Chapter 4
Domain 2: Security Operations and Administration

The Systems Security Certified Practitioner (SSCP) must be familiar with an organization's policies, standards, procedures, and guidelines to ensure adequate information availability, integrity, and confidentiality (AIC). The SSCP works closely with the organization's management personnel, system owners, information managers, data custodians, and end users in the application of security policies, data classification schemes, security controls verification, and the monitoring and application of patches and updates. It is important that the SSCP candidate understand the concepts of endpoint device security and change management. As a member of the organization's IT security team, a practitioner may be involved in security awareness training and other milestones in the employee life cycle, such as onboarding, account provisioning and user support, changing rights, and account ­termination processing.

Security operations and administration is a broad canvas encompassing everything from corporate policies to everyday security activities. The practitioner should be knowledgeable in all of the facets of IT security administration for an organization.

Security Administration Concepts and Principles

Security administration includes the policies, principles, standards, procedures, and guidelines required for availability, integrity, and confidentiality (AIC) of an organization's data and hardware assets. Security administration also defines the roles and responsibilities of individuals within the organization who must carry out various tasks according to established directives. Administrative activities such as change control, configuration management, security awareness training, monitoring of systems and devices, and the application of generally accepted industry practices are the responsibility of IT administrators and security practitioners.

Security administration is performing various functions and activities related to the security of the system or enterprise. It is typically the responsibility of a security administrator, security officer, or security manager. While some of the specific activities are actually performed by frontline personnel such as security practitioners, the responsibility for them resides with the security administrator. But security administration sometimes requires more than assuming duties that somebody else has been performing. Many security administration functions in organizations are handled by various personnel. A typical assignment of the security practitioner is to perform duties that ensure that system security is maintained, security flaws are controlled, and risk to the organization is minimized.

Security administration involves the selection and placement of controls to enforce the AIC objectives within the system to ensure availability, integrity, and confidentiality for all members of the organization. These key administration duties may include configuration, logging, monitoring, upgrading, and updating products and end-user support.

The first thing that comes to mind when someone says IT security are electronic boxes with assorted flashing lights. Although various network hardware devices may be used to detect and mitigate threats on a network, IT security and the security of the enterprise must first be built on a firm foundation of policies and concepts. Without policies and the resulting procedures and guidelines, there would be a complete lack of corporate governance with respect IT security. Security policies are the foundation upon which the organization can rely for guidance.

Network personnel, from network administrators to security practitioners, are required to have a least a working knowledge of networking, security, and risk management ­concepts and how they impact the enterprise.

Security Equation

IT security and the security of the organization are necessary because of risk. Every enterprise faces uncertainty based on a vast array of threats. The process of measuring, identifying, and controlling the risk environment within an organization is referred to as risk management. Risks are managed by utilizing various controls to reduce them. You have already seen that these controls may be technical or administrative in nature. The following is the description we use in the system security field to identify risk:

Risk is a function of the likelihood of a threat agent exploiting a vulnerability, and the resulting impact of that action creates an adverse effect on the organization.

In other words, risk can be expressed as the possibility of loss. Risk and risk management will be covered in Chapter 5. The activities of security administration include the creation of policies as a risk mitigation function. Administrative policies recognize that threats exist and put in place controls and conditions whereby the exposure of various organization ­vulnerabilities may be mitigated.

Security Policies and Practices

Policies and practices are put in place by an organization to guide business and personnel actions. In a small entrepreneurial business, policies may be dictated and enforced by the business owner. Not always are these policies committed to writing. In many cases, a policy statement might be explained as, “We've always done it this way.” In most cases, when a very small business begins to grow and gains employees, it's actually the human resources department that spearheads the requirement for policy statements. Many of these employee-based policy statements are enacted due to various local, state, and federal regulations. In many cases, the beginnings of a small business ­security policy take the form of “lock the door and turn off the lights when you leave.”

As we move from small and medium-sized businesses (SMBs) into large enterprises, the requirements for formal, well-constructed written documents that are aligned with the mission and values of the enterprise are required. These documents form the foundation to protect the organization's information and assets by specifying the requirements and techniques utilized to control risk. It is through these documents that controls are put in place to reduce risk by mitigating a threat's ability to exploit a vulnerability.

Business, IT, and Security Alignment

The security of any organization or enterprise rests totally on the strategic planning and tactical implementation of security policies and risk mitigation controls. The security plan of the organization should completely coincide with the mission, objectives, culture, and nature of the business. Various security frameworks exist to guide the organization as well as the security professionals responsible for implementing programs through the planning, organization, and documentation that respond to the requirements of the organization. The most popular frameworks include the National Institute of Standards and Technology (NIST) 800 series of Special Publications. These NIST publications offer a broad coverage of IT security best practices. Another of the most popular frameworks is the ISO/IEC 27000 series of information security standards.

An information security management system (ISMS) consists of the set of policies designed to reduce or mitigate risks to the organization. It promotes the principle that an organization should create, implement, and maintain a complete set of security policies, processes, and systems to manage risks to both hardware and information assets.

The framework initially was published in the United Kingdom as BS 7799 in the mid '90s. By 2000 it was adopted by the International Organization for Standardization (ISO) and retitled ISO/IEC 17799. In 2005, the standard was incorporated into the ISO 27000 standards series as ISO/IEC 27002. It is common to place the date of revision after the standard number. The most recent revision is ISO/IEC 27002:2013. The standard is explicitly concerned with information security, meaning the security of all forms of information. There are several information security standards published in the ISO/IEC 27000 series. The two most popular are as follows:

  1. ISO 27001:2013 ISO 27001:2013 is a specification for the evaluation of the performance of an information security management system (ISMS). Organizations that meet the standard may gain an official certification issued by an independent and accredited certification body on successful completion of a formal audit process.
  2. ISO 27002:2013 Provides organizational information security standards and information security management practices which takes into consideration the organization's information risk appetite. These guidelines include the selection, implementation, and management of risk mitigation controls. ISO/IEC 27002:2013 is a popular, internationally recognized standard of good practice for information security.

Both ISO 27001:2013 and ISO 27002:2013 have been completely rewritten since the 2005 edition. While ISO 27001:2005 specified Deming's Plan-Do-Check-Act cycle, in ISO 27001:2013 other continuous improvement processes such as Six Sigma's DMAIC (Define, Measure, Analyze, Improve, and Control) may be implemented.

Best Practices

A best practice is an accepted methodology of performing an action that leads to a beneficial result. In many situations, the best practice has developed, over a period of time, through trial and error. Businesses utilize best practices in the form of frameworks, templates, or guidelines. Various methodology frameworks such as Information Technology Infrastructure Library ITIL, Six Sigma, agile project management, and the Scrum agile software development framework are readily adopted by businesses. Practice distribution has been made possible generally through the commercialization of the topic and the proliferation of books, courses, and certifications.

Organizations such as the National Institute of Standards and Technology (NIST), the International Organization for Standardization (ISO), and the International Electrotechnical Commission (IEC) work with industry groups as well as governments to develop and publish frameworks of best practices. Once a framework becomes generally well accepted, it will be adopted as an industry standard. A typical best practice recommendation for information security management is the ISO/IEC 27002:2013. Quite often best practices and industry-recognized frameworks become the foundation for corporate policies.

Corporate Policies

A corporate policy is a written document that states high-level goals and directives as established by corporate top management. Corporate policies take the form of a brief statement by corporate top management and provide authorization, intent, and direction. They generally include all of the major areas of the enterprise, such as accounting, legal, human resources, ethics, and regulatory compliance to name a few.

Corporate policies are generally created as a response to various requirements.

  1. Legislative and Regulatory Compliance Most corporations are required to comply with a variety of legislative or regulatory mandates. Legislative restrictions are in the form of laws passed by a government body. A regulation is generally issued by government department or a recognized regulatory body such as a trade association. Failure to comply with legislative or regulatory mandates may result in fines, sanctions, or even criminal prosecution.
  2. Contractual Requirement Every enterprise enters into a wide variety of contracts with suppliers, customers, service providers, and partnering organizations. These policies state the intent and direction of top management in relation to the management of a contract or relationship.

Security Policies

The corporate security policy is a statement authorized by top management that defines the overall security for the organization and protection of corporate assets. Chief among ­corporate assets is information. Therefore, many security policies are referred to as IT security policies because information is contained on computers, servers, and storage devices.

The IT security policy may be viewed as an umbrella policy that encompasses a number of subpolicies or supporting policies that address various activities or risk categories. These subpolicies generally cover areas such as information access, use and disclosure, destruction, and classification as well as physical security, ethics, and various activities associated with the IT infrastructure. Figure 4.1 illustrates the relationship between general corporate policies, the IT security policy, and various subpolicies.

Flowchart of the relationship between corporate policies, security policies, and supporting policies. Security is directly under corporate while all other supporting policies are under security policies.

Figure 4.1 The relationship between corporate policies, security policies, and supporting policies

For instance, the enterprise security policy may broadly state that all information system users are required to use a password as an authentication mechanism. The password policy would then specify such details as the structure of a password, password expiration and renewal, re-issuance of a forgotten password, and any other details specific to passwords.

Types of Security Policies

There are different categories of security policies depending upon the structure and requirements of the organization. There are three general types of security policies that together meet the requirements of the overall enterprise security program:

  1. Organizational Policies An organizational policy is established by a person or group with a high level of authority, such as a senior manager or corporate office, and it's usually very broad in nature, impacting the entire organization, corporate division, geographic area, or a country-specific working group. For example, an organizational policy may be created for the XYZ Corporation, the XYZ Corporation Omaha Engine Manufacturing Division, or the XYZ Corporation Asia – Pacific Region.

    The same organizational policy may exist for all three entities, with the difference being the scope of the policy in relation to the requirements of the entity. For instance, an organizational policy reflecting the requirement for personal privacy for European operations will have different standards, regulations, and legislation to comply with than one for the Omaha division within the United States. Organizational policy should be clear regarding the specific entity or geography of the intended audience. It should include specific statements about the geography, facilities, hardware, software, data storage, and personnel within the scope of the policy. This is very important in the case of a cloud data storage policy, for example.

    The organizational policy may generally state that customer data may be placed in cloud storage. Unfortunately, the organization may find that the cloud storage facilities are based in a country that does not allow search and seizure of the data during a forensics investigation. Therefore, the organization must carefully consider and clearly define the requirements when creating a general organizational policy.

  2. Functional Policies Functional policies address specific issues or concerns of the organization. They may be used to define requirements related to particular areas of security, such as access control, acceptable use, change management requirements, hardware and software updates, and other operational concerns. An example of a functional policy is a Bring Your Own Device (BYOD) policy. It may state that corporate employees may use their own wireless device to access the organization's network and data based upon certain criteria. The functional policy will list the criteria that must be met prior to an individual being allowed access. The criteria may include the requirement of current updates on the system, the use of anti-malware and virus protection, the restriction of different types of data that may be uploaded or downloaded, the requirement for device security, the ability to remote wipe the device in case of theft or loss, and many other requirements that are relevant to the use of personal wireless devices.

