Security

June 3, 2016 | Author: ajeykarthi | Category: N/A
Share Embed Donate


Short Description

Security...

Description

ISO 17799 Security Standard How Will It Fit with Other Standards Don Holden, CISSP-ISSMP [email protected] Concordant, Inc January 2006

11

Agenda 1¾ 2¾ 3¾ 4¾ 5¾ 6¾ 7¾ 8¾ 9¾

Do We Need a Security Standard? History of ISO 17799 New and Improved 17799 A Certification Standard – 27001 Benefits of Certification Other Security Standards Is There a Map for this Maize A New Framework Other Sources Concordant, Inc. | www.concordantinc.com

Why Standardization Security Visibility among Business Partners

Source: NIST Presentation

Source: NIST

Concordant, Inc. | www.concordantinc.com

Desired End State

Source: NIST Presentation Concordant, Inc. | www.concordantinc.com

History of ISO17799 1¾



3¾ 4¾ 5¾



Began in 1989 as “User Code of Practice” (UK’s DTI) Became BSI 7799 “Code of Practice for Information Security Management” in 1995 Submitted to ISO but defeated Part 2 was added in 1998 Revised in 1999 and Part 1 submitted to ISO for fast track approval. Opposed by other large countries but passed in 2000 as ISO 17799:2000 Concordant, Inc. |

www.concordantinc.com

ISO17799-2005 New and Improved 1¾

Additions 17 new controls 8 new control objectives

2¾ 3¾

Deletions – 9 controls deleted Improvements Rewording for clarity Reformatting Relocating controls and text Concordant, Inc. | www.concordantinc.com

ISO 17799 Reformatted Clauses Security Policy

Security Policy

Security Organization

Organizing Information Security

Asset Classification & Control

Asset Management

Personnel Security

Human Resource Security

Physical & Environmental Security

Physical & Environmental Security

Communications & Operations Mgt

Communications & Operations Mgt

Access Control

Access Control

Systems Development & Maintenance

IS Acquisitions, Development & Maintenance

IS Incident Management Business Continuity Management

Business Continuity Management

Compliance

Compliance

Concordant, Inc. | www.concordantinc.com

ISO 17799 Improvements

Concordant, Inc. | www.concordantinc.com

IS Management Systems Certification 1¾

There have been no “ISO 17799 certifications”. ISO 17799 is a code of practice, with recommended controls, not a requirements specification. Certifications have been done for Information Security

Management Systems using BS7799-Part 2

Concordant, Inc. | www.concordantinc.com

ISO 27001:2005 ISMS - Requirements 1¾

The Certification Standard Based on BS 7799-2002 Part 2 Aligned with ISO 9001 and 14001 (EMS)



Concepts in 27001 All activities must follow a process (PDCA) Must specify security goals Controls based on risk analysis Choice of offered controls Continuous verification process Continuous improvement process Concordant, Inc. | www.concordantinc.com

ISO 27001 ISMS Process Model

Source: ISO 27001:2005 Concordant, Inc. | www.concordantinc.com

Components of 27001 4 Information security management system ¾ 4.1 General requirements ¾ 4.2 Establishing and managing the ISMS ¾ 4.2.1 Establish the ISMS ¾ 4.2.2 Implement and operate the ISMS ¾ 4.2.3 Monitor and review the ISMS ¾ 4.2.4 Maintain and improve the ISMS ¾ 4.3 Documentation requirements 1¾ 4.3.1 General 2¾ 4.3.2 Control of documents 3¾ 4.3.3 Control of records

5 Management responsibility ¾ 5.1 Management commitment ¾ 5.2 Resource management ¾ 5.2.1 Provision of resources ¾ 5.2.2 Training, awareness and competence 6 Internal ISMS audits 7 Management review of the ISMS ¾ 7.1 General ¾ 7.2 Review input ¾ 7.3 Review output 8 ISMS improvement 8.1 Continual improvement

Concordant, Inc. | www.concordantinc.com

Why Certify to 27001



Some Reasons for Certifying: Meeting U.S. legislative requirements directly and indirectly As part of a supplier management program As a measure and independent evidence that industry best practices are being followed. To reduce insurance premiums As part of a corporate governance program May offer competitive advantage Concordant, Inc. | www.concordantinc.com

ISO 27000 Series What’s Next 1¾



3¾ 4¾ 5¾

Provide guidance (not mandatory requirements ) for 27001 processes (PDCA) Defining scopes for information security management systems Risk assessment Identification of assets Effectiveness of information security Concordant, Inc. | www.concordantinc.com

Planned 27000 Series ISMS Framework 1¾ 2¾ 3¾ 4¾ 5¾ 6¾

27000 (P) Fundamentals and Vocabulary 27001-2005 Requirements – (PDCA) 27002 (P) Code of Practice (17799-2005) 27003 (P) Implementation Guidance – (PDCA) 27004 (D) IS Metrics and Measurements 27005 (D) Risk Management Supports 27001 Certifications Based upon BS7799-3 ISMS Guidelines for Information Security Risk Management Concordant, Inc. | www.concordantinc.com

