1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management...

12
1 Managing the Security Function Chapter 11

Transcript of 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management...

Page 1: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

1

Managing the Security Function

Chapter 11

Page 2: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

2

Figure 11-1: Organizational Issues

Top Management Support

Top-Management security awareness briefing (emphasis on brief)

Corporate security policy statement: Vision, not details

Follow-through when security must be upheld in conflicts

Business champions to give support and business advice

Page 3: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

3

Figure 11-1: Organizational Issues

Should You Place Security Within IT?

Pros

Compatible technical skills

Making the CIO responsible for security breaches gives accountability

Cons

Difficult to blow the whistle on the IT staff

Vendor preference differences with networking staff (e.g., Cisco vs Check Point)

Page 4: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

4

Figure 11-1: Organizational Issues

Should You Place Security Within IT?

Locating security outside IT

Can blow the whistle on IT actions

If a staff group, can only give advice

Page 5: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

5

Figure 11-1: Organizational Issues

Security and Auditing

IT Auditing has the skills to determine whether IT rules are enforced, but IT auditing does not set policy

Internal Auditing also can audit IT-related procedures, but it does not make policy

Page 6: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

6

Figure 11-1: Organizational Issues

Managed Security Service Providers (Figure 11-2)

On-site logging, off-site analysis

Practice-based expertise

Get plenty of experience on a daily basis—like fire departments

Separation of responsibilities: Can blow whistle on IT, even the CIO

Page 7: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

7

Figure 11-1: Organizational Issues

Managed Security Service Providers (Figure 11-2)

What to Outsource?

Typically, intrusion detection and vulnerability assessment

Rarely policy and other control practices

Not commonly antivirus protection and other aspects of security, but MSSPs are expanding

Page 8: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

8

Figure 11-1: Organizational Issues

Managed Security Service Providers (Figure 11-2)

Evaluating the MSSP

Diligence: Is it really reading the logs? (Contracts often are vague)

Skills and background of testers

Page 9: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

9

Figure 11-1: Organizational Issues

Security and Business Staffs

Cannot Just Lob Policies Over the Wall

Security and Business Partners

Your Business Partner’s Security Affects You

Uniformed Security Personnel

They are often called first by suspicious users

They support investigations

Page 10: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

10

Figure 11-1: Organizational Issues

Staffing and Training

Hiring staff: Expertise

Training is necessary because few people on the market are security experts

Certifications are good but vary in what they require and do not make up for lack of experience

Background checks should be done on the security staff

Page 11: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

11

Figure 11-1: Organizational Issues

Staffing and Training

All workers involved in IT should have background checks, including the maintenance staff, consultants, and contractors

Should you hire a hacker?

They are likely to have the knowledge you need

But would you be afraid to fire or lay off one?

Page 12: 1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.

12

Figure 11-2: Managed Security Service Provider (MSSP)

Firm MSSP

MSSP LoggingServer

Log File

Security Manager

2.Encrypted &Compressed

Log Data

3.Analysis

5.Vulnerability

Test

4.Small Number of Alerts