CISM Certification Study Guide Part 2
CISM Certification Study Guide Part 2
STUDY GUIDE
Contents: Page #
Chapter 1 & 2 In CISM Certification Study Guide Part 1
1|Page
CHAPTER 3:
Information Security Program Development and
Management
Objective
Ensure that the information security manager understands the broad requirements
and activities needed to establish and manage the information security program in
alignment with the information security strategy.
The ISM must realize that the objectives and expected benefits will work best if defined
in business terms.
2|Page
• Importance of Information Security Program
A well-executed security program will serve to effectively:
▪ Design, implement, manage and monitor the security program,
transforming strategy into actuality.
▪ Provide the capabilities to meet security objectives.
▪ Accommodate changes in security requirements.
Concepts
Implementing and managing a security program will require the information
security manager to understand and have a working knowledge of a number of
management and process concepts including:
3|Page
▪ Control implementation and testing
▪ Control monitoring and metrics
▪ Architectures
▪ Documentation
▪ Quality Assurance
▪ Project management
▪ Business case development
▪ Business process reengineering
▪ Budgeting, costing and financial issues
▪ Deployment and integration strategies
▪ Training needs assessments and approaches
▪ Communications
▪ Problem resolution
▪ Variance and noncompliance resolution
▪ Risk management
▪ Compliance monitoring and enforcement
▪ Personnel issues
Technology Resources
Technology itself is not a control - technology is used to implement controls:
• It is essential that the Information Security Manager understands
where a given technology fits into the basic prevention, detection
containment, reaction and recovery framework.
▪ Firewalls
▪ Routers and switches
▪ IDS, NIDS, HIDS
▪ Cryptographic techniques (PKI, AES)
▪ Digital signatures
▪ Smart cards
4|Page
• Services, Infrastructure and Applications
• People, Skills and Competencies
• The ISM must try to integrate information security policy into existing sets of people
following established processes and policies using existing systems.
• The ISM must also identify the technologies in use that process the information
covered by the information security policy
• Cobit 5
The ISM should understand the benefits of the following principles as they
apply to an information security management framework:
• ISO/IEC 27001:2013
The ISM should be aware of the breadth of the following
information security management control areas:
• Information security policies
• Organization of information security
• Human resource security (controls that are applied before during or
after employment)
• Asset management
• Access control
• Cryptography
• Physical and environmental security
• Operation security
• Communications security
• System acquisition, development and maintenance
5|Page
• Supplier relationships
• Information security incident management
• Information security aspects of business continuity management
• Compliance (with internal requirements, such as policies, and with
external requirements, such as laws)
Operational Components
Management Components
Administrative Components
7|Page
▪ Organizational policies and procedures
▪ Appropriate Use Policy
▪ Protection of Proprietary Information (POPI) Policy
▪ Employee monitoring
o Generally communicated and administered by HR function
o Strategic alignment
o Risk optimization
o Resource optimization
o Benefits realization
o Value delivery
• An ISM road map helps define what each process means to a given organization.
