Title: Chapter 11: Policies and Procedures
1Chapter 11 Policies and Procedures
- Security Guide to Network Security Fundamentals
- Second Edition
2Objectives
- Define the security policy cycle
- Explain risk identification
- Design a security policy
- Define types of security policies
- Define compliance monitoring and evaluation
3Understanding the Security Policy Cycle
- First part of the cycle is risk identification
- Risk identification seeks to determine the risks
that an organization faces against its
information assets - That information becomes the basis of developing
a security policy - A security policy is a document or series of
documents that clearly defines the defense
mechanisms an organization will employ to keep
information secure
4Understanding the Security Policy Cycle
Start Here
5Reviewing Risk Identification
- First step in security policy cycle is to
identify risks - Involves the four steps
- Inventory the assets
- Determine what threats exist against the assets
and by which threat agents - Investigate whether vulnerabilities exist that
can be exploited - Decide what to do about the risks
6Reviewing Risk Identification
7Asset Identification
- An asset is any item with a positive economic
value - Many types of assets, classified as follows
- Physical assets Hardware
- Software Data
- Personnel Employees
- Along with the assets, attributes of the assets
need to be compiled
8Asset Identification (continued)
- After an inventory of assets has been created and
their attributes identified, the next step is to
determine each items relative value - Factors to be considered in determining the
relative value are listed on pages 386 and 387 of
the text
9Threat Identification
- A threat is not limited to those from attackers,
but also includes acts of God (forces of nature),
such as fire or severe weather disasters - Threat modeling constructs scenarios of the types
of threats that assets can face - The goal of threat modeling is to better
understand who the attackers are, why they
attack, and what types of attacks may occur
10Threat Identification (continued)
- A valuable tool used in threat modeling is the
construction of an attack tree - An attack tree provides a visual image of the
attacks that may occur against an asset
11Threat Identification (continued)
12Vulnerability Appraisal
- After assets have been inventoried and
prioritized and the threats have been explored,
the next question becomes, what current security
weaknesses may expose the assets to these
threats? - Vulnerability appraisal takes a current snapshot
of the security of the organization as it now
stands
13Vulnerability Appraisal
- To assist with determining vulnerabilities of
hardware and software assets, use vulnerability
scanners - Nessus, NeWT, GFI LanGuard, MBSA
- These tools, available as free Internet downloads
and as commercial products, compare the asset
against a database of known vulnerabilities and
produce a discovery report that exposes the
vulnerability and assesses its severity
14Risk Assessment
- Final step in identifying risks is to perform a
risk assessment - Risk assessment involves determining the
likelihood that the vulnerability is a risk to
the organization - Each vulnerability can be ranked by the scale
- Sometimes calculating anticipated losses can be
helpful in determining the impact of a
vulnerability
15Risk Assessment (continued)
- Formulas commonly used to calculate expected
losses are - Single Loss Expectancy
- Annualized Loss Expectancy
- An organization has three options when confronted
with a risk - Accept the risk- risk is minimal
- Diminish the risk implement security
- Transfer the risk insurance, third party
- Car stereo example
16Risk Assessment (continued)
17Designing the Security Policy
- Designing a security policy is the logical next
step in the security policy cycle - After risks are clearly identified, a policy is
needed to mitigate what the organization decides
are the most important risks
18What Is a Security Policy?
- A policy is a document that outlines specific
requirements or rules that must be met - Communicate a consensus of judgment
- Define what appropriate behavior for users is
- Identify what tools and procedures are needed
- Provides a foundation for HR action in response
to inappropriate behavior
19What Is a Security Policy? (cont.)
- The security policy should also outline standards
and guidelines for network access - A standard is a collection of requirements
specific to the system or procedure that must be
met by everyone - Remote access procedures, server installs
- A guideline is a collection of suggestions that
should be implemented - Best practices
20Balancing Control and Trust
- To create an effective security policy, two
elements must be carefully balanced trust and
control - Three models of trust
- Trust everyone all of the time
- Trust no one at any time
- Trust some people some of the time
- A security policy attempts to provide the right
amount of trust for productivity - Too much control (security) may cause users to
look for ways to circumvent network usage policies
21Designing a Policy
- When designing a security policy, you can
consider a standard set of principles - These can be divided into what a policy must do
and what a policy should do
22Designing a Policy (examples)
23Designing a Policy (continued)
- Security policy design should be the work of a
team and not one or two technicians - The team should have these representatives
- Senior level administrator
- Member of management who can enforce the policy
- Member of the legal staff
- Representative from the user community
- (wheres the tech???)
