GSU's Roadmap for a World-Class Information Security Management System– ISO/IEC 27001:2005 Tammy Clark, Chief Information Security Officer, William Monahan, Lead Information Security Administrator “You will now have a starting place and a destination, and you will be able to determine what it will cost you to get there. You will be going someplace.” H. Stanley Judd GSU’s Information Security Roadmap • JL Albert’s (CIO) Vision and Support • Strategic & Tactical Planning • Alignment with academic/ business objectives • Incremental and distributed deployments • Continuous cycles of reviews and improvements Strategic Choices Determine Our Direction… – WHY develop a World-Class Information Security Management System (ISMS)? – Critical success factors – Using the ISO/IEC 2700127002 – Overview of ISO 27002 – Advantages of Using ISO 27001/27002 – Deming’s “Plan, Do, Check, Act” model – Building an Information Security Management System What a Long and Exhausting Road Trip! (Why Implement an ISMS?!) Protect the university’s reputation Stop chasing compliance (with legal and contractual requirements) Ensure CIA (confidentiality, integrity, and availability) and reduce the chances of business disruptions Reduce exposure for illegal or malicious acts committed with the university's information technology resources Ensure effective control and continuous improvement of information security Implement a comprehensive approach (far beyond technical sphere) –close the gaps Navigate Around Traffic Jams and Slow Downs (Critical Success Factors) Align your course in parallel with strategic information technology and business goals & objectives Provide a good set of directions to your navigator (and convince him to drive)! Set realistic and attainable milestones upfront—and be prepared to handle obstacles Get everyone traveling in the same direction Advance your initiative down the road successfully through collaborations with key University stakeholders Avoid accidents and dead ends! Continually work behind the scenes to promote the synergy of people, processes & technology Chart a Course to Your Destination Using ISO/IEC 27001 and 27002 ISO/IEC 27001 Requirements Certification ISO/IEC 27002 Code of Practice Compliance – This process involves the auditing of an ISO/IEC 27002:2005 compliant ISMS to the requirements of ISO/IEC 27001:2005. – Users of the ISO/IEC 27002 framework need to carry out a risk assessment to identify which controls are relevant to their own business environment and implement them. – The ISMS will be audited by an accredited certification body – The standard is also intended to provide a guide for the development of "organizational security standards and effective security management practices” – Uses the word “shall”. – Uses the word “should”. Quick Overview of ISO 27002 • Covers 11 information security ‘domains’: – Information Security Policy – Organization of information security – Asset Management – Human resource security – Physical and environmental security – Communication and operations management – Access control – Information systems acquisition, development and maintenance • • • • – Information security incident management – Business continuity management – Compliance 39 security objectives and a total of 133 separate controls Using its baseline security approach enables an enterprise to increase security levels using existing resources without additional costs Comprehensive & holistic Favors incremental deployment of controls Advantages of Using ISO 27001 A Framework which provides a structure that organizations can follow. Flexible and comprehensive ‘umbrella’ framework for your information security program Helps everyone to be “on the same page” because they can see what is expected. Integrated into ITIL v3 (ISO 20000) Information security best practices Auditable Same process approach as ISO 9000 Total Quality Management Series and ISO 20000 Service Management Process (Plan-Do-Check-Act) Plan-Do-Check-Act A ‘cycle’ of continuous review and improvements Plan—Establish Do—Implement and Operate Check—Monitor and Review Act—Maintain and Improve PLAN Phase - Establish Your ISMS Define the Scope and Boundary of the ISMS. Define an ISMS Policy. Define the risk assessment approach Identify, analyze and evaluate the risks to the assets identified in your scope and select risk treatment options. Select controls and control objectives, reasons for selection and prepare a Statement of Applicability. Obtain management approval of the proposed residual