Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35
السعودية االلكترونية
College ofالجامعة Computing and الجامعة السعودية االلكترونية Informatics
IT Security and Policies
26/12/2021 Security Program and Policies Principles and Practices
by Sari Stern Greene
Updated 02/2018
Chapter 8: Communications and Operations
Security Objectives Author useful standard operating procedures Implement change control processes Understand the importance of patch management Protect information systems against malware Consider data backup and replication strategies Recognize the security requirements of email and email systems Appreciate the value of log data and analysis Evaluate service provider relationships Write policies and procedures to support operational and communications security Introduction Communication and operations security focuses on Information technology (IT) and Security functions including: 1. Standard operating procedures 2. Change management 3. Malware protection 4. Data replication 5. Secure management 6. Activity monitoring These functions are carried out by IT and information security data custodians (e.g., network administrations security engineers) Standard Operating Procedures (SOPs) SOPs are detailed explanations of how to perform a task *SOPs provide; standardized direction, improved communication, reduced training time and improved work consistency Effective SOPs include: 1. Who performs the task 2. What materials are necessary 3. Where the task takes place 4. When the task will be performed 5. How the person will execute the task SOPs Documentation SOPs should be properly documented to protect the company A critical task/business process is only known by one employee and is not documented, if that employee becomes unavailable, the organization could be seriously injured Documented SOPs standardize the target process and provide sufficient information Someone with limited experience can successfully perform the procedure unsupervised SOPs should be written in detail by someone with sufficient experience of the targeted process. Authorizing SOP Documentation Documented procedure must be: Reviewed The reviewer should check the SOP for clarity and reliability Verified The verifier should test the procedure and ensure they are correct and not missing any steps Authorized (before publication) The process owner is responsible for authorization, publication and distribution of the document Protecting SOP Documentation The integrity of the SOP document should be protected through: Access controls Should be applied to protect the procedure document from any tampering/altering Version controls Employees should use the latest revision of the procedure Developing SOPs SOPs should be: Concise & clear Logical step-by-step order Plain language format Exceptions are noted and explained Warnings are clear and standout Choosing the format of a SOP is based on: How many decisions the user will make How many steps are in the procedure Developing SOPs Methods
There are four common SOP formats:
Developing SOPs 1. Simple step Procedure contains less than 10 steps Does not involve many decisions Developing SOPs There are four common SOP formats: 2. Hierarchical / 3. Graphic Procedure contains more than 10 steps Does not involve many decisions Developing SOPs There are four common SOP formats: 4. Flowchart Procedure can contain any number of steps Involves many decisions SOPs Documentation Policy Example Operational Change Control Change control: An internal procedure in which authorized changes are made to software, hardware, network access privileges, or business processes. Managing change allows organizations to be productive and spend less time in crisis mode. Example: An operating system fails to be updated completely to the new version nor is it still original version, this results in an unstable platform hindering the productivity of the entire company. The change control process: 1. Submitting a Request For Change (RFC) 2. Developing a change control plan 3. Communicating change 4. Implementing & monitoring change Submitting a Request for Change (RFC) The first phase of the change control process is an RFC submission The RFC should include: 1. Description of the proposed change 2. Justification why the change should be implemented 3. Impact of not implementing the change 4. Alternatives 5. Cost 6. Resource requirements and timeframe The change is then evaluated and if approved, it will be implemented Developing a Change Control Plan Once the change is approved, the next step is to develop a change control plan The change control plan should include: 1. Security reviews to ensure no new vulnerabilities are introduced 2. Implementation instructions 3. Rollback and/or recovery options 4. Post implementation monitoring *The complexity of the change and its risk to the organization will influence the level of detail within the change control plan. Communicating Change Change must be communicated to all relevant parties (employees, managers) There are two main categories of messages that are communicated: 1.Messages about the change, which should include: Current situation The need for change What the change is, how it will change and when 2.Messages how the change will impact employees Impact on day-to-day activities of the employees Implication on job security Implementing & Monitoring Change Change can be unpredictable If possible, change should be applied to a test environment to check and monitor its impact. A plan must be in place to roll back or recover from failed implementation All actions and steps taken to implement the change should be recorded and documented Change should be continuously monitored for any flaws and unexpected impacts Patching Patch is software or code designed to fix a problem Applying security patches is the primary method of fixing security vulnerabilities in software Patches need to be applied quickly to prevent attackers from exploiting code and information Patch Management The process of scheduling, testing, approving, and applying security patches Patching can be unpredictable and disruptive User should be notified of potential downtime due to patch installation Malware Protection Malware (malicious software) is designed to: 1. Disrupt computer operation 2. Gather sensitive information 3. Gain unauthorized access to computer systems and mobile devices Malware can infect system by being bundled with other programs or self-replicated Most malware typically requires user interaction such as: 1. Clicking an email attachment 2. Downloading a file from the