• Because the ISM rarely begins with a blank slate, the ISM must be able to review
and evaluate the security level of existing:
o Data
o Applications
o Systems
o Facilities
o Processes
*Security reviews need to have an objective, scope, constraints, approach and result
8|Page
• Security infrastructure: the foundation that enables security resources to be
deployed
• When infrastructure is designed and implemented to support policies and
standards, the infrastructure is said to be secure
Architecture:
• Helps manage complexity by acting as an integrated road map for
projects and services
• Provides simplicity and clarity through layering and modularization
• Take into account organizational:
o Goals
o Environment
o Technical (and business) capabilities
• Is broader than “technology”
• Has a business focus
Architecture Implementation
• Development of comprehensive enterprise security architecture
• Approach
• Framework considerations
9|Page
• Numerous architectural frameworks have been developed to address the need
for overall comprehensive model for information systems:
o COBIT
o ITIL
o ISO/IEC 27001:2013
o SABSA
• Personnel:
o Architects, designers, builders, developers, testers and others involved in
the construction of the information security program
o Likely to be different from the personnel that will administer systems once
they are functioning
• Roles:
o Responsibilities and/or access rights assigned according to function
10 | P a g e
Security Awareness, Training and Education
Documentation
11 | P a g e
Program Development and Project Management
• A gap analysis will identify a series of projects that will improve the information
security program
o Each project must:
▪ Have a defined time, budget and measurable objectives
▪ Make the environment more secure without otherwise causing
control weaknesses in other areas
• The ISM prioritizes the portfolio of projects so that:
o Interdependent projects do not delay each other
o Resources are optimally allocated
o Results are smoothly integrated into existing operations
• The ISM should employ generally accepted project management techniques,
such as:
o Goal setting
o Progress monitoring
o Tracking deadlines
o Assigning responsibilities
Risk Management
• Virtually all aspects of the information security management (ISM) program aim
to reduce risk to an acceptable level
• One risk management aspect of the ISM program is incident management
• The ISM must understand and develop the requisite skills to:
o Identify
o Evaluate/analyze
o Manage (respond to) risk
• Knowledge and skills to manage risk as part of the ISM program may include:
o Program development life cycle risk
o Program management risk
o Project risk
o Vulnerability assessment methods
o Threats specific to the information security manager’s organization
o Risk analysis approaches
o Risk response options
o Ability to understand and assess potential impacts if risk are exploited
o Risk monitoring and reporting
o Threat analysis
12 | P a g e
• Purpose of a Business case
• Obtain support of influencers and decision makers
• Require those proposing projects to provide a clear value proposition
• Enable:
o Comparison between competing projects/proposals
o Objective decision-making
o Measurability of project success against projection
Program Budgeting
13 | P a g e
General Rules of Use/Acceptable Use Policy
Vendor Management
• ISM is responsible for the oversight and monitoring of external providers.
14 | P a g e
• Are policies and standards defined, formally approved and
distributed?
• Are business unit managers involved in guiding and supporting
information security program activities?
• Is there a formal steering committee?
• How is the program positioned within the organization?
• To whom is the program accountable?
• Does this positioning impart an appropriate level of authority and
visibility for the objectives that the program must fulfill?
• Does the program implement effective administration functions?
• Are meaningful metrics used to evaluate program performance? Are
these metrics regularly collected and reported?
• Are there forums and mechanisms for regular management oversight
of program activities? Does management regularly reassess program
effectiveness?
• Physical/Corporate Security
• IT Audit
• Information Technology Unit
• Business Unit Management
• Human Resources
• Legal Department
• Employees
• Procurement
• Compliance
• Privacy
• Training
• Quality Assurance
• Insurance
• Third Party Management
• Project Management Office
• Cross-organizational responsibilities
• Incident Response
• Security Reviews and Audits
• Management of Security Technology
• Due Diligence
• Compliance Monitoring and Enforcement
15 | P a g e
• Assessment of Risk and Impact
• Outsourcing and Service Providers
• Cloud Computing
• Integration with IT Processes
Control Categories
17 | P a g e
• Used to track and guide a program with the following:
• Metrics Development
• Monitoring Approaches
• Measuring Information Security Management Performance
• Measuring Information Security Risk and Loss
• Measuring Support of Organizational Objectives
• Measuring Compliance
• Measuring Operational Productivity
• Measuring Security Cost Effectiveness
• Measuring Organizational Awareness
• Measuring the Effectiveness of Technical Security Architecture
• Measuring the Effectiveness of Management Framework and Resources
• Measuring Operational Performance
• Monitoring and Communication
• Management Support
• Funding
• Staffing
18 | P a g e
CHAPTER 4:
Information Security Incident Management
Objective
Ensure that the information security manager has the knowledge and
understanding necessary to plan, establish and manage the capability to detect,
investigate, respond to and recover from information security incidents to minimize
business impact.
19 | P a g e
o Detect incidents quickly
o Diagnose incidents accurately
o Manage incidents properly
o Contain and minimize damage
o Restore affected services
o Determine root causes
o Implement improvements to prevent recurrence
o Document and report
20 | P a g e
• Failure of security controls to prevent incidents
• Legal and regulatory groups requiring the development of an incident
management capability
• The growing sophistication and capabilities of profit-oriented attackers
• Advanced persistent threats (APTs)
Concepts
• Incident handling is one service that involves all the processes or tasks
associated with handling events and incidents. It involves multiple functions:
• Detection and reporting
• Triage
• Analysis
• Incident response
It encompasses:
• Planning, coordination, and execution of any appropriate mitigation
• Recovery strategies and actions
21 | P a g e
Incident Management Systems
Responsibilities
22 | P a g e
• Recovering quickly and efficiently from security incidents
• Responding systematically and decreasing the likelihood of recurrence
• Balancing operational and security processes
• Dealing with legal and law enforcement-related issues
23 | P a g e
• IRT members should be familiar with:
• Basic Security Principles
Personnel
• Composition of IMT
• Information Security Manager
• Steering Committee/Advisory Board
• Perm/Dedicated Team Members
• Virtual/Temp Team Members
Roles
24 | P a g e
• Incident handler-IMT/IRT team member
• Investigator-IMT/IRT team member
• It security specialist-IMT/IRT team member
• Business managers-business functions owners; information assets/system
owners
• IT specialists/representatives-subject matter experts in IT services
• Legal representative-subject matter expert in legal
• HR-subject matter expert in HR area
• Public relations (PR) representative-subject matter expert in PR area
• Risk management specialist-subject matter expert in risk management
• Physical security/facilities manager-knowledgeable about physical plant and
emergency capabilities
Skills
• Personal skills:
o Communication
o Leadership
o Presentation
o Ability to follow policies and procedures
o Team
o Integrity
o Self-understanding
o Coping with stress
o Problem solving
o Time management
• Technical skills:
o Technical Foundation
o Incident Handling
25 | P a g e
Audits
• Are performed to verify the incident response process conformance to
o Policies
o Standards
o Guidelines
o Procedures
• Provide an objective view of the overall completeness and functionality of the
incident response plans
• Provide assurance that major gaps in the processes do not exist
• Audits can be internal or external:
o Internal audits are conducted by control specialists within the
organization
o External audits are performed by a third party and provide additional
independence
Defining Objectives
The objectives of incident management are:
• Handle incidents when they occur so that the exposure can be contained
or eradicated to enable recovery within an AIW
• Prevent previous incidents from recurring by documenting and learning
from past incidents
• Deploy proactive countermeasures to prevent/minimize the probability of
incidents from taking place
Strategic Alignment
Incident management must be aligned with an organization’s strategic plan:
• Constituency-to whom does the IMT provide service?
• Mission-defines the purpose of the team
26 | P a g e
• Services-services should be clearly defined
• Organizational structure-the structure of the IMT should support the
organizational structure
• Resources-sufficient staffing is necessary for effectiveness
• Funding-sufficient funding is required to ensure continuity of services
• Management buy-in-senior management buy-in is essential
Risk Management
Value Delivery
Resource Management
Performance Measurement
• The incident management action plan is also known as the incident response
plan (IRP)
• In the CMU/SEI technical report titled Defining Incident Management Processes,
the approach is as follows:
o Prepare/improve/sustain sub process includes:
▪ Coordinating planning and design:
• Identify incident management requirements
• Establish vision and mission
• Obtain funding and sponsorship
• Develop implementation plan
▪ Coordinate implementation:
• Develop policies, processes and plans
• Establish incident handling criteria
• Implement define resources
• Evaluate incident management capability
• Conduct postmortem review
• Determine incident management process changes
• Implement incident management process changes
28 | P a g e
▪ Reactive detection-the detect process is conducted when there are
reports from system users or other organizations
o Triage events
▪ Can be done on two levels:
• Tactical, based on a set of criteria
• Strategic, based on the impact of business
▪ Sub process includes
• Categorization:
o Denial of service
o Malicious code
o Unauthorized access
o Inappropriate usage
o Multiple components (Correlation, Prioritization,
Assignment)
History of Incidents
Past incidents:
• Provide valuable information on trends, types and business impacts
• Are an input into the assessment of the types of incidents that must be
considered and planned for
Threats
29 | P a g e
Threats are any event that may cause harm to an organization’s assets, operations or
personnel. There are a number of threats that must be considered including:
• Environmental
• Technical
• Man-made
Vulnerabilities
CIAC (and later the SANS Institute) propose the following incident response phase:
• Preparation
o This phase prepares an organization to develop an incident response plan
prior to an incident. Sufficient preparation facilities smooth execution
o Activities in this phase include:
▪ Establishing an approach to handle incidents
▪ Establishing policy and warning banners in information systems to
deter intruders and allow information collection
▪ Establishing communication plan to stake holders
▪ Developing criteria on when to report incident to authorities
▪ Developing a process to activate the incident management team
▪ Establishing a secure location to execute the incident response
plan
▪ Ensuring equipment needed is available
• Identification
o This phase aims to verify if an incident has happened and find out more
details about the incident. Reports on possible incidents may come from
information systems, end users or other organizations. Not all reports are
valid incident’s, as they may be false alarms or may not qualify as an
incident.
o Activities in this phase include:
▪ Assigning ownership of an incident or potential incident to an
incident handler
▪ Verifying that reports or events qualify as an incident
▪ Establishing chain of custody during identification when handling
potential evidence
30 | P a g e
▪ Determining the severity of an incident and escalating it as
necessary
• Containment
o After an incident has been identified and confirmed, the IMT is activated
and information from the incident handler is shared
o The team will conduct a detailed assessment and contact the system
owner or business manager of the affected information systems/assets to
coordinate further action
o The action taken in this phase is to limit the exposure. Activities in this
phase include:
▪ Activating the incident management/response team to contain the
incident
▪ Notifying appropriate stakeholders affected by the incident
▪ Obtaining agreement on actions taken that may affect availability of
a service or risks of the containment process
▪ Getting the IT representative and relevant virtual team members
involved to implement containment procedures
▪ Obtaining and preserving evidence
▪ Documenting and taking backups of actions from this phase
onward
▪ Controlling and managing communication to the public by the public
relations team
• Eradication
o When containment measures have been deployed, it is time to determine
the root cause of the incident and eradicate it
o Eradication can be done in a number of ways:
▪ Restoring backups to achieve a clean state of the system
▪ Removing the root cause
▪ Improving defenses
▪ Performing vulnerability analysis to find further potential damage
from the same root cause
o Activities in this phase include:
▪ Determining the signs and cause of incidents
▪ Locating the most recent version of backups or alternative solutions
▪ Removing the root cause. In the event of worm virus infection, it
can be removed by deploying appropriate patches and updated
antivirus software
▪ Improving defenses by implementing protection techniques
▪ Performing vulnerability analysis to find new vulnerabilities
introduced by the root cause
• Recovery
o This phase ensures that affected systems or services are restored to a
condition specified in the service delivery objectives (SDO) or business
31 | P a g e
continuity plan (BCP). The time constraint up to this phase is documented
in the RTO.
o Activities in this phase include:
▪ Restoring operations to normal
▪ Validating that actions taken on restored systems were successful
▪ Getting involvement of system owners to declare normal operation
• Lessons learned
o At the end of the incident response process, a report should be developed
to share what has happened, what measures were taken and the results
after the plan was executed
o The report should contain lessons learned that provide the IMT and other
stakeholders valuable learning points of what could have been done better
o These lessons should be developed onto a plan to enhance the incident
management capability and the documentation of the incident response
plan.