    Similar to organizational policies, functional policies may include the entire organization, corporate division, geographic area, or country-specific working group within the scope of the policy. An example of the corporate division functional policy might be that personal access to all manufacturing facility workspaces at the XYZ Corporation Omaha Engine Manufacturing Division will require two-factor authentication.

  3. Operational Policies Operational policies, sometimes referred to as system-specific ­policies, are used to clarify and provide a clear direction on operational topics such as access to specific database information, application software, or networking facilities. An operational policy may state the requirement that a specific action, such as access to an accounts payable application function, requires separation of duties. Another operational policy may state that all accounting personnel workstations will be assigned to a specific virtual network.

The more detailed or granular a policy, the more frequently the policy may be required to be updated or changed. Organizational policies are usually very broad in scope, while an operational policy defines a specific operational requirement or action. For instance, an organizational policy may require that all individuals utilize two-factor authentication for facility access. This is a general statement that applies to all the individuals in the organization. The specific supporting operational policy may state that the XYZ2314 retinal scanner be used as the second factor for authentication at the New Mexico Laboratory Annex. While the organizational policy is long term, spanning many years, the XYZ2314 retinal scanner may be replaced within a year or two, requiring an operational policy and procedural policy change.

Security Policy Endorsement

Although corporate policies may be authored by knowledgeable individuals within the organization or may be adopted from a variety of best practices, policy templates, or frameworks, it is of paramount importance that the top management of the organization support, approve, and endorse the security policy. The security policy should reflect and support the mission and goals of the enterprise. The endorsement by top management provides an authoritative document that authorizes the adoption and implementation of various controls by which to mitigate risk to the organization's assets. The security policy clearly states the direction and goals of top management and reflects the culture, goals, and mission of the organization.

Enterprise-Wide Security Policies

Today we operate in a multicultural global economy. As security professionals, we must recognize that our organization may span dozens of countries. Under the umbrella of IT security policies, it is not unusual to have policies specific to a country or a region. The right to privacy is a highly developed area of law in Europe. All of the member states of the European Union are also members of the European Convention on Human Rights. In 1980, the comprehensive data protection system was adopted throughout Europe. The Convention developed the guidelines governing the protection of privacy. It adopted seven principles governing the protection of personal data:

  1. Notice Persons should be given notice when their data is being collected.
  2. Purpose Data should only be used for the purpose stated and not for any other purposes.
  3. Consent Data should not be disclosed without the owner's consent.
  4. Security Collected data should be kept secure from any potential abuses.
  5. Disclosure Persons should be informed as to who is collecting their data.
  6. Access Persons should be allowed to access their data and make corrections to any inaccurate data.
  7. Accountability Persons should have a method available to them to hold data collectors accountable for not following the above principles.

It is important to understand that from a global perspective, numerous security policies may be required depending upon local laws, customs, and regulations.

Supporting Security Policies

A large number of policies may fall under the umbrella of IT security or corporate security policies. Each of these policies provides guidance on a specific requirement. Here are some of the most common supporting security policies:

  1. Acceptable Use Policy This policy defines the acceptable use of organizational hardware and information assets. This is one of the first organizational policies most new employees are exposed to, and they usually must sign an acknowledgment of having received it. The AUP may also define warning banners that pop up on system login, which may also require acknowledgment by clicking a continue button.
  2. Password Policy A password policy usually states that a password must be used as authentication for hardware and information access. This policy will address use, creation, structure, system lockout, and the password replacement and renewal period.
  3. Backup Policy This policy specifies backup procedures for information on individual workstations, servers, databases, applications, or other environments.
  4. Network Access Policy The network access policy may contain the rights and privileges of specific subjects when they are gaining access to the network. This policy may describe authentication techniques and specific access control mechanisms.
  5. Incident Response Policy This policy describes how incidents are identified and the specific steps to be taken once they are. As a functional or operational policy, it may list the persons to be notified and actions required to remedy the situation.
  6. Guest Access Policy This policy describes specific network guests that may be allowed access and the methods they are allowed to use for access.
  7. Remote Access Policy This policy describes authentication techniques and logging requirements for accessing the corporate network from external sources.
  8. Virtual Private Network (VPN) Policy The virtual private network policy describes hardware, software, and encryption to be utilized when establishing VPNs for remote access by both users and external systems.
  9. Third-Party Connection Policy The third-party connection policy describes any methodology used by customers, partners, suppliers, or other entities when connecting with the corporate network.
  10. Wireless Policy This policy describes the setup and use of the corporate wireless network. It may describe network access, protocols and methodology for encryption, and other details concerning wireless network access.
  11. Encryption Policy Data should be encrypted both in transit and at rest. The encryption policy describes the methodology and algorithms used to encrypt data in various states. This policy may also describe the requirements for encryption on external devices such as cell phones, pads, laptops, and tablets.
  12. Mobile Device Policy The mobile device policy is sometimes referred to as a BYOD policy and describes the use of various personally own portable devices both on the premises of the organization and when connected to the organization's network.
  13. Network Security Policy A network security policy broadly states the requirements for network security and, as a functional or operational policy, describes security requirements and specific controls to be utilized to protect corporate assets.
  14. Data Classification Policy The data classification policy describes the method and hierarchy of data classification within the organization. It also will describe the criteria for data access, including the assignment of subjects rights to access classified data, and a data declassification scheme.
  15. Retention Policy This policy describes long-term storage of data, encryption of data while it's in storage, access to stored data, and data destruction criteria.
  16. Physical Security Policy The physical security policy outlines the controls used to mitigate threats to physical assets. The policy may describe access controls, authentication methodology, and access logging requirements throughout the organization.
  17. Outsourcing Policy An outsourcing policy may set forth the requirements placed upon external vendors who supply labor, consultation, or physical assets to the organization. Generally these policies describe access controls for the privacy and security of corporate assets.
  18. Email Policy Email policies generally describe the use of corporate email accounts, data retention, acceptable use, restrictions on personal use, and appropriate email content. Functional and operational email policies may detail email storage, deletion, and forwarding to personal devices.
  19. Employment Policy Every employer should enforce an acceptable use policy (AUP) as well as other policies that outline acceptable behavior for all employees. The employment policy should describe the qualifications for employment, background check requirement, and required onboarding, training, and indoctrination, including the signed receipt indicating an acknowledgment of receiving a corporate policy manual or employee handbook.
  20. Contractor, Consultant, and Vendor Security Policy A variety of policies may be required if a business engages contractors, consultants, and vendors on the premises. These policies should specify physical access, acknowledgment of entry, access to specific information or networks, encryption methodology, and other subjects specific to the relationship.
Security Policy Format and Design

Security policies do not need to be large and bulky to be effective. In fact, most corporate policies are three to five pages and usually no longer than nine pages in length. It is very helpful if all policies follow the same general format.

All policies may be designed to include various statements specific to the policy topic; security policies usually contain many of the following sections:

  1. Purpose Statement The purpose statement identifies a particular policy and reason for its existence. It is usually a vision or mission statement.
  2. Audience Statement This statement identifies the intended audience for the policy. For instance, a high-level organizational policy may affect every employee in the enterprise, while another high-level policy of a similar nature may affect only those employees working in the Asia-Pacific region. An operational policy, on the other hand, may be directed at system administrators at the Omaha branch.
  3. Authorization Statement This statement lists the individual responsible for issuing the policy. In all cases this should be a C-level individual. The authorization statement establishes the ultimate responsibility for this particular policy.
  4. Accountability Statement This section specifies individuals, by job title, who are responsible for ensuring compliance with the policy.
  5. Standards or Mandate Statement This section may be optional and, when used, specifies the regulation, legislation, contractual agreement, or business standard the policy enforces. For instance, the policy may support a particular requirement of the Sarbanes-Oxley Act or a Payment Card Industry Data Security Standard (PCI DSS) v2 requirement.
  6. Policy Detail Statement This section briefly specifies the items or actions that are directed by the policy. For instance, “The IT department at XYZ Corporation will establish a password policy to authenticate all individuals or systems desiring access to the network or data of XYZ Corporation.” On the password policy document, this section would detail specific password requirements, such as length, duration, issuance, and identity verification.
  7. Enforcement Statement This section specifies what actions or sanctions may be taken in the event the policy is violated. On occasion, a range of actions or sanctions may be listed, depending upon the severity of the policy violation. It is important to define, by job title, who enforces the policy.
Support and Execution of Security Policies

As you have seen, the corporate security policy is generally broad in nature and makes a single statement. It does not go into detail concerning the “how” and, specifically, the “who” of any aspect of the policy. In the example of the corporate password security policy, the mandate statement was very general. On the specific password policy, more detail was added as to the length of time, identity verification, and other password requirements. This password policy detail is supported by a policy statement, standards, baselines, procedures, and guidelines.

The components of a policy and supporting documents are as follows:

  1. Policy Statement A policy statement is a high-level directive setting forth a mandate in support of the mission goals and objectives of the organization. For example, XYZ Corporation will comply with the Payment Card Industry Data Security Standard (PCI DSS).
  2. Standards Standards represent the criteria that must be met by the policy. Standards may be imposed by legislation, regulation, or industry requirements, or they may be imposed by the organization. For instance, the Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards. The PCI DSS standard is mandated by the card brands and specifies various compliance requirements. The corporate PCI DSS security policy would list the six requirements as established by the Payment Card Industry Security Standards Council.
  3. Baselines A baseline may be established as the normal or minimal criteria that must be met by the policy. Baselines may list a specific configuration setting for a piece of hardware, such as a firewall, an IDS, or a router. Such a baseline configuration may require that various rules be included in every router. Baselines are used to ensure that the standard minimal or optimal foundation configuration exists for the consistent implementation of the availability, integrity, and confidentiality of information throughout the organization.

    Each piece of hardware or software has optimal settings that allow for the most secure implementation. A baseline states a specific configuration criteria required for the hardware or software to meet the functional or organizational policy statement. For example, an organizational policy may state that every user workstation be protected by antivirus software. The functional policy may state that ABC antivirus software be implemented on all user workstations. And a baseline may state that the ABC antivirus software be configured to automatically update on a daily basis using the ABC Professional Signature database. It is also important that configurations be regularly evaluated or audited to ensure that they meet the baseline minimum requirement.

