Principles of Information Security 7E - Module 11
Principles of Information Security 7E - Module 11
Principles of Information Security 7E - Module 11
Implementing Information
Security
Upon completion of this material, you should be able to:
1 Explain how an organization’s information security blueprint becomes a project
plan
Change is good. You
2 Explain the significance of the project manager’s role in the success of an infor- go first!
mation security project
—Dilbert (by Scott Adams)
3 Discuss the many organizational considerations that a project plan must address
4 Describe the need for professional project management for complex projects
5 Discuss technical strategies and models for implementing a project plan
6 List and discuss the nontechnical problems that organizations face in times of
rapid change
Opening Scenario
Kelvin Urich was preparing for the change control meeting that was about to start. His screen showed the slides he planned to
use with his detailed notes. He scanned through the slides one final time. During the meeting last week, the technical review
committee had approved his ideas, and now he was confident that the project plan he’d developed was complete, tight, and
well-ordered.
The series of change requests resulting from this project would keep the company’s technical analysts busy for months
to come, but he hoped that the scope and scale of the project, and the vast improvements it was sure to bring to the SLS
information security program, would inspire his colleagues. To help the project proceed smoothly, he had loaded his slides
and supporting documents with columns of tasks, subtasks, and action items, and he had assigned dates to every action step
and personnel to each required task. Everything was under control.
Kelvin started the online meeting software, activated his microphone and camera, and braced himself to start the virtual
meeting.
Naomi Jackson, the change control supervisor, connected a few minutes early. She greeted Kelvin with a wave. Everyone
attending had received the detailed report of planned changes the previous day; Naomi opened the list of planned change
items and shared them with the meeting. Charlie Moody connected next, also nodding to Kelvin on the screen.
Once the virtual room filled, Naomi said, “Time to get started.” The slide showing the planned changes highlighted the
first change control item for discussion. She said, “Item 742.”
418 Principles of Information Security
One of the members of the UNIX support team responded, “As planned,” meaning that the item, a routine maintenance
procedure for the corporate servers, would occur as scheduled.
Naomi continued down the list in numeric order. Most items received the response “As planned” from the sponsoring
team member. Occasionally, someone answered “Cancelled” or “Will be rescheduled,” but for the most part, the review of the
change items proceeded as usual until it came to the section with Kelvin’s information security change requests.
Naomi said, “Items 761 through 767. Kelvin Urich from the security team is present to discuss these items with the change
control group.” Naomi passed control of the shared screen to Kelvin.
Kelvin shared his opening slide with the meeting. He waited, a little nervously, until he felt everyone had registered the
material on the screen, and then began speaking: “I’m sure most of you are already aware of the information security upgrades
we’ve been working on for the past few months. We’ve created an overall strategy based on the revised policies that were
published last month and a detailed analysis of the threats to our systems. As the project manager, I’ve created what I think
is a very workable plan. The seven change requests on the list today are all network changes, and each is a top priority. In the
coming weeks, I’ll be sending each department head a complete list of all planned changes and the expected dates. Of course,
detailed change requests will be filed in advance for change control meetings, but each department can find out when any
item is planned by checking the master list. As I said, there are more changes coming, and I hope we can all work together to
make this a success.”
“Comments or questions?” asked Naomi. “Please use our standard virtual meeting protocols.”
Instantly, six virtual hands shot up on the participant list. All of them belonged to senior technical analysts. Kelvin realized
belatedly that none of these analysts were on the technical review committee that had approved his plan.
As he was running the session now, Kelvin said, “OK, Davey Martinez, I think you were first. Go ahead.”
Davey replied, “We should have been warned if we are going to have all this work dumped on us all at once.”
Kelvin replied, “Well, Davey, I guess this is the first chance we have had to tell you about it.” He continued, “Amy, you’re
next.” She replied, “We can’t make this happen on this schedule.”
Meanwhile, the chat window had erupted with several threads of comments. It seemed like everyone in the meeting
had started typing messages and replies at once. Amid the sudden chaos that had broken out during an otherwise orderly
meeting, it occurred to Kelvin that his plan might not be as simple as he’d thought. He braced himself—it was going to be a
very long afternoon.
specifications and create systems, an approach known as joint application development (JAD) added members of the
management team from the supported business unit. In some cases, future users of the systems were also added.
Another innovation that often occurred with the JAD approach was to increase the speed at which requirements were
collected and software was prototyped, thus allowing more iterations in the design process—an approach called rapid
application development (RAD). This type of development later evolved into a combined approach known as the spiral
method, in which each stage of development was completed in smaller increments, with delivery of working software
components occurring more frequently and the software under development coming closer to its intended finished
state with each pass through the development process.
Taking the objectives of JAD and RAD even further is the collective approach to systems development known as
agile programming (AP) or extreme programming (XP), including aspects of systems development known as Kanban
and Scrum. As the need to reduce the time taken in the systems development cycle from gathering requirements to
testing software continued to evolve, even faster feedback cycles were required to reduce time to market and shorten
feature rollout times. When coupled with a need to better integrate the effort of the development team and the opera-
tions team to improve the functionality and security of applications, another model known as Development Operations
(DevOps) has begun to emerge.
DevOps focuses on integrating the need for the development team to provide iterative and rapid improvements
to system functionality and the need for the operations team to improve security and minimize the disruption from
software release cycles. By collaborating across the entire software/service life cycle, DevOps uses a continuous devel-
opment model that relies on systems thinking, short feedback loops, and continuous experimentation and learning.
Each of these approaches has its advantages and disadvantages, and each can be effective under the right circum-
stances. People who work in software development and some specialty areas of information security that support the
software assurance process must be conversant with each of these methodologies.