ISMS Framework – 2700x 1¾

Potential Standards Monitoring and Review Internal Auditing Continual Improvement

Concordant, Inc. | www.concordantinc.com

ISO SubCommitee on Security ISO/IEC JTC SC27

Concordant, Inc. | www.concordantinc.com

SC27 Working Group 1 1¾ 2¾

3¾ 4¾

5¾ 6¾ 7¾

Management of ICT security (MICTS) Risk - ISO/IEC 13335 Code of practice for information security management ISO/IEC 17799 IT Network security - ISO/IEC 18028 Selection, deployment and operations of intrusion detection systems - ISO/IEC 18043 Information security incident management - ISO/IEC 18044 ISMS Requirements specification – ISO 27001 ISMS Metrics and measurements – draft ISO 27004 Proposed inclusion of NIST 800-55 CISWG Best Practices and Metrics Concordant, Inc. | www.concordantinc.com

SC27 Working Group 2 1¾

2¾ 3¾ 4¾

5¾ 6¾ 7¾

Digital signature schemes giving message recovery ISO/IEC 9796 Message authentication codes - ISO/IEC 9797 Entity authentication - ISO/IEC 9798 Modes of operation for an n-bit block cipher algorithm ISO/IEC 10116 Hash-functions - ISO/IEC 10118 Key management - ISO/IEC 11770 Digital signatures with appendix - ISO/IEC 14888

Concordant, Inc. | www.concordantinc.com

SC27 Working Group 3 1¾

2¾ 3¾ 4¾ 5¾ 6¾ 7¾

Cryptographic techniques based on elliptic curves ISO/IEC 15946 Time stamping services - ISO/IEC 18014 Random bit generation - ISO/IEC 18031 Prime number generation - ISO/IEC 18032 Encryption algorithms - ISO/IEC 18033 Data encapsulation mechanisms - ISO/IEC 19772 Biometric template protection - ISO/IEC 24745 Concordant, Inc. | www.concordantinc.com

Mapping the Maize 1¾

Standards and guidelines that support ISO 17799

Concordant, Inc. | www.concordantinc.com

Mapping to 17799

Source: SC27 N4476 WG1 Road Map

Source: SC27/WG1 “WG1 Road Map”

Concordant, Inc. | www.concordantinc.com

Security Standards Framework

Concordant, Inc. | www.concordantinc.com

Source ISO/IEC SC27

Source: SC27 Business Plan

Other ISO Security TC 68 SC2 Banking Security 1¾

Some Security Standards: Message authentication Digital Signatures Encryption Techniques Protection Profiles Security guidelines

Biometrics

Concordant, Inc. | www.concordantinc.com

How does the U.S. Participate? 1¾

InterNational Committee Information Technology Standards (INCITS) ANSI Technical Advisory Group for ISO/IEC JTC1 INCITS is sponsored by the Information Technology Industry Council (ITI) Originally founded as Accredited Standards Committee X3 INCITS Cyber Security 1 (CS1) formed in April 2005 for security standards CS1 working on a draft standard- “Implementation of Role-

Based Access Controls” Concordant, Inc. | www.concordantinc.com

Other Sources of Guidance 1¾ 2¾

3¾ 4¾

NIST 800 Series Publications CISWG Best Practices and Metrics – Report to Congress PCI Data Security Technical Benchmarks Center for Internet Security NSA NIST Vendor Security Recommendations Concordant, Inc. | www.concordantinc.com

Concordant, Inc. | www.concordantinc.com

What Concordant Does 1¾



IT infrastructure services for regulated industries Security services Secure & Compliant Assessment Implementation/ Remediation Maintenance and Support Concordant, Inc. | www.concordantinc.com

References 1¾ “Frequently Asked Questions” ATSEC http://www.atsec.com/01/index.php?id=06-0101-01 2¾ CISWG Report of the Best Practices and Metrics Team http://www.cisecurity.org/Documents/BPMetricsTeamReportFinal111704Rev11005.pdf 3¾ INCITS CS1 www. www.ncits.org/tc_home/cs1.htm 4¾ ISO/IEC 13335-1:2004, Management of information and communications technology security — Part1: Concepts and models for managing and planning ICT security. 5¾ ISO/IEC TR 13335-3:1998, Guidelines for the Management of IT Security — Part 3: Techniques for the management of IT security. 6¾ ISO/IEC TR 13335-4:2000, Guidelines for the Management of IT Security — Part 4: Selection of 7¾ Safeguards 8¾ ISO/IEC TR 18044:2004, Security techniques — Information Security Incident Management 9¾ NIST SP 800-30, Risk Management Guide for Information Technology Systems 10¾ Gamma Secure Systems Ltd http://www.gammassl.co.uk/index.html 11¾ NIST Presentation “New FISMA Standards & Guidelines”, Ross, Don; Katzke, S. 12¾ OECD Guidelines for the Security of Information Systems and Networks — Towards a Culture of Security. Paris: OECD, July 2002. www.oecd.org

Concordant, Inc. | www.concordantinc.com

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF