Compliance-driven Security Requirements Warzaw 12 Oct 2010 10-10-13 [email_address] Bengt Berg, M.Sc, CISM, CISSP, QSA, ...  Head of Compliance Management Services Cybercom Sweden East AB
Who is Bengt Berg?  What is Cybercom?  1800 employees, 11 countries, 28 offices Turnover  ≈ 60 M€/2006 ≈ 200 M€/2009 Cybercom Secure: 80 full-time consultants Compliance Management and PCI DSS IAM Forensics Development of secure software components ...and some other areas of expertise So... Who’s Talking?  10-10-13 [email_address]
External Compliance Requirements 10-10-13 [email_address] Sarbanes-Oxley Act ISO/EIC 27001:2006 CE certification FDA/Part11 Basel3 Public Sector Procurement Laws ISO 14001 PCI DSS,  Payment Card Industry Data Security Standard,
How PCI DSS has Transformed the Payment Security Area  10-10-13 [email_address]
PCI DSS 10-10-13 [email_address] Brands Bank PSP Merchant Solution vendor Service provider PA-QSA PTS PFI QSA ASV
But What are These Requirements?  10-10-13 [email_address] Requirement 1:   Install and maintain a firewall configuration to protect cardholder data Requirement 2:   Do not use vendor-supplied defaults for system passwords and other security parameters  Requirement 3:   Protect stored cardholder data Requirement 4:   Encrypt transmission of cardholder data across open, public networks  Requirement 5:   Use and regularly update anti-virus software Requirement 6:   Develop and maintain secure systems and applications  Requirement 7:   Restrict access to cardholder data by business need-to-know : Requirement 8  Assign a unique ID to each person with computer access Requirement 9:   Restrict physical access to cardholder data  Requirement 10:   Track and monitor all access to network resources and cardholder data Requirement 11:   Regularly test security systems and processes  Requirement 12:   Maintain a policy that addresses information security  Requires solutions for change Documentation of systems, firewalls, ...  ... Staging of systems, databases, routers, ... System hardening ... Encryption of stored cardholder data, ... Never EVER store some data... Key management... ... Encryption of cardholder data sent over public networks Some policies must exist Anti-virus requirements  Centralized logs for AV solutions Secure development methods OWASP Top10 ( www.owasp.org )  Test data, and test systems, requirements  Change management for access requests ” Need to know” Policies, procedures, instructions Access and identity management  Users, roles, logs Physical security Surveillance cameras Visitor badges IDS/IPS 7/24 Centralized logging File integrity monitoring  Wireless analyzer ASV Scans (int/ext) quarterly Penetration test yearly Yearly risk assessments  Security policies Security organization Incident response plans
Conflict of interests Banks initially uncoordinated Caused great problems Situation fixed by PAN Nordic Self assessments (In Norway: ”self betrayal”   )  Almost always too nice First PA-DSS self-assessment: 45 minutes. Lesson learned: Patience... Endurance...  Initial Backlashes 10-10-13 [email_address]
Response From Product Suppliers and Consultancy Companies 10-10-13 [email_address]
Retailers now have a very high level of security Leveraging the investments into other business areas Using the IDS for the whole company  Incident management methods covers the whole company  What Results Have Been Achieved?  10-10-13 [email_address] Investments in  IS/IT Security
Not possible to sell insecure software to retailers anymore  What Results Have Been Achieved?  10-10-13 [email_address]
Software developers know about security nowadays What Results Have Been Achieved?  10-10-13 [email_address]
Increased security amongst outsourcing companies And they make good business out of it! What Results Have Been Achieved?  10-10-13 [email_address] Brands Bank PSP Merchant Solution vendor Service provider QSA ASV
Emerging Methods for Managing External Compliance Requirements  10-10-13 [email_address]
A few trends growing more solid every day: Portal solutions for compliance management  Extreme use of issue management solutions Using wikis for policies and other documentation..  Trend-oriented tests of compliance status Emerging methods 10-10-13 [email_address]
Cybercom, Acrea, ARIS, and numerous others Binders in a bookshelf isn’t enough Portal Solutions for Compliance Management 10-10-13 [email_address]
Use of Issue Management Systems 10-10-13 [email_address] 27 workflows neccessary  to implement ISO 27001 Report Incident Incident response team Webb team Network team H/R Closed Incidents CISO
Use of Issue Management Systems 10-10-13 [email_address]
All Documentation in Wiki format All documents easily accessible (read)  Policy documents  Instructions Edit only by document owner Easy to allow ”free for all” in draft mode Built-in discussion forum!  Let people help each other...  Built-in functionality for version control 10-10-13 [email_address]
All Documentation in Wiki format 10-10-13 [email_address]
Trend-oriented tests 10-10-13 [email_address]
What are the effects of external compliance requirements?  Conclusions  10-10-13 [email_address] New compliance-oriented business models Will always benefit the outsourcing providers The leader gets a competitive advantage  Rational methods decrease investment Success depends on the governance framework Nobody wants to be a problem for their customer