  4. Procedures Procedures are detailed steps that provide a set of instructions for performing a specific task. Some companies, and specifically government/military organizations, might have what is called a standard operating procedure (SOP). Procedures define not only the steps to take but other specific information.
    1. Instructions The chronological steps that the individual must do to complete or finish a task.
    2. What The device or tools that should be used and a source of materials specific to the task. This may also describe what reports or logs must be completed when a procedure is finished.
    3. When How often or what time of day should the procedure be undertaken.
    4. Where Where to find the device, the tools, or the information required by the procedure.
    5. Who The person responsible for carrying out the procedure. This may also specify who is responsible to inspect or double-check the quality of the work.
  5. Guidelines Guidelines differ from procedures in that they are generally considered optional and may take the form of a suggested practice. Guidelines generally allow the individual to make a discretionary judgment on how to proceed when executing procedural steps. Many guidelines originate from recommendations and best practices and are usually created through trial and error. For instance, a guideline may state, “To avoid skin contact, wear rubber gloves when applying solvent.”

    It is not uncommon that over time guidelines become accepted practice throughout an organization or industry and are integrated into a procedure as a requirement. Many of today's policies and procedures originated as guidelines.

Figure 4.2 illustrates the hierarchy from general corporate policies to guidelines, including standards, baselines, and procedures.

Image described by caption and surrounding text.

Figure 4.2 Illustration of the hierarchy from general corporate policies to guidelines

Policy Documentation

For effective communication, all corporate policies should use a similar template. The template will ensure that each policy document contains the required information and is easy to read and understand. Policy content must be brief and to the point.

Policies may be documented through a number of methods. Of course, one technique would be to print out the pages and place them in a binder. Policies do need to be in writing, but consideration should be given to storage, accessibility, updates, and communication.

Enforcing Security Policies

A method of enforcement must be included in the security policy. The policy should list the definition of a violation (and optionally, its severity) and the punishment, sanction, or action taken. When considering enforcement actions, it is always highly recommended to include the human resources department. Policies must be enforced fairly and without bias. Individuals could claim that they did not know about the policy, the policy changed without them knowing, or that somebody else was not accused when they violated the policy. Numerous legal issues may arise when enforcing a security policy.

The violation of some policies could lead to severe punishment, sanctions, or termination for the employee. In such case, as with onboarding documentation, the employee must sign an acknowledgment that they have received, read, and understand the policy. When feasible, some organizations require a face-to-face meeting with each employee, while other policy notification situations may use emails to employees and require an e-signature document to be returned.

Policy Change and Updating

Over time, some policies must change. Policy change and review should constantly be undertaken by the organization. Because top-level corporate policies are authorized by C-level corporate officers, a formal change review and signoff process should be undertaken. Once a policy is updated, copies should be distributed as specified by the communication plan.

Policy Communication and Awareness

Policies and changes to policies must be communicated to the appropriate audience throughout an organization. Depending upon the policy, not all information is distributed to everybody. A policy that affects only the marketing department is obviously not required to be distributed to warehouse personnel.

When communicating policies and changes, it is important to consider the actions required by the individual. Some of these actions may be more significant than others. For instance, a policy change stating that a specific server will not be available from 10 p.m. to midnight on Saturdays due to scheduled maintenance may have less impact and significance on individuals than a policy that implements a new workgroup data-sharing software application requiring individuals to organize and upload all of their work files within the next week. The communication should be clear on what actions and activities individuals must perform in relation to the policy or policy change.

Many companies utilize their intranet to disseminate policy information. Other policy documentation communication plans might include one or more of the following:

  • banner upon login
  • Newsletters
  • Emails from the CEO
  • Posters or displays in public areas
  • Senior management town hall meetings
  • Departmental meetings
  • Manager meetings, one-on-one meetings, or workgroup meetings
  • Global meetings, management webinars, or conference calls
  • Open days or “cafe chats”

Two of the most popular and frequently used methods of policy distribution and awareness are manager meetings and pop-up logon banners. Everyone in the organization logs into their computer workstation on a regular basis. It is fairly easy to include a pop-up or warning banner announcing a policy or a change in a policy. For more detailed explanation or policy distributions that may require a question-and-answer session, manager meetings may be held with departmental staff. Depending upon the details of the policy, “train-the-trainer” sessions may be held with managers to explain the details of a policy and how to answer specific questions. This is especially important if a policy may have an adverse or confusing effect on personnel.

Security Development Life Cycle

A security practitioner may be involved in the development of software or applications. It is important that security personnel be involved at the beginning and as a stakeholder in every development project.

The Security Development Lifecycle (SDL) is a software development process proposed by Microsoft to reduce software maintenance costs and increase the reliability and security of software. The Security Development Lifecycle incorporates all of the activities to ensure compliance with both operational and security requirements as specified by organizational policy. Security requirements and the inclusion of security controls should be present at the beginning of the development project.

Automated Configuration Management

The security practitioner may be required to manage the configuration files on a variety of network equipment. Configuration management is critical to the success of the IT organization. Various IT devices, including servers, switches, routers, and IDSs as well as other networking items, require configuration and system updates on a regular basis. The larger the organization, the more difficult this task becomes.

While it is always possible to update and configure items manually, many organizations have adopted automated configuration management. Automated configuration management provides a centralized method to make changes to a system in an organized manner.

Configuration management is the application of tools that allow for the centralized management of settings, firewall rules, and configuration files that allow networking items to perform their assigned tasks.

The task of configuration management may be broken down into a number of activities. The security practitioner may be responsible for any or all of these configuration management tasks.

  1. Identification Configuration identification is the process of setting and maintaining operational baselines that define the system status at any point in time. Identification is similar to snapshots, in which the specific parameters of the system are available. An example includes restore points on Microsoft Windows operating systems. A restore point represents a specific configuration at a point in time.
  2. Control Control represents any action concerning change requests and change proposals and their subsequent approval or disapproval. Control may be thought of as a function of the change control process. Various devices may be automatically patched or updated on a regular basis without submitting a change request, while other devices must proceed through a change proposal.
  3. Accounting Accounting is the process of logging and reporting any change to configuration.
  4. Auditing Auditing is verification that a process has been completed according to policy or plan. It may also verify that the product is in compliance with established performance requirements.

Patch Management

Applying relevant patches, updates, and fixes may be the responsibility of the security practitioner. Patching devices may be automated or manual in nature and are always procedural based. This means that a procedure exists such as taking an item offline, placing it in administrator mode, connecting a console, and completing many other required steps to update the software contained on the device. Although the word patch is frequently used to describe an update or change in a software device, there are many other terms associated with this activity.

  1. Patch A patch is a piece of software intended to update an application, operating system, or control program to improve its usability and performance. A patch may be broad in nature and fix or repair various problems identified within the software. Patch Tuesday is an industry term referring to when Microsoft regularly releases patches for its software products. Usually on the second and fourth Tuesday of each month at a specific time of the day, patches are made available for manual or automatic download. Other major manufacturers, such as SAP and Adobe Systems, have announced their Security Patch Day to coincide and occur on Patch Tuesday.
  2. Security Patch A security patch is a specific update to an application, operating system, or control program in response to the identification of a vulnerability. Many manufacturers attempt to distribute security patches as soon as they are tested and available. In some cases, a manufacturer is unaware of a vulnerability and therefore does not have a patch available. An exploit of a vulnerability for which the manufacturer is unaware is referred to as a zero-day attack. The term zero day indicates that this is the first time the vulnerability has been identified. Microsoft generally releases security patches once a month, and other manufacturers release security patches as soon after a vulnerability identification as possible.
  3. Unofficial Patch Unofficial patches are patches provided by third-party individuals or organizations for commercial software. These patches are usually sold by subscription and either fix problems earlier than the manufacturer can release a patch or patch products that are no longer supported by a manufacturer.
  4. Hot Patch A hot patch is a patch that can be applied to piece of hardware or software without the requirement to power down or reboot the product, thus making it unavailable to users. This type of patch addresses the availability component of the CIA triad.
  5. Service Pack A service pack is made up of a number of updates, enhancements, fixes, or patches that are delivered by the manufacturer in the form of a single executable file. The executable file will cause the service pack to be installed on the target machine. Service packs are usually numbered and are released on a random basis when a sufficient number of patches and updates have accumulated. Most service packs are cumulative in nature, meaning patches and updates from a previous service pack are incorporated in the current service pack to ensure that all changes are made adequately. Service packs for application software generally replace the existing files with updated software. During this process, the application software may receive a new version number.
  6. Update, Upgrade Update and upgrade are industry slang used to describe the installation of any software that either fixes a vulnerability or increases the usability or functionality of the product.
  7. Fix, Quick Fix A fix has become known in the software industry as a rapid repair to an identified problem. In many cases, the fix is related to a very specific problem or possibly a specific user of the software. A hastily released fix that has not been properly tested may raise the risk of possible regressions. A regression is when a fix for a current problem creates problems in prior versions of the product. Testing a fix to address this problem is called regression testing.
  8. Hotfix Similar to a hot patch, a hotfix may be applied to a piece of hardware or software that is currently online and in use. Hotfixes have become known in the software industry as providing the ability to fix a bug very rapidly and possibly without going through formal development channels.

Version Numbering

Software version numbering is a method of assigning alphanumeric or numbers to designate the generation or “build” of a software or firmware product. The numbers or alphanumeric designations are generally assigned in increasing order to correspond to changes and developments and new releases of the software product.

Most versioning schemes feature three- to four-digit identifiers and are used to convey the importance or significance between changes. Different manufacturers and producers of software make use of the designations differently. For instance, the designation 2.1.3.4 may indicate that this is the fourth revision (4) of the documentation and the third revision (3) of minor changes. It may also indicate this is the first revision (1) indicating a major change since the last general release. Some manufacturers jump sequence numbers to indicate the importance of an upgrade or software revision change. For instance, Internet Explorer 6 went from 6.1 to 6.5.

The primary version number (2) indicates a new software release with a major functionality change. When manufacturers change the primary version number, it may indicate a substantial change in functionality, usability, or feature set. It may also denote an incompatibility with prior versions. When changing the primary version number, many manufacturers use this opportunity to resell the subscription to the software.

Sandbox Testing

It is an industry best practice to thoroughly test any patch, fix, update, or service pack in a nonproduction environment. Sandbox refers to a machine or virtual network that is totally isolated from the production environment. Problems experienced during testing within a sandbox cannot escape to the production network. It is never a good idea to distribute patches, fixes, or even service packs without first testing them in an offline environment.

Implementation and Release Management

Release management is part of the software development process, which can be a constantly evolving process or an ongoing cycle of development, testing, and release. Software applications are created, modified, or updated on a regular basis. As part of the process, they are tested and evaluated by both IT quality testing teams and end-user testing teams. Each team is challenged with testing the software to specific design parameters, usually as outlined in the business requirements document (BRD). The IT quality team is charged with testing the automation of the software and how it interacts with databases, storage devices, and other pieces of software, sometimes referred to as quality acceptance testing (QAT), while the user team is testing the software against specific scenarios or business cases, usually referred to as user acceptance testing (UAT).

