling Access

Policy into Procedure

Page 52: The Increasing Problems Of Controlling Access

Training staff

Page 53: The Increasing Problems Of Controlling Access

Access Models

Page 54: The Increasing Problems Of Controlling Access

No quick fix

Page 55: The Increasing Problems Of Controlling Access

Managing risks

Page 56: The Increasing Problems Of Controlling Access

Technology helps

Page 57: The Increasing Problems Of Controlling Access

Access model is a must

Page 58: The Increasing Problems Of Controlling Access

Staff need to understand