▪ Writing the incident report
▪ Analyzing issues encountered during incident response efforts
▪ Proposing improvement based on issues encountered
▪ Presenting the report to relevant stakeholders
• A BIA should:
• Determine the loss to the organization resulting from a function being
unavailable
• Establish the escalation of that loss over time
• Identify the minimum resources needed for recovery
• Prioritize the recovery of processes and supporting systems
• Create report to aide stakeholders in understanding what impact an incident
would have on the business
• A successful BIA requires participation from:
• Senior management
• IT
32 | P a g e
• End-user personnel
• BIA goals
• Critically prioritization
• Downtime estimation
• Resource requirement
• A BIA includes the following activities:
• Gathering assessment material
• Analyzing the information compiled
• Documenting the result and presenting recommendations
Elements include:
• Business/ department mission
• Functions that characterize each business function
• Dependencies-inputs and outputs
• Identify critical processing cycles
• Estimated impact of various incidents
• Identify resources and activities required for restoration
• Determine work-around possibilities
• Estimate recovery time
Benefits include
• Increased understanding of potential loss
• Common facilitation of all response activities
• Raising awareness of response management in organizations
33 | P a g e
Organizing, Training and Equipping the Response Staff
Each of these planning processes typically includes several main phases, including:
• Risk and business impact assessment
• Response and recovery strategy definition
• Documenting response and recovery plans
• Testing response and recovery plans
• Auditing response and recovery plans
34 | P a g e
Recovery Strategies
Addressing Threats
Recovery Sites
35 | P a g e
• RTOs
• RPOs
• Services delivery objectives (SDOs)
• Maximum tolerable outages (MTOs)
• Proximity factors
• Location
• Nature of probable disruptions
Reciprocal Agreements
Alternatives available for securing backup hardware and physical facilities include:
• A vendor or third party
• Off-the-shelf-to make use of this approach, several strategies must be
employed:
o Avoiding the use of unusual and hard-to-get equipment
o Regularly updating equipment to keep current
o Maintaining software compatibility to permit the operation of newer
equipment
• Recovery of IT facilities involves telecommunications and network recovery
• Methods used are:
o Alternative routing
o Diverse routing
o Long-haul network diversity
o Protection of local resources
o Voice recovery
o Availability of appropriate circuits and adequate bandwidth
o Availability of out-of-band communications in case of failure of primary
communications methods
• Recovery strategies must work for the entire period of recovery until all
facilities are restored
• Strategies may include:
o Doing nothing until recovery facilities are ready
o Using manual procedures
o Focusing on the most important customers, suppliers, products, and
systems with resources that are still available
o Using PC-based systems to capture data for later processing or
performing simple local processing
Strategy Implementation
Risk
• Is the combination of the probability of an event and its consequence
(ISO/IEC 73)
• A basic understanding of security risk analysis and the effects on
organizations of various types of risk are important components of incident
management
Risk Tolerance
• Is the acceptable level if variation that management is willing to allow for any
risk as the enterprise pursues its objectives
• Is the same as acceptable risk
• Must be determined by management
37 | P a g e
Notification Requirements
• Redundancy
• Alternate routing
• Diverse routing
• Long-haul diversity
• Last mile circuit protection
• Voice recovery
High-Availability Considerations
Insurance
38 | P a g e
• Errors and omissions
• Fidelity coverage
• Media transportation
Types of Tests
39 | P a g e
Test Results
The test should strive to, at a minimum, accomplish the following tasks:
• Verify the completeness and precision of the response and recovery plan
• Evaluate the performance of the personnel involved in the exercise
• Appraise the demonstrated level of training and awareness of individuals
who are not part of the recovery/response team
• Evaluate the coordination among the team members and external vendors
and suppliers
• Measure the ability and capacity of the backup site to perform prescribed
processing
• Assess the vital records retrieval capability
• Evaluate the state and quantity of equipment and supplies that have been
relocated to the recovery site
• Measure the overall performance of operational and information systems
processing activities related to maintaining the business entity
40 | P a g e
o Updating, at least quarterly, the notification directory to include all
personnel changes, including phone numbers and responsibilities or
status within the company
• Post-event reviews are a very critical part of the incident management process
• The ISM should:
o Manage post-event reviews to learn from the completed tasks and to
use the information to improve the IMT’s response procedures
o Consider enlisting the help of third-party specialists if detailed forensic
skills are needed
Establishing Procedures
If an incident occurs:
• The information security staff needs documented procedures so that
information can be properly recorded and preserved
• The ISM should develop data/evidence preservation procedures
• The information systems staff must understand basic procedures, including
taking no action that could change/modify/contaminate potential or actual
evidence
41 | P a g e