Académique Documents
Professionnel Documents
Culture Documents
Introduction
Layer 1 - ISMS causes 4 8
Layer 2 - Policy, Organizational Design, Legal Obligations, Asset
Management
Layer 3 - Human Resources
Layer 4 - Incident Management
Layer 5 - Access Control
Layer 6 - Physical & Environmental
Layer 7 - Information Systems Acquisition, Development &
Maintenance
Layer 8 - Communications and Operations Management
Layer 9 - Business Continuity Management
ITIL ICT, ISMS, DiD Operational Integration
When Mark is a volunteer and was recognized by the Premier of New Brunswick for his work in
the Knowledge Industry establishing the Atlantic Chapter of the High technology Crime
Investigation Association. Mark has also volunteered with local professional associations for
HTCIA, ISACA, ISSA, IIA and FMI. Mark has also been published in trade magazines and on the
Internet in addition to being sought after as an expert by local radio, newspapers and television.
In Toronto Mark volunteer on the annual Toronto Childrens Sick Kids Telethon and road a
stationary bike on a marathon Juvenile Diabetes campaign. Mark has also volunteered with local
Minor Hockey, Minor Fastball, Elementary School, Middle School, Boys Scots and assisted with
raising money for the Food bank in conjunction with the annual NHL Old-Timers Challenge. Mark
is continuing to contribute his knowledge through ISACA with the development of Cloud
Computing whitepaper and the Canadian Standards Institutes workgroup updating ISO/IEC
27001:2012 Information Security Management Systems framework.
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
The Roman heavy infantry typically was deployed, as the main body, facing the
enemy, in three approximately equal lines, with the cavalry on their wings to
prevent them being flanked and light infantry in a screen in front of them to hide
changes in deployment strategy. The heavy infantry, harass the enemy forces and,
in some cases, drive off units such as elephants that would be a great threat to
close-order heavy infantry.
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Compliance Management
Risk Management
Identity Management
Authorization Management
Accountability Management
Availability Management
Configuration Management
Incident Management
Security Policy
Information Security Org
Asset Management
Human Resources
Physical & Environmental Security
Communications & Operations
Management
Access Control
Information System Acquisition,
Development & Maintenance
Information Security Incident
Management
Business Continuity Management
Compliance
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Large-scale breaches dropped dramatically while small attacks increased. The report notes there are several
possible reasons for this trend, including the fact that small to medium-sized businesses represent prime attack
targets for many hackers, who favor highly automated, repeatable attacks against these more vulnerable
targets, possibly because criminals are opting to play it safe in light of recent arrests and prosecutions of highprofile hackers.
Outsiders are responsible for most data breaches. Ninety-two percent of data breaches were caused by
external sources. Contrary to the malicious-employee stereotype, insiders were responsible for only 16 percent
of attacks. Partner-related attacks continued to decline, and business partners accounted for less than 1
percent of breaches.
Physical attacks are on the rise. After doubling as a percentage of all breaches in 2009, attacks involving
physical actions doubled again in 2010, and included manipulating common credit-card devices such as ATMs,
gas pumps and point-of-sale terminals. The data indicates that organized crime groups are responsible for most
of these card-skimming schemes.
Hacking and malware is the most popular attack method. Malware was a factor in about half of the 2010
caseload and was responsible for almost 80 percent of lost data. The most common kinds of malware found in
the caseload were those involving sending data to an external entity, opening backdoors, and key logger
functionalities.
Stolen passwords and credentials are out of control. Ineffective, weak or stolen credentials continue to wreak
havoc on enterprise security. Failure to change default credentials remains an issue, particularly in the financial
services, retail and hospitality industries.
A1: Injection
A2: Cross-Site Scripting (XSS)
A3: Broken Authentication and Session Management
A4: Insecure Direct Object References
A5: Cross-Site Request Forgery (CSRF)
A6: Security Mis-configuration
A7: Insecure Cryptographic Storage
A8: Failure to Restrict URL Access
A9: Insufficient Transport Layer Protection
A10: Invalidated Redirects and Forwards
Source: 2010 OWSAP Top 10 Web Application Security Risks Threat statistics
5 Management responsibility
8 ISMS improvement
8 ISMS improvement
8 ISMS improvement
Exclusions
Please note clause 1.2 - Any exclusion of controls found to be
necessary to satisfy the risk acceptance criteria needs to be
justified and evidence needs to be provided that the associated
risks have been accepted by accountable persons.
