SlideShare a Scribd company logo
1 of 12
Download to read offline
Informa(on	
  Systems	
  Security	
  Programs	
  
Na(onal	
  Futures	
  Associa(on	
  
9070	
  -­‐	
  NFA	
  COMPLIANCE	
  RULES	
  2-­‐9,	
  2-­‐36	
  AND	
  2-­‐49:	
  INFORMATION	
  SYSTEMS	
  
SECURITY	
  PROGRAMS	
  
hNp://www.nfa.futures.org/nfamanual/NFAManual.aspx?RuleID=9070&Sec(on=9	
  
	
  
Wesley.Moore@Quarule.com	
  
What	
  Comprises	
  the	
  Informa(on	
  Systems	
  Security	
  Program?	
  
	
  
	
  Regulatory	
  rules	
  
	
  Five	
  areas	
  of	
  an	
  Informa.on	
  Systems	
  Security	
  Program	
  (ISSP):	
  
1.  Wri<en	
  Program	
  
2.  Security	
  and	
  Risk	
  Analysis	
  
3.  Deployment	
  of	
  Protec.ve	
  Measures	
  Against	
  Iden.fied	
  Threats	
  and	
  Vulnerabili.es	
  
4.  Response	
  and	
  Recovery	
  from	
  Threats	
  to	
  Electronic	
  Systems	
  
5.  Employee	
  Training	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   2	
  
Do	
  We	
  Have	
  a	
  WriNen	
  	
  
Informa(on	
  Security	
  Systems	
  Program	
  (ISSP)?	
  
	
  
Regulatory	
  rules	
  
a)  Members	
  must	
  adopt	
  and	
  enforce	
  a	
  wri<en	
  ISSP	
  designed	
  to	
  provide	
  safeguards	
  and	
  
protect	
  against	
  security	
  threats	
  or	
  hazards	
  to	
  their	
  technology	
  systems.	
  
b)  The	
  wri<en	
  ISSP	
  must	
  be	
  appropriate	
  to	
  the	
  Member's	
  size,	
  complexity	
  of	
  opera.ons,	
  type	
  
of	
  customers	
  and	
  counterpar.es,	
  the	
  sensi.vity	
  of	
  the	
  data	
  accessible	
  within	
  its	
  systems,	
  
and	
  its	
  electronic	
  interconnec.vity	
  with	
  other	
  en..es.	
  
c)  There	
  are	
  several	
  cybersecurity	
  best	
  prac.ces	
  and	
  standards	
  readily	
  available,	
  including	
  
those	
  promulgated	
  by	
  SANS,	
  OWASP,	
  ISACA's	
  COBIT	
  5,	
  and	
  NIST.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  have	
  a	
  wri<en	
  ISSP?	
  
2.  Is	
  the	
  ISSP	
  appropriate	
  for	
  the	
  Member’s	
  specific	
  needs?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   3	
  
Do	
  We	
  Analyze	
  Security	
  and	
  Risk?	
  	
  
	
  
There	
  are	
  many	
  different	
  types	
  of	
  internal	
  and	
  external	
  threats,	
  including:	
  
a)  Loss,	
  destruc.on	
  or	
  thea	
  of	
  data;	
  	
  
b)  A<acks	
  by	
  viruses,	
  spyware	
  and	
  other	
  malware;	
  and	
  
c)  Intercep.on	
  and	
  compromising	
  of	
  electronic	
  transmissions.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  keep	
  track	
  of	
  their	
  hardware	
  and	
  soaware?	
  	
  
2.  Has	
  the	
  Member	
  reviewed	
  the	
  vulnerabili.es	
  of	
  their	
  electronic	
  infrastructure?	
  
3.  Is	
  the	
  Member’s	
  data	
  secure?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   4	
  
Do	
  We	
  Assess	
  and	
  Priori(ze?	
  
Members	
  must	
  assess	
  and	
  priori.ze	
  the	
  risks	
  associated	
  with	
  the	
  
use	
  of	
  their	
  informa.on	
  technology	
  systems.	
  
Regulatory	
  rules	
  
a)  Es.mate	
  the	
  severity	
  of	
  the	
  poten.al	
  threats;	
  	
  
b)  Perform	
  a	
  vulnerability	
  analysis;	
  and	
  
c)  Decide	
  how	
  to	
  manage	
  the	
  risks	
  of	
  these	
  threats.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Have	
  there	
  been	
  any	
  past	
  incidents?	
  