Once the software is completed and passes the testing environment, it is made ready for deployment. Software deployment is a series of steps in which the new software is loaded on a server and distributed to the appropriate user workstations. In some deployment situations, the software remains on the server and is available for end-user logon.

  1. Software Release Activities The security practitioner may be responsible for one or more activities during the software release process.
    1. Facilitate Communication Serves as a liaison between the business units and the IT department to ensure proper communication during the release process.
    2. Release Coordinator Communicates issues, problems, and concerns and coordinates the services of the help desk group to facilitate software deployment.
  2. Software Release Challenges A software release is not without its own unique challenges. The security practitioner may be involved in communicating or assisting in solving some of the challenges and problems facing the release, including these:
    • End-user issues
    • Reporting of software defects
    • Change requests
    • End-user orientation and training
    • Defect reporting
    • Incident handling
    • Identification of risks

Software release can be an ongoing, multifaceted project involving dozens of individuals. In the past, new software releases and updates were made available only upon the completion of particular project. This project methodology is referred to as the waterfall development process, where one step leads to the next until the project is eventually completed and distributed to the end users. Software development organizations today utilize an agile development process in which items are developed very quickly, tested, and made available. The agile development process has greatly increased the number of possible software releases due to the rapid ability to create or modify software, correct mistakes, and reissue the software.

Change Management

Change management is specifically an IT process in which the objective is to ensure that the methods and procedures for change are standardized and are used for efficient and prompt response to all change requests. Change management is a system that records a request, processes requests, elicits a denial or authorization, and records the outcome of the change to a configuration item.

Changes requiring specific approval may be forwarded to a change control board (CCB) or change advisory board (CAB) consisting of various authoritative and qualified individuals within the organization who review and approve or deny changes.

Change management is responsible for managing change processes involving the following:

  • Network infrastructure
  • Specific networking components
  • Application software
  • Database structure
  • Communications processes
  • Change and release processes
  • Network component modification or upgrades

Asset Management

Asset management broadly defines the identification, maintenance, and risk protection of hardware or information assets. The very first step of risk management is identifying the assets that require protection. The security practitioner may be involved in cataloging, maintaining, or decommissioning various organizational assets.

Assets are generally grouped into two specific classes: physical assets, which are also called tangible assets, and nonphysical assets, which are also called intangible assets. It may be obvious that tangible assets are IT infrastructure hardware components, while intangible assets are data, information, and intellectual property.

Asset Life Cycle

As a security practitioner, you may be involved in providing some service at any point along the asset life cycle. The asset life cycle includes the following steps:

  • Design
  • Construction
  • Commissioning
  • Operating
  • Maintaining
  • Repairing, modifying, replacing
  • Decommissioning
  • Disposal

Validate Security Controls

The IT environment is constantly changing along with the threats to the organization. IT departments should regularly test security and compliance controls to ensure that they remain both effective and within the scope of the required operational guidelines. The reason security controls require validation is to maintain compliance established by various regulations, such as, for example, FISMA/NIST, PCI DSS, and HIPAA.

It may be the responsibility of the security practitioner to assess, verify, and document the correct operational state of a security control based upon established baselines. During this process, the practitioner accomplishes a number of procedures that may include validation of current updates and patches, validation of correct configuration, and review of logs and documentation.

Data Management Policies

Every organization maintains data related to its business or operation. This information may consist simply of phone numbers and contacts, or it may be regulated information such as patient medical records. The security practitioner can be involved at any level of the maintenance and protection of organizational information.

Data States

Data is classified as being in one of three states: data at rest, data in transit, and data in process. Data at rest is in memory, and data in transit is moving. Data in process is a little more complex because it is data that is being used by a process. Programmers and database administrators are involved with handling data in process. For instance, if two numbers are being added together and the power goes out, what happens to the two numbers, and what happens to the answer? The programmers and database administrators use processes referred to as rollback and roll forward to reverse the effects of the calculation and restore the data to the state it was in prior to the power going out. Although the security practitioner may not be involved in such programming, it is important to recognize the terminology.

Information Life Cycle Management

Information life cycle management (ILM) is the practice of applying certain policies during the creation and maintenance of information. The organization may have several policies concerning the creation, classification, access, handling, and disposal of information. The security practitioner may be involved at any point during information life cycle management, including the classification and disposal of information as per existing policies.

Information Classification Policy

Organizations, whether business, military, or the federal government, possess data requiring various levels of privacy. The strictest data privacy classification in a military organization is top secret. This designation would indicate that the data or information would require the greatest amount of protection afforded any data in the system.

Various organizations are required to classify information based on privacy regulations imposed upon the industry. Information such as trade secrets, Department of Defense or governmental information, patient privacy information, and customer information such as credit cards, addresses, and Social Security numbers are all pieces of information that require protection through privacy. Some organizations separate classifications based on the type of data, such as financial, personal, or institutional secrets. An information classification structure is a set of labels or tags placed on documents and data that specifies the required protection that should be afforded to the information.

Many organizations, including the U.S military and government, use hierarchical based information classification systems. Business and commercial information classification systems are much more abbreviated than those of the military or government usually featuring three layers at most. Typically, this hierarchy includes unclassified, sensitive but unclassified, confidential, secret, and top secret. In the corporate world, a hierarchy may include public, sensitive, and confidential as classification categories.

Most organizations provide security controls based on the value of what is being protected. Many organizations rely on a risk assessment to determine the value of data. There are several ways to determine the value of an asset. The organization could assess the impact of the loss or disclosure of the data, the cost of replacement, and the amount of embarrassment that disclosure or loss of the data could produce. Then, place a higher value on the more serious impacts. The higher the value, the more protection is required. The lower the value, the less protection is needed.

To keep yourself on track, keep the following points in mind when assessing the level of security necessary for data within your organization.

  • You cannot protect everything from everyone.
  • There are not enough resources and money in the world to totally mitigate all risks.
  • Focus on protecting the most important information first, the information that exhibits the highest risks if exposed.

There are two parts to a data classification system:

  1. Object Classification An object is the data being accessed by a subject. During the process of object classification, an object such as a document is labeled (classified) in some manner to illustrate the status of the information. For instance, it may be labeled company confidential, sensitive, or unclassified.
  2. Subject Labeling A subject is the person or system requiring access to the classified object or data. Generally, the technique of labeling a subject is referred to as issuing a clearance level. A clearance establishes the topmost boundary of the information that may be accessed by the subject. For instance, a subject may have a secret clearance, thereby establishing that the topmost boundary of access is classified information that is labeled secret. By default, the subject would also be able to access any information classified below the secret level. However, they would not be able to transfer information classified as secret to any other level. For instance, information classified as secret must remain classified as secret.

Data Classification Process

Data classification strategies differ greatly from one organization to the next because each generates different types and volumes of data. The balance may vary greatly from one user to the next between office documents, email correspondence, images, video files, customer and product information, and financial or intellectual property data. Many companies begin to classify data in line with their confidentiality requirements, adding more security for increasingly confidential data. The classification system itself must include an element of centralized control so that data is classified in the context of overall strategic business objectives, such as compliance.

Various tools, software, and methodology exist to assist an organization in the data classification process. Generally, organizations opt to classify the most sensitive information first and work down to publicly available information.

Marking, Labeling, and Storage

An organization establishing a data classification policy must also include information concerning the marking, labeling, and storage of classified information. Sensitive information must be adequately identified both physically (by the marking on containers and storage devices) and digitally so that it can be recognized by trusted computer systems. The data classification policy should also include the access control provisions for both current information and information in long-term storage. Some information must be maintained in storage off-site for many years. Some regulations require that sensitive information be retained 7 years and some as much as 10 years. In the case of criminal evidence data, the information must be kept indefinitely. Consideration should also be given to the encryption methodology for long-term storage of data at rest. Currently, the AES encryption algorithm is used for long-term data storage.

Data Declassification

Records management is an expensive undertaking for any organization. The continued maintenance of classified information, including storage and access, should be considered in any data retention or data classification program. Many government agencies and other organizations have responded by developing an open data program. An open data program is an attempt to review information and declassify it according to various criteria. Some information that has been gathered may not be declassified. For instance, the Privacy Act of 1974, 5 U.S.C. § 552a, Public Law No. 93-579, established a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in systems of records by federal agencies. Other regulations, including HIPAA, restrict declassification or dissemination of private client or patient information.

It is suggested that a declassification scheme and methodology be included in any classification policy.

Endpoint Device Security

Any computer hardware device that can be connected to the Internet or a local area network can be referred to as an endpoint device. Endpoint devices include desktop computers, user workstations, laptop computers, tablets, thin clients, smartphones, printers, removable memory such as USB drives, IP cameras, and other business-related computer items. Specialized computer hardware, such as point-of-sale terminals, dedicated tablets such as those used in the shipping industry, barcode readers, smart meters used in the electrical distribution industry, and supervisory control and data acquisition SCADA networking items within the manufacturing industries are classified as endpoint devices.

With the creation of IPv6, the Internet of Things (IoT) will force the quantity of endpoint devices into the billions, including household appliances, Internet-enabled medical devices, and other Internet-connected items such as automobiles, communication devices, tools, and process control items.

Endpoint device security is specified in the endpoint device policy and generally consists of endpoint compliance and endpoint defense, as explained in the following sections.

Endpoint Health Compliance

Network access control (NAC) is a technology that uses a set of protocols to enforce a policy for endpoint access to a network. In essence, network access control checks the health of the device requesting network access. An endpoint device security policy might state that the device is required to meet a certain criteria prior to being allowed access to the network. This criteria could include the requirement that current software, current updates, and specific applications be loaded on the device. Upon request to join a network, the network access control technology would check the requesting device to determine that it has the current antivirus protection, the current system updates, and the current system configuration; it also may verify installed software or applications (apps) and confirm the current update level or configuration of the applications.

The second aspect of network access control technology is that through various means, which may include a preinstalled software agent loaded on the device, the network access control software may be able to automatically bring the device into compliance by automatically upgrading the device or correcting configuration problems.

Network access control represents a new and emerging category of security products that investigate a device and check its health prior to allowing access to a network. With the millions and possibly billions of devices within the Internet of Things, Internet-enabled devices such as health monitoring wristbands, refrigerators, washing machines, wearable devices, medical devices such as insulin pumps, and thousands of additional devices all could be compromised by malware or other attacks. It would be highly beneficial to be able to remotely monitor the health of the connecting device.

Although the nature of this technology is currently somewhat controversial concerning privacy issues and the ability to make changes externally on a personally owned device, it's clear that there will be a need for a way to check the health of devices wishing to connect to a network.

