Mumbai Chapter E-Journal 2014-15 Issue - 3
Mumbai Chapter E-Journal 2014-15 Issue - 3
Mumbai Chapter E-Journal 2014-15 Issue - 3
INSIDE THIS
EDITION
Message From The
President
Get Connected To
ISACA Mumbai
Chapter
News Update
Interlude
Corporate Espionage
the insider threat
Vendor risk
assessment
Security
Considerations while
Procuring BYOD
Solutions for Mobile
Phone/Tablets
ISACA Conference
Photo Gallery
Solution To Last
Editions Crossword
Puzzle
Crossword Puzzle
2 ,
I S S U E
isaca @ mumbai
E - J O U R N A L ( F O R
I N T E R N A L
C I R C U L A T I O N
O N L Y )
-Vaibhav Patkar
PAGE
ISACA
MUMBAI
VOLUME
2,
ISSUE
PAGE
decrypted.
Source http://thehackernews.com/2015/05/logjan-ssl-vulnerability.html
Source https://weakdh.org
Cyberattack Exposes I.R.S Tax Returns
Criminals used stolen data to gain access to past tax returns of more than 100,000 people through an application on the Internal
Revenue Services website, the agency said on Tuesday.
Using Social Security numbers, birth dates, street addresses and other personal information obtained elsewhere, the criminals
completed a multistep authentication process and requested the tax returns and other filings, the I.R.S. said. Information from
those forms was used to file fraudulent returns, the I.R.S. said, and the agency sent nearly $50 million in refunds before it detected
the scheme.
Source http://www.nytimes.com/2015/05/27/business/breach-exposes-irs-tax-returns.html?_r=1
Gaana.com reportedly hacked, details of 10 million users allegedly scraped
One of Indias most popular music streaming service, Gaana.com, has been reportedly hacked. The site is currently down for
maintenance, with no official statement given out yet. A Pakistan-based hacker has claimed responsibility for the hack and claims
details of 10 million users including their email address, date of birth and other information has been scraped and made available
in a searchable database.
The hacker, Mak Man, claims he can get all details of users by entering an email address. He claims his exploit has given him access
to information about 10 million users of the service. Of course, the claims remain unverified at the moment.
Source: http://www.bgr.in/news/gaana-com-reportedly-hacked-details-of-10-million-users-allegedly-scraped/
http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-detailsexposed/
PAGE
Interlude
Brief Bio
About The
Interviewee
ISACA
MUMBAI
-Anuprita Dagga
3. Awareness (Deterrent)
People are the most critical
part of the system. It is very
important to make users
aware of the information
security concept about WHY,
WHAT, WHERE and HOW.
A: Security of Customer
information and company
confidentiality is in the
centre of the Information
Security Management
System. Protection and
monitoring of confidential
information, is the minimum
compliance that should be
kept in mind, while defining
information security
program. Being in financial
services industry, we give
priority to safeguard and
monitor customer personal
information and company
confidential information.
There are 3 parallel paths
which helps in avoiding
security breaches
1. Proactive (Learning from
the external world) Every
security professional needs
to be aware of the security
trends, threats,
vulnerabilities published,
breaches that occur in the
external world etc. This will
help the Company to initiate
proactive action plans before
responding to any incident.
VOLUME
2,
ISSUE
PAGE
technology developments is
one of the major challenge.
Q: How has social media
impacted you
professionally?
A: Social media helps one to
know all the developments
happening in the external
world. In such a busy
working schedule, it is the
Writer
-Murli Nambiar
employees working as spies for
competition:
the
INSIDER
THREAT.
Brief Bio
About The
PAGE
More About
The Writer
Murli
is
widely
acknowledged
as
a
domain expert and has
been featured in number
of publications. He's
spoken at many seminars
and conferences as well.
In addition to winning
many
awards
in
Information
security
space. He was also
featured in a book The
Innovative
heroes,
published
by
DynamicCIO.com
2013" as one of Top 30
CIO's.
In his spare time, Murli is
an avid photographer,
loves to travel, read and
listen to old Hindi music.
sensitive
microphones to pick up and
record
conversations
and
satellites that survey entire globe.
Technical intelligence
Radio
signals,
coded
communications,
recorded
conversations, intercepted calls
and emails, satellites surveillance
and electronic monitoring of ship
and aircraft movements all
contribute
to
increasingly
complex intelligence pictures.
Proliferation of smartphones is
another factor.
Commercial
and
trade
intelligence
Corporate espionage has become
more
prominent.