Internet Different Types of Malware Malware can be categorized as: Viruses: malicious code that attaches to become part of another program Worm: a piece of code that spreads from one computer to another without requiring a host file Trojans: malicious code that masks itself as a legitimate kind application Bots: Snippets of code designed to automate tasks and respond to instructions Ransomware: a type of malware that take computer or its data as hostage Rootkits: a set of software tools that hides its presence on the computer, using some of the lower layers of the operating system or the device basic input/output system (BIOS) with privileged access permissions. Spyware/adware: general term describing software that tracks Internet activity and searches without user knowledge How is Malware Controlled? Prevention controls Stop an attack before it occurs Disable remote desktop connection Configure the firewall to restrict access Disallow users to install software on company device Detection controls Identify the presence of malware, alert the user, and prevent the malware from carrying out its mission Detection controls include the following: Real-time firewall detection of suspicious file downloads. Real-time firewall detection of suspicious network connections. What Is Antivirus Software? Antivirus software is used to detect, contain, and in some cases eliminate malicious software Most AV software employs two techniques 1. Signature-based recognition (virus code) 2. Behavior-based (heuristic) recognition (Disabling security controls, registering for autostart) AV software is not 100% effective due to three factors 1. The volume of new malware 2. Single-instance malware (never been seen before) 3. Blended threats (malware put together) Malicious Software Policy Example Data Replication The impact of malware, hardware failure, accidental deletion is reduced by effective: Data Replication Is the process of copying data to a second location that is available for immediate use (Moving data between a company’s sites) Data backup is the process of copying/storing data that can be restored to its original location in case the original is lost or damaged. Replicating and backing up data protects data’s integrity and availability Recommended Backup/Replication Strategy? Decision to backup/replicate and how often should be based on the impact of not being able to access the data Several factors should be considered when the strategy is designed: Reliability is vital Speed and efficiency Simplicity and ease of use Cost Backed-up or replicated data should be stored in a off-site location, secure from theft, the elements, and natural disasters. The Importance of Testing The value of the backup or replication is the assurance that running a restore operation will yield success and that the data will once again be available for production and business-critical application systems.
The accessibility or restore strategy must be:
Carefully designed Tested before being approved Documented Securing Messaging Emails take complex routes with processing and sorting at several locations before arriving at its destination It’s hard to tell if someone has read or manipulated your message in transit *making it an insecure way to transmit information Email is an effective way to spread malware and attack/penetrate organizations Malware is spread in emails through: Attachments Hyperlinks Email hoax: Email containing false information (such as virus warnings) asking user to perform actions that can be damaging Email users and employees should: Be careful of attachments, hyperlinks and spam emails Not access personal email accounts from corporate networks Securing Messaging The three most common user errors/mistakes that impact the confidentiality of email are: 1.Hitting the wrong button Using “reply all” as instead of “reply” or “forward” instead of “reply” 2.Sending an e-mail to the wrong e-mail address Sending to the wrong address because it is close to the intended recipient’s address (especially with the use of autocomplete addresses) 3.Forwarding an email with the entire string Leaving a third person with information discussed in earlier e-mails that should have been private. Are E-Mail Servers at Risk? Email servers are hosts that deliver, forward, store emails Compromising the e-mail server can happen by: Relay abuse: using mail servers to distribute spam/malware DDoS attack: an attack against the availability of the email service In a response to the deluge/flood of spam and email malware distribution, blacklisting has become a standard practice. Blacklisting is used to deny emails coming from a specified IP address, domain name or email address that is known for spam/malware. Activity Monitoring and Log Analysis Logs are used to record events occurring within an organization’s systems and networks Log management activities include: 1. Configure log sources, log generations, storage & security 2. Perform analysis of log data 3. Initiate appropriate responses to identified events 4. Manage the long-term storage of log data Data logs should be selected based on their ability to: 1. Identify suspicious activity and attacks 2. Help understand normal activity 3. Provide operational oversight/mistake 4. Provide a record of activity Analyzing Logs Data log analysis can be a reliable way to discover, potential threats, malicious activity and provide operational oversight Log analysis techniques include: Correlation: ties individual log entries together based on related information Sequencing: examines activity based on patterns Signature: compares log data to “known bad” activity Trend analysis: identifies activity overtime that alone might seem normal Summary Day-to-day activities can have a huge impact on the security of the network and the data it contains. SOPs are important in providing a consistent framework across the company. Change must be managed. Two mandatory components of a change management process are RFC documents and a change control plan. Malware is becoming the tool of choice for criminals to exploit devices, operating systems, applications, and user vulnerabilities. Many types of malware exist, and companies should protect against them. Sound backup strategies should be developed, tested, authorized and implemented. E-mail, while being a fantastic business tool, is also a double-edge sword because of its inherent lack of built-in security and must be treated as such. Operational security extends to service providers. Service provider controls should meet or exceed those of the company. Thank You