Bengt Berg, Cybercom Security, Polen

  • 1.
    Compliance-driven Security RequirementsWarzaw 12 Oct 2010 10-10-13 [email_address] Bengt Berg, M.Sc, CISM, CISSP, QSA, ... Head of Compliance Management Services Cybercom Sweden East AB
  • 2.
    Who is BengtBerg? What is Cybercom? 1800 employees, 11 countries, 28 offices Turnover ≈ 60 M€/2006 ≈ 200 M€/2009 Cybercom Secure: 80 full-time consultants Compliance Management and PCI DSS IAM Forensics Development of secure software components ...and some other areas of expertise So... Who’s Talking? 10-10-13 [email_address]
  • 3.
    External Compliance Requirements10-10-13 [email_address] Sarbanes-Oxley Act ISO/EIC 27001:2006 CE certification FDA/Part11 Basel3 Public Sector Procurement Laws ISO 14001 PCI DSS, Payment Card Industry Data Security Standard,
  • 4.
    How PCI DSShas Transformed the Payment Security Area 10-10-13 [email_address]
  • 5.
    PCI DSS 10-10-13[email_address] Brands Bank PSP Merchant Solution vendor Service provider PA-QSA PTS PFI QSA ASV
  • 6.
    But What areThese Requirements? 10-10-13 [email_address] Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict access to cardholder data by business need-to-know : Requirement 8 Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Requirement 12: Maintain a policy that addresses information security Requires solutions for change Documentation of systems, firewalls, ... ... Staging of systems, databases, routers, ... System hardening ... Encryption of stored cardholder data, ... Never EVER store some data... Key management... ... Encryption of cardholder data sent over public networks Some policies must exist Anti-virus requirements Centralized logs for AV solutions Secure development methods OWASP Top10 ( www.owasp.org ) Test data, and test systems, requirements Change management for access requests ” Need to know” Policies, procedures, instructions Access and identity management Users, roles, logs Physical security Surveillance cameras Visitor badges IDS/IPS 7/24 Centralized logging File integrity monitoring Wireless analyzer ASV Scans (int/ext) quarterly Penetration test yearly Yearly risk assessments Security policies Security organization Incident response plans
  • 7.
    Conflict of interestsBanks initially uncoordinated Caused great problems Situation fixed by PAN Nordic Self assessments (In Norway: ”self betrayal”  ) Almost always too nice First PA-DSS self-assessment: 45 minutes. Lesson learned: Patience... Endurance... Initial Backlashes 10-10-13 [email_address]
  • 8.
    Response From ProductSuppliers and Consultancy Companies 10-10-13 [email_address]
  • 9.
    Retailers now havea very high level of security Leveraging the investments into other business areas Using the IDS for the whole company Incident management methods covers the whole company What Results Have Been Achieved? 10-10-13 [email_address] Investments in IS/IT Security
  • 10.
    Not possible tosell insecure software to retailers anymore What Results Have Been Achieved? 10-10-13 [email_address]
  • 11.
    Software developers knowabout security nowadays What Results Have Been Achieved? 10-10-13 [email_address]
  • 12.
    Increased security amongstoutsourcing companies And they make good business out of it! What Results Have Been Achieved? 10-10-13 [email_address] Brands Bank PSP Merchant Solution vendor Service provider QSA ASV
  • 13.
    Emerging Methods forManaging External Compliance Requirements 10-10-13 [email_address]
  • 14.
    A few trendsgrowing more solid every day: Portal solutions for compliance management Extreme use of issue management solutions Using wikis for policies and other documentation.. Trend-oriented tests of compliance status Emerging methods 10-10-13 [email_address]
  • 15.
    Cybercom, Acrea, ARIS,and numerous others Binders in a bookshelf isn’t enough Portal Solutions for Compliance Management 10-10-13 [email_address]
  • 16.
    Use of IssueManagement Systems 10-10-13 [email_address] 27 workflows neccessary to implement ISO 27001 Report Incident Incident response team Webb team Network team H/R Closed Incidents CISO
  • 17.
    Use of IssueManagement Systems 10-10-13 [email_address]
  • 18.
    All Documentation inWiki format All documents easily accessible (read) Policy documents Instructions Edit only by document owner Easy to allow ”free for all” in draft mode Built-in discussion forum! Let people help each other... Built-in functionality for version control 10-10-13 [email_address]
  • 19.
    All Documentation inWiki format 10-10-13 [email_address]
  • 20.
  • 21.
    What are theeffects of external compliance requirements? Conclusions 10-10-13 [email_address] New compliance-oriented business models Will always benefit the outsourcing providers The leader gets a competitive advantage Rational methods decrease investment Success depends on the governance framework Nobody wants to be a problem for their customer

Editor's Notes

  • #2 Alltså, jag tänkte inte tala om branscher där man skall arbeta med IT-säkerhet
  • #4 Det är gratis att ställa krav på andra En allt större del av säkerhetsinvesteringarna går till att hantera andras krav, inte de egna Det finns alltid en struktur/organisation/uppföljning bakom dessa krav. Finns det inte kan man strunta i dem 
  • #19 Poängtera att detta inte är en wiki där envar kan editera.
  • #20 Poängtera att detta inte är en wiki där envar kan editera.