Endpoint Defense

Endpoint defense consists of an endpoint-mounted firewall, host intrusion detection systems (HIDSs), and antivirus software. The point at which defense mechanisms should be installed is when the endpoint or host system is initially set up or installed. The problem with endpoint defense is that it is required to be installed and maintained by the end user. It is safe to say that the majority of tablets, pads, and cell phones are currently incorrectly set up. In fact, it is a proven fact that most devices still maintain the default password that was on the product out of the box. Another aspect of end-user responsibility is maintaining patches, updates, and new versions of software applications as well as antivirus software.

Various firms offer endpoint security management software. Security management software is usually a form of server product that centrally manages the security settings and security components of network-based endpoint computers. Using security management software, applying patches and updates and monitoring the health and well-being of the endpoint device may be accomplished in a central location.

Endpoint defense for systems connected to a network can be carried out through the use of group management policies. A network administrator may assign various rights and capabilities to the user group that are enforced when they log onto the network. These rights and capabilities could include the inability to make changes, use USB devices, download specific software, or take other actions that might compromise the system. Although imposing restrictions on users is never popular, it does restrict the possibility of intrusions and problems with endpoint devices.

Endpoint Device Policy

Endpoint device policies describe the various aspects and requirements of endpoint devices that are connected to the organization's network. By definition, endpoint devices may consist of assets owned by the organization or personally owned devices. It is obvious that endpoint devices owned directly by the organization are much easier to keep in compliance with upgraded software, patches, and other defensive mechanisms.

Personally owned devices may be described by a mobile device policy, in some cases known as a Bring Your Own Device (BYOD) policy. It is important today to have and enforce a clear BYOD policy within an organization. Employees, contractors, and visitors as well as strangers are attempting to enter your network on a daily basis. Clearly the policy must address authentication mechanisms that allow or restrict access to network hardware and information assets. One of the most important parts of a BYOB policy is what information may be stored on a personally own device and what happens if the device is lost or stolen. Most BYOD policies specify that each device that has the capability of downloading information from the network must have the capability of being wiped or erased remotely if stolen or lost.

Personally owned devices offer many challenges to IT security managers and practitioners. Employees must be trained in the protection of corporate information assets that may be in their possession. For example, many personally owned devices have VPN client software installed. Many users automatically store their logon passwords on the device, and if the device is lost or stolen, the thief can immediately log on to the organization's network. In addition, users might log on using public Wi-Fi networks. In some public environments, Wi-Fi networks can actually be spoofed by a rogue operator who is intercepting passwords and text messages being sent over the network. The security practitioner should be involved in educating users in the correct methods of using their own devices.

Security Education and Awareness Training

End users pose the greatest threat to hardware and information assets of an organization. Through inadvertent or willful actions, users have the ability to cause great harm to the organization. Most organizations have already invested heavily in the latest firewalls, intrusion detection systems, and other advanced security technologies. Yet losses caused by security breaches continue to grow each year. The problem is not so much with the security technology as it is with the lack of security awareness among users. All too often the breaches that information security professionals have to deal with are caused by users forgetting to back up critical files, using weak passwords, or opening an email attachment with malicious code.

Social networking attacks prove to be one of the easiest attack vectors available. The uneducated user can be easily exploited. It is important to stress initial and continued security awareness education and training at all levels within an organization.

Organizations need to address the following potential vulnerabilities caused by uneducated end users:

  1. Malware Introduction Implantation of malware or malicious code within ads with third-party apps owned by an organization can pose real risks ranging from exposing proprietary information, culminating in the devalue of the corporate brand. End users continuously receive emails or solicitations with a “click here” invitation. They need to be informed opening unsolicited attachments and “click here” invitations can trigger the introduction of malware onto their system.
  2. Social Media Platforms Employees in most organizations are increasingly using social media platforms like Twitter, LinkedIn, and Facebook to communicate with friends, family, and business customers. Individuals are sharing more personal information online which poses a significant threat as new “friends” and “followers,” most of whom are unknown, pose social engineering threats. Through Twitter feeds and online posts, end users could expose corporate information, including nonpublic information of a financial nature that could potentially lead to insider trading. In the event of a corporate crisis where press inquiries were normally made through the public affairs department, end users now simply tweet or post information online, providing a direct link to the press.
  3. Password Exposure With the introduction of personal end-user devices, the ability for IT administrators to enforce password best practices has disappeared. After years of password breaches and warnings about weak passwords, a large percentage of people are still choosing words like welcome or words derived from personal information such as a birthday for passwords. This ultimately places company data and networks at risk. IT administrators have the ability to mandate password construction, expiration, and other attributes through such tools as Group Policy Manager. But this is only effective with systems where hosts directly connect to the network.

    Network managers and administrators have attempted to create various password policies that invariably include passwords such as &KH67rty&D@, which are virtually impossible for individuals to memorize, thus leading them to have written notes containing passwords in the vicinity of their computer.

    Other end users do not take password security seriously. It is been discovered through various industry audits that whole departments shared a single password into a database. It has also been discovered that temporary personnel have been allowed to log in as the person they are replacing for the day.

  4. Mistaken Access Social engineering against end users is an act of psychological manipulation. It is the art of manipulating people into performing actions or divulging confidential information. Through sympathy, tricks, mistaken identity, and deception, end users may be lured into allowing an unauthorized individual into a location or providing access to an organization's information.
  5. Data Exposure Technology has also led to the popularity of cloud storage. The ability to access information from anywhere and store and share data is an incredible business tool, but it also presents some challenges. There are a number of cloud services, many aimed at consumers, like Dropbox, Google Drive, and Apple iCloud. However, not every service or vendor has the same security controls, and so many are inappropriate for enterprise use. If employees are untrained, they're more likely to share sensitive documents over unprotected channels and store them on insecure devices, putting company information at risk.
  6. Lost Devices Sometimes the biggest risks that companies face does not come from the outside but results from end-user negligence. When employees are careless with their devices, it can lead to loss or theft. This can become a serious security issue for companies when a lost device contains sensitive company data. As mobile devices proliferate in the workforce, the ramifications of a lost or stolen device are huge. Personally owned mobile devices are more difficult to remotely wipe when lost or misplaced since they are not under IT department direct control. This can expose corporate data to loss and may result in the breach of sensitive data, potentially triggering state or national data breach notification requirements.

Employee Security Training Policy

The security policy of the organization must include a top-level security training policy. It should clearly state the importance of training at all levels of the organization to mitigate the threat to the organization through end-user conduct, whether it's willful or negligent.

The policy should clearly dictate which department is responsible for end-user security training. It should allocate the appropriate budget and state the expected goals and outcomes of end-user training.

Employee Security Training program

Security awareness training should focus on the threats to the organization as posed by the end users. These individuals should be made aware that such threats exist and be able to recognize the pattern or techniques an attacker may use. They should also be instructed on how to be vigilant so they can identify the potential risks and vulnerabilities that exist.

Several groups within an organization are involved with and have access to various levels of information. Training programs should be focused on users, management, and executives due to their exposure to potentially sensitive information. Special security awareness training programs should be devised for each group to pinpoint the threats and the risks at each of their levels within the organization.

Training Users

Training corporate employees on the subject of security is extremely important. It may be required under the corporate security policy, and in some cases it may be a compliance item under a governmental or industry regulation. It is important for the SSCP to understand various aspects of training because you may very well be involved in either the development or the delivery of security training topics.

  1. Focus End users can potentially cause a greater loss of information and system assets than all other types of threats. It is imperative that users of the organizations systems be well educated about security threats such as social engineering. Users should be given information to help them make good decisions regarding their use of the systems in their daily activities. User training must also include proper use of personal devices such as cell phones, tablets, and laptops.
  2. Level of Information User training should consist of basics facts about information systems security as it applies to the environment in which they work. It should include all of the best practices, including how they should exercise the use of proper passwords, how to avoid giving information over the phone, and how to report suspicious activity. User training programs should also concentrate on how to protect corporate data and workstations. They should be aware of threats and vulnerabilities and the risks to their information in their systems.

    Specialized training should be provided to any end users handling sensitive or confidential information. This may include individuals with access to customer databases, accounting records, or client information. Individuals should also receive specialized security training in compliance-based areas such as HIPAA medical information regulations and patient information privacy.

  3. Delivery Method Instructor-based training is usually preferred by many organizations. Classroom training promotes direct contact and the ability to perform various interactions such as role-playing or scenario-based activities between individuals. Care must be taken in the selection and training of the instructor so that adequate emphasis is placed upon the correct content. Computer-based training (CBT) may be used to complement instructor-based training because it may be available as training on demand, with incremental modules.
  4. Training Frequency User training should be delivered at a minimum upon new hire and at least on an annual basis thereafter. It is important to support the training on a daily or weekly basis with pop-up banners, email reminders, webinars, and posters.

Training Management

Corporate security training may be tailored to other employees at different ranks within the organization. It's important to recognize the information requirements and perspectives of these individuals in order to make the best use of time and provide for the greatest impact and absorption of the information.

  1. Focus The focus of management training is protecting the assets of the company while creating efficiencies and productivity throughout the organization. Those in management individuals are interested in cost and time. Management training should concentrate on the consequences involved in not maintaining an adequate security posture. Promoting end-user security should be a job-related task placed on every manager.
  2. Level of Informatio Managers, by nature, tend to be concise and bottom-line oriented. They want to know the security requirements of the organization, the funding required, and the results expected. In essence, they require a business case to be made for organizational security. Managers need to understand their responsibilities and how to make security work within their organization including the impact if security fails.
  3. Delivery Method Manager training is quite different than end-user training. Management training programs should communicate corporate policies with regard to the security of the organization. This type of training session may also provide managers with a train-the-trainer program as well as handouts and materials for their departmental meetings. The managers of the company are primarily concerned with the functions of their business unit. In most organizations, they are conduits of information from higher management down to their staff. Therefore, you may use the following briefing method of communicating security programs to managers.
    1. Briefing Paper A short summary of the security programs is outlined. A briefing paper specifically states the purpose and actions required in implementing security programs for their unit of responsibility.
    2. Formal Briefing The formal briefing is where the overall program is discussed, including the current status of the system security manager's responsibilities, actions, and activities.
    3. Reminder Memo This is a follow-up, a written memo or email that highlights the first and second steps and reminds them of their responsibility.
  4. Training Frequency Once a year is often enough for manager training, but managers are also users, and it is recommended that they attend user training as well.

Training Executives

Making a presentation on security topics to the senior executives within an organization is a skill that requires understanding both the time available and the amount of information to present. This level of corporate employee requires a high-level presentation that is quite different from end-user corporate security training.