2.  What	
  are	
  the	
  known	
  threats	
  iden.fied	
  by	
  other	
  en..es?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   5	
  
How	
  Do	
  We	
  Protect	
  Against	
  	
  
Iden(fied	
  Threats	
  and	
  Vulnerabili(es?	
  
	
  
A	
  Member	
  should	
  document	
  in	
  their	
  ISSP	
  the	
  safeguards	
  that	
  they	
  deploy	
  aaer	
  reviewing	
  and	
  
priori.zing	
  threats	
  and	
  vulnerabili.es.	
  These	
  safeguards	
  will	
  depend	
  on	
  the	
  Member’s	
  specific	
  
needs,	
  and	
  can	
  include:	
  
a)  Physically	
  protec.ng	
  buildings,	
  equipment	
  and	
  assets;	
  
b)  Using	
  and	
  maintaining	
  up-­‐to-­‐date	
  firewall,	
  an.-­‐virus	
  and	
  an.-­‐malware	
  soaware;	
  
c)  Limi.ng	
  both	
  physical	
  and	
  electronic	
  access;	
  
d)  Ensuring	
  that	
  systems	
  are	
  regularly	
  and	
  properly	
  updated;	
  
e)  Deploying	
  encryp.on	
  soaware;	
  
f)  Preven.ng	
  the	
  use	
  of	
  unauthorized	
  soaware;	
  
g)  Backing	
  up	
  systems	
  and	
  data;	
  and	
  
h)  Ensuring	
  that	
  mobile	
  devices	
  are	
  subject	
  to	
  similar	
  applicable	
  safeguards.	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   6	
  
How	
  Do	
  We	
  Detect	
  Poten(al	
  Threats	
  and	
  Vulnerabili(es?	
  
	
  
Regulatory	
  rules	
  
Members	
  should	
  also	
  document	
  and	
  implement	
  reasonable	
  procedures	
  to	
  detect	
  poten.al	
  
threats,	
  including	
  new	
  and	
  emerging	
  threats.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  What	
  procedures	
  does	
  Member	
  have	
  in	
  place?	
  	
  
2.  Do	
  those	
  procedures	
  meet	
  the	
  proper	
  standards?	
  
3.  Is	
  the	
  Member	
  a	
  part	
  of	
  a	
  threat	
  sharing	
  organiza.on	
  which	
  can	
  alert	
  the	
  Member	
  of	
  new	
  
and	
  emerging	
  threats?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   7	
  
How	
  Do	
  We	
  Respond	
  to	
  Threats	
  to	
  Electronic	
  Systems?	
  
Regulatory	
  rules	
  
Members	
  should	
  create	
  an	
  incident	
  response	
  plan	
  to	
  provide	
  a	
  framework	
  to	
  manage	
  detected	
  
security	
  incidents,	
  analyze	
  their	
  poten(al	
  impact	
  and	
  take	
  appropriate	
  measures	
  to	
  contain	
  
and	
  mi.gate	
  their	
  threat.	
  
The	
  response	
  plan	
  should	
  list	
  out	
  how	
  the	
  Member	
  will	
  address	
  poten(al	
  incidents,	
  including	
  
how	
  it	
  will	
  communicate	
  and	
  escalate	
  incidents	
  internally,	
  and	
  how	
  it	
  will	
  communicate	
  
externally	
  with	
  customers,	
  counterpar.es,	
  regulators,	
  and	
  law	
  enforcement.	
  
The	
  Member’s	
  response	
  plan	
  should	
  also	
  include	
  how	
  the	
  Member	
  plans	
  to	
  restore	
  
compromised	
  systems	
  and	
  data,	
  and	
  how	
  it	
  will	
  incorporate	
  lessons	
  learned	
  into	
  the	
  ISSP.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  have	
  a	
  response	
  plan?	
  
2.  Does	
  the	
  response	
  plan	
  detail	
  how	
  to	
  determine	
  the	
  level	
  and	
  type	
  of	
  threat	
  and	
  how	
  to	
  
respond?	
  
3.  Does	
  the	
  response	
  plan	
  detail	
  how	
  restore	
  compromised	
  systems	
  and	
  data?	
  
4.  Does	
  the	
  response	
  plan	
  detail	
  who,	
  how	
  and	
  when	
  to	
  communicate	
  details	
  of	
  an	
  incident?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   8	
  
Does	
  Everyone	
  Know	
  What	
  to	
  Do?	
  
	
  
Regulatory	
  rules	
  
A	
  Member's	
  ISSP	
  should	
  contain	
  a	
  descrip.on	
  of	
  the	
  Member's	
  educa(on	
  and	
  training	
  rela.ng	
  
to	
  informa.on	
  security	
  for	
  all	
  appropriate	
  personnel.	
  This	
  training	
  program	
  should	
  be	
  
conducted	
  for	
  employees	
  upon	
  hiring	
  and	
  periodically	
  during	
  their	
  employment,	
  and	
  should	
  be	
  
appropriate	
  to	
  the	
  security	
  risks	
  the	
  Member	
  faces	
  as	
  well	
  as	
  the	
  composi.on	
  of	
  its	
  workforce.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Are	
  the	
  Member’s	
  employees	
  trained	
  in	
  informa.on	
  security?	
  
2.  Does	
  the	
  Member	
  train	
  employees	
  on	
  informa.on	
  security	
  both	
  at	
  hiring	
  and	
  throughout	
  
employment?	
  
3.  Is	
  the	
  training	
  appropriate	
  for	
  the	
  risks	
  and	
  the	
  workforce?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   9	
  
How	
  Do	
  We	
  Know	
  if	
  the	
  	
  
Info	
  Systems	
  Security	
  Plan	
  (ISSP)	
  is	
  Effec(ve?	
  
	
  
Regulatory	
  rules	
  
A	
  Member	
  should	
  monitor	
  and	
  regularly	
  review	
  the	
  effec(veness	
  of	
  its	
  ISSP,	
  including	
  the	
  
efficacy	
  of	
  the	
  safeguards	
  deployed,	
  and	
  make	
  appropriate	
  adjustments.	
  	
  
The	
  review	
  should	
  be	
  done	
  at	
  least	
  once	
  every	
  year,	
  and	
  may	
  be	
  done	
  by	
  in-­‐house	
  staff	
  with	
  
appropriate	
  knowledge	
  or	
  by	
  engaging	
  an	
  independent	
  third-­‐party	
  informa.on	
  security	
  
specialist.	
  	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  schedule	
  regular	
  reviews	
  of	
  its	
  ISSP?	
  
2.  Does	
  the	
  Member	
  have	
  qualified	
  employees	
  who	
  can	
  perform	
  the	
  review	
  or	
  does	
  the	
  
Member	
  need	
  to	
  hire	
  an	
  outside	
  party?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   10	
  
Are	
  Third-­‐Party	
  Service	
  Providers	
  Secure?	
  
Regulatory	
  rules	
  
A	
  Member’s	
  ISSP	
  should	
  also	
  address	
  the	
  risks	
  posed	
  by	
  third-­‐party	
  service	
  providers	
  that	
  have	
  
access	
  to	
  a	
  Member's	
  systems,	
  operate	
  outsourced	
  systems	
  for	
  the	
  Member	
  or	
  provide	
  cloud-­‐
based	
  services	
  to	
  the	
  Member.	
  	
  
Since	
  the	
  Member	
  does	
  not	
  control	
  the	
  third-­‐party	
  service	
  providers,	
  it	
  is	
  crucial	
  that	
  the	
  
Member	
  perform	
  due	
  diligence	
  on	
  a	
  service	
  provider's	
  security	
  prac.ces	
  and	
  avoid	
  using	
  third	
  
par.es	
  whose	
  security	
  standards	
  are	
  not	
  comparable	
  to	
  the	
  Member's	
  standards	
  in	
  a	
  par.cular	
  
area	
  or	
  ac.vity.	
  	
  
A	
  Member	
  should	
  also	
  place	
  appropriate	
  access	
  controls	
  to	
  their	
  informa.on	
  systems	
  and	
  data	
  
and	
  have	
  a	
  procedure	
  to	
  remove	
  access	
  when	
  a	
  service	
  provider	
  is	
  no	
  longer	
  providing	
  services.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  keep	
  a	
  list	
  of	
  any	
  service	
  providers	
  it	
  employs?	
  
2.  Does	
  the	
  Member	
  monitor	
  the	
  security	
  prac.ces	
  of	
  its	
  service	
  providers?	
  
3.  Does	
  the	
  Member	
  have	
  access	
  controls	
  in	
  place	
  to	
  prevent	
  improper	
  access?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   11	
  
ISSP	
  Resources	
  
	
  
SANS	
  Ins.tute	
  (SANS)	
  –	
  h<ps://www.sans.org/	
  
Open	
  Web	
  Applica.on	
  Security	
  Project	
  (OWASP)	
  –	
  h<ps://www.owasp.org	
  
ISACA's	
  Control	
  Objec.ves	
  for	
  Informa.on	
  and	
  Related	
  Technology	
  (COBIT)	
  5	
  –	
  
	
  h<ps://cobitonline.isaca.org/	
  
Na.onal	
  Ins.tute	
  of	
  Standards	
  and	
  Technology	
  (NIST)	
  –	
  h<ps://www.nist.gov/	
  
	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   12	
  

More Related Content

What's hot

1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
madunix
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
James W. De Rienzo
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
stevemeltzer
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
Tonex
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 

What's hot (20)

Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
APT Monitoring and Compliance
APT Monitoring and ComplianceAPT Monitoring and Compliance
APT Monitoring and Compliance
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
what is security
what is securitywhat is security
what is security
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 

Viewers also liked

Lokale regie uit macht of onmacht onderzoek naar de optimalisering van de g...
Lokale regie uit macht of onmacht   onderzoek naar de optimalisering van de g...Lokale regie uit macht of onmacht   onderzoek naar de optimalisering van de g...
Lokale regie uit macht of onmacht onderzoek naar de optimalisering van de g...
Bart Litjens
 

Viewers also liked (20)

Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
Seminario III
Seminario IIISeminario III
Seminario III
 
Music from Ireland and beyond
Music from Ireland and beyondMusic from Ireland and beyond
Music from Ireland and beyond
 
Manual slideshare
Manual slideshareManual slideshare
Manual slideshare
 
Apostila hidraulica
Apostila hidraulicaApostila hidraulica
Apostila hidraulica
 
Apostila hidraulica
Apostila hidraulicaApostila hidraulica
Apostila hidraulica
 
Reflexões sobre nutrição no hospital - A otimização de atitudes interdependen...
Reflexões sobre nutrição no hospital - A otimização de atitudes interdependen...Reflexões sobre nutrição no hospital - A otimização de atitudes interdependen...
Reflexões sobre nutrição no hospital - A otimização de atitudes interdependen...
 
Allegato 13-omega-3-slide-1
Allegato 13-omega-3-slide-1Allegato 13-omega-3-slide-1
Allegato 13-omega-3-slide-1
 
Sin título 1.tics
Sin título 1.ticsSin título 1.tics
Sin título 1.tics
 
Jll cincinnati industrial outlook q1 2017
Jll cincinnati industrial outlook   q1 2017Jll cincinnati industrial outlook   q1 2017
Jll cincinnati industrial outlook q1 2017
 
My story pp 1
My story pp 1My story pp 1
My story pp 1
 
Cementerio de Barcos, Antonio Maldonado (primeras páginas)
Cementerio de Barcos, Antonio Maldonado (primeras páginas)Cementerio de Barcos, Antonio Maldonado (primeras páginas)
Cementerio de Barcos, Antonio Maldonado (primeras páginas)
 
Pantallasos
PantallasosPantallasos
Pantallasos
 
Slideshare 10 8
Slideshare 10 8Slideshare 10 8
Slideshare 10 8
 
3 w
3 w3 w
3 w
 
2 w
2 w2 w
2 w
 
Lokale regie uit macht of onmacht onderzoek naar de optimalisering van de g...
Lokale regie uit macht of onmacht   onderzoek naar de optimalisering van de g...Lokale regie uit macht of onmacht   onderzoek naar de optimalisering van de g...
Lokale regie uit macht of onmacht onderzoek naar de optimalisering van de g...
 
Que es acces y definicion de conceptos
Que es acces y definicion de conceptosQue es acces y definicion de conceptos
Que es acces y definicion de conceptos
 
proyecto de grado
proyecto de grado proyecto de grado
proyecto de grado
 
1 w
1 w1 w
1 w
 

Similar to NFA Interpretive Notice on Info Security

E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
mydrynan
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
christiandean12115
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 

Similar to NFA Interpretive Notice on Info Security (20)

E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 

Recently uploaded

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Recently uploaded (20)