Where any controls are excluded, claims of conformity to this
International Standard are not acceptable unless such
exclusions do not affect the organizations ability, and/or
responsibility, to provide information security that meets the
security requirements determined by risk assessment and
applicable legal or regulatory requirements.
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
A.15 Compliance
A.15.1 Compliance with legal requirements
A.15.1.1 Identification of applicable legislation
A.15.1.2 Intellectual property rights (IPR)
A.15.1.3 Protection of organizational records
A.15.1.4 Data protection and privacy of personal information
A.15.1.5 Prevention of misuse of information processing facilities
A.15.1.6 Regulation of cryptographic controls
A.10.5 Back-up
A.10.5.1 Information back-up
A.10.10 Monitoring
A.10.10.1 Audit logging
A.10.10.2 Monitoring system use
A.10.10.3 Protection of log information
A.10.10.4 Administrator and operator logs
A.10.10.5 Fault logging
A.10.10.6 Clock synchronization
Goals
ISMS Goals
Reduce risks and threats to the Confidentiality, Integrity and Availability of the organizations
Information Assets and System Resources by providing policies, practices and standards
designed to mitigate or eliminate all known risks and threats.
Improve the effectiveness and efficiency of Information Security Management by
implementing a world class best practice and framework for consistent, concise information
security administration.
Improve effectiveness and efficiencies of existing information security mechanisms by
formalizing new practices to monitor compliance and maintain sensitive data awareness.
Improve reassurance testing and validation outcomes by Internal Audit and External Auditors
to further assure senior management and shareholders that Information Assets and System
Resources are secure.
Reduce the likelihood that an accidental incident originating from staff could have an adverse
affect on organizational reputation or liabilities potentially leading to financial losses, by
providing an ongoing information security program.
ITSM Goals
IT Security Management has two primary objectives that fit
perfectly with the ISMS Goals:
Quality Management
Quality Management
Quality Management for IT services is a systematic way of ensuring that all the
activities necessary to design, develop, implement and maintain IT services satisfy the
requirements of the organization and its employees while providing assurance that
strategic and tactical activities are carried out cost-effectively.
Quote
We have learned to live in a world of mistakes and defective products as if they
were necessary to life. It is time to adopt a new philosophy...
(W. Edwards Deming, 19001993)
Quality Management
Excerpts from Demings 14 points relevant to Service Management:
- break down barriers between departments (improves communications and management)
-management must learn their responsibilities, and take on leadership (process improvement
requires commitment from the top; good leaders motivate people to improve themselves and
therefore the image of the organization)
-improve constantly (a central theme for service managers is continual improvement; this is also a
theme for Quality Management. A process led approach is key to achieve this target)
-institute a programme of education and self-improvement (learning and improving skills have
been the focus of Service Management for many years)
Quality Management
Demings 14 point Service Management guidelines focuse on 4 repetitive activities, which
are Plan Do Check Act. Through the establishment of a common theme continuous
improvement. These activities are easily identifiable within both the ITSM and ISMS
frameworks and can also be linked in to the Capability Maturity Model.
PDCA
Plan-Do-Check-Act
The PDCA Methodology is an iterative process model
STEP #1
PLAN
Interested Parties
STEP #4
DO
ACT
Lead Corrective,
Preventative, and
Continuous Improvement
action plans
Information
Security
requirements &
expectations
DO
CHECK
ACT
STEP #2
CHECK
STEP #3
PLAN
Interested Parties
Monitor, Audit,
Review Information
Security Program
Managed
Information
Security
Design, plan and initiate the information security program. These activities including creating a strategy,
socialization concepts, creating policies, goals, objectives and practices as necessary to manage risk.
Execute and control the information security strategy including the integration into organizational practices.
Facilitate semi-annual audits to determine conformance to the statement of applicability and identify
opportunities for improvement. Wherever appropriate develop and integrate performance matrices which
support information security program goals and objectives.
Upon the discovery of nonconformities and/or opportunities create and track corrective, preventive, and
continuous improvement action plans. Present findings from internal/external audit and risk assessments to
the Management Review Committee for decisions regarding the acceptance, rejection, or transfer of risk and
the commitment of resources and capital to facilitate subsequent efforts.
SLA/Security Chapter
Agreement between
customer and provider
Reporting According to
SLA, OLA, UC
STEP #4
Act
MAINTAIN:
* Learn
* Improve
* Plan
* Implement
STEP #1
Plan
PLAN:
* Service Level Agreements
* Underpinning Contracts
* Operational Level Agreements
* Internal Policies
CONTROL:
* Organize
* Create Management Framework
* Allocate Responsibilities
STEP #2
Do
.
EVALUATE:
* Internal audits
* External audits
* Self Assessments
* Security incidents
STEP #3
Check
IMPLEMENT:
* Improve awareness
* Classification and management
resources
* Personal Security
* Physical Security
* Security management of hardware,
networks, applications, etc
* Access Control
* Resolve security incidents
Risk Assessment
Strategies
include:
(1). Control SelfAssessment
(2). Privacy
Impact
Assessment,
(3). Threat-Risk
Assessment,
(4). OCTAVE
STEP #2
Do
InfoSec
Management
Review
Committee
Human
Resources
Manager
VP Finance,
Property
Administration
Manager,
VP of Product
Development,
Director of
Technical
Operations,
Director of
Product
Development,
VP of Payment
Services,
Director of
Online Banking
Services,
Director of
Internal Audit.
STEP #3
Check
A
A: Integrated into
the ITIL Incident
and Problem
Management
processes,
Project
Management,
Service Desk,
Human
Resources,
Systems
Development,
ISMS ISO27K
AUDIT
STATEMENT
OF
APPLICABILITY
ISMS RECORD
MANAGEMENT
YES
CONFORMITY
RECORDS/
EVIDENCE
NO
NO
THREAT/RISK
ASSESSMENT
Statutory,
Regulator
Registry
Contract
Registry
AUDIT
REPORT
YES
RA REPORT
RISK
ASSESSMENT
ASSET
INVENTORY
DATA
SENSITIVITY
PARTNER/
CUSTOMER
FEEDBACK
ISMS MANAGEMENT
REVIEW PROCESS
BUSINESS
PLANS
LEGISLATIVE
CHANGES
MANAGEMENT
REVIEW
Meeting
Minutes
ISMS EXTERNAL
INPUT
NO
ACCEPT,
REJECT OR
TRANSFER
RISK
RISK
TREATMENT
PLAN
YES
CORRECTIVE
OR
PREVENTATIVE
ACTION
ACTION PLANS/
PROJECT
PLANS
CONTINUOUS
IMPROVEMENT
PROGRAM
STEP #4
Act
B: Integrated
into the project
Management
Dashboards
STEP #1
Plan
ISMS / ITSM
Program Inputs
ITSM:
ISMS:
Program Inputs
Inputs: SLA, OLA, Information Security Policy, Statutes, Regulations
Inputs:
1) business requirements;
2) security requirements;
3) business processes effecting the existing business requirements;
4) regulatory or legal requirements;
5) contractual obligations; and,
6) levels of risk and/or criteria for accepting risks;
d) Resource needs;
e) Improvement on how the effectiveness of controls is being measured.
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Program Outputs
ITSM:
Program Outputs
ISMS:
Outputs:
a) results of ISMS audits and reviews;
b) feedback from interested parties;
c) techniques, products or procedures, which could be used in the organization to
improve the ISMS performance and effectiveness;
d) status of preventive and corrective actions;
e) vulnerabilities or threats not adequately addressed in the previous risk assessment;
f) results from effectiveness measurements;
g) follow-up actions from previous management reviews;
h) any changes that could affect the ISMS; and,
i) recommendations for improvement.
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
CYBERSECURITY
Program Integration
with operational level
processes
Configuration Management
ITSM:
ISMS:
Configuration Management
People - Staff and managers, particularly those in key knowledge management roles
such as senior/executive managers, software architects/developers/testers, systems
managers, security administrators, operators, legal and regulatory compliance
people.......
Information - Personal, financial, legal, research and development, strategic and
commercial, email, voicemail, databases, personal and shared drives, backup
tapes/CDs/DVDs and digital archives, encryption keys, Personal, financial, legal.......
Software - In-house/custom-written systems, client software (including shared or
single-user End User Computing desktop applications), commercial off-the-shelf
(COTS), ERP, MIS, databases, software utilities/tools, eBusiness applications,
middleware....
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Configuration Management
Hardware - "Computing and storage devices e.g. desktops, workstations, laptops,
handhelds, servers, mainframes, modems and line terminators, communications devices
(network nodes), printers/copiers/FAX machines and multifunction devices.
