Analyzing and Securing Data
Analyzing and Securing Data
SERVIC
ES
SEIS 661
Analyzing and
securing data in a risk
ridden world
Amir
Muhawesh
Introduction
Any company wishing to do business in todays information driven world will at one point
or another find itself facing questions of information security and what role it should play in day
to day operations, It would be easy to tie down the hatches and take an all in approach, simply
securing all data to every extent possible, to hire the best consultants, and to ensure every
domain is covered in all aspects. Ten, even five years ago this approach would seem silly, even
a waste, as information security was something that was an expense, not an asset. In the last
few years however, the NSA, Target, Google have given the public a startling slap in the face
and the given the topic of information security a scrutiny it has never seen.
It is not the public that finds itself obligated to react; however, it is the organizations that
are in the cross hairs of both those with ill intent and those concerned about their safety and
privacy. In light of this new scrutiny, organizations can tend to over correct in hopes of protecting
themselves and their images. The result is wasted resources and little hope of ever achieving a
balance between real security and the companies interests. It is this same scrutiny that has
changed the view on security from that of on obligation to being an asset, something to gloat
about, which only inflames the issue of over correcting. The result may indeed be more harmful
than a lack of response in the first place. Wasted resources, misallocated funds, a false sense
of security, these things all make it that much more important to understand where the real risks
lie and what controls are needed to properly mitigate them.
Approach
A quick examination of the situation we are put in quickly reveals two major problems to
be overcome. First, what approach are we going to use to protect ourselves, our clients, and our
interests? Second, how are we going to make this possible on a limited budget with limited
time?
To make this possible, we find that it is necessary to create a targeted approach,
investing in only the domains crucial for the operation and growth of the business, at which point
further resources can be put into information security.
It is only logical then, to put our resources into domains which have the strongest for
clearest benefit for us, and protect our most valuable asset, our data. We believe starting with
our data and working our way out from there will allow us to build a strong security policy that
starts with the most important aspect of our business and can organically grow from there. To
put it simply, we are taking a data-centric approach to our information security.
Recommendation
Any company operating correctly is going to have at least two or three layers of
classification, their public data, sensitive data, and private data. Companies that offer products
that do not gather or otherwise encapsulate sensitive client data would fall into these categories.
An example is a company that sells widgets. The public data would be data about the company
that is easily accessible to anyone who sought it out. Sensitive data would regard internal
matters of the company such as salaries, profits and other commercially related data. Private
data would simply be data kept internally regarding employees that are used for day to day
operations within the company. Because that company does not need to gather PII (Personally
Identifying Information), it has no need to classify data into the confidential level.
ITS services, however, does not have this luxury. Since we are in the lucrative field of
asset management, we hold the responsibility of protecting the most confidential data possible.
Things like social security numbers, bank account numbers, financial transactions, and tax data
are all our responsibility to keep safe. This requires careful classification of our data, which will
2
allow us craft our policies, standards, and guidelines to ensure responsible handling of client
data.
Following this chain of thought, our first recommendation is going to be to classify the data into
the four aforementioned categories.
Classification
Public
Sensitive
Private
Confidential
Definition
Information that has been
declared public knowledge
by someone with the
authority to do so, and
can freely be given to
anyone without any
possible damage.
Privileged or proprietary
information, not
accessible to everyone.
Sensitive data requires
extra scrutiny for
completion and accuracy.
Information for use
exclusively within the
organization. Harm to the
organization or individuals
within the organization
could possibly occur if this
information is obtained
through unauthorized
access.
Data used exclusively
within the organization
and to privileged
individuals only.
Unauthorized access by
individuals within or
outside the organization
would cause harm to both
the organization and its
clients including but not
limited to the reputation
of the organization.
Example
Project data, currently
released product info and
pricing etc
Transactional information
of client accounts, PII of
both clients and
employees, account
numbers.
Domain
3
Data Classification falls under, and partially covers the domain of Information Security
Governance and Risk Management.