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

NFA Interpretive Notice on Info Security

  • 1. Informa(on  Systems  Security  Programs   Na(onal  Futures  Associa(on   9070  -­‐  NFA  COMPLIANCE  RULES  2-­‐9,  2-­‐36  AND  2-­‐49:  INFORMATION  SYSTEMS   SECURITY  PROGRAMS   hNp://www.nfa.futures.org/nfamanual/NFAManual.aspx?RuleID=9070&Sec(on=9     Wesley.Moore@Quarule.com  
  • 2. What  Comprises  the  Informa(on  Systems  Security  Program?      Regulatory  rules    Five  areas  of  an  Informa.on  Systems  Security  Program  (ISSP):   1.  Wri<en  Program   2.  Security  and  Risk  Analysis   3.  Deployment  of  Protec.ve  Measures  Against  Iden.fied  Threats  and  Vulnerabili.es   4.  Response  and  Recovery  from  Threats  to  Electronic  Systems   5.  Employee  Training   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       2  
  • 3. Do  We  Have  a  WriNen     Informa(on  Security  Systems  Program  (ISSP)?     Regulatory  rules   a)  Members  must  adopt  and  enforce  a  wri<en  ISSP  designed  to  provide  safeguards  and   protect  against  security  threats  or  hazards  to  their  technology  systems.   b)  The  wri<en  ISSP  must  be  appropriate  to  the  Member's  size,  complexity  of  opera.ons,  type   of  customers  and  counterpar.es,  the  sensi.vity  of  the  data  accessible  within  its  systems,   and  its  electronic  interconnec.vity  with  other  en..es.   c)  There  are  several  cybersecurity  best  prac.ces  and  standards  readily  available,  including   those  promulgated  by  SANS,  OWASP,  ISACA's  COBIT  5,  and  NIST.   Key  Compliance  Ques(ons   1.  Does  the  Member  have  a  wri<en  ISSP?   2.  Is  the  ISSP  appropriate  for  the  Member’s  specific  needs?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       3  
  • 4. Do  We  Analyze  Security  and  Risk?       There  are  many  different  types  of  internal  and  external  threats,  including:   a)  Loss,  destruc.on  or  thea  of  data;     b)  A<acks  by  viruses,  spyware  and  other  malware;  and   c)  Intercep.on  and  compromising  of  electronic  transmissions.   Key  Compliance  Ques(ons   1.  Does  the  Member  keep  track  of  their  hardware  and  soaware?     2.  Has  the  Member  reviewed  the  vulnerabili.es  of  their  electronic  infrastructure?   3.  Is  the  Member’s  data  secure?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       4  
  • 5. Do  We  Assess  and  Priori(ze?   Members  must  assess  and  priori.ze  the  risks  associated  with  the   use  of  their  informa.on  technology  systems.   Regulatory  rules   a)  Es.mate  the  severity  of  the  poten.al  threats;     b)  Perform  a  vulnerability  analysis;  and   c)  Decide  how  to  manage  the  risks  of  these  threats.   Key  Compliance  Ques(ons   1.  Have  there  been  any  past  incidents?   2.  What  are  the  known  threats  iden.fied  by  other  en..es?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       5  
  • 6. How  Do  We  Protect  Against     Iden(fied  Threats  and  Vulnerabili(es?     A  Member  should  document  in  their  ISSP  the  safeguards  that  they  deploy  aaer  reviewing  and   priori.zing  threats  and  vulnerabili.es.  These  safeguards  will  depend  on  the  Member’s  specific   needs,  and  can  include:   a)  Physically  protec.ng  buildings,  equipment  and  assets;   b)  Using  and  maintaining  up-­‐to-­‐date  firewall,  an.-­‐virus  and  an.-­‐malware  soaware;   c)  Limi.ng  both  physical  and  electronic  access;   d)  Ensuring  that  systems  are  regularly  and  properly  updated;   e)  Deploying  encryp.on  soaware;   f)  Preven.ng  the  use  of  unauthorized  soaware;   g)  Backing  up  systems  and  data;  and   h)  Ensuring  that  mobile  devices  are  subject  to  similar  applicable  safeguards.   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       6  
  • 7. How  Do  We  Detect  Poten(al  Threats  and  Vulnerabili(es?     Regulatory  rules   Members  should  also  document  and  implement  reasonable  procedures  to  detect  poten.al   threats,  including  new  and  emerging  threats.   Key  Compliance  Ques(ons   1.  What  procedures  does  Member  have  in  place?     2.  Do  those  procedures  meet  the  proper  standards?   3.  Is  the  Member  a  part  of  a  threat  sharing  organiza.on  which  can  alert  the  Member  of  new   and  emerging  threats?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       7  
