SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Information Systems 365/765
Nicholas Davis, November 10, 2016
Lecture 16 Operations Security
Operations SecurityOperations Security
• What happens after the secure network and
systems are built
• Day to day work and use
• Continual maintenance (due care and due
diligence)
• Prudent Person Concept (despite all the
controls in place, operations security still
depends on people using their common sense
and good judgment to uphold IT secuirty
principles)
11/11/16 UNIVERSITY OF WISCONSIN 2
Administrative ManagementAdministrative Management
DesignDesign
• Dealing with personal issues (separation of job
duties and job rotation)
• High risk activities are broken up among
various employees
• The organization should have a written
complete and detailed list of duties of personnel
• User and Administrator should have different
access rights on systems
• Backup and redundancy of job functions
• Enforce least privilege and mandatory vacations
11/11/16 UNIVERSITY OF WISCONSIN 3
Security and Network PersonnelSecurity and Network Personnel
TasksTasks
• Implements and maintains security devices
and software
• Carries out security assessments
• Creates and maintains user profiles and access
• Configures the security labels in Mandatory
Access Control
• Sets initial password
• Reviews audit logs
11/11/16 UNIVERSITY OF WISCONSIN 4
Security and Network PersonnelSecurity and Network Personnel
AccountabilityAccountability
Limit excessive privileges
Enable monitoring, logging and auditing (should
be routine)
Questions which you should ask:
•Are users doing functions which are part
of the job descriptions?
•Are repetitive mistakes being made?
•Do too many users have rights to sensitive
data?
11/11/16 UNIVERSITY OF WISCONSIN 5
Clipping LevelsClipping Levels
(Threshold)(Threshold)
• Threshold is a baseline for activities committed
before an alarm is raised
• Once exceeded, violations are recorded for
review
• The purpose is to discover problems before
damage occurs
• Example, you have logged in incorrectly 10
times, your account is locked, reset password
11/11/16 UNIVERSITY OF WISCONSIN 6
Assurance LevelsAssurance Levels
Operational Assurance: describes the standards to
which an information system was built. This is
determined during the design process.
Lifecycle Assurance: describes how the
information system is maintained and grown,
while making sure to abide by the original
operational assurance, setting standards and
expectations to be met
Routine audits of active accounts, etc.
11/11/16 UNIVERSITY OF WISCONSIN 7
Operational ResponsibilitiesOperational Responsibilities
Duties of staff may include: software, personnel
and software
Management is responsible for managing
personal behavior of employees
The operations people focus on avoiding recurring
issues
All deviations from the norm should be
investigated
11/11/16 UNIVERSITY OF WISCONSIN 8
Unusual or UnexplainedUnusual or Unexplained
OccurrencesOccurrences
Steps is such a situation are:
1.Investigate
2.Diagnose
3.Solve
4.Make changes in system to keep issue from
occurring in the future
11/11/16 UNIVERSITY OF WISCONSIN 9
Deviations From StandardsDeviations From Standards
Standards = expected service levels of information
systems
It provides a solid baseline, from which deviations
can be investigated
Examples of common problems:
Unscheduled system reboots (Zoinks, Scooby!)
Asset identification and management (where’s my
stuff?)
Systems controls (how did this person gain
access?)
11/11/16 UNIVERSITY OF WISCONSIN 10
System HardeningSystem Hardening
Types of controls: Physical, Technical,
Administrative
Physical safeguards:
1.Wiring and networking closets locked
2.Networks in public locations should be
physically un-accessible
3.Removable devices should be locked and
encrypted
11/11/16 UNIVERSITY OF WISCONSIN 11
Systems HardeningSystems Hardening
(Continued)(Continued)
Licensing issues: Make sure your company is
using the software in compliance with vendor
contracts and stipulated operating procedures
Make sure you have a Service Level Agreement
(SLA) with your software, hardware and service
providers, indicating acceptable and unacceptable
performance and recovery baseline agreements
11/11/16 UNIVERSITY OF WISCONSIN 12
Remote Access SecurityRemote Access Security
Definition: Providing secure information systems