Now that we have classified our data, we have laid the foundation to create our policies,
guidelines, and standards not only for the safe handling of our data but for our entire security
policy as well. The above classification allows us to create the following policy which will be
used as a guide companywide in for the safe handling of data.
Information Sensitivity Policy
Purpose
The Information Sensitivity Policy is intended to help employees determine what
information can be disclosed to non-employees, as well as the relative sensitivity of
information that should not be disclosed outside of ITS services without proper
authorization.
The information covered in these guidelines includes, but is not limited to,
information that is either stored or shared via any means. This includes: electronic
information, information on paper, and information shared orally or visually (such as
telephone and video conferencing). All employees should familiarize themselves
with the information labeling and handling guidelines that follow. It should be noted
that the sensitivity level definitions were created as guidelines and to emphasize
common sense steps that you can take to protect ITS services confidential
information. Please Note: The impact of these guidelines on daily activity should be
minimal.
Questions about the proper classification of a specific piece of information should be
addressed to your manager. Questions about these guidelines should be addressed
to Information security.
Scope
All ITS Services information is categorized into four main classifications:
Public - Information that has been declared public knowledge by someone with the
authority to do so, and can freely be given to anyone without any possible damage
to ITS Services.
Sensitive - Privileged or proprietary information, not accessible to everyone, it is
data which requires extra scrutiny for completion and accuracy.
Private - Information for use exclusively within the organization. Harm to the
organization or individuals within the organization could possibly occur if this
information is obtained through unauthorized access.
Enforcement
Any employee found to have violated this policy may be subject to disciplinary
action, up to and including termination of employment.
both letting the employees know they will be held liable for their actions when accessing
sensitive data, and allows any interested parties to follow a story of what may have happened
after any incidents.
Recommendation
Building on our data classifications, we are going to implement logical access control to
ensure the confidentiality, integrity and availability of our data. To avoid expending resources
unnecessarily and over burdening our employees, public and sensitive data will be kept behind
one layer of defense. That is, employees will be allowed to keep this information directly on their
laptops, able to access it after entering a user-name and password to access their local
machines.
Private and confidential information will be kept exclusively on two separate severs
respectively. Access to these servers will require additional access and authorization which will
only be possible after employees have logged onto their virtual machines. This not only adds a
second layer of security, but allows the most sensitive data to remain safe in the case that a
laptop is stolen or misplaced.
Private information will be kept on a server which will require a traditional user-name, but
will also implement an RSA token in addition to a password. Once this information is properly
verified users will have unfettered access to data labeled as private.
Confidential information will be the most secure. Like private information, users will need
to enter an additional username and password along with a string provided by an RSA token.
Once they are on the server that hosts the confidential information, users will have to undergo
one last layer of defense. This will be implemented in the form of a dynamic password which will
be a minimum of fifteen characters and will change hourly. To access a system with confidential
data (such as logging in to a database directly) users will access a web based application that
allows the user to copy the current password by clicking a button. Although this may seem
excessive, it will allow users will not have to memorize the password, and changing hourly to a
random string provides strong protection against unauthorized access as well as prevent any
accidental privileges being left for former employees.
Audit logs will be kept for all logins and false login attempts. A monthly audit will be
conducted to review for suspicious activities such as multiple failed login attempts, cagey login
times, and unusual login locations.
Identification
8
Access
In order to ensure users are only getting access to the data level they are entitled to, we
are going to implement role based security. Each role will be attached to a group which allows
access to certain levels of data.
Audit
Audit logs will be kept for all logins and false login attempts. A monthly audit will be
conducted to review for suspicious activities such as multiple failed login attempts, login times,
and unusual login locations. Although seemingly inconspicuous, audit logs are vital to providing
details about any attempted or successful security breaches.
Domain
Logical access control falls under the domain of access control. Building upon the data
classification we have implemented from our first domain, we were able to strengthen our
security to qualify as strong authentication based of on four categories of data. Furthermore we
were able to ensure we have covered the four areas of logical access control which resulted in
preventive and detective measures to continue our data-centric approach to security.
