Chapter 9: Security Operations and Administration PDF

Summary

This chapter details topics including security operations, security administration, controlling access, documentation, and procedures.

Full Transcript

CHAPTER 9 Security Operations and Administration Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com. Learning Objective(s) and Key Concepts Learning Objective(s) Key Concepts...

CHAPTER 9 Security Operations and Administration Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com. Learning Objective(s) and Key Concepts Learning Objective(s) Key Concepts Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Explain the role of security  Role of security administration operations, security policies, within an organization security audits, testing, and  Compliance and professional ethics monitoring in an IT infrastructure.  Components of an IT security policy infrastructure and data classification standards  Change management and configuration management  The system life cycle (SLC) and the system development life cycle (SDLC) Security Administration  The group of individuals responsible for planning, designing, implementing, and monitoring an organization’s security plan Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Physical location where they work is often referred to as the security operations center (SOC)  Organizations must identify and document information assets, and then assign responsibility of each one to a person or position Controlling Access  Identification  Assertions made by users about who they are Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Authentication  The proving of that assertion  Authorization  The permissions a legitimate user or process has on the system  Accountability  Tracking or logging what authenticated and unauthenticated users do while accessing the system Documentation, Procedures, and Guidelines  The most common documentation requirements include:  Sensitive assets list Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  The organization’s security process  The authority of the persons responsible for security  The policies, procedures, and guidelines adopted by the organization  An organization must comply with rules on two levels:  Regulatory compliance  Organizational compliance Disaster Assessment and Recovery  The security administration team:  Handles incidents, disasters, and other interruptions Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Forms an incident response team, comprising individuals responsible for responding to incidents and investigating security breaches  Manages the emergency operations groups, which is responsible for protecting sensitive data in the event of natural disasters, equipment failure, and other potential emergencies Security Outsourcing  Advantages  High level of expertise that an organization alone might not have Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Disadvantages  The outsourcing firm might not possess internal knowledge  You will not develop in-house capability or talent and need to continue to pay for these services indefinitely Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Outsourcing Considerations  Adherence to policy  Data security  Ownership  Privacy  Risk Common Outsourcing Agreements  Service-level agreement (SLA) Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Blanket purchase agreement (BPA)  Memorandum of understanding (MOU)  Interconnection security agreement (ISA) Compliance  Event logs  Records of actions that an organization’s operating system or application software Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com creates, showing which user or system accessed data or a resource and when  Compliance liaison  Makes sure that all personnel are aware of and comply with the organization’s policies  Remediation  Fixing something that is broken or defective, and, with computer systems, it refers to fixing security vulnerabilities Professional Ethics  Set the example Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Encourage adopting ethical guidelines and standards  Inform users through security awareness training Common Fallacies About Ethics  Users think:  Computers should prevent abuse Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  They have the right to explore security vulnerabilities as a form of free speech or expression  Their actions may cause only minor damage and that a little damage will not bother anyone  If it’s easy to break in, it must be all right to do so  Hacking is okay if what they do is not damaging  If they are not making any money or advancing themselves by hacking into a system, they must not be committing a crime  Information should be free and that it’s okay to look through somebody’s system to obtain information Codes of Ethics  A code of ethics helps ensure professionalism Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Internet Architecture Board (IAB) statement of policy  List of unethical and unacceptable online practices, specifically related to activities involving the Internet  Professional requirements/privacy principles  An organization should collect only what it needs.  An organization should not share its information.  An organization should keep its information up to date.  An organization should use its information only for the purposes for which it was collected.  An organization should properly destroy its information when it is no longer needed. Personnel Security Principles  Limiting access Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Separation of duties  Job rotation  Mandatory vacations  Security training  Security awareness  Social engineering The Infrastructure for an IT Security Policy  Policies Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Standards  Procedures  Baselines  Guidelines Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com The Security Policy Environment Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com The Security Policy Hierarchy Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Systematic Actions Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Baseline Corporate Configuration Data Classification Standards  Data owner  Person who owns the data or someone the owner assigns Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Responsible for classifying data  System owner  Person or group that manages the infrastructure  Classifying information criteria  Value  Sensitivity  Criticality Information Classification Objectives  To identify information protection requirements Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  To identify data value in accordance with organization policy  To ensure that sensitive and/or critical information is provided appropriate protection/controls  To lower costs by protecting only sensitive information  To standardize classification labeling throughout the organization  