access to remote users
Can help reduce costs, by permitting work
flexibility, but also may expose you to increased
risk. It is a balancing act.
1.All communication via remote access should be
encrypted at all times
2.Generally remote access to critical systems by
end users should not be permitted
3.Administrators must use strong authentication
such as One Time Password device (OTP)
11/11/16 UNIVERSITY OF WISCONSIN 13
Configuration and ChangeConfiguration and Change
ManagementManagement
Policies should:
1.Document how all changes are made and
approved
2.Guidelines should be different based upon the
kind of data being managed
3.Disruptions in service must be planned and
approved in advance
4.Contingency plans must be in place to address
planned outages
11/11/16 UNIVERSITY OF WISCONSIN 14
Change Control ProcessChange Control Process
Process:
1.Submit request for change to take place
2.Formal approval of the change
3.Formal documentation of the change
4.Assurance of testing must be presented to the
group approving the change
5.Implement the change
6.Report results to management
11/11/16 UNIVERSITY OF WISCONSIN 15
Examples of Change ControlledExamples of Change Controlled
EventsEvents
New computers installed
New applications installed
Changes in system configurations implemented
Patches and system updates
New networking equipment installed
Company IT infrastructure merged with that of
another company which was acquired
11/11/16 UNIVERSITY OF WISCONSIN 16
Physical Media ControlsPhysical Media Controls
1. Protect from unauthorized access
2. Protect from environmental issues such as
flooding, overheating, etc.
3. Media should be labeled
4. Media should be sanitized when they reach the
end of their use/life.
5. Tracking number, chain of custody of media
6. Location of backups
7. Keep history of any changes to media
(replacements, etc)
11/11/16 UNIVERSITY OF WISCONSIN 17
Network and ResourceNetwork and Resource
AvailabilityAvailability
Failsafe measures are very important!
1.Have redundant hardware and software
replacements on hand
2.Implement fault tolerance technologies such as load
balancing login servers
Note the difference between redundancy and
load balancing: Redundancy means having a
backup system which can take over if the primary
system goes down, and load balancing means that two
or more systems are operating in tandem to decrease
resource utilization and dependency on a single point,
which could fail.
11/11/16 UNIVERSITY OF WISCONSIN 18
Network and ResourceNetwork and Resource
AvailabilityAvailability
1. Mean Time Between Failures (MTBF) should
be tracked and proactively addressed. “Trend”
your devices, so that you can plan for
replacement and be ready.
2. Understand the Mean Time To Repair
(MTTR), so you can make adequate plans
when a system breaks.
3. Avoid single points of failure, whenever
possible
11/11/16 UNIVERSITY OF WISCONSIN 19
Redundant Array ofRedundant Array of
Independent Disks (RAID)Independent Disks (RAID)
RAID 0 = striping of data across several disks. If
any one disk is lost, the missing data can be
determined by looking at points on either side of
missing data. If a disk goes down, pull it and
replace it.
RAID 1 = mirroring of source disk. If a disk goes
down, it can be rebuilt from the mirror disk.
11/11/16 UNIVERSITY OF WISCONSIN 20
BackupsBackups
• Steps:
• Document your procedures
• Test and certify restores
• Do continuous incremental online
backups
• Engage is Business Continuity Planning,
keep copies both onsite and offsite, in
case of disaster
11/11/16 UNIVERSITY OF WISCONSIN 21
Mainframe OperationalMainframe Operational
SecuritySecurity
Continue to be useful, reliable and
expensive
Generally have less patching requirements
Generally more powerful and less flexible
than client server systems
Dinosaurs!
11/11/16 UNIVERSITY OF WISCONSIN 22
Fax SecurityFax Security
• There is no such thing as a
secure Fax
• Never use a Fax for a sensitive
communication!
11/11/16 UNIVERSITY OF WISCONSIN 23
Vulnerability TestingVulnerability Testing
Goals:
1.Evaluate your company’s true and actual
security posture vs your company’s stated and or
assumed security posture
2.Confirms known vulnerabilities and identifies
new vulnerabilities
3.Tests how your company reacts to attacks of
information systems
11/11/16 UNIVERSITY OF WISCONSIN 24
11/11/16 UNIVERSITY OF WISCONSIN 25

Weitere ähnliche Inhalte

Was ist angesagt?

Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVaultAlienVault
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information Systemnewbie2019
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)Vimarsh Padha
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMuhammad Asim
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementEnclaveSecurity
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsEinar Landre
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Donald E. Hester
 

Was ist angesagt? (20)

Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Incident response
Incident responseIncident response
Incident response
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
 
P3 m2
P3 m2P3 m2
P3 m2
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Section01 overview
Section01 overviewSection01 overview
Section01 overview
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systems
 
Spectre and Meltdown
Spectre and MeltdownSpectre and Meltdown
Spectre and Meltdown
 
Infrastructure resilience
Infrastructure resilienceInfrastructure resilience
Infrastructure resilience
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 

Andere mochten auch

The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationNicholas Davis
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 Nicholas Davis
 
Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlNicholas Davis
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityNicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 

Andere mochten auch (8)

The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher Education
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
 
Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access Control
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) Security
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 

Ähnlich wie Security Operations -- An Overview

Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsSolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsSolarWinds
 
Joe Buonomo-ASQ Presentation
Joe Buonomo-ASQ PresentationJoe Buonomo-ASQ Presentation
Joe Buonomo-ASQ PresentationJoe Buonomo
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunk
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentResilient Systems
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002Greg Hanchin
 
CS403: Operating System : Lec 4 OS services.pptx
CS403: Operating System : Lec 4 OS services.pptxCS403: Operating System : Lec 4 OS services.pptx
CS403: Operating System : Lec 4 OS services.pptxAsst.prof M.Gokilavani
 
Comp8 unit9a lecture_slides
Comp8 unit9a lecture_slidesComp8 unit9a lecture_slides
Comp8 unit9a lecture_slidesCMDLMS
 
Business Case - SSD.pptx
Business Case - SSD.pptxBusiness Case - SSD.pptx
Business Case - SSD.pptxPritam Yadav
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Comp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesComp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesCMDLMS
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Sonatype
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...Cognizant
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingPrecisely
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?Black Duck by Synopsys
 

Ähnlich wie Security Operations -- An Overview (20)

Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
Joe Buonomo-ASQ Presentation
Joe Buonomo-ASQ PresentationJoe Buonomo-ASQ Presentation
Joe Buonomo-ASQ Presentation
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002
 
CS403: Operating System : Lec 4 OS services.pptx
CS403: Operating System : Lec 4 OS services.pptxCS403: Operating System : Lec 4 OS services.pptx
CS403: Operating System : Lec 4 OS services.pptx
 
Comp8 unit9a lecture_slides
Comp8 unit9a lecture_slidesComp8 unit9a lecture_slides
Comp8 unit9a lecture_slides
 
Business Case - SSD.pptx
Business Case - SSD.pptxBusiness Case - SSD.pptx
Business Case - SSD.pptx
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Comp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesComp8 unit6b lecture_slides
Comp8 unit6b lecture_slides
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and Reporting
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 

Mehr von Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebNicholas Davis
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Nicholas Davis
 

Mehr von Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 

Kürzlich hochgeladen

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 

Kürzlich hochgeladen (9)