Telecommunications - "Fiber Internet Connection, DSL Internet Connection, General
Packet Radio Service (GPRS), Gateway GPRS Support Node (GGSN), Protocol/Port
Summary (- UDP 9000 (MO, MT), - UDP 53248 (MT), - FTP 21 (MO), - SSH 22 (MT), HTTP 8005 (MT), - TCP 1225, 1121, 2189 (MO), - UDP 1120, 1121, 2188 (MO), - Unicom IDC - ASN: 4808), Wireless Devices (GPRS, Public), Wireless Carriers, Internet Service
Providers.
Facilities - IT buildings, data centers, server/computer rooms, LAN/wiring closets,
offices, desks/drawers/filing cabinets, media storage rooms.....
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Corrective/Preventative Actions
110 incidents of which the majority impacted the information security principle
availability.
Incident Management
ITSM: Integration: Incident Management is an
important process for reporting security incidents. Information
security incidents are not clearly understood by most business
people, so its very likely the information security incidents may be
handled through a different practice other than incident
management. It is therefore essential that Incident Management
recognize security incidents as such. Any incident that may
interfere with achieving the SLA security requirements is classified
as a security incident by ITSM. It is useful to include a description
in the SLA of the type of incidents to be considered as security
incidents. In addition, any incident that interferes with achieving
the basic internal security level is also classified as a security
incident.
ISMS:
Incident Management
Problem Management
ITSM:
Integration: Problem
Management is responsible for
identifying and solving structural security
failings. The resolution of a problem could
introduce a new security risk which is
why, Problem Management must involve
Security Management during the
resolution of the problem. This
certification should be based on
compliance with the SLA and
organizational security requirements.
Corrective/Preventative Management
ITSM: Integration:
Corrective action - 8.2 The documented procedure for corrective action shall define
requirements for:
a) identifying nonconformities;
b) determining the causes of nonconformities;
c) evaluating the need for actions to ensure that nonconformities do not recur;
d) determining and implementing the corrective action needed;
e) recording results of action taken (see 4.3.3); and
f) reviewing of corrective action taken.
Preventive action - 8.3 The documented procedure for preventive action shall define
requirements for:
a) identifying potential nonconformities and their causes;
b) evaluating the need for action to prevent occurrence of nonconformities;
c) determining and implementing preventive action needed;
d) recording results of action taken (see 4.3.3); and e) reviewing of preventive action taken.
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Corrective/Preventative Management
ITSM:
Continuous Improvement
Dept A
Dept E
Dept B
Dept C
Dept D
Continuous Improvement
Risk is measured in terms of High, Med, Low
Impact is accessed against the principles of
information security, Confidentiality, Integrity
and/or Availability
Continuous Improvement
Change Management
ITSM:
Integration: Change
Management activities are often closely
associated with security because Change
Management and Security Management are
interdependent. There are a number of
standard operations to ensure that this security
is maintained including the Request For Change
(RFC) associated with governance for
acceptance. The RFC should also include a
proposal for dealing with security issues and
based on the SLA requirements Preferably, the
Security Manager (and possibly the customers
Security Officer) should be a member of the
Change Advisory Board (CAB).
Change Management
ISMS:
Purpose
Why are we collecting the
information?
Manual
Operation
Request access to
classified information
assets
Protection
Facilitate Risk Assessment
select & implement
safeguards
C1
R1
Access (add,
change, delete)
Decision
Maintain Record
of distribution
i.e. email
record, courier
receipt
Process
CP1
NO
Are we removing
access?
YES
Transfer a
remove classified
information
Remove
Authorization
Remove
username from
an authorized list
Notify manager
Paper
Document
Digital
camera
Optical
scanner
video
fax
computer
phone
Mobile
phone
1b
C3
R3
1g
YES
Assign or modify
the level of
authorization
C2
R2
C4
1a
What level of
authorization has
been assigned
Validate
R4
Apply document
control security
standards
DISPOSE
Release
information
SHARE
CP2
1i
R5
C1
Manager to
review annually
1c
DELETE
R1
Authorization
List
1e
- RBAC
- Workgroups
- SOD
SECURE
RECYCLE
1h
1d
C5
CREATE
Information
asset
1f
D= Declassified
O= Operational
C= Confidential
P= Private
Release method
(ftp, email, mail,
hardcopy)
MIGRATE
Notify user
AUDIT
CONSOLIDATE
ADD
DISCLOSE
Legend:
Activity
Decision
Document
Interface
Page
Connect
Data
Store
Risk
Tools
Control
Management
USE
CHANGE
INTERFACE
ARCHIVE
INFORMATION SECURITY
Electronic
interface
Release Management
ITSM:
ISMS:
Release Management
C1
R1
Access (add,
change, delete)
Maintain Record
of distribution
i.e. email
record, courier
receipt
CP1
NO
Are we removing
access?