An emerging development has been called SecDevOps, which is short for security development operations and is
also known as DevSecOps. This is a process of using the DevOps methodologies noted earlier to bring an integrated
development and operations approach that is applied to the specification, creation, and implementation of security
control systems. SecDevOps is a set of best practices designed to allow organizations to build a culture of secure cod-
ing within their development approach that will bring the impact of DevOps development and deployment processes
to enable the secure deployment of application functionality. The planned outcome is to embed security inside the
development process as deeply as DevOps has enabled an operations mindset into program development.
You can learn more about DevSecOps in general and Microsoft’s support for that approach in the Azure develop-
i ment environment at https://azure.microsoft.com/en-us/solutions/devsecops/.
Deliverables:
discontinued, outsourced, postponed, or returned to an earlier phase. This determination depends on whether the proj-
ect is proceeding as expected and whether it needs additional expertise, organizational knowledge, or other resources.
Once the system is implemented, it is maintained and modified over the remainder of its working life. Any infor-
mation systems implementation may have multiple iterations as the cycle is repeated over time. Only by constant
examination and renewal can any system, especially an information security program, perform up to expectations in
a constantly changing environment.
The following sections describe each phase of a traditional SDLC.1
Investigation
The first phase, investigation, is the most important. What problem is the system being developed to solve? The
investigation phase begins by examining the event or plan that initiates the process. During this phase, the objectives,
constraints, and scope of the project are specified. A preliminary cost-benefit analysis evaluates the perceived benefits
and their appropriate levels of cost. At the conclusion of this phase and at every phase afterward, a process will be
undertaken to assess economic, technical, and behavioral feasibilities and ensure that implementation is worth the
organization’s time and effort.
Analysis
The analysis phase begins with the information gained during the investigation phase. This phase consists primarily
of assessments of the organization, its current systems, and its capability to support the proposed systems. Analysts
begin by determining what the new system is expected to do and how it will interact with existing systems. This phase
ends with documentation of the findings and an update of the feasibility analysis.
Logical Design
In the logical design phase, the information gained from the analysis phase is used to begin creating a systems solu-
tion for a business problem. In any systems solution, the first and driving factor must be the business need. Based on
the business need, applications are selected to provide needed services, and then the team chooses data support and
structures capable of providing the needed inputs. Finally, based on all of this, specific technologies are delineated
to implement the physical solution. The logical design, therefore, is the blueprint for the desired solution. The logical
design is implementation-independent, meaning that it contains no reference to specific technologies, vendors, or
products. Instead, it addresses how the proposed system will solve the problem at hand. In this stage, analysts gener-
ate estimates of costs and benefits to allow for a general comparison of available options. At the end of this phase,
another feasibility analysis is performed.
Physical Design
During the physical design phase, specific technologies are selected to support the alternatives identified and evalu-
ated in the logical design. The selected components are evaluated based on a make-or-buy decision—the option
to develop components in-house or purchase them from a vendor. Final designs integrate various components and
Module 11 Implementing Information Security 421
technologies. After yet another feasibility analysis, the entire solution is presented to the organization’s manage-
ment for approval.
Implementation
In the implementation phase, any needed software is created. Components are ordered, received, and tested. After-
ward, users are trained and supporting documentation created. Once all components are tested individually, they are
installed and tested as a system. A feasibility analysis is again prepared, and the sponsors are then presented with the
system for a performance review and acceptance test.
For more information on SDLCs, see Appendix E of Special Publication 800-64, Rev. 2, from the National Institute
i of Standards and Technology (NIST). The Web address is http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpub-
lication800-64r2.pdf. Although this is a “withdrawn” document that has been superseded, it is still useful to your
understanding of the methodologies used in the security of software development.
Software Assurance
Many of the information security issues facing modern information systems have their root cause in the software ele-
ments of the system. Secure systems require secure or at least securable software. The development of systems and
the software they use is often accomplished using a methodology, such as the SDLC described earlier. Many organiza-
tions recognize the need to include planning for security objectives in the SDLC they use to create systems, and have
established procedures to create software that is more capable of being deployed in a secure fashion. This approach
to software development is known as software assurance, or SA. SA attempts to intentionally create software free of
vulnerabilities and provide effective, efficient software that users can deploy with confidence.
Organizations are increasingly working to build security into the SDLC to prevent security problems before they
begin. A national effort is under way to create a common body of knowledge focused on secure software develop-
ment. The U.S. Department of Defense launched a Software Assurance Initiative in 2003. This initial process was led
by Joe Jarzombek and was endorsed and supported by the Department of Homeland Security (DHS), which joined
the program in 2004. This program initiative resulted in the publication of the Software Assurance (SwA) Common
Body of Knowledge (CBK).2 A working group drawn from industry, government, and academia was formed to examine
two key questions:
1. What are the engineering activities or aspects of activities that are relevant to achieving secure software?
2. What knowledge is needed to perform these activities or aspects?
Based on the findings of this working group and a host of existing external doc- software assurance
uments and standards, the SwA CBK was developed and published to serve as a A methodological approach to the
development of software that seeks
guideline. While this work has not yet been adopted as a standard or even a policy
to build security into the develop-
requirement of government agencies, it serves as a strongly recommended guide to ment life cycle rather than address
developing more secure applications. it at later stages.