Recommendation
A committee will be formed to investigate, analyze, and implement any relevant
regulation that applies to our organization. Ideally this committee would be as well rounded as
possible, but due to the limited resources of our organization we will need to form the committee
with just enough to show due diligence and due care to proactively relieve the company of
liability in case of both a data breach and in order to ensure the company becomes and remains
compliant to regulations that apply to it.
Our committee will consist of three individuals who will be responsible for analyzing,
planning and implementing whatever controls are necessary to gain compliance. The first
individual will be an executive who will bring the business perspective to the table. Budgeting,
long-term outlook, and organizational issues will belong to this individual. Second, we will have
a lawyer who is well versed in the regulation and law of information security especially in
regards to the financial industry. It will be this individuals job to interpret the law and guide us
down the path of compliance. The last individual will be a representative of the information
10
technology perspective, perhaps a CISO if resources allow, who will be in charge of the actual
implementation of any technologies and controls deemed necessary by the committee.
Head Start
Due to our training and the previous experience of the members of our committee, we
find that it is possible to gain a head start on path to compliance. Namely, there are two
looming regulations which are obvious in nature and demand immediate attention as their
implementation is mandatory and will take a significant amount of time to gain full compliance
with. The teams responsible for implementing the controls to be compliant will begin
immediately with these two regulations while our committee overseas progress and investigates
other laws and compliance that may deemed necessary.
Domain
Complying to regulations and laws applicable to our organization appropriately falls
under the Legal, Regulations, Investigations, and Compliance domain. Unlike our first two
11
concerns listed, this concern is fairly well spread across most of the domain. By forming a
committee to research and investigate the laws and regulation needed to gain compliance, we
are ensuring that we cover our bases to protect both ourselves and our clients in terms of
existing regulation and any new regulation which may become law in the future.
Moving Forward
For the time being we find our current approach satisfactory in its requirement of
sufficiently securing our data in a manner that protects our organization, its clients, and allows
us to grow with the confidence to ensure clients of their safety and to appease regulators. As we
continue to grow we will find it necessary to utilize our increasing resources to continue our
data-centric approach and build out from there. Continuing with that theme, we will implement
the remaining domains prioritized by their proximity to our data, as resources become available
to do so.
References
Johnson, Cory. "What is Sensitive Information? - Definition from Techopedia."
Techopedias. N.p., n.d. Web. 5 May 2014.
<http://www.techopedia.com/definition/25260/sensitive-information>.
Kyriazoglou, John . "INFORMATION SENSITIVITY POLICY." . N.p., 13 Nov. 2011. Web. 5
May 2014.
<http://businessmanagementcontrols.blogspot.com/2011/11/information-sensitivitypolicy.html>.
"Role Based Access Control (RBAC) and Role Based Security." Role Based Access
Control and Role Based Security. National Institute of Standards and Technology, 3
Apr. 2013. Web. 5 May 2014. <http://csrc.nist.gov/groups/SNS/rbac/>.
Harris, Shon, and Polisetty Veera Subrahmanya Kumar. CISSP all-in-one exam guide,
sixth edition. 6th ed. New York: McGraw-Hill, 2013. Print.
"Information Security Policy Templates." SANS:. Sans Institute, n.d. Web. 5 May
2014. <http://www.sans.org/security-resources/policies/>.
"Financial Institutions and Customer Information: Complying with the Safeguards
Rule | BCP Business Center." Financial Institutions and Customer Information:
Complying with the Safeguards Rule | BCP Business Center. United States
Government, 1 Apr. 2006. Web. 5 May 2014.
12
<http://www.business.ftc.gov/documents/bus54-financial-institutions-and-customerinformation-complying-safeguards-rule>.
Bilger, Mike, Luke OConnor, Matthias Schunter, Morton Swimmer, and Nev Zunic.
"Data-centric security." IBM Global Services, 1 Dec. 2006. Web. 5 May 2014.
<http://www-935.ibm.com/services/no/cio/risk/gov_wp_data_centric.pdf>.
13