  1. Focus The success of the company and the protection of business assets is the role of the senior executives of the organization. They are responsible to shareholders and investors for the success of the company. The training focus for executives should be to provide them with enough information to allow them to make quality decisions based upon factual data that will benefit the organization.
  2. Level of Information At a general level, corporate executives should be made aware of security policies. They should also be informed of general risks to the organization and how they are being mitigated through various programs. Executives realize their responsibilities under legislation, rules, and regulations and the impact that compliance has on the organization. It is also important to include a briefing on the protection of high-level confidential information because many high-level corporate executives are the focus of whaling attacks, spoofing, social networking, and other attacks due to their position and inside knowledge of the organization.
  3. Delivery Method Short written briefs of one or two pages are the optimal communication method with high-level executives. If the presentation is longer, it will generally not be read.
  4. Training Frequency Deliver training as requested or required. Top executives have skill levels that allow them to assimilate information very quickly. It is important to summarize information and be prepared to follow the summary with in-depth supporting information.

Business Continuity Planning

Every business or organization can potentially face threats or situations that disrupt business processes and activities. For instance, a hurricane might interrupt electrical power to a business location. A tornado or fire might destroy parts of the building in which a business is located. A flood might easily disrupt the operations of a primary supplier of parts to manufacture the company's products. Each one of these interruptions or disruptions can potentially harm the organization.

Business community planning includes all of the steps and activities required to maintain business operations in the event of a disaster or disruption. It must include consideration for those activities required to completely restore business operations. All of the activities and information required to maintain business activities during a disaster incident and the restoration activities necessary to restore the business to a fully operational status are included in a business continuity plan (BCP).

A business continuity plan will take into consideration a variety of threats that might potentially disrupt or interrupt business operations. These threats will fall into the following categories:

  1. Weather/Natural Event/Fire Weather or natural events may cause a potential business interruption or disruption. Business locations may be exposed to ice and snow, hurricanes, tornadoes, droughts, tsunamis, earthquakes, floods, mudslides, or forest fires, among other events. Fire is one of the most frequent causes for business interruption or disruption. A fire does not need to be major to cause significant problems. A localized fire in a networking or communications cabinet can create significant downtime for an organization.
  2. Human Caused Human-caused events may be intentional or unintentional and cause business interruption or disruption. This category would include sabotage, neglect, willful misconduct, unintentional errors or mistakes, and other events that could be caused by a person from within or external to an organization an organization. Included within this category are medical emergencies such as the common cold, flu, epidemics, and other biological situations that may directly cause business interruption.
  3. Supply Chain Any activity that supplies raw materials, finished parts, or services required by the organization to maintain business activities is part of a supply chain. For example, a supplier of automobile tires is in the supply chain for the auto manufacturer. If the tire manufacturer experiences a disaster and could no longer supply tires to the auto manufacturer, the auto manufacturer will experience a disruption or interruption of business.

    The failure of internal operations that are required to create or manufacture products such as the machine tool or conveyor system could pose significant interruption or disruption to a business. Services and other activities such as banking and Internet and telecommunication services may be included as part of the supply chain because they contribute to the organization's ongoing business activities.

  4. Utilities Utilities service is the lifeblood of any organization. An extended lack of utility service could create a significant disruption or interruption of business activities. Basic utilities may include electric power, water, sewage, and telephone service. Other utilities to consider would be telecommunications (including fiber-optic service), microwave communication, satellite communication, and general mail service. Within the utilities category may be grouped basic transportation services, such as UPS, FedEx, and other commercial carriers.
  5. Crime/Terrorism/War Crime, terrorism, and war pose a significant threat to an organization, with the potential of severe interruption or disruption of the business. Crime could involve a holdup or robbery but could extend to the theft of a valuable business asset such as a customer database. Extortion and embezzlement can also have a significant disruptive influence on a business.

    The September 11, 2001, terrorist attacks; the terrorist attack on a cartoon publisher in Paris, France; the attack on the Oklahoma City federal building; and other significant terrorist attacks have illustrated on how terrorism can cause significant business interruption or disruption or even immediate termination of activities, as with the Sony Pictures release of a supposedly offensive movie.

    Crime also includes the theft of intellectual property. Edward Snowden perpetrated a crime against the United States government by exposing Central Intelligence Agency classified information. Creating a politically embarrassing situation for the government of the United States, this action illustrates that organizations can be significantly disrupted by the release of sensitive information or the exposure of intellectual property such as trade secrets to competitors.

  6. Attack An attack is a willful action against a business that causes significant interruption or disruption. Most of the time we think of an attack as a cyber-based intrusion, but an attack can include any activity with the goal of creating harm to the organization. Business interruption may be a result of an attack. For instance, workplace violence such as the Fort Hood shooting or a deranged individual crashing a light airplane into the IRS office building in Austin, Texas, are attacks that have caused business interruption.
  7. Digital Threats to the digital environment of an organization abound. Business services may be interrupted by hacker intrusion, distributed denial of service, boot sector destruction, and many other techniques. A clear illustration of the damage that can be done digitally to an organization is the attack on Sony Pictures in California. Not only did the terrorist organization, sponsored by a nation-state, manage to expose sensitive corporate information in emails, they also caused major damage to the organization through physical destruction of hardware by destroying boot sectors.
  8. Miscellaneous Causes Under miscellaneous causes, random equipment failure might top the list. What happens to the data center if the air-conditioning breaks down? How long might be equipment continue working without air-conditioning? What happens if a pipe bursts and floods the server room? Unanticipated random events can cause devastating damage.

These threats and the resulting business disruptions illustrate many of the calamities that face organizations. While risk analysis endeavors to identify various threats and mitigate their effects, it is obvious that a business or organization can never address every threat. There would be no way the promoters of the Boston marathon could have significantly predicted that two brothers from Boston would place a bomb in a spectator area. Through risk analysis, they may have identified that anything could go wrong at any point along the marathon route and thus obtain an insurance policy covering both the marathon participants and spectators in case a spectator brings a legal action against the promoter. The continuity plan, on the other hand, would detail the actions that would be taken in the eventuality that there was a significant disruption or interruption of the marathon.

Developing a Business Continuity Plan

The business continuity plan is a set of procedures, programs, and supporting plans that have been established to maintain the operations of the organization in the event of disruption or interruption caused by different levels of disaster. In the event of a disaster, responding individuals simply follow a plan consisting of instructions, checklists, or prearranged activities. Each individual can proceed to take the actions necessary to recover from a disastrous situation.

Development of a business continuity plan is a major undertaking for any organization. It requires time and diligence and the participation of many individuals. Successful plan creation is the result of the resolve and commitment of the organization and the commitment of financial resources to the project. Unfortunately, many small to medium-size businesses neglect the creation of a business continuity plan purely because of lack of resources. Although there is some business continuity plan templates available, each business organization must determine which functions are vital to the success of its specific operation.

As with all projects of any substance, the activity begins with a policy or charter that initiates the project. The business continuity plan policy must include the mandate of top management or the sponsorship of a senior executive or executive committee to provide the required directives and financial support the plan creation will require. Without top management or executive support, the creation of the plan will fail.

A business continuity plan consists of several supporting plans or documents (Figure 4.3). These plans are used to identify and prioritize various activities of the organization that must be maintained for the continued viability of the organization. Other documents will detail information concerning backup plans, alternate sites, restoration and recovery plans, and other plans critical to the continuation of the organization.

Organizational chart presenting the business continuity plan and its support plans: personnel succession plan, business impact analysis, disaster recovery plan, BCP maintenance plan, and BCP testing plan.

Figure 4.3 The business continuity plan and support plans and documents

Business Impact Analysis

A business impact analysis (BIA) is the first step in creating a business continuity plan. Similar to risk analysis, where all assets are identified and possible threats categorized, the business impact analysis seeks to determine and rank activities and functions that are absolutely required by the operation and without which the operation would cease to exist. The business impact analysis evaluates the financial impact on the organization from a quantitative and qualitative viewpoint.

For example, a warehouse and shipping facility suffered $500,000 in damage during a hurricane. Prior to the damage, the facility was shipping $70,000 worth of products per day. It is estimated that the facility will be down for five days. The quantitative financial impact might be calculated at $350,000 in lost shipping revenue plus $500,000 to restore the warehouse to full operation. The qualitative financial impact is a less precise figure based upon business that had been turned away, customers that will leave and never come back, and bad publicity or reputation in the marketplace and other considerations.

During a business analysis, all of the major activities of the organization are listed and categorized as to their importance or how critical they are to the continued existence of the organization. Every business organization has basic revenue-driving operations and support functions. The BIA seeks to differentiate critical operations from support operations and specify a time frame during which the business can survive without the critical operations. Differing from a risk analysis where potential threats are examined, a business impact analysis considers the impact to the business if the business function ceased operation for whatever reason.

Various steps must be undertaken during the creation of a business impact analysis:

  1. Locate and determine all business processes It may seem easy to identify simple business processes. A list of departments such as sales, marketing, manufacturing, accounting, IT, customer service, and a few other major groups may be enough. But this process becomes much more complex than a larger organization. Although major departments and workgroups have been identified, what would happen if a localized fire took out the valuable customer database of a small four-person work group?

    The list of all the business processes is usually created by contacting senior personnel, department heads, managers, and knowledgeable individuals within the organization. This listing of processes will form the basis of creating an entire picture of the organization.

  2. Determine how critical a process is to the business The next task is to determine how critical a process is to the business. This may be accomplished through interviews, polls, questionnaires, and other devices used to solicit opinions and information from across the organization. Reconciling of this information is never an easy chore. It may be found that according to the perspective of the individuals polled, their department or business process may be indispensable. Therefore, a ranking system should be devised along with the decision process to determine the critical nature of each business process.
  3. Determine how long the business can survive without a particular process Once business processes are ranked in order of importance, now comes the task of determining how the business can survive without a particular process. This computation may be undertaken with the assistance of knowledgeable individuals within the organization, such as stakeholders, department heads, and managers.
  4. Downtime impact timelines Various terminology may be employed to describe the timeline when a critical operation is down or offline (Figure 4.4). The times can be measured in minutes, days, or weeks and can be determined by both qualitative (numerically based) and quantitative (subjectively based) methods. Usually the correct answer is a combination of both techniques.
    Timeline with three points: disaster, recovery point, and MTD. Brace labeled Recovery Time Objective between disaster and recovery point and brace labeled Maximum Tolerable Downtime between disaster and MTD.

    Figure 4.4 An illustration of the relationship between maximum tolerable downtime and the recovery time objective

  5. Maximum Tolerable Downtime (MTD) The maximum tolerable downtime is an estimate of the maximum time the business process may be down or offline before the organization becomes unable to recover. For instance, if a business warehouse sustains a catastrophic fire and cannot adequately function for a period of 90 days, it may be assumed or a fact that all of the current customers have migrated to other suppliers and that the business can no longer operate.
  6. Recovery Time Objective (RTO) The recovery time objective may be stated as the estimated time by which the affected process will be restored. For instance, a fire in a warehouse has destroyed the communications closet containing five servers. All data processing functions to that warehouse are no longer available. The recovery time objective is stated as 14 days to replace equipment, rewire the building, and bring the servers to full operation. The important point to remember is that the RTO must always be less than the MTD. If it is ever longer, the business will fail.
  7. Recovery Point Objective (RPO) The recovery point objective acknowledges that during any disaster, records and data may be lost. It is necessary to determine at what point known good records could be restored, after which reliable data and information will not be available. A recovery point objective is directly related to data retention, data storage, and backup methodology employed by the organization. For instance, if daily data is backed up at midnight each night, the recovery point objective will be the prior midnight. Many businesses utilize immediate offsite storage such as cloud storage or another related facility. When this is the case, data can be recovered almost up to the point of disruption, so the recovery point objective is virtually at the point of service interruption.