422 Principles of Information Security
The SwA CBK, which is a work in progress, contains the following sections:
• Nature of Dangers
• Fundamental Concepts and Principles
• Ethics, Law, and Governance
• Secure Software Requirements
• Secure Software Design
• Secure Software Construction
• Secure Software Verification, Validation, and Evaluation
• Secure Software Tools and Methods
• Secure Software Processes
• Secure Software Project Management
• Acquisition of Secure Software
• Secure Software Sustainment3
The following sections provide insight into the stages that should be incorporated into the software SDLC.
This statement could be about software development in the early part of the 21st century, but it actually dates
back to 1975, before information security and software assurance became critical factors for many organizations. In
the same article, the authors provide insight into what are now commonplace security principles:
Many of the common problems associated with programming approaches that don’t follow the software assurance
methodology are discussed in Module 2.
Module 11 Implementing Information Security 423
For more information on software assurance and the national effort to develop an SA common body of knowl-
i edge and supporting curriculum, visit https://buildsecurityin.us-cert.gov/dhs/dhs-software-assurance-resources.
Initiation
During this first phase of the development life cycle, security considerations are key to diligent and early
integration, thereby ensuring that threats, requirements, and potential constraints in functionality and
integration are considered. At this point, security is looked at more in terms of business risks with input
from the information security office. For example, an agency may identify a political risk resulting from
a prominent Web site being modified or made unavailable during a critical business period, resulting in
decreased trust by citizens.
Early planning and awareness will result in cost and time saving through proper risk management
planning. Security discussions should be performed as part of (not separately from) the development
project to ensure solid understandings among project personnel of business decisions and their risk
implications to the overall development project. [. . .]
These activities and their related outputs are illustrated in Figure 11-2. The key aspect of this illustration is the align-
ment of the system design to enterprise architecture (EA) and information assurance (IA) design goals.
Development/Acquisition
This section addresses security considerations unique to the second SDLC phase. Key security activities
for this phase include:
• Conduct the risk assessment and use the results to supplement the baseline security controls;
• Analyze security requirements;
• Perform functional and security testing;
• Prepare initial documents for system certification and accreditation; and
• Design security architecture.
Although this section presents the information security components in a sequential top-down manner,
the order of completion is not necessarily fixed. Security analysis of complex systems will need to be
iterated until consistency and completeness is achieved. [. . .]
Module 11 Implementing Information Security 425
These activities and their related outputs are illustrated in Figure 11-3.
Implementation/Assessment
Implementation/Assessment is the third phase of the SDLC. During this phase, the system will be
installed and evaluated in the organization’s operational environment.
Note that the Certification and Authorization (C&A) approach to systems formerly used by the federal government
has evolved into a comprehensive Risk Management Framework (RMF). As such, the performance of a risk assessment
on the system under development would replace the C&A process. These activities and their related outputs are illus-
trated in Figure 11-4. The POA&M in the figure refers to a plan of action and milestones (POA&M), which is a document
that identifies tasks to be accomplished.
Source: NIST SP 800-64 Rev. 2: “Security Considerations in the System Development Life Cycle.”
These activities and their related outputs are illustrated in Figure 11-5. Note that the CCB indicated in this figure
is the change control board, the organizational unit that coordinates changes to systems across the organization.
Disposal
Disposal, the final phase in the SDLC, provides for disposal of a system and closeout of any contracts
in place. Information security issues associated with information and system disposal should be
addressed explicitly. When information systems are transferred, become obsolete, or are no longer
usable, it is important to ensure that government resources and assets are protected.
Usually, there is no definitive end to a system. Systems normally evolve or transition to the next
generation because of changing requirements or improvements in technology. System security plans
should continually evolve with the system. Much of the environmental, management, and operational
information should still be relevant and useful in developing the security plan for the follow-on
system.
The disposal activities ensure the orderly termination of the system and preserve the vital information
about the system so that some or all of the information may be reactivated in the future, if necessary.
Particular emphasis is given to proper preservation of the data processed by the system so that the
data is effectively migrated to another system or archived in accordance with applicable records
management regulations and policies for potential future access.
These activities and their related outputs are illustrated in Figure 11-6.
It is imperative that information security be designed into a system from its inception, rather than being added
during or after the implementation phase. Information systems that were designed with no security functionality, or
with security functions added as an afterthought, often require constant patching, updating, and maintenance to pre-
vent risk to the systems and information. A well-known adage holds that “an ounce of prevention is worth a pound of
cure.” With this in mind, organizations are moving toward more security-focused development approaches, seeking
to improve not only the functionality of existing systems but consumer confidence in their products. In early 2002,
Microsoft effectively suspended development work on many of its products to put its OS developers, testers, and pro-
gram managers through an intensive program that focused on secure software development. It also delayed release of
its flagship server operating system to address critical security issues. Many other organizations followed Microsoft’s
lead in putting security into the development process. Since that time, Microsoft has developed its own Security Devel-
opment Lifecycle, which uses a seven-phase, 17-step methodology that culminates in an executed incident response
plan, as shown in Figure 11-7.7
Core security Create quality Analyze attack Deprecate unsafe Fuzz Final security
Execute incident
training gates/bug bars surface functions testing review
response plan
For more information on the Microsoft SDL, visit the Web site at www.microsoft.com/
i en-us/securityengineering/sdl/.
During the implementation phase, the organization translates its blueprint for project plan
information security into a project plan. The project plan instructs the people who The documented instructions for
are executing the implementation phase. These instructions focus on the security participants and stakeholders in a
project that provide details on its
control changes needed to improve the security of the hardware, software, proce-
goals, objectives, tasks, scheduling,
dures, data, and people that make up the organization’s information systems. The and resource management.
information security project plan as a whole must describe how to acquire and
implement the needed security controls and create a setting in which those controls
achieve the desired outcomes.