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 

Security Operations -- An Overview

  • 1. Information Systems 365/765 Nicholas Davis, November 10, 2016 Lecture 16 Operations Security
  • 2. Operations SecurityOperations Security • What happens after the secure network and systems are built • Day to day work and use • Continual maintenance (due care and due diligence) • Prudent Person Concept (despite all the controls in place, operations security still depends on people using their common sense and good judgment to uphold IT secuirty principles) 11/11/16 UNIVERSITY OF WISCONSIN 2
  • 3. Administrative ManagementAdministrative Management DesignDesign • Dealing with personal issues (separation of job duties and job rotation) • High risk activities are broken up among various employees • The organization should have a written complete and detailed list of duties of personnel • User and Administrator should have different access rights on systems • Backup and redundancy of job functions • Enforce least privilege and mandatory vacations 11/11/16 UNIVERSITY OF WISCONSIN 3
  • 4. Security and Network PersonnelSecurity and Network Personnel TasksTasks • Implements and maintains security devices and software • Carries out security assessments • Creates and maintains user profiles and access • Configures the security labels in Mandatory Access Control • Sets initial password • Reviews audit logs 11/11/16 UNIVERSITY OF WISCONSIN 4
  • 5. Security and Network PersonnelSecurity and Network Personnel AccountabilityAccountability Limit excessive privileges Enable monitoring, logging and auditing (should be routine) Questions which you should ask: •Are users doing functions which are part of the job descriptions? •Are repetitive mistakes being made? •Do too many users have rights to sensitive data? 11/11/16 UNIVERSITY OF WISCONSIN 5
  • 6. Clipping LevelsClipping Levels (Threshold)(Threshold) • Threshold is a baseline for activities committed before an alarm is raised • Once exceeded, violations are recorded for review • The purpose is to discover problems before damage occurs • Example, you have logged in incorrectly 10 times, your account is locked, reset password 11/11/16 UNIVERSITY OF WISCONSIN 6
  • 7. Assurance LevelsAssurance Levels Operational Assurance: describes the standards to which an information system was built. This is determined during the design process. Lifecycle Assurance: describes how the information system is maintained and grown, while making sure to abide by the original operational assurance, setting standards and expectations to be met Routine audits of active accounts, etc. 11/11/16 UNIVERSITY OF WISCONSIN 7
  • 8. Operational ResponsibilitiesOperational Responsibilities Duties of staff may include: software, personnel and software Management is responsible for managing personal behavior of employees The operations people focus on avoiding recurring issues All deviations from the norm should be investigated 11/11/16 UNIVERSITY OF WISCONSIN 8
  • 9. Unusual or UnexplainedUnusual or Unexplained OccurrencesOccurrences Steps is such a situation are: 1.Investigate 2.Diagnose 3.Solve 4.Make changes in system to keep issue from occurring in the future 11/11/16 UNIVERSITY OF WISCONSIN 9
  • 10. Deviations From StandardsDeviations From Standards Standards = expected service levels of information systems It provides a solid baseline, from which deviations can be investigated Examples of common problems: Unscheduled system reboots (Zoinks, Scooby!) Asset identification and management (where’s my stuff?) Systems controls (how did this person gain access?) 11/11/16 UNIVERSITY OF WISCONSIN 10
  • 11. System HardeningSystem Hardening Types of controls: Physical, Technical, Administrative Physical safeguards: 1.Wiring and networking closets locked 2.Networks in public locations should be physically un-accessible 3.Removable devices should be locked and encrypted 11/11/16 UNIVERSITY OF WISCONSIN 11
  • 12. Systems HardeningSystems Hardening (Continued)(Continued) Licensing issues: Make sure your company is using the software in compliance with vendor contracts and stipulated operating procedures Make sure you have a Service Level Agreement (SLA) with your software, hardware and service providers, indicating acceptable and unacceptable performance and recovery baseline agreements 11/11/16 UNIVERSITY OF WISCONSIN 12