risks. Obtain management authorization to implement and operate ISMS. DO Phase-Implement Your ISMS Formulate and implement your Risk Treatment Plan (RTP) Implement selected controls to meet your control objectives Define metrics to measure the effectiveness of your controls Implement a training and awareness program Manage operations in accordance with identified controls, policies and procedures Implement procedures and controls to manage incidents CHECK Phase-Monitor and Review Your ISMS Execute monitoring and review procedures: – Documentary evidence of monitoring such as logs, records, files – Measure effectiveness (metrics) – Review risk assessments – Conduct internal ISMS audits – Management Reviews – Update Security Plans – Record actions and events ACT Phase-Maintain and Improve the ISMS – Implement identified improvements – Take appropriate corrective and preventive actions – Communicate actions & improvements to interested parties – Ensure improvements meet objectives Tactical Actions Moving Us Closer to Our Destination… Annual Security Plan based on ISO 27002 Risk Management Automated Governance, Risk and Compliance (Proteus) Communicate/Cooperate/ Collaborate Annual Security Plan based on ISO 27002 (If You Don't Know Where You're Going, Any Road Will Get You There) Began in 2004 – First Plan was Painful Incremental Approach – 27002 Requirements – Status of Security – Proposed Action Items Plan is a Moving Target – New Legislation, Standard, & Compliance Requirements Tool to Solicit/Incorporate Feedback Risk Assessments (Vote early and vote often) Risk Assessment Policy in 2005 – Required in ISO 17799:2005 update – Approximately 50 Reviews/Year (and growing) A Lot of Benefits from Proactive Approach – More Secure/Robust Services – Found/Curtailed Some Craziness – The Auditor Effect – Foster/Strengthen Relationships & Understanding – Risk Management System (Trust But Verify) Trusted Third Party (Internal Audit) is Required – Ensures Controls Were Adequate/Commensurate – Ensures Controls Were Implemented in Timely Manner We Must Continuously Reevaluate Risk Automated Governance, Risk and Compliance (Proteus) • Online audit any part of your organization against any standard Online audit of external suppliers, saves time & money • Create an Information Security focused asset register Links assets to legislation/controls • Define roles with meaning Roles linked to controls/policy/procedures • Do business impact analysis simply & easily Quick win, keeps risk business focused • Identify the key services, assets & data which need Business Continuity or DR Reduce exposure • Perform Risk Assessments, simply & easily Reduces risks with countermeasures • Incident reporting with a difference • Build a central policy register • Helps you plan your security investment • Provides you with a real time RiskView Instantaneously sizes problem Supports the audit process Spend effectively & wisely Manage more effectively Some of the Benefits of Proteus “The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency.” - Bill Gates One Repository for ISMS Materials - Policies, Procedures, Objective Evidence, Action Plans… Good Discretionary Access Control – Can Assign Access to Sites (Audit Points) – Centralized Control/Distributed Administration Workflow Engine helps you collect information and stay in compliance Communicate/Cooperate/Collaborate Centralized Control/Distributed Administration Model – IntruShield IPS, ISS SiteProtector, Symantec System Center Console, Proteus, On Line Security Awareness Classes, PGP Full Disk Encryption... Hyper Communicate – Monthly ITSSS, NEO, Web Presence… It is all about Relationships! – Know/Trust/Like Governance Training • BSI Americas Information Security Training – ISO 27001/ISMS http://www.bsiamericas.com/TrainingInformatio nSecurity/index.xalter • HISP (Holistic Information Security Practitioner) Training/Certification http://www.hispcertification.org/ References – ISO/IEC 27001 standard – BS 7799-3:2006 (Risk Mgt) – BS 25999 (Business Continuity) – BIP 0071-0074 (ISMS Guidance Series from BSI) – ISO/IEC 27002 standard – (ISO/IEC 27001:2005 in plain English) http://www.praxiom.c om/iso-27001overview.htm – (ISO/IEC 27002:2005 in plain English) http://www.praxiom.c om/iso-17799overview.htm Questions? Feel free to write us! Tammy Clark ([email protected]) William Monahan ([email protected]) T Copyright Tammy L. Clark, October 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and with permission of author.
© Copyright 2026 Paperzz