As the opening scenario of this module illustrates, organizational change is not easily accomplished. The follow-
ing sections discuss the issues a project plan must address, including project leadership; managerial, technical, and
budgetary considerations; and organizational resistance to the change.
The major steps in executing the project plan are as follows:
• Planning the project
• Supervising tasks and action steps
• Wrapping up
The project plan can be developed in any number of ways. Each organization has to determine its own project
management methodology for IT and information security projects. Whenever possible, information security proj-
ects should follow the organization’s project management practices. Many organizations now make use of a project
office—a centralized resource to maximize the benefits of a standardized approach to project management. One such
benefit is the leveraging of common project management practices across the organization to enable reallocation of
resources without confusion or delays.
Each major task in the WBS is then further divided into either smaller tasks (subtasks) or specific action steps.
For the sake of simplicity, the sample project plan outlined in the table and described in the following sections divides
each major task into action steps. In an actual project plan, major tasks are often much more complex and must be
divided into subtasks before action steps can be identified and assigned to a specific person or skill set. Given the
variety of possible projects, there are few formal guidelines for determining the appropriate level of detail—that is, the
level at which a task or subtask should become an action step. However, one hard-and-fast rule can help you make this
determination: A task or subtask becomes an action step when it can be completed by one person or skill set and has
a single deliverable. (A deliverable is a completed document or program module that can serve either as the beginning
point for a later task or become an element in the finished project.)
430 Principles of Information Security
The WBS can be prepared with a simple spreadsheet program. The use of more
projectitis complex project management software often leads to projectitis, in which the proj-
A situation in project planning in ect manager spends more time working with the project management software than
which a project manager spends accomplishing meaningful project work. Recall Kelvin’s slides from the opening sce-
more time manipulating and adjust-
ing aspects of the project manage-
nario, which were loaded with dates and details. His case of projectitis led him to
ment software than accomplishing develop an elegant, detailed plan before gaining consensus for the required changes.
meaningful project work. Because he was new to project management, he did not realize that simpler software
tools could help him focus on organizing and coordinating with the project team.
Work to Be Accomplished
The work to be accomplished encompasses both activities and deliverables. Ideally, the project planner provides a
label to identify the task and provides a thorough description for the task. The description should be complete enough
to avoid ambiguity during the tracking process later, yet should not be so detailed as to make the WBS unwieldy. For
instance, if the task is to write firewall specifications for the preparation of a request for proposal (RFP), the planner
should note that the deliverable is a specification document suitable for distribution to vendors.
Module 11 Implementing Information Security 431
Assignments
The project planner should describe the skills or personnel, often referred to as resources, needed to accomplish the
task. The naming of individual employees should be avoided in early planning efforts, a rule Kelvin ignored when
he named employees for every task in the first draft of his project plan. Instead of making individual assignments,
the project plan should focus on organizational roles or known skill sets. For example, if any of the engineers in
the networks group can write the specifications for a router, the assigned resource would be noted as “network
engineer” in the WBS. As planning progresses, however, specific tasks and action steps should be assigned to
individual employees. For example, when only the manager of the networks group can evaluate responses to the
RFP and make an award for a contract, the project planner should assign the network manager as the resource for
this task.
Amount of Effort
Planners need to estimate the effort required to complete each task, subtask, or action step. Estimating effort hours for
technical work is a complex process. Even when an organization has formal governance, technical review processes,
and change control procedures, it is always good practice to ask the people who are most familiar with the tasks to
make these estimates. After these estimates are made, the people assigned to action steps should review the estimated
effort hours, understand the tasks, and agree with the estimates. Had Kelvin collaborated with his peers more effec-
tively and adopted a more flexible planning approach, much of the resistance he encountered in the meeting would
not have emerged.
Task Dependencies
Whenever possible, planners should note the dependencies of other tasks or action steps on the one at hand, including
task predecessors and successors. Predecessors are tasks that precede the current task, and successors are tasks that
come after the current task and are dependent upon it. Multiple types of dependencies can exist, but such details are
typically covered in courses on project management and are beyond the scope of this text.
A process for developing a simple WBS-style project plan is provided in the following steps. In this example, a small
information security project has been assigned to Jane Smith for planning. The project is to design and implement a
firewall for a small office. The hardware is a standard organizational product and will be installed at a location that
already has a network connection.
Jane’s first step is to list the major tasks:
1. Contact field office and confirm network assumptions.
2. Purchase standard firewall hardware.
3. Configure firewall.
4. Package and ship firewall to field office.
5. Work with local technical resource to install and test firewall.
6. Coordinate vulnerability assessment by penetration test team.
7. Get remote office sign-off and update all network drawings and documentation.
After all the people involved review and refine Jane’s plan, she revises it to add more dates to the tasks listed, as
shown in Table 11-2.
For more information on project management certifications in the federal sector, visit www.fai.gov/certification/
i program-and-project-managers-fac-ppm.
Financial Considerations
Regardless of an organization’s information security needs, the amount of effort that can be expended depends on the
available funds. A cost-benefit analysis (CBA), as described in Module 4, is typically prepared and must be reviewed
and verified prior to the development of the project plan. The CBA determines the impact that a specific technology
or approach can have on the organization’s information assets and what it may cost.
Each organization has its own approach to the creation and management of budgets and expenses. In many organiza-
tions, the information security budget is a subsection of the overall IT budget. In others, information security is a separate
budget category that may have the same degree of visibility and priority as the IT budget. Regardless of where informa-
tion security items are located in the budget, monetary constraints determine what can and cannot be accomplished.