  • 13. Remote Access SecurityRemote Access Security Definition: Providing secure information systems access to remote users Can help reduce costs, by permitting work flexibility, but also may expose you to increased risk. It is a balancing act. 1.All communication via remote access should be encrypted at all times 2.Generally remote access to critical systems by end users should not be permitted 3.Administrators must use strong authentication such as One Time Password device (OTP) 11/11/16 UNIVERSITY OF WISCONSIN 13
  • 14. Configuration and ChangeConfiguration and Change ManagementManagement Policies should: 1.Document how all changes are made and approved 2.Guidelines should be different based upon the kind of data being managed 3.Disruptions in service must be planned and approved in advance 4.Contingency plans must be in place to address planned outages 11/11/16 UNIVERSITY OF WISCONSIN 14
  • 15. Change Control ProcessChange Control Process Process: 1.Submit request for change to take place 2.Formal approval of the change 3.Formal documentation of the change 4.Assurance of testing must be presented to the group approving the change 5.Implement the change 6.Report results to management 11/11/16 UNIVERSITY OF WISCONSIN 15
  • 16. Examples of Change ControlledExamples of Change Controlled EventsEvents New computers installed New applications installed Changes in system configurations implemented Patches and system updates New networking equipment installed Company IT infrastructure merged with that of another company which was acquired 11/11/16 UNIVERSITY OF WISCONSIN 16
  • 17. Physical Media ControlsPhysical Media Controls 1. Protect from unauthorized access 2. Protect from environmental issues such as flooding, overheating, etc. 3. Media should be labeled 4. Media should be sanitized when they reach the end of their use/life. 5. Tracking number, chain of custody of media 6. Location of backups 7. Keep history of any changes to media (replacements, etc) 11/11/16 UNIVERSITY OF WISCONSIN 17
  • 18. Network and ResourceNetwork and Resource AvailabilityAvailability Failsafe measures are very important! 1.Have redundant hardware and software replacements on hand 2.Implement fault tolerance technologies such as load balancing login servers Note the difference between redundancy and load balancing: Redundancy means having a backup system which can take over if the primary system goes down, and load balancing means that two or more systems are operating in tandem to decrease resource utilization and dependency on a single point, which could fail. 11/11/16 UNIVERSITY OF WISCONSIN 18
  • 19. Network and ResourceNetwork and Resource AvailabilityAvailability 1. Mean Time Between Failures (MTBF) should be tracked and proactively addressed. “Trend” your devices, so that you can plan for replacement and be ready. 2. Understand the Mean Time To Repair (MTTR), so you can make adequate plans when a system breaks. 3. Avoid single points of failure, whenever possible 11/11/16 UNIVERSITY OF WISCONSIN 19
  • 20. Redundant Array ofRedundant Array of Independent Disks (RAID)Independent Disks (RAID) RAID 0 = striping of data across several disks. If any one disk is lost, the missing data can be determined by looking at points on either side of missing data. If a disk goes down, pull it and replace it. RAID 1 = mirroring of source disk. If a disk goes down, it can be rebuilt from the mirror disk. 11/11/16 UNIVERSITY OF WISCONSIN 20
  • 21. BackupsBackups • Steps: • Document your procedures • Test and certify restores • Do continuous incremental online backups • Engage is Business Continuity Planning, keep copies both onsite and offsite, in case of disaster 11/11/16 UNIVERSITY OF WISCONSIN 21
  • 22. Mainframe OperationalMainframe Operational SecuritySecurity Continue to be useful, reliable and expensive Generally have less patching requirements Generally more powerful and less flexible than client server systems Dinosaurs! 11/11/16 UNIVERSITY OF WISCONSIN 22
  • 23. Fax SecurityFax Security • There is no such thing as a secure Fax • Never use a Fax for a sensitive communication! 11/11/16 UNIVERSITY OF WISCONSIN 23
  • 24. Vulnerability TestingVulnerability Testing Goals: 1.Evaluate your company’s true and actual security posture vs your company’s stated and or assumed security posture 2.Confirms known vulnerabilities and identifies new vulnerabilities 3.Tests how your company reacts to attacks of information systems 11/11/16 UNIVERSITY OF WISCONSIN 24
  • 25. 11/11/16 UNIVERSITY OF WISCONSIN 25