Title: Security Planning Essentials
1Security Planning Essentials
2Network Security Challenges
- Enterprises are expanding
- Information theft is exploding out of control
- Computer crime, fraud and destruction cost
billions of dollars - Network security a sensitive issue for CIO's and
network managers alike - Information Privacy and Security
- Connectivity is exploding
3Understanding the Fundamentals
- The Ten Immutable Laws
- Eight Steps to take to security
4The Ten Immutable Laws
- If a bad guy can persuade you to run his program
on your computer, its not your computer anymore - If a bad guy can alter the operating system on
your computer, its not your computer anymore - If a bad guy has unrestricted physical access to
your computer, its not your computer anymore - If you allow a bad guy to upload programs to your
web site, its not your web site any more - Weak passwords trump strong security
5The Ten Immutable Laws
- A machine is only as secure as the administrator
is trustworthy - Encrypted data is only as secure as the
decryption key - An out of date virus scanner is only marginally
better than no virus scanner at all - Absolute anonymity isn't practical, in real life
or on the web - Technology is not a panacea
6Getting Started with the Process
- Identify the assets you want to protect
- Create policies that support the security
philosophy of the organization - Establish a baseline for your security posture
with an assessment - Create a gap analysis
- Identify and prioritize your risks
7The Process Contd
- Develop a remedial action plan, remediate and
test the results - Manage the process
- Train your users
- Audit, audit, audit
8Identify the Assets to Protect
- Involve top management
- Identify your most valuable systems and
information - Make it difficult for unauthorized users to
access them
9Identify the Assets to Protect
- Firewalls are good
- Intrusion detection systems are good
- Establish security in layers
- Physical security is critical
- Virus control is critical
- Backups are critical
10Firewall Deployment
DMZ
- Corporate Network Gateways
- Protecting internal network from attack
- Most common deployment point
Demilitarized Zone (DMZ) Public Servers
Human Resources Network
Corporate Site
11Firewall Deployment
- Corporate Network Gateways
- Internal Segment Gateways
- Protect sensitive segments (Finance, HR, Product
Development) - Provide second layer of defense
- Ensure protection against internal attacks and
misuse
DMZ
Demilitarized Zone (Publicly accessible Servers)
Human Resources Network
Corporate Site
12Firewall Deployment
- Corporate Network Gateways
- Internal Segment Gateways
- Server-Based Firewall
- Protect individual application servers
- Apply granular access control beyond application
level
Public Servers
DMZ
Human Resources Network
Corporate Site
13Designed for Security
- It is always easier to design security into an
application or an architecture in the beginning - Always have upper management involved in setting
the overall security policy for your organization - Involve stakeholders from various departments in
the design process
14Create Corporate Policies
- Acceptable usage
- Internet usage
- E-Mail usage (communications)
- Site Security
- Acquisition and disposal of assets
- Change management
- Audit
- Employee monitoring
15Establish a Baseline
- Conduct an assessment of your
- People
- Do you have the right number of people, trained
in the right disciplines - Process
- Are your processes used to manage the assets
appropriate - Technology
- Are your assets configured properly, sized
appropriately and protected as required
16Identify and Prioritize Your Risks
- You can probably accomplish 80 of your security
needs with 20 of the effort and money - The last 20 of your security will be very
expensive - If someone wants to compromise your systems bad
enough, they will - Make it tough for them
17Develop a Remedial Action Plan
- Create the project plan
- Assign accountability
- Apply remedial action
- Test the results
18Manage the Process
- Monitor the progress of the plan
- Involve all business units in security design
- Make any policy violations very painful
- Conduct vulnerability assessments regularly
- Monitor your forward deployed devices constantly
- Create a disaster recovery plan
19Technical Processes
- Backups
- Off-site media rotations
- Frequent test restores
- Virus control
- Up to date software
- Scan and filter e-mail and web content
- Security updates
- Apply vendor supplied security patches
20The Patch Management Process
21Security Errors
- Top 7 Management errors from SANS
- Assign untrained people to maintain security
- Failure to align security with business problems
and strategic initiatives - Failure to make necessary process changes
- Failure to recognize the value of information
assets
22Security Errors Contd
- From SANS
- Approve short term fix for long term problem
- Pretend security will go away if ignored
- Reliance on a single control solution
23Train Your Users
- Do they understand safe computing practices
- Do they know the importance of good passwords
- Do they understand the value of your
technological assets - Would your users know a security breach if they
saw it - Would they know what to do
- Policies must be clearly and consistently
communicated
24Common User Security Errors
- Passwords on Post-it notes
- Computers left unattended
- Use poor passwords
- Open e-mail attachments
- Download software from the web
- Fail to backup data
25Audit, Audit, Audit
- Review your logs
- Security
- Virus control
- Backup
- System
- Firewall
- IDS
26Auditing Policy
- You must have an audit policy in place!
- Without it, you have no way to tell when
something unusual or bad happens - You may be required to have it for legal,
insurance, or compliance reasons - What goes in the policy is dependant on your
organizational goals and objectives
27Remember
28Reference Sites
- www.sans.org Security alerts and articles
- www.securityfocus.com Policy development
- www.nwc.com Network security articles
- www.microsoft.com/security Security best
practices
29Questions?