Public organizations tend to be more predictable in their budget processes than private organizations because
the budgets of public organizations are usually the product of legislation or public meetings. This makes it difficult to
obtain additional funds once the budget is determined. Also, some public organizations rely on temporary or renew-
able grants for their budgets and must stipulate their planned expenditures when the grant applications are written. If
new expenses arise, funds must be requested via new grant applications. Also, grant expenditures are usually audited
and cannot be misspent. In addition, many public organizations must spend all budgeted funds within the fiscal
year—otherwise, the subsequent year’s budget is reduced by the unspent amount. As a result, these organizations
often conduct “spend-a-thons” at the end of the fiscal year. This is often the best time to acquire a remaining piece of
technology needed to complete the information security architecture.
Private (for-profit) organizations have budgetary constraints that are determined by the marketplace. When a for-
profit organization initiates a project to improve security, the funding comes from the company’s capital and expense
Module 11 Implementing Information Security 433
budgets. Each for-profit organization has different methods for determining its capital budget and its rules for manag-
ing capital spending and expenses. In almost all cases, however, budgetary constraints affect the planning and actual
expenditures for information security. For example, a preferred technology or solution may be sacrificed for a less
desirable but more affordable solution. The budget ultimately guides the information security implementation.
To justify the amount budgeted for a security project at either a public or for-profit organization, it may be use-
ful to benchmark expenses of similar organizations. Most for-profit organizations publish the components of their
expense reports. Similarly, public organizations must document how funds are spent. A savvy information security
project manager might find a number of similarly sized organizations with larger expenditures for security to justify
planned spending. While such tactics may not improve this year’s budget, they could improve future budgets. Ironi-
cally, attackers can also help information security project planners justify the information security budget. If attacks
successfully compromise secured information systems, management may be more willing to support the information
security budget.
Priority Considerations
In general, the most important information security controls in the project plan should be scheduled first. Budgetary
constraints may have an effect on the assignment of a project’s priorities. As you learned in Module 5, the implemen-
tation of controls is guided by the prioritization of threats and the value of the threatened information assets. A less
important control may be prioritized if it addresses a group of specific vulnerabilities and improves the organization’s
security posture to a greater degree than other high-priority controls.
Staffing Considerations
The need for qualified, trained, and available personnel also constrains the project plan. An experienced staff is often
needed to implement technologies and to develop and implement policies and training programs. If no staff members
are trained to configure a new firewall, for example, the appropriate personnel must be trained or hired.
Procurement Considerations
There are often constraints on the selection of equipment and services—for example, some organizations require the
use of particular service vendors or manufacturers and suppliers. These constraints may limit which technologies can
be acquired. For example, in a recent budget cycle, the author’s lab administrator was considering selecting an auto-
mated risk analysis software package. The leading candidate promised to integrate everything, including vulnerability
scanning, risk weighting, and control selection. Upon receipt of the RFP, the vendor issued a bid to meet the desired
requirements for a staggering $75,000, plus a 10 percent annual maintenance fee. If an organization has an annual
information security budget of $30,000, it must eliminate a package like this from consideration. Also, consider the
chilling effect on innovation when an organization requires elaborate supporting documentation and complex bidding
for even small-scale purchases. Such procurement constraints, which are designed to control losses from occasional
abuses, may actually increase costs when the lack of operating agility is taken into consideration.
so far in advance that they forget the new training techniques and requirements. The optimal time frame for training
is usually one to three weeks before the new policies and technologies come online.
Scope Considerations
The scope of any given project plan should be carefully reviewed and kept as small as possible, given the project’s
objectives. To control project scope, organizations should implement large information security projects in stages, as
in the bull’s-eye approach discussed later in this module.
For several reasons, the scope of information security projects must be evaluated and adjusted with care. First, in
addition to the challenge of handling many complex tasks at one time, the installation of information security controls
can disrupt the ongoing operations of an organization and may also conflict with existing controls in unpredictable
ways. For example, if you install a new packet-filtering router and a new application proxy firewall at the same time
and users are blocked from accessing the Web as a result, which technology caused the conflict? Was it the router, the
firewall, or an interaction between the two? Limiting the project scope to a set of manageable tasks does not mean that
the project should only allow change to one component at a time, but a good plan carefully considers the number of
tasks that are planned for the same time in a single department.
Recall from the opening scenario that all of Kelvin’s change requests are in the area of networking, where the
dependencies are particularly complex. If the changes in Kelvin’s project plan are not deployed exactly as planned, or
if unanticipated complexities arise, there could be extensive disruption to Sequential Label and Supply’s daily opera-
tions. For instance, an error in the deployment of the primary firewall rules could interrupt all Internet connectivity,
which might make detection and recovery from the error more difficult.
Supervised Implementation
Although it is not an optimal solution, some organizations designate a champion from the general management com-
munity of interest to supervise the implementation of an information security project plan. In this case, groups of tasks
are delegated to individuals or teams from the IT and information security communities of interest. An alternative is
to designate a senior IT manager or the CIO of the organization to lead the implementation. In this case, the detailed
work is delegated to cross-functional teams.
The best solution is to designate a suitable person from the information security community of interest. In the final
analysis, each organization must find the project leadership that best suits its specific needs and the personalities and
politics of the organizational culture.
Module 11 Implementing Information Security 435
Plan initiated
Project Wrap-Up
Project wrap-up is usually handled as a procedural task and assigned to a mid-level IT or information security man-
ager. These managers collect documentation, finalize status reports, and deliver a final report and a presentation at a
wrap-up meeting. The goal of the wrap-up is to resolve any pending issues, critique the overall project effort, and draw
conclusions about how to improve the process for the future.
i For more information on project management, visit the Project Management Institute’s Web site at www.pmi.org.