To alert employees and other authorized personnel to protection requirements  To comply with privacy law and regulations Examples of Classification  U.S. government (standardized)  Unclassified Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Restricted  Confidential  Secret  Top Secret  Private sector (not standardized)  Public (low)  Private (medium)  Confidential (high) Classification Procedures  Critical to effective data classification Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Determine the scope and process  Conduct a business impact analysis to evaluate all the organization’s data  Data value is determined according to:  Exclusive possession (trade secrets and intellectual property)  Utility (usefulness)  Cost to create or re-create the data  Liability (protection regulations)  Convertibility/negotiability (financial information)  Operational impact (if data is unavailable)  Threats to the information  Risks Assurance  Internal and external auditors  Should review organization’s information-classification status during regular audit Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com process  Evaluate level of compliance with classification policy and procedures to ensure compliance  Information security personnel  Should regularly visit workstations and other areas where users might leave unprotected classified materials  When violations occur, submit appropriate reports to supervisors and managers Configuration Management  The process of managing all changes to computer and device configurations Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Evaluates the impact a modification might have on security  Security professionals responsible for:  Ensuring adequate review of all system changes  Ensuring that configuration changes will not cause unintended consequences for security Hardware Inventory and Configuration Chart  Decision to roll out a new patch, service pack, or release will be complicated if you can’t find, update, and test every affected device Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Have an up-to-date map or layout of the configuration of the hardware components  Regularly check for any available vendor upgrades, patches, and service packs The Change Management Process  Configuration control  Management of the baseline settings for a system device Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Change control  Management of changes to the configuration Change Control Management  Communicate change management procedures and standards effectively Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Reactive or proactive  Reactive: Management responds to changes in the business environment  Proactive: Management initiates the change to achieve a desired goal  Occurs on a continuous, regularly scheduled, release, or program-by-program basis Change Control Committees  Ensure changes are: changes are:  Properly tested Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Authorized  Scheduled  Communicated  Documented Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Change Control Procedures Change Control Issues  Peer reviews  Ensure that a peer or other expert double-checks all changes before you put them Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com into production  Back-out plans  Ensure that if the change doesn’t work properly, a plan exists to restore the system to a known good condition  Documentation  Keep documentation current to reflect the true system’s design Application Software Security  Processes for software development:  System life cycle (SLC) Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  System development life cycle (SDLC)  Steps are similar; key differences:  SLC includes operations and disposal  SDLC ends with the transition to production The System Life Cycle  Project initiation and planning Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Functional requirements and definition  System design specification  Build (develop) and document  Acceptance testing  Implementation (transition to production)  Operations and maintenance  Disposal Testing Application Software (1 of 2)  Test for all expected and unexpected actions Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Test that errors are handled correctly  Perform tests to verify maximum load on the system, including:  Transaction volume  Memory allocation  Network bandwidth  Response times  Keep production or sensitive data secure during testing Testing Application Software (2 of 2)  Thoroughly evaluate any change to your environment. Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Formalize the process for procuring new equipment.  Follow the guidance in your data policies.  Review a system throughout its life cycle to ensure that it meets its specified security (certification).  Make sure management officially accepts the system (accreditation). Systems Procurement  To ensure that new equipment does not expose the environment to new vulnerabilities: Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Evaluate various solutions that are available.  Evaluate vendors in terms of maintenance, support, and training.  Use the Common Criteria to ensure that you simplify the evaluation process.  Monitor vendor contracts and SLAs.  Correctly install equipment and formally accept it at the end of the project.  Follow the organization’s procurement procedures to ensure a fair purchasing process.  Monitor systems and equipment to identify those that are reaching the end of their life span so that you can schedule them for replacement. Software Development and Security  Application must properly perform the following tasks:  Checks user authentication to the application Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Checks user authorization (privilege level)  Has procedures for recovering database integrity in the event of system failure  Handles errors and exceptions consistently and does not allow any error or exception to go unhandled  Validates all input  Defines secure configuration baselines  Provides guidance on hardening your application  Provides and applies frequent patches Software Development Models  The two most widely accepted models for software development  Waterfall model Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Agile development method Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com The Waterfall Model Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com The Agile Software Development Method Summary  Role of security administration within an organization Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Compliance and professional ethics  Components of an IT security policy infrastructure and data classification standards  Change management and configuration management  The system life cycle (SLC) and the system development life cycle (SDLC)

Use Quizgecko on...
Browser
Browser