National
interests are now more focussed
on economic strength and
commercial
competition.
Information regarding strategy of
a competitor is invaluable and is
often used as a tool when
negotiating
contracts
with
customers. Corporate espionage
can be online or offline, however
with advanced technology, online
espionage in the form of hacking
has
been
steadily
gaining
popularity.
ISACA
MUMBAI
Human intelligence
In some areas of espionage,
however human agents are still
the best information sources
because they can supply the
missing factors the intentions of
those in command. Human
espionage can reveal the way
competition management think
what they know, what they want
and what they plan to do to
achieve their objectives.
Traditionally companies spend
their time and effort in investing
on technology controls to prevent
online
leakage
however
information is often leaked when
the employees interact with the
head-hunters
and
their
counterparts in other companies.
Juneau Kastuva, President and
CEO of a Canadian security firm,
Northgate estimated that 85 to 90
per cent of incidents involve the
assistance of an insider who has
legitimate
access
to
the
information. Thus, the most
common agent of industrial
espionage often emerges as an
insider an employee.
Double agents
In this shadowy world of cat and
mouse,
perhaps
the
most
dangerous figure is the double
agent the spy with divided
loyalties or personal greed who
trades
information
between
contenders and who betrays both
sides with equal ease.
To win an espionage battle,
counterintelligence forces have to
watch for the tell-tale signs of
someone who quite does not
belong, who shows too much
interest in sensitive places or
pieces of information, who
associates with people who may
be suspect, or whose background
details seem less than convincing.
Implications of corporate
espionage
Corporate
espionage
always
damages the interests of the
company,
in
some
cases
irreparable. Leaking of critical and
confidential data would give an
advantage to the competition.
Innumerable cases are known
where companies had disastrous
results by virtue of stocks
dropping, legal and financial
implications and loss of customer
confidence. The leaking of
confidential
product
plans,
marketing strategies, and financial
documents could cripple an
organization and bring it to
extinction.
Tools and modus operandi
Tools various tools could be
used by spies- using invisible ink,
secret messages using codes and
ciphers, Microdots, telephone
taps,
hidden
microphones,
miniature
cameras,
infrared
cameras, Night vision systems etc.
Many spying devices are available
on the Internet at dirt cheap
prices motion activated video
recorder, Voice recorder, GPS
tracking key, Watch cameras, PC /
Cell monitoring etc.
Modus operandi Dumpster diving the process
of looking at thrash to identify
confidential data not disposed
of correctly.
Carrying
off
confidential
documents
and
joining
competitors. Emailing / copying
confidential
information
VOLUME
2,
ISSUE
PAGE
PAGE
ISACA
MUMBAI
awareness session
corporate staff.
for
their
Instances
of
corporate
espionage and the damage
caused global / India
An Article in ComputerWeekly
in 2013 highlights a large and
sophisticated
cyber-attack
infrastructure that appears to
have originated in India. A group
of attackers, based in India seem
to have employed multiple
developers to deliver specific
malware for private threat
actors, according to a report by
malware analysis firm Norman
Shark.
Analysis of IP addresses
collected from criminal data
stores showed that attacks
targeted victim in more than a
dozen countries.
Shastrigate
- named after
Shastri Bhavan which housed
number of ministries - the
recent leaks of documents from
the Petroleum and Gas Ministry
and later the Coal, Foreign
Investment Promotion Board
(FIPB), Power, Coal and New
and Renewable Energy. Delhi
Polices Crime Branch arrested
five
persons,
reportedly
including
two
government
officials and a journalist, for
allegedly
leaking
classified
documents from the petroleum
ministry.
Two forged identity cards of the
Ministries of Coal and Power
and copies of various official/
secret documents were seized
from his possession. Total of 16
people were arrested in the
espionage case.
APT1 Chinas cyber espionage
units they have been active
since 2006 and have targeted
more than 141 organizations,
having stolen more than
hundreds of terabytes of data
from them. They focus on
compromising
organizations
across a broad range of
industries in English speaking
countries.
In 2001, Procter & Gamble
admitted to a spying operation,
alleged to have been carried out
over 6 months, on its hair-care
VOLUME
2,
ISSUE
PAGE
up
PAGE
10
Brief Bio
About The
Writer
K. K. Mookhey is the
Principal Consultant at
Network Intelligence (I)
Pvt Ltd. and the Institute
of Information Security.