For more information on the SANS GIAC Certified Project Manager certification, visit www.giac.org/certification/
i certified-project-manager-gcpm. For more information on the EC-Council’s PM course, visit www.eccouncil.org. For
more information on the SIA certification, visit www.securityindustry.org.
For more information on the Project Management Institute and the PMP certification, visit www.pmi.org/
i certifications/project-management-pmp.
Conversion Strategies
As the components of the new security system are planned, provisions must be made for the changeover from the
previous method of performing a task to the new method. Just like IT systems, information security projects require
careful conversion planning. This section discusses the four basic approaches for changing from an old system or
process to a new one. The approaches are illustrated in Figure 11-9.
Direct Changeover
Also known as going “cold turkey,” a direct changeover conversion strategy involves stopping the old method and
beginning the new one. This approach could be as simple as having employees follow the existing procedure one
week and then use a new procedure the next. Some cases of direct changeover are simple, such as requiring employ-
ees to begin using a new password with a stronger degree of authentication on an
announced date. Some may be more complex, such as requiring the entire company
to change procedures when the network team disables an old firewall and activates a
direct changeover
conversion strategy
new one. The primary drawback to the direct changeover approach is that if the new
The conversion strategy that
system fails or needs modification, users may be without services while the system’s involves stopping the old system
bugs are worked out. Complete testing of the new system in advance of the direct and starting the new one without
changeover reduces the probability of such problems. any overlap.
Old system
Parallel
New system
1. Policies—This is the outer, or first, ring in the bull’s-eye diagram. The critical importance of policies
has been emphasized throughout this textbook, particularly in Module 3. The foundation of all effective
information security programs is sound information security policy and information technology policy.
Because policy establishes the ground rules for the use of all systems and describes what is appropriate
and inappropriate, it enables all other information security components to function correctly. When
deciding how to implement complex changes and choose from conflicting options, you can use policy to
clarify what the organization is trying to accomplish with its efforts.
2. Networks—In the past, most information security efforts focused on this layer, so until recently,
information security was often considered synonymous with network security. In today’s computing
environment, implementing information security is more complex because networking infrastructure
often comes into contact with threats from the public network. If an organization is new to the Internet
and examines its policy environment to define how the new company networks should be defended, it will
soon find that designing and implementing an effective DMZ is the primary way to secure those networks.
Module 11 Implementing Information Security 439
Policies
Networks
Systems
Applications
Secondary efforts in this layer include providing the necessary authentication and authorization when
allowing users to connect over public networks to the organization’s systems.
3. Systems—Many organizations find that the problems of configuring and operating information systems in
a secure fashion become more difficult as the number and complexity of these systems grow. This layer
includes computers used as servers and desktop computers and systems used for process control and
manufacturing systems.
4. Applications—The layer that receives attention last deals with the application software systems used by
the organization to accomplish its work. This includes packaged applications, such as office automation
and e-mail programs, as well as high-end enterprise resource planning (ERP) packages that span the
organization. Custom application software developed by the organization for its own needs is also included.
By reviewing the information security blueprint and the current state of the organization’s information security
efforts in terms of these four layers, project planners can determine which areas require expanded capabilities. The
bull’s-eye model can also be used to evaluate the sequence of steps taken to integrate parts of the information security
blueprint into a project plan. As suggested by its bull’s-eye shape, this model dictates the following:
• Until sound and usable IT and information security policies are developed, communicated, and enforced, no
additional resources should be spent on other controls.
• Until effective network controls are designed and deployed, all resources should go toward achieving that
goal, unless resources are needed to revisit the policy needs of the organization.
• After policies and network controls are established, implementation should focus on the information, process,
and manufacturing systems of the organization. Until there is well-informed assurance that all critical systems
are being configured and operated in a secure fashion, all resources should be spent on reaching that goal.
• Once there is assurance that policies are in place, networks are secure, and systems are safe, attention should
move to assessing and remediating the security of the organization’s applications. This is a complicated and
vast area of concern for many organizations, and most neglect to analyze the impact of information security
on existing systems and their own proprietary systems. As in all planning efforts, attention should be paid to
the most critical applications first.
To Outsource or Not
Not every organization needs to develop an information security department or program of its own. Just as some
organizations outsource part or all of their IT operations, so too can organizations outsource their information security
programs. The expense and time required to develop an effective information security program may be beyond the
means of some organizations, so it may be in their best interest to hire professional services to help their IT depart-
ments implement such a program.
440 Principles of Information Security
When an organization outsources most or all of its IT services, information security should be part of the contract
arrangement with the supplier. Organizations that handle most of their own IT operations may choose to outsource
the more specialized information security functions. Small and medium-sized organizations often hire outside consul-
tants for penetration testing and information security program audits. Organizations of all sizes frequently outsource
network monitoring functions to make certain that their systems are adequately secured and to gain assistance in
watching for attempted or successful attacks.
For an interesting article on outsourcing security, visit the Web page of renowned security consultant and author
i Bruce Schneier at https://www.schneier.com/essays/archives/2002/01/the_case_for_outsour.html.
Effective change control is an essential part of the IT operation in all but the smallest organizations. The informa-
tion security group can also use the change control process to ensure that the organization follows essential process
steps that protect confidentiality, integrity, and availability when systems are upgraded across the organization.
of approach and the use of automated techniques where possible, seeking to deliver a high degree of effectiveness and
an essential efficiency to operations. The Controls are recognized as a subset of the controls enumerated in NIST SP 800-
53 (currently in Draft Rev. 5) and are not intended to supplant the NIST directives, including the Cybersecurity Frame-
work developed in response to Executive Order 13636. The order directed federal agencies to take steps to improve
the security infrastructure of critical federal systems. One of those steps was the development and implementation
of the Cybersecurity Framework. The Controls are a means of implementing a smaller number of actionable controls
that deliver maximum results from a modest set of resource inputs using a structured list of priorities.