NO
1b
C3
YES
Transfer a
remove classified
information
Remove
Authorization
R3
Remove
username from
an authorized list
1g
YES
Assign or modify
the level of
authorization
C2
R2
C4
1a
What level of
authorization has
been assigned
Validate
Notify manager
R4
Apply document
control security
standards
Release
information
1h
1d
CP2
C5
1i
R5
C1
Manager to
review annually
1c
R1
Authorization
List
1e
- RBAC
- Workgroups
- SOD
Information
asset
1f
D= Declassified
O= Operational
C= Confidential
P= Private
Legend:
Activity
Decision
Document
Interface
Page
Connect
Data
Store
Control
Risk
Tools
Management
Release method
(ftp, email, mail,
hardcopy)
Notify user
Availability Management
ITSM:
Capacity Management
ITSM:
ISMS:
Capacity Management
Integration: IT Service
Continuity Management ensures that the
impact of any contingencies is limited to the
level agreed with the customer.
Contingencies need not necessarily turn into
disasters. The major activities and defined,
maintained, implemented, and testing the
contingency plan, and taking preventative
action. Because of security aspects, there
are ties with Security Management. On the
other hand, failure to fulfill basic security
requirements may be considered itself
contingency.
Business Continuity
Your Service
Providers
Your Business
Consumer &
Business
Requirements
764536748 BOB
Information
DataBase
GTH4567
CUSTOMER
NBMJRL9087
12343536475 MARY
REQUIREMENTS
To deliver these
services well need
specific information
gathered and stored,
maintained, processed
and exchanged
TECHNOLOGY + TELECOMMUNICATIONS
+ BUSINESS SYSTEMS
+ HARDWARE
+ SKILLED LABOR
To deliver these services well need business systems created in a program language to ensure consistent and
effective processing. Well also need reliable hardware and telecommunication suitable for the requirements and
skilled people/resources to write code, trouble shoot administered security, patching/fixes, configure systems,
configures communications, build in redundancy
Service Providers
Organizational Security and Privacy group will assist Managers by reviewing and recommending
amendments to contracts and agreements to ensure they address information security and privacy
obligations as outlined within data protection statutes (PIP Act, PIPED Act, and FOIPP Act). Some of
these provisions may include the following:
Physical and Environmental Security
Security standards for sensitive Databases
Disclosure of Personal Information
Transmission and Back-ups of Personal Information
Annual Compliance Certificate
Ownership and Control of Personal Information Information handling for Database/Media
System Logs, Audit Logs
Privacy Strategy/Plan
Breach or Demand Notification
Training/Awareness
Security Controls for Authorized Personnel
Risk Assessments (PIA, TRA, CSA)
Agreements with contractors/service providers
Testing and Development Work
US based companies
Removal of Personal Information
Destruction of sensitive information and media Sensitive information sharing
Collection of Personal Information
Containing sensitive information
Non-Compliance Reports
Executives
Organizational
Security and
Privacy
Managers
Service
Providers
Service Catalogue
If the risk rating is high for an internal system then a resolution must be applied within 7 days, all
other systems must be have 60 days to remediate;
If the risk rating equals Medium for Internet facing systems then remediation is required within 7
days.
If the risk rating is Medium for an Internal system then remediation is required within 60 days. All
other systems have a 90 day time span to remediate gaps in security;
If the risk rating is Low for Internet facing system then remediation is required within 30 days.
If the risk rating is Low for an Internal system then remediation is required within 180 days.
All other systems have up to 18 months for remediation or until the next maintenance cycle,
whichever is first.
ISMS:
Contractual Obligations
ISMS:
External Reports
Management Reports
ITSM:
ISMS:
Internal Reports
CyberSecurity is important and the ISO/IEC 27001 ISMS framework can be utilized to provide assurance to customers,
shareholders and partners.
A crucial aspect of managing CyberSecurity effectively is the
active engagement of managers and employees, especially those
who have been assigned specific accountabilities and
responsibilities for various aspects of CyberSecurity.