Figure 4.5 illustrates the relationship between the recovery point objective and the recovery time objective. The recovery point objective indicates the last known good data safely backed up and not affected by the disaster. The recovery time objective is the amount of time required to restore the data from the backup archives.

Image described by caption and surrounding text.

Figure 4.5 The relationship between recovery point objective and recovery time objective

The concepts of maximum tolerable downtime, recovery point objective, and recovery time objective may be applied to every critical activity identified as a priority to the organization. Although the recovery point objective in the previous example refers to the restoration of data using backup files, it may also apply to physical or operational assets. For instance, a recovery point in a customer service office may be established as the point at which customer service agents are able to resume operations by answering telephones and resolving client issues. When planning a physical or operational recovery point objective, it is important to consider alternate or temporary recovery programs. For instance, the customer service department may be brought back to minimal operational status in an alternate location with telephone service using temporary tables, paper records, and written forms while the normal facility, communications equipment, and computer service is being restored.

Disaster Recovery Plans

As a security practitioner, you will be involved in restoration activities after a disaster. You, along with other team members, perform an integral service in returning IT operations and other business functions back to normal. A business continuity plan is concerned with maintaining the operations of a system or department after a disaster. As previously discussed, operations may be continued in a temporary location using a paper-based methodology, but at least they will be continuing.

Disaster recovery plans encompass a framework of processes and programs focused on the restoration of computer services, telecommunications, facilities, and operations back to a predisaster operational state. Since most organizations rely heavily on IT infrastructure, it is important that IT systems and services be returned to an operational state as soon as possible. As previously stated, continuity planning and disaster recovery planning sometimes require monumental efforts. These activities require a large degree of coordination, stakeholder input, and financial resources. Due to the importance of IT infrastructure, the IT department should create a comprehensive continuity plan and a disaster recovery plan independently of the rest of the organization if necessary. In other words, the IT infrastructure for an organization should take priority and have complete restoration plans available.

Not all disasters are created equal. For instance, the air-conditioning breaking down the server room or the loss of power from the electrical grid may pose serious problems, but they are not as catastrophic as a tornado or hurricane. Some disasters are not disasters at all and only pose significant but short-term problems. To address this situation, various threats may be identified and assessed as to either the likelihood of occurrence or the impact to the organization if they do occur. There will be those threats with a very low likelihood of occurrence and possibly with a very low impact on the operations of the organization if they do occur.

Since all disasters and their impact on the organization are not equal, a method should be available to trigger the correct response plan. For instance, suppose a fire occurs and the information needs to be conveyed to the emergency recovery staff, corporate executives, and other stakeholders. You could easily imagine that the very next question somebody will have is, “How serious is it?” Therefore, many organizations have adopted a three-tier category system to describe an event by listing a disaster level. In this example, we'll list them as level I, level II, and level III disasters, although the title may be different based upon the organization. The descriptions and responses for each disaster level are completely arbitrary and may be assigned or determined by the individual organization. Each disaster level triggers a measured and preplanned response by the organization. Note that the level classification indicates the response to the disaster event, not a description of the cause, which is of secondary concern.

  1. Level I Disaster This level describes a disaster that is local in nature and affects only a small part of the operation. Although serious, it may be handled in-house and may have a short-term effect on ongoing operations. The short-term effect may be defined as a 6- or 12-hour downtime with total recovery within 48 to 72 hours. Disasters of this nature might include a localized event such as an equipment failure, application or database failure, communication system failure, or other local infrastructure problem.
  2. Level II Disaster A level II disaster specifies a situation that affects a significant amount of the organization. In this instance, ongoing operations may be affected for up to a week or more. The physical location of some departments may be damaged and unusable. Organization IT infrastructure may be seriously damaged, requiring significant replacement or rebuilding of equipment or wiring. Data storage facilities may have been seriously damaged, requiring replacement or the use of an alternate site.
  3. Level III Disaster A level III disaster specifies a very serious situation requiring the relocation of IT operations to an off-premises alternate site. This type of disaster may include significant damage to the facility, requiring personnel to evacuate the premises. The facility may be deemed unusable and require extensive repair. The estimated time to restore the facilities to full operational status may be measured in weeks or months.

Disaster Recovery Strategy

Various items and components of the IT infrastructure require different strategies. For instance, should a disaster event occur, there is a significant difference between restoring a server with previously backed-up information and totally replacing server racks and damaged cables and restoring communication equipment. The recovery strategy should include plans and procedures for the restoration or replacement of various components of the IT infrastructure. These plans should include the following sections:

  • Assessing the damage and determining what needs to be replaced
  • Placing orders for replacement goods or services
  • Receiving, installing, and configuring replacement goods
  • Loading and testing applications and data
  • Certification and accreditation of IT systems and infrastructure

Each section should indicate the job title of the individuals responsible for the management and completion of the activity. It may also detail suppliers, service providers, contractors, partners, and other individuals and entities that may be utilized or contracted to perform a role in the recovery efforts.

A recovery plan may be organized by operational section. For example, different individuals may have responsibilities, and each section may feature different priorities, timelines, suppliers, and requirements. The following operational sections might be included in a recovery plan for an IT department:

  • Physical Facility
  • Facility Wiring
  • Network Hardware
  • Data, Applications, and Operating System Restoration
  • Communications Hardware

Figure 4.6 illustrates a graphical technique of prioritizing disaster response by analyzing the impact to the business if a catastrophic event should occur. Obviously, plans to restore high-impact, high-probability processes take precedence over low-impact, low-probability processes. This type of planning chart will easily illustrate restoration priorities. Business processes that are very important to the business would be placed in the upper-right quadrant, indicating that the continuity of these processes has high significance to the continued operation of the business.

Image described by caption and surrounding text.

Figure 4.6 An illustration of restoration priorities based upon the importance of the asset or department to the organization and the impact to the organization if it is unavailable or lost during a disaster

Plan Testing

Continuity plans and disaster plans required testing. Testing is the method of identifying weaknesses, reviewing assignments and updating plan information. It also verifies that the plan meets the organization's needs and requirements and that all individuals responsible for action items are knowledgeable and competent regarding their responsibilities. The primary goal of testing includes the following activities:

  • Fulfill testing, exercise, and maintenance requirements
  • Conduct training for the business continuity team supervisory individuals
  • Conduct orientation for all staff positions
  • Conduct actual changeover or simulated scenarios
  • Update plans to incorporate “lessons learned from” exercises

Various methods may be used to test the plans with varying degrees of risk to the organization and commitment of time and resources:

  1. Checklist Test The checklist test enables individuals to review the continuity plan or disaster recovery plan to ensure that all procedures and critical areas within their responsibility are addressed. During this test, they meet update information including contact and duty assignment information. This type of test is conducted at the individuals work space, office or cube and requires the least amount of effort and resources. Some organizations may also referred to as a desktop test.
  2. Tabletop Test In a tabletop test, individuals assigned to the test being conducted will assemble in a conference room. Here they will review the continuity plan or disaster recovery plan and proceed through the plan step-by-step, outlining their personal responsibilities. Sometimes referred to as a structured walk-through test, this test enables the group to discuss the plans and update them where required. During the tabletop test or structured walk-through test, a specific scenario may be discussed and individuals may role-play their assigned activities. In one such test it was discovered that a key person from the finance staff was required to be part of the continuity team because they were the only staff members who had purchasing authority.
  3. Simulation Test A typical emergency situation may be practiced during a simulation test. In this type of test, individuals role-play their assignments to bring the simulation to a successful conclusion. They are instructed to go through all the exact steps they would in the event of a real emergency situation, the steps being coordinated by the continuity plan leader. The leader might designate a specific time for the start of the test.

    At that time, the continuity plan leader announces the type of emergency, such as a fire and evacuation of part of the building with an outage of all network operations and communication within that area. The leader may then declare the potential impact of the event. For instance, nationwide customer service is completely interrupted for the next 20 hours. Since the current work location is no longer available, the team leader designates the location that will be used as an alternate site for the coordination of all activities. All responsible participants will relocate all of their available resources to the newly assigned location. If they are responsible for other individuals, they have to locate these people and deliver them to a predefined location.

    The simulation tests is a very accurate training tool because, invariably, people will forget things, not have transportation, not have backups available, or find that communication is inadequate. The simulation test is typically conducted once a year in many organizations due to the fact that it may interrupt or disrupt business activities during the testing period.

  4. Parallel Test A parallel test is similar to those tests where software applications are run in parallel with the actual business environment to test how well they will perform. In a parallel test, duplicate systems or alternate processing sites may be brought online and run in parallel with the existing data processing system. This type of test can tend to be complex and expensive. The benefit is that in the event anything goes wrong with the parallel test, the primary processing environment is not affected.
  5. Full Interruption Test A full interruption test entails a complete power up of an alternate site, switch over and power down of the primary site. This test is very risky and expensive. Typically, only the business activities requiring the highest level of continuity are switched to the alternate site. The challenge on many full interruption tests is to bring the primary site back online.

Succession Planning

With proper succession planning, backup personnel are available in the event that key personnel are lost or unavailable. Backup personnel may be required to fill key business leadership positions in the company or IT department. Succession planning increases the availability of experienced and capable employees who are prepared to assume these roles if they are required.

Succession planning is key within an IT department. It begins with the process of hiring competent well-rounded personnel. They should then be cross-trained in many different disciplines. Specifically for disaster planning, the disaster plan should clearly list, by job title, the succession to the top decision-making role during a disaster. This is simply accomplished in some organizations by a “call list” that includes the individuals who should be notified of an event or situation. The point is, in a disaster scenario, a clear leader and decision-maker must be denoted. In the event a primary person is not available, the authority should immediately be instilled with a backup person.

In planning for succession, individuals should be cross-trained in disaster preparedness and information should be shared among both the primary and backup persons who are responsible to take action. Plans including procedures, documentation, policies, and other documents should be identified and shared.

Disaster Planning Alternate Sites

Business continuity plans require the listing of alternate plans for the continuation of IT operations should a disaster occur. Of course, in some level I disasters, as previously described, IT operations may continue in the same location. A level III disaster may mean that a location is no longer suitable or available for continued IT operations and therefore a decision must be made to relocate, on a temporary basis, to an alternate site or facility. It is important during the creation of business continuity plans to carefully consider and preplan alternate sites. These alternate sites should be arranged for and contracted in anticipation of any need arising.