The Controls are informed by actual attacks and effective defenses, reflecting the knowledge of a broad range of
experts in both the public and private sectors. These experts include threat responders, threat analysts, vulnerability
finders, solution providers, defenders, policy makers, and users who work within government and academia as well
as industries such as power, defense, finance, transportation, consulting, security, and IT.
The Controls are the most effective set of technical measures available to detect, prevent, respond to, and mitigate
damage from attacks. The Controls work to block the initial compromise of systems and to prevent or disrupt further
attacks on already compromised machines.12
The CIS Controls from Version 7.1, which was released in 2019, are as follows:
Basic Controls
Foundational Controls
Organizational Controls
• Unfreezing—Thawing hard-and-fast habits and established procedures. Preparing the organization for upcom-
ing changes facilitates the implementation of new processes, systems, and procedures. Training and awareness
programs assist in this preparation.
• Moving—Transitioning between the old way and the new. The physical implementation of new methods, using
the strategies outlined earlier in this module, requires the organization to recognize the cessation of old ways
of work and reinforces the need to use the new methods.
• Refreezing—The integration of the new methods into the organizational culture. This integration is accom-
plished by creating an atmosphere in which the changes are accepted as the preferred way of accomplishing
the necessary tasks.
For a sample change management and control policy template, visit the ISO 27001 security Web page at
i www.iso27001security.com/ISO27k_Model_policy_on_change_management_and_control.docx.
Closing Scenario
Charlie looked across his desk at Kelvin, who was absorbed in the sheaf of handwritten notes from the meeting. Charlie had
asked Kelvin to come to his office and discuss the change control meeting from earlier that day.
“So what do you think?” Charlie asked.
“I think I was blindsided by a bus!” Kelvin replied. “I thought I had considered all the possible effects of the change in my
project plan. I tried to explain this, but everyone acted as if I had threatened their lives.”
“In a way you did, or you threatened their jobs, at least,” Charlie stated. “Some people believe that change is the enemy.”
“But these changes are important.”
“I agree,” Charlie said. “But successful change usually occurs in small steps. What’s your top priority?”
“All the items on this list are top priorities,” Kelvin said. “I haven’t even gotten to the second tier.”
“So what should you do to accomplish these top priorities?” Charlie asked.
“I guess I should reprioritize within my top tier, but what then?”
“The next step is to build support before the meeting, not during it,” Charlie said, smiling. “Never go into a meeting where
you haven’t done your homework, especially when other people in the meeting can reduce your chance of success.”
Discussion Questions
1. What project management tasks should Kelvin perform before his next meeting?
2. What change management tasks should Kelvin perform before his next meeting, and how do these tasks fit
within the project management process?
3. Had you been in Kelvin’s place, what would you have done differently to prepare for this meeting?
3. Suppose Kelvin has a close friend who works for a firm that makes and sells software for a specific control objec-
tive on the list. When Kelvin prioritized the list of his preferences, he made detailed adjustments to the data pre-
sented so the specific control was at the top of the list. Kelvin planned to provide his friend with internal design
specifications and the assessment criteria to be used for vendor selection for the initiative. Has Kelvin committed
an ethical lapse?
Selected Readings
• Information Technology Project Management, 5th Edition, by Kathy Schwalbe. Course Technology. 2007. Boston.
• The PMI Project Management Fact Book, 2nd Edition, by the Project Management Institute. 2001. Newtown Square, PA.
• NIST SP 800-37, Rev. 1, “Guide for Applying the Risk Management Framework to Federal Information Systems: A
Security Life Cycle Approach.”
• NIST DRAFT SP 800-39, “Managing Risk from Information Systems: An Organizational Perspective.”
Module Summary
• Information security should be implemented in every major system. One approach is to ensure that security is
a part of the organization’s system development methodology. DevOps and SecDevOps are emerging acceler-
ated development models that merge development and operational skills.
• Software assurance is a methodological approach to the development of software that seeks to build security
into the development life cycle rather than address it at later stages.
• The implementation phase of the security systems development life cycle involves modifying the configuration
and operation of the organization’s information systems to make them more secure. Such changes include
those to procedures, people, hardware, software, and data. During the implementation phase, the organization
translates its blueprint for information security into a concrete project plan.
• Before developing a project plan, management should articulate and coordinate the organization’s information
security vision and objectives with the involved communities of interest.
• The major steps in executing the project plan are planning the project, supervising tasks and action steps
within the plan, and wrapping up the plan.
• Each organization determines its own project management methodology for IT and information security proj-
ects. Whenever possible, an organization’s information security projects should be in line with its project
management practices.
• Planning for the implementation phase involves the creation of a detailed project plan. The project plan can
be created by using a simple planning tool such as the work breakdown structure (WBS). The plan can be
prepared with a simple desktop PC spreadsheet program or with more complex project management software.
The WBS involves addressing major project tasks and their related attributes, including the following:
❍ Work to be accomplished (activities and deliverables)
• Constraints and considerations should be addressed when developing the project plan. Considerations include
those for finances, procurement, priority, time and scheduling, staffing, scope, organizational feasibility, train-
ing and indoctrination, change control, and technology governance.
Module 11 Implementing Information Security 445
• Organizations usually designate a professional project manager to lead a security information project. Alter-
natively, some organizations designate a champion from a senior level of general management or a senior IT
manager, such as the CIO.