One of the pioneers in
the information security
space, he founded NII in
2001. What started as a
one-man show has
grown into a team of
200+ security
professionals working
across India and the
Middle East with the
whos-who of industry as
long-term clients. He is
the author of two books
on security Linux
Security & Controls and
Metasploit Framework as
well as numerous
articles. He is one of the
first Indian security
researchers to have
presented at Blackhat
USA in 2004. His
experience and skillsets
encompass IT
Governance, Information
Security Strategy,
Forensics, Fraud Risk
Management, and
Business Continuity. He
holds the CISA, CISSP,
CISM, CRISC and PCI
QSA qualifications.
ISACA
1. Loss of productivity
3. Employee privacy
4. Disclosure of sensitive
information on social
media
Any instance of disclosure of
company confidential
information on social media
should be handled with strict
action and a strong message
sent that these channels cannot
be used for causing any sort of
harm to the company or its
reputation. Again, the employee
awareness campaigns should
help sensitize people to the
proper usage of these channels
and ensure they dont
inadvertently disclose insider
information even over chat.
2. Security risks
Often the content and links
posted on social media sites can
be used to compromise the
users system via a phishing scam
or malware download. While
this can happen in any case, the
social media interactions happen
with a certain level of inherent
trust the posts and links are
from friends of mine and
therefore must be valid to some
extent. This can be mitigated by
strong malware controls within
the network as well as constant
employee education. While we
open up social media for our
employees, we should combine
it with an awareness campaign
@
MUMBAI
5. Protecting company
reputation
What employees post about the
Company should be outlined
more along the lines of
encouraging them to give
positive insights rather than
listing out too many
restrictions, which might appear
to be a curb on freedom of
speech. The signal that should
go out is that social media is a
positive technology, and
promoting the Company, its
brand, and its practices on
social media would help create
a beneficial image for the
Company and employees.
6. Other safeguards
The other guidelines we have in
our acceptable usage guidelines
for email and Internet should also
flow through to social media
such as not posting content of a
sexual nature or that which might
break the countrys laws or be
considered racist or offensive.
Overall, the following steps should
be taken:
1. Identify the purpose behind
taking this step and make it
public to all employees
2. Restrict use of social media to
lunch break and after working
hours
3. Monitor closely usage of these
sites and alert employees and
their managers if usage crosses
acceptable thresholds
4. Educate employees to the risks
of social media even at home
this will encourage them to
follow proper safety
precautions both at work and
at home
5. Create an acceptable set of
guidelines and circulate them
to all employees
Further reading:
Social Media Strategy, Policy and
Governance
Enterprise Social Governance
Social Media Policy Template
Social Media Policy Template
Another template (4 pages)
VOLUME
2,
ISSUE
PAGE
-Latha Sunderkrishnan
11
Brief Bio
About The
Writer
1. Introduction
Companies today have third party contracts with various vendors. Most of the process are outsourced to
various companies. This is the most convenient and flexible way to work, so that overall management
activities are limited to just vendor management alone. The quantum of work that is outsourced to third
parties include not just IT, data management and security providers, but also facilities management
(cleaning HVAC Heating, Ventilation and Air Conditioning) along with any vendor that may have access
to network, data or facilities. However, outsourcing to third parties comes with significant risks such as
adverse vendor incidents, and sometimes even penalty from regulators.
In todays paperless and highly competitive environment, it is in the interest of the company to safe guard
its information Therefore it becomes imperative that the company does everything to manage and
maintain its IT infrastructure. This means a need to evolve a Vendor risk management, which will look at
various aspects of information security associated with the vendor. This would include management of
risks right from identifying the vendor, contract management, risk management, Business continuity plans
etc. Managing external vendors should be a key competency for every enterprise and can lead to optimally
mitigated risk and significant benefits.
In order to establish an effective vendor management process with goals and objectives, the enterprise
needs to ensure the following:
Vendor management strategy is consistent with enterprise goals.
Effective cooperation and governance models are in place.
Service, quality, cost and business goals are clearly defined.
All parties perform as agreed.
Vendor risk is assessed and properly addressed.
Vendor relationships are working effectively, as measured according to service objectives.
2. Approach
1. A Risk assessment needs to be done for choosing the vendors. The controls implemented need to be
evaluated and if need be the policies and procedures need to be audited. The selection procedure
should have been performed with due-diligence. This should be properly documented based on needs
and appropriate criteria.
2. Site visits to the vendor office needs to be carried out. The financial capabilities of the vendor needs
to be assessed, along with previous experience, staff capabilities, any pending litigation or customer
complaints etc.
