Chapter 5 Maintaining Security of Operations
Objectives Establish routine security of operation Create a dependable operational security process Ensure operational response to incidents
Security of Operations A critical part of information assurance lifecycle Ensures the integrity and performance Process involves actions such as: Ensuring that current operating procedures are properly aligned with organization’s security policies Monitoring performance of assigned security duties to confirm that they correspond to proper processes Defining and executing operational housekeeping processes to ensure that the security function continues to operate properly
Aims: Aligning Purpose with Practice Information assurance goals must be satisfied for the organization to be secure Factors that can affect this process include changes in: People who use the system or their motivations Types of systems interconnected with the organization’s systems Type or sensitivity of data  Way the organization does business or type of business the organization conducts Rigor and extent of information assurance objectives Organizational risk model and risk tolerance approach
Aims: Aligning Purpose with Practice If information assurance goal is not being met The organization performs a risk assessment/risk mitigation process to decide how to meet it
Threat Response: Keeping the Organization on Its Toes Threat response is either proactive or reactive  Proactive activities include  Identification of threats and vulnerabilities Creation, assessment, and optimization of security solutions Implementation of controls to protect the software and the information Reactive activities include  Detecting and reacting to external or internal intrusions or security violations in a timely manner
Staying Alert: Elements of the Operational Security Process Operational security process is composed of principles These principles represent the primary functions of the operational security process:  Sensing Analyzing Responding Managing
Sensing: Understanding the Threat Operational sensing is proactive Must be performed continuously  Implemented and run by defined policies, procedures, tools, and standards Monitors, tests, and assesses the environment, to detect vulnerabilities and security violations Identifies and resolves threats as they arise  Reviews monitor and evaluate management and end-user behavior
Sensing: Understanding the Threat Security assurance requires documentary evidence of: Feasible information assurance and security perimeter Overall concept of standard operating procedure Generic operational testing and review plan Policies to ensure appropriate response to unexpected incidents Secure site plan Business Continuity and Disaster Recovery Plan (BCP/DRP)  Assurance that all are adequately trained in secure operation Assurance that all are capable of utilizing security functionality relevant to their position in the organization
Analyzing: Making Smart Decisions A good decision about a given threat requires understanding the consequences and impacts Threat assessment – understanding the consequences Impact analysis – evaluating the strategy  Reporting – understanding the alternatives Authorizing – getting the go-ahead
Responding: Ensuring a Disciplined Response This function implements the authorized corrective action Factors that might influence the decision are: Resource constraints Difficulty, or unfeasibility of the response required All threats and vulnerabilities should be tracked and the resulting responses overseen A defined process is required to ensure that this is done accurately
Managing: Maintaining an Effective Process All information assurance processes as a routine function have to be: Planned Designed Administered Maintained Ensure that effective leadership vision and expertise is exercised at all times It oversees and coordinates the alignment process to maintain the best response to threats and changes in a dynamically changing situation
Implementation: Setting Up the Security of Operations Process Security of operations is founded on organization-wide policies, procedures, and countermeasures  Maintains the relevance and effectiveness of the infrastructure Specifies the approved methods and processes that will be followed to ensure security performance Should be embedded as part of day-to-day workplace functioning  Operational assessment is critical Methods and metrics used to track performance must be specified  Certifications must be used to judge proper execution
Operational Planning A formal security of operations plan is an important baseline document Acts as a point of reference in the evolution of events and day-to-day management Operationalizes and coordinates the elements of the security of operations function Organizes and focuses the effective deployment of resources Supports the budgeting process Makes the security objectives explicit Serves as a mechanism for assessing contractual and regulatory obligations Organizes technical and management response so that the right set of countermeasures is always in place
Operational Planning Operational security plan is built and maintained through eight stages
Steps for a Secure Operation Step 1: document the baseline  Step 2: determine the benchmarks Step 3: establish a security architecture Step 4: build awareness Step 5: deploy supporting technology Step 6: assess performance Step 7: specify how corrective action will be taken Step 8: enforce accountability
Operational Response Security of operations should ensure that an effective operational response in in place  It resolves problems as they appear Response is established and maintained by a plan Plan integrates the sensing, analyzing, and responding principles into a set of procedures that meet the security needs Pre-defined response ensures that an optimum solution is provided in a timely fashion Timeliness is underwritten by effective incident reporting
Operational Response Ensuring effective reporting and response Formal incident response team (IRT) or operational response team (ORT)  Ensuring timely reports Provides a description of both the type and estimated impact of the incident Ensuring timely response Incident reports should go to a single central coordinator or facilitator for confirmation analysis and subsequent action