  • 8. How  Do  We  Respond  to  Threats  to  Electronic  Systems?   Regulatory  rules   Members  should  create  an  incident  response  plan  to  provide  a  framework  to  manage  detected   security  incidents,  analyze  their  poten(al  impact  and  take  appropriate  measures  to  contain   and  mi.gate  their  threat.   The  response  plan  should  list  out  how  the  Member  will  address  poten(al  incidents,  including   how  it  will  communicate  and  escalate  incidents  internally,  and  how  it  will  communicate   externally  with  customers,  counterpar.es,  regulators,  and  law  enforcement.   The  Member’s  response  plan  should  also  include  how  the  Member  plans  to  restore   compromised  systems  and  data,  and  how  it  will  incorporate  lessons  learned  into  the  ISSP.   Key  Compliance  Ques(ons   1.  Does  the  Member  have  a  response  plan?   2.  Does  the  response  plan  detail  how  to  determine  the  level  and  type  of  threat  and  how  to   respond?   3.  Does  the  response  plan  detail  how  restore  compromised  systems  and  data?   4.  Does  the  response  plan  detail  who,  how  and  when  to  communicate  details  of  an  incident?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       8  
  • 9. Does  Everyone  Know  What  to  Do?     Regulatory  rules   A  Member's  ISSP  should  contain  a  descrip.on  of  the  Member's  educa(on  and  training  rela.ng   to  informa.on  security  for  all  appropriate  personnel.  This  training  program  should  be   conducted  for  employees  upon  hiring  and  periodically  during  their  employment,  and  should  be   appropriate  to  the  security  risks  the  Member  faces  as  well  as  the  composi.on  of  its  workforce.   Key  Compliance  Ques(ons   1.  Are  the  Member’s  employees  trained  in  informa.on  security?   2.  Does  the  Member  train  employees  on  informa.on  security  both  at  hiring  and  throughout   employment?   3.  Is  the  training  appropriate  for  the  risks  and  the  workforce?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       9  
  • 10. How  Do  We  Know  if  the     Info  Systems  Security  Plan  (ISSP)  is  Effec(ve?     Regulatory  rules   A  Member  should  monitor  and  regularly  review  the  effec(veness  of  its  ISSP,  including  the   efficacy  of  the  safeguards  deployed,  and  make  appropriate  adjustments.     The  review  should  be  done  at  least  once  every  year,  and  may  be  done  by  in-­‐house  staff  with   appropriate  knowledge  or  by  engaging  an  independent  third-­‐party  informa.on  security   specialist.     Key  Compliance  Ques(ons   1.  Does  the  Member  schedule  regular  reviews  of  its  ISSP?   2.  Does  the  Member  have  qualified  employees  who  can  perform  the  review  or  does  the   Member  need  to  hire  an  outside  party?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       10  
  • 11. Are  Third-­‐Party  Service  Providers  Secure?   Regulatory  rules   A  Member’s  ISSP  should  also  address  the  risks  posed  by  third-­‐party  service  providers  that  have   access  to  a  Member's  systems,  operate  outsourced  systems  for  the  Member  or  provide  cloud-­‐ based  services  to  the  Member.     Since  the  Member  does  not  control  the  third-­‐party  service  providers,  it  is  crucial  that  the   Member  perform  due  diligence  on  a  service  provider's  security  prac.ces  and  avoid  using  third   par.es  whose  security  standards  are  not  comparable  to  the  Member's  standards  in  a  par.cular   area  or  ac.vity.     A  Member  should  also  place  appropriate  access  controls  to  their  informa.on  systems  and  data   and  have  a  procedure  to  remove  access  when  a  service  provider  is  no  longer  providing  services.   Key  Compliance  Ques(ons   1.  Does  the  Member  keep  a  list  of  any  service  providers  it  employs?   2.  Does  the  Member  monitor  the  security  prac.ces  of  its  service  providers?   3.  Does  the  Member  have  access  controls  in  place  to  prevent  improper  access?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       11  
  • 12. ISSP  Resources     SANS  Ins.tute  (SANS)  –  h<ps://www.sans.org/   Open  Web  Applica.on  Security  Project  (OWASP)  –  h<ps://www.owasp.org   ISACA's  Control  Objec.ves  for  Informa.on  and  Related  Technology  (COBIT)  5  –    h<ps://cobitonline.isaca.org/   Na.onal  Ins.tute  of  Standards  and  Technology  (NIST)  –  h<ps://www.nist.gov/     ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       12