Latha Sunderkrishnan
(CISA, ISO27001 LA,
COBIT 5 Foundation) is
a Senior Consultant with
Network Intelligence
India. She is an
Electronics Engineer with
more than 17 years of
experience in IT with
various multi-national
organizations working
with a wide variety of
technologies. She has
worked in Information
Security Audits and
Consulting, Information
Security trainings,
Project Management,
Quality Assurance and
Customer Support. She
can be reached at
lsunder@hotmail.com
3. Skill levels and training of the vendor needs to be assessed. This will help in understanding their
capabilities for the contractual work undertaken.
4. Checks for adequate documentation present to convey the program management of the vendors to
the relevant staff of the company.
5. The contracts needs to be well defined. It should be vetted by internal/external legal counsel.
6. Adequate staff should be deployed in order to fulfill the requirements of the contract. The third party
staff should be well aware of their roles and responsibilities. They should also have had confidential
agreements signed.
7. All records pertaining to activities needs to be managed in an organized manner, Methodologies for
updating and archiving documents need to be defined.
8. The results of the activities performed by the vendor needs to be reported to the management on a
timely basis. This should be reviewed by Management periodically. There should be a feedback
mechanism in place. Thus the performance of the vendor needs to be evaluated continuously.
9. All precautions need to be taken to ensure that the data of the organization is protected and secure
at all times.
10. The organization should ensure that compliance is met and all policies and procedures are complied
with. It should also plan for regular audits of the third party process and ensure that those are also
All Rights Reserved 2007-2015 ISACA Mumbai Chapter.
PAGE
12
Setup
Contract
Operations
Transition-Out
C-level executives
Business process
owners
Procurement
Legal
Risk function
IT
Security
C-level Executives - They are accountable for the vendor management process depends on the scale of
outsourcing
Business Process Officers - Business Process Officers should be actively involved in the vendor
management life-cycle
Procurement - Many responsibilities within the vendor management life cycle belong to the
procurement function
Legal - To effectively mitigate vendor-related risk, the legal function should be involved throughout the
entire vendor management life cycle.
Risk Function - The risk function should be consulted throughout the vendor management lifecycle to
obtain a complete view on risk that is related to the relationship, services or products.
Compliance and Audit - The compliance and audit functions should be consulted throughout the vendor
management life cycle to ensure compliance with internal and external laws, regulations and policies
IT - The IT role is significant because its members may be more familiar with the products and services
and their market availability.
Human Resources - The HR stakeholder should be consulted throughout the vendor management
lifecycle to ensure compliance with the enterprises worker statutes, local regulations, and code of
conduct and labour law.
4. Managing a Cloud Service Provider
Cloud computing security is the set of control-based technologies and policies designed to adhere to
ISACA
MUMBAI
VOLUME
2,
ISSUE
PAGE
13
regulatory compliance rules and protect information, data applications and infrastructure associated with
cloud computing use.
The cloud is a shared resource, hence identity management, privacy and access control are of particular
concern. With more organizations using cloud computing and associated cloud providers for data
operations, proper security in these and other potentially vulnerable areas have become a priority for
organizations contracting with a cloud computing provider.
Cloud computing security processes should address the security controls, the cloud provider will
incorporate to maintain the customer's data security, privacy and compliance with necessary regulations.
The processes may also include a business continuity and data plan in case of a cloud security breach.
Cloud using the public cloud effectively is an IT governance issue. The impact cloud is having on the
organization is initially assessed in order to devise a strategic and workable approach.
It is important to identify and categorize data already within the organization and the business processes
around them. For example, storing credit card data in house currently and outsourcing the storage would
mean an increased scope for PCI DSS (although outsourcing the payment transactions themselves to an
approved provider usually makes sense). Storing personal data could have legal ramifications, if stored or
replicated outside the country of the data subject
Firstly there is a need to address the new threats that virtualisation poses within cloud computing. The
second is the ability for SMEs to perform due diligence effectively for an outsourced provider, given they
rarely have in-house technical or legal expertise.
Google Plus cloud service helps me keep my contacts, calendars, photos, etc., synchronized across my
various computing devices. Thus I like this feature and service. When suddenly I had to switch mobiles as
my previous one was not working, I got back all my data intact from this service. But I am also careful
about the data I put there.
5. Metrics for SLA
SLA would define the service level agreements between the vendor or the service provider and the
company. It would also include how the services would be measured. This would define if the
expectations are met in terms of the services provided.
How to go about choosing the various factors for the Metrics?