Anticipating Potential Incidents Potential incidents include: Pre-attack probes Unauthorized access attempts Denial of service attempts Vulnerabilities in the infrastructure Reports are generic and result from routine data-gathering activity and analysis  Reports also result from analyses performed by the software Reports are generated by intrusion detection devices Operational event logging monitors events taking place within the system
Working with Active Incidents Always require an operational response Actions are dictated by circumstances requiring: Applying a technical patch Reconfiguration, or reinstallation of the system Change in policy and procedure Implementation of new enforcement mechanisms Operational response team: Contains the harm from an incident and prevents its reoccurrence Supervises the change to the target system through the configuration management process Performs the coordination and documentation activities needed
Ensuring Continuing Integrity: Configuration Management Formal procedure undertaken for change management Refers to the evolution of change to objects It is a critical component of security for two reasons: Predictable day-to-day functioning of systems Ability to detect unauthorized changes Maintains the integrity of the items under its control Allows for the evaluation and performance of management changes Establishes the integrity of the system
Human-based: Configuration Management Configuration manager role Processes all requests for change Manages the change authorization process Verifies that the change is complete Baseline manager role Identifies, accounts for, and maintains all configuration items with the identification scheme Establishes a baseline management ledger (BML)  Records all changes and promotions to baselines in this ledger Maintains libraries associated with it
Human-based: Configuration Management Verification manager role Confirms that items in the change management ledger conform to the identification scheme Verifies that changes have been carried out Conducts milestone reviews and audits Status accounting – ensures the continuing correct status of each baseline Changes at any level in the structure must be maintained at all levels
Human-based: Configuration Management Configuration management plan Builds a plan that lists the activities in the configuration management function including: The procedures to be followed during the configuration management process The schedule for routine activities The procedures for performing configuration management activity involving other organizations
Operational Housekeeping Operational housekeeping – ensures that routine information processing activities are performed securely Responsible for ensuring that the organization’s information is protected from common threats  Proactive measures such as periodic inspections and compliance audits Managerial concerns Ensuring that routine patches and repairs to equipment and facilities are performed
Preparing an Operational Procedure Manual Every organization has to compile, distribute, and update a procedure manual Details all required procedures to ensure continuous security of operations Should contain simple checklists providing clear directions for employees performing routine housekeeping Should ensure that the required steps are listed along with expected results, and a way to determine those results are accurate There should be a clear statement of the interrelationship between related procedures
Managing Security Patches Security patches should be in place so that: Software can be consistently updated and maintained to close vulnerabilities They are important safeguards and are a routine part of the security maintenance process Any operating system security update should be verified, tested, and installed immediately
Back Up Your Data, Back Up Your Job Backups are important housekeeping functions Support the recovery function Are essential prerequisites for business continuity Support the recovery point objective (RPO) in business continuity planning Other reasons could include: Hard drive failure Serious virus attack or other accidents  Based on a schedule dictated by operational circumstances
Enforcing Personal Security Discipline Personal security discipline implies that the staff members routinely follow approved security procedures  Steps need to be taken to ensure that routine activities are performed in a continuous and repeatable way Discipline is the key to ensuring that routine behaviors are performed Discipline hinges on people understanding the importance of routine security practices Education, training, and awareness function
Maintaining Your Software Software must be configured and operate without conflict Ensure safe and secure operation Provide essential automated security service Visible part of the process: Registry and file system utilities aligned correctly, interacting properly Running disk cleanups and performing hardware checks Security utilities Virus and spyware checkers and spam filters
Making Your Software Behave Software functionality is difficult to assure since software interactions occur within the computer Necessary to perform system integrity checks Assure that the registry files, applications, and system utilities are installed properly and working as designed Preventive maintenance should be routinely scheduled, coordinated, enforced, and reported through the information assurance function
Watching Your Back Have a set of operational procedures in place to secure application systems Procedures include system management responsibilities such as:  Ensuring that security functions are enabled on both user and administrative accounts Conducting software engineering procedures such as routine operational testing Including simple processes such as regularly ensuring that passwords are changed Checking system event logs periodically
Disposing of Assets in a Secure Manner A critical part of the day-to-day integrity of information is the secure disposal of media There must be rules for the secure erasure or destruction of electronic storage media Routine clear out of temporary files and temporary Internet cache files Use of modern shredders to dispose of paper copies In the case of especially sensitive material, the use of contracted destruction services Magnetic storage media such as floppies routinely degaussed or shredded prior to disposal
Locking Down Electronic Office