24Elements of a Security Policy
- Because security policies are formal documents
that outline acceptable and unacceptable employee
behavior, legal elements are often included in
these documents - The three most common elements
- Due care
- Separation of duties
- Need to know
25Elements of a Security Policy
26Due Care
- Defined as obligations that are imposed on owners
and operators of assets to exercise reasonable
care of the assets and take necessary precautions
to protect them - Due care is the care that a reasonable person
would exercise under the given circumstances - For infosec, due care is often used to indicate
the reasonable treatment that an employee would
exercise when using computer equipment - See page 397 for more examples
27Separation of Duties
- Key element in internal controls such that one
persons work serves as a complementary check on
another persons - Think of checks and balances
- No one person should have complete control over
any action from initialization to completion - Personnel should only perform those duties
specified in their job descriptions - Given the size of the company and IT staff this
may be difficult to implement
28Need to Know
- One of the best methods to keep information
confidential is to restrict who has access to
that information - Only that employee whose job function depends on
knowing the information is provided access - Access to data is given on a need-to-know basis
- Need-to-know decisions should be conducted at the
management level
29Types of Security Policies
- Umbrella term for all of the subpolicies included
within it - In this section, you examine some common security
policies - Acceptable use policy
- Human resource policy
- Password management policy
- Privacy policy
- Disposal and destruction policy
- Service-level agreement
- http//www.sans.org/resources/policies/
- http//www.sans.org/resources/policies/Acceptable_
Use_Policy.pdf
30Types of Security Policies
31Types of Security Policies
32Types of Security Policies
33Acceptable Use Policy (AUP)
- Defines what actions users of a system may
perform while using computing and networking
equipment - AUPs typically cover all computer use, including
Internet usage, email, printing and password
security - Unacceptable use should also be outlined
- All users should be required to sign the AUP as
part of their employment or education - AUPs are generally considered to be the most
important information security policies
34Human Resource Policy
- Policies of the organization that address human
resources regarding how an employees information
technology resources will be addressed - Should include employee orientation
- Should also include penalties for policy
violation - Terms of termination and the guidelines to follow
upon employee termination
35Password Management Policy
- Although passwords often form the weakest link in
information security, they are still the most
widely used - A password management policy should clearly
address how passwords are managed - In addition to controls that can be implemented
through technology, password policies should also
outline characteristics of weak and strong
passwords and provide examples
36Privacy Policy
- Organizations should have a privacy policy that
outlines how the organization uses information it
collects - Privacy statements are also becoming more popular
as part of online applications and purchases
37Disposal and Destruction Policy
- One of the classic social engineering techniques
used by attackers is to dig through documents or
equipment that has been discarded (dumpster
diving) - The policy should cover how long records and data
will be retained - It should also cover how to dispose of them
- This includes both paper and hardware
- Best practice for giving away equipment is to do
so through a third-party or make sure that all
proper precautions are met - Dismantle equipment, format drives etc
38Service-Level Agreement (SLA) Policy
- Contract between a vendor and an organization for
services - Typically contains the items listed on page 403
39Understanding Compliance Monitoring and Evaluation
- The final process in the security policy cycle is
compliance monitoring and evaluation - Some of the most valuable analysis occurs when an
attack penetrates the security defenses - A team must respond to the initial attack and
reexamine security policies that address the
vulnerability to determine what changes need to
be made to prevent its reoccurrence
40Incidence Response Policy
- Outlines actions to be performed when a security
breach occurs - Most policies outline composition of an incidence
response team (IRT) - Should be composed of individuals from
- Senior management IT personnel, HR
- Corporate counsel legal team
- Public relations Microsoft
- http//www.cert.org/csirts/Creating-A-CSIRT.html
41Incidence Response Policy
42Ethics Policy
- Codes of ethics by external agencies have
encouraged its membership to adhere to strict
ethical behavior within their profession - Codes of ethics for IT professionals are
available from the Institute for Electrical and
Electronic Engineers (IEEE) and the Association
for Computing Machinery (ACM), among others - Main purpose of an ethics policy is to state the
values, principles, and ideals each member of an
organization must agree to
43Summary
- The security policy cycle defines the overall
process for developing a security policy - There are four steps in risk identification
- Inventory the assets and their attributes
- Determine what threats exist against the assets
and by which threat agents - Determine whether vulnerabilities exist that can
be exploited by surveying the current security
infrastructure - Make decisions regarding what to do about the
risks
44Summary (continued)
- A security policy development team should be
formed to create the information security policy - An incidence response policy outlines actions to
be performed when a security breach occurs - A policy addressing ethics can also be formulated
by an organization