Firstly there is a need to define the KPIs that could be used to measure the Metrics. Secondly it would
include the type of KPI like
When selecting KPI, need to understand what the indication of value to the customer is:
Service metrics which reflect the end-to-end quality of service or user experience
Process metrics to inform the service provider and customer of the effectiveness (achieving goals) and
efficiency (use of resources) of key activities within the service delivery function.
Technology metrics to inform the IT provider at the component level, enabling the identification of
issues and improvement opportunities
All Rights Reserved 2007-2015 ISACA Mumbai Chapter.
PAGE
14
MUMBAI
VOLUME
2,
ISSUE
PAGE
15
Brief Bio
About The
Writer
http://www.employeeservices.gov.sk.ca/projectsecurity
www.isaca.org Vendor Management Using COBIT 5
Threat
Vulnerability
Business Risk
Information
No
segregation
between There is risk of Information
Leakage through Corporate
Information
and sharing (Intentional
or
BYOD
Personal Information
Unintentional) with
unauthorized
User can download any attachments person or competitor due to absent
of security controls over BYOD
on BYOD phone memory card.
In case of user separation, IT Team mobile; this may lead to loss of
business / reputation.
cannot delete files stored
on personal memory card.
Single user can configure companys
E-mail account on multiple mobile
phone devices without IT/Security
Teams knowledge.
I hope above table is enough to alert business stakeholders on information security assurance. No Firewall
can help to prevent Information Leakage if this is not taken care.
So many security companies have developed BYOD security solution. It is important for the companys
security officer to choose right solution to protect information. When we think of allowing user owned
device for official purpose, Follow MUST be taken care:
PAGE
16
Sr
Control
Description
Secure Container
Restrict screenshot
Integrate
with
companys BYOD security solution should be able to integrate with
central authentication control company AD to access E-mails. This feature reduce IT
teams headache to maintain separate user management
system.
Remote wipe-out
In case of theft of stolen, companys IT team should be
able to wipe out device remotely without anybodys
intervention.
Selective wipe-out
There should be option of Selective Wide-out to wide
only Corporate Space. No personal data should be
wiped out.
Password Policy
Few BYOD Security solutions do ask for Password
while accessing corporate emails. This is separate from
phone lock password.
Device Restriction
User should be restricted to configure companys email
account only on ONE device. In case users attempts to
configure another device, BYOD security solutions
should prevent and through alert to security
administrator.
Audit Logs
Various logs:
Last sync Date and Time
Device details e.g. Mobile no, IMIE etc
Activity logs
Security logs
User ID and E-mail ID
Also check of log retention, access to logs, security of
logs etc.
Compatibility
Does your solution support IOS, Android, and Windows
Phone etc.
Users Private data
BYOD solutions should not access users private space.
Solution should respect users privacy
4
5
6
7
9
10
Security checklist can be further enhanced along with BYOD security solution vendor and security officer
based on need. Once solution is implemented, organizations HR team rollout BYOD policy with eligibility
criteria, does and donts etc.
There are lots of BYOD security solutions in market; generally CISO function should lead BYOD security
solution assessment.
Visit http://highersecurity.blogspot.in for more information security related blogs.
ISAC
VOLUME
2,
ISSUE
PAGE
17
ISACA Conference
PAGE
18
ISACA
MUMBAI
VOLUME
2,
ISSUE
PAGE
19
Photo Gallery
Felicitation of 2014 exam passers
The chapter celebrated success of ISACA 2014 exam takers in a glittering felicitation ceremony.
Exam passers turned out in a large numbers to receive their momentos and shared their
experience about plan and preparation for the exam. Special mention of the function is the Son
getting his CISA momento in the presence of his mother who is also a CISA and old member of
the chapter. It was really heartening to see a mother and son holding CISA certification
together. The function finished with a dinner which was appreciated by all.
Group Photo
Momentos
PAGE
20
Career Fair
ISACA
S
C
R
I
S
C
D
L
L
T
H
R
E
A
T
P
A
M
M
I
N
G
D
H
MUMBAI
Z
A
R
C
I
S
P
A
A
F
Q
D
N
R
O
O
T
K
I
T
P
R
O
X
Y
C
I
P
H
E
R
H
T
T
P
S
O
T
R
P
O
P
I
R
A
C
Y
VOLUME
2,
ISSUE
PAGE
21
Crossword Puzzle
A
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
ACROSS
A-2
A-5
A-7
I-2
M-9
DOWN
A-4
B-1
D-2
F-1
F-6
O-6 A supercomputer
O-12 Message Digest
P-2
P-10