A variety of site selections and alternative methods are available for the continuity of business operations:

  1. Hot Site A hot site is a physical location available for immediate switchover of processing operations. A hot site typically contains power, heating, ventilation and air-conditioning, security, connectivity, servers, workstations, and networking devices that may be substituted for the existing production environment. Data may also be mirrored to the hot site, requiring little or no installation or update. A hot site is set aside exclusively for the use of the organization. The hot site installation and contract is very expensive.
  2. Warm Site A warm site is a computer facility that is contractually available and has some power, heating, ventilation and air-conditioning, connectivity, and basic networking equipment. Organizations may be required to install servers, workstations, and other networking devices in order to make a warm site fully operational. Obviously, a warm site will take longer to bring online than a hot site. Some suppliers of warm sites offer mobile capability. The mobile site features IT equipment mounted in semitrailer vans that may be brought to an organization's location. A major consideration is that in the event of a major catastrophic event affecting a number of organizations, a warm site may not be available due to the number of organizations under contract to use it.
  3. Cold Site A cold site is a facility that has power, heating, ventilation and air-conditioning, and little else. It does not have communications or computer equipment. If an organization has to set up an alternate site for processing, they would have to bring in and set up every device. Although it's the least expensive of the site alternatives, bringing a cold site online would involve a substantial undertaking and expense.
  4. Virtual Site With the proliferation of cloud services, various cloud providers are providing Infrastructure as a Service (IaaS) disaster recovery sites. Under these programs, the organization's existing IT infrastructure may be established under virtual conditions in the cloud. Data and applications may be made available almost immediately under the circumstances.
  5. Partnership/Cooperative Site A partnership/cooperative site also known as a reciprocal site involves an agreement between two companies to share resources in the event of a disaster. In such a situation, excess capacity by the way of servers, storage, computer workstations, and other resources may be made available should one or either company experience a disaster situation.

Several scenarios should be envisioned when planning for alternate sites or the relocation of operations. The assumption might be that if a disaster affects a geographic region, various scenarios may occur.

  1. Alternate Site Proximity A general rule of thumb is that an alternate site should be no closer to the original site than 20 miles. This takes into consideration general geographic disasters such as earthquakes, floods, hurricanes, tornadoes, forest fires, or other events that might affect not only the organization but every business within a radius of several miles. This was evident during 9/11 when a company's backup location was the second World Trade Center tower. Consideration should also be given to the transportation of individuals, data, and hardware to the alternate site as well as room and board of individuals while at the alternate site.
  2. Competition for Resources When disaster affects a geographic region, it affects all the companies and businesses as well as potential suppliers and providers within the area. The business continuity plan and disaster recovery plan should take into account that the resources required for recovery may not be available because they are being utilized by other organizations within the same vicinity. This includes contracts for alternate sites. Another organization may have contracted for a priority position in using an alternate site. As part of a contingency plan, many companies maintain a quantity of small-denomination currency and even have gold on hand to use to barter for services, equipment, and supplies in an emergency.

Summary

The systems security certified practitioner must be familiar with the organization's policies, standards, procedures, and guidelines to ensure adequate information availability, integrity, and confidentiality.

In this chapter you learned that security administration defines the roles and responsibilities of practitioners within the organization who must carry out various tasks according to established policy and directives. Practitioners may be involved with change control, configuration management, security awareness training, and the monitoring of systems and devices. The application of generally accepted industry best practices is the responsibility of the IT administrators and security practitioners. Key administration duties may include configuration, logging, monitoring, and upgrading and updating products as well as providing end-user support.

We discussed the importance of policies within an organization. Without policies and the resulting procedures and guidelines, there would be a complete lack of corporate governance with respect to IT security. Security policies are the foundation upon which the organization can rely for guidance. Included with these policies is the concept of continuity of operations. Continuity of operations includes all actions required to continue operations after a disaster. A policy of disaster preparedness and a disaster recovery policy provide the steps and required information to restore operations.

The configuration and management of various systems and network products may be the responsibility of the security practitioner. This chapter covered patching and upgrading systems. We also looked at the version numbering methodology used to identify various versions of software, firmware, and hardware and discussed release management and the responsibilities involved in the distribution of software changes throughout the organization.

Data classification policies and the responsibilities of the security practitioner were discussed. The practitioner may be involved in both the classification process and the declassification process with regard to data management policies.

The security practitioner may be involved in conducting or facilitating security awareness training courses or sessions. During the sessions, malware, social media, passwords, and the implications of lost devices can be discussed. Different groups of individuals that require training were identified.

Business continuity and disaster recovery plans are important programs to initiate within an organization. The security practitioner may be involved in originating or maintaining such plans and will definitely be involved if the plan needs to be exercised. A business impact analysis is key to the origination of a business continuity plan. Plans should be tested by a variety of methods to ensure that individuals are aware of their responsibilities and that all of the details of the plans have been considered.

Exam Essentials

  1. Importance of risk Understand that risk is a function of the likelihood of a given threat agent exploiting a particular vulnerability, and the resulting impact of that creates an adverse event in the organization.
  2. Corporate Policies Understand that corporate policies must be aligned with the mission and values of an organization.
  3. Support of Top Management Be aware that the success of any policy requires the support and authorization of top management or a sponsoring high-level executive, without which it is doomed to fail.
  4. General Types of Policies Know that organizational policies, functional policies, and operational policies are types of policies.
  5. Policy Construction Understand that policies consist of standards, baselines procedures, and guidelines.
  6. The (ISC)2 Code of Ethics All SSCP candidates should read and understand the (ISC)2 Code of Ethics.
  7. Configuration of Hardware and Software Know that the security practitioner is required to patch, upgrade, and make changes to both hardware and software.
  8. Change Management Understand all of the techniques and methodology required in change management, and be able to support the change management policies of the organization.
  9. Data Management Policies Be able carry out the tasks required of data management policies, including data maintenance, classification, and declassification.
  10. Endpoint Device Security Understand the requirements of endpoint device security concerning firewalls, host intrusion detection systems, and antivirus software, and be able to support endpoint device policies.
  11. End-User Training Be aware of the types of end-user and security awareness program training required by the different job levels of individuals within the organization.
  12. Business Continuity Planning Know and understand that as a practitioner, you will be involved in business continuity planning and participating in both tests and actual implementation of plans as required.

Written Lab

You can find the answers in Appendix A.

  1. Write a paragraph explaining the importance of executive-level endorsement of a ­policy.
  2. What is a primary difference between standards, baselines, and procedures?
  3. Briefly explain the difference between a hot site, a warm site, and a cold site.
  4. Describe the difference between recovery time objective and recovery point objective.

Review Questions

You can find the answers in Appendix B.

  1. Proper security administration policies, controls, and procedures enforce which of the following?

    A. The elimination of risk

    B. The total reduction of malware

    C. The AIC objectives

    D. Separation of duties

  2. Which of the following best describes a threat exploiting a vulnerability?

    A. DDOS

    B. Risk

    C. A hurricane

    D. Power supply brownout

  3. Which of the following best describes a security policy?

    A. It describes the requirement for shareholder satisfaction

    B. Lists potential risk targets within the organization

    C. Makes extensive use of baselines and guidelines

    D. Completely aligns with the mission, objectives, culture, and nature of the business

  4. Which of the following best describes a federated relationship?

    A. Numerous franchises in a geographical area

    B. The airline industry

    C. HIPAA patient privacy requirements for healthcare providers

    D. Third-party companies and their networks share customer data based upon a single sign-on to a primary organization

  5. Which of the following is an example of compensating control?

    A. A padlock on a gate

    B. A chain on the hotel room door

    C. A red bucket of sand with the word, “Fire”

    D. An insurance policy

  6. What must every policy possess in order to be successfully implemented?

    A. An enforcement provision

    B. Scope and statements from stakeholders

    C. Senior executive endorsement

    D. Controls and procedures statement

  7. What does an acceptable use policy AUP state?

    A. That the organization assets may not be used on weekends

    B. That USB drives may not be used

    C. The acceptable and unacceptable uses for organizational resources

    D. That users may not visit shopping sites during work

  8. An Acceptable Use Policy (AUP) is what type of control?

    A. Administrative

    B. Corrective

    C. Detective

    D. Compensating

  9. Which of the following should be included in every policy that states possible penalties or restrictions for individuals?

    A. A copyright notice

    B. An enforcement statement

    C. A statement from the author

    D. A preamble of rights

  10. Organization policies are generally created in response to the requirement to meet certain criteria. Which of the following best details these requirements?

    A. Baselines

    B. Standards

    C. Procedures

    D. Policy Requirements Document (PRD)

  11. Which of the following is a typical method of communicating a policy or policy change?

    A. Intranet announcement

    B. Handouts

    C. Instagram announcement

    D. Phone e-mailed blast

  12. Which of the following is the third canon of the (ISC)2 Code of Ethics?

    A. Act honorably

    B. Ensure the safety of society

    C. Meet all CEU requirements for this certification

    D. Provide competent and diligent service

  13. What is a service pack?

    A. A piece of software intended to update an application

    B. A piece of software written by user group intended to fix a problem

    C. A piece of software intended to inform users of a software vulnerability

    D. An executable program that loads a number of fixes and system upgrades

  14. Which of the following best describes an environment to test a patch or a service pack?

    A. As they are received from the manufacturer

    B. In a sandbox

    C. In a production environment

    D. In a simulator

  15. What is a typical commercial or business information classification scheme?

    A. Unclassified, sensitive but unclassified, secret, and top secret

    B. Unclassified, business casual, confidential

    C. Public, company confidential, company secret

    D. Public, sensitive but unclassified, confidential, secret, and top secret

  16. If subjects receive a clearance, what do objects receive?

    A. Data Tag

    B. Mandatory Access Control label

    C. Access point

    D. Classification

  17. Which of the following best describes endpoint device?

    A. Router

    B. Computer printer

    C. Switch

    D. HIDS

  18. Which of the following is part of the business continuity plan?

    A. The recovery downtime objective

    B. The restoration of accounting data into databases

    C. Recovery point objective

    D. The maximum tolerable off-line time

  19. Which of the following best describes a disaster recovery plan?

    A. Makes use of probability analysis

    B. Uses the Business Information Plan to determine procedures

    C. Documents procedures to restore equipment and facilities to the condition they were in prior to the disaster

    D. Specifies time required to restore data with different backup schemes

  20. Which of the following best describes maximum tolerable downtime?

    A. The amount of time a business process may be off-line before the viability of the organization is in severe jeopardy

    B. The point at which data recovery should begin

    C. The amount of time between RPO and RTO

    D. The time required to restore data from a backup

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.46.69