• Once a project is under way, it can be managed to completion using a process known as a negative feedback
loop or cybernetic loop. This process involves measuring variances from the project plan and then taking
corrective action when needed.
• As the components of the new security system are planned, provisions must be made for the changeover from
the previous method of performing a task to the new method(s). The four common conversion strategies for
performing this changeover are as follows:
❍ Direct changeover
❍ Phased implementation
❍ Pilot implementation
❍ Parallel operations
• The bull’s-eye model is a proven method for prioritizing a program of complex change. Using this method,
the project manager can address issues from the general to the specific and focus on systematic solutions
instead of individual problems.
• When the expense and time required to develop an effective information security program is beyond the reach
of an organization, it should outsource the program to competent professional services.
• Technology governance is a complex process that an organization uses to manage the impacts and costs of
technology implementation, innovation, and obsolescence.
• The change control process is a method that medium-sized and large organizations use to deal with the impact
of technical change on their operations.
• As with any project, certain aspects of change must be addressed. In any major project, the prospect of moving
from the familiar to the unfamiliar can cause employees to resist change, consciously or unconsciously.
Review Questions
1. What is a methodology in the context of implement- 12. Why is it a good practice to delay naming
ing secure systems? specific people as resources early in the
2. What is a systems development life cycle (or planning process?
SDLC)? 13. What is a milestone, and why is it significant to
3. What is a project plan? List what a project plan can project planning?
accomplish. 14. Why is it good practice to assign start and end
4. What categories of constraints to project plan dates sparingly in the early stages of project
implementation are noted in the module? Explain planning?
each of them. 15. Who is the best judge of effort estimates for project
5. List and describe the three major steps in execut- tasks and action steps? Why?
ing the project plan. 16. Within project management, what is a dependency?
6. What is a work breakdown structure (WBS)? Is it What is a predecessor? What is a successor?
the only way to organize a project plan? 17. What is a negative feedback loop? How is it used to
7. What is projectitis? How is it cured or its impact keep a project in control?
minimized? 18. When a task is not being completed according to
8. List and define the common attributes of tasks the plan, what two circumstances are likely to be
within a WBS. involved?
9. How does a planner know when a task has been 19. List and describe the four basic conversion strate-
subdivided to an adequate degree and can be clas- gies that are used when converting to a new sys-
sified as an action step? tem. Under which circumstances is each strategy
10. What is a deliverable? Name two uses for the best approach?
deliverables. 20. What is technology governance? What is change
11. What is a resource? What are the two types? control? How are they related?
446 Principles of Information Security
Exercises
1. Using the Web, explore the emerging approach of 4. Write a job description for Kelvin Urich, the project
SecDevOps (Security/Development/Operations). manager described in the opening scenario of this
An earlier and alternative approach is DevSecOps. module. Be sure to identify key characteristics of
What is the difference implied in the two names? the ideal candidate, as well as work experience and
2. Create a first draft of a WBS from the following sce- educational background. Also, justify why your job
nario. Make assumptions as needed based on the description is suitable for potential candidates for
section about project planning considerations and this position.
constraints in this module. In your WBS, describe the 5. Search the Web for job descriptions of project man-
skill sets required for the tasks you have planned. agers. You can use any number of Web sites, includ-
3. If you have access to commercial project manage- ing www.monster.com or www.dice.com, to find at
ment software, such as Microsoft Project, use it to least 10 IT-related job descriptions. What common
complete a project plan based on the data shown elements do you find among the job descriptions?
in Table 11-2. Prepare a simple WBS report or Gantt What is the most unusual characteristic among
chart that shows your work. them?
References
1. Adapted from Dewitz, Sandra D. Systems Analysis and Design and the Transition to Objects. 1996. New York:
McGraw Hill Publishers, 94.
2. Redwine, Samuel T., Jr. (Editor). “Software Assurance: A Guide to the Common Body of Knowledge to
Produce, Acquire, and Sustain Secure Software,” Version 1.1. U.S. Department of Homeland Security.
September 2006.
3. Ibid.
4. Saltzer, J. H., and Schroeder, M. D. “The Protection of Information in Computer Systems.” Proceedings
of the IEEE, vol. 63, no. 9 (1975), pp. 1278–1308. Accessed November 1, 2020, from http://cap-lore.com/
CapTheory/ProtInf/.
5. Ibid.
6. Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J., and Gulick, J. Special Publication 800-64, Rev.
2, “Security Considerations in the System Development Life Cycle.” National Institute of Standards and
Technology. Accessed November 1, 2020, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpub-
lication800-64r2.pdf.
7. Microsoft. “Microsoft Security Development Lifecycle (SDL) Process Guidance – Version 5.2.” Accessed
November 1, 2020, from www.microsoft.com/en-us/download/confirmation.aspx?id=29884.
8. Ibid.
9. The SANS Institute. “GIAC Certified Project Manager (GCPM).” Accessed October 24, 2020, from www.giac
.org/certification/certified-project-manager-gcpm.
10. Ibid.
11. EC-Council. “Certified Project Management (CPM).” Accessed October 24, 2020, from https://iclass.eccoun-
cil.org/our-courses/certified-project-management/.
12. “CIS Controls® Download.” Version 7.1. Accessed November 1, 2020, from www.cisecurity.org/controls/.
13. Ibid.
14. Schein, E.H. “Kurt Lewin’s Change Theory in the Field and in the Classroom: Notes Toward a Model of
Managed Learning.” Systems Practice 9, 27–47 (1996). https://doi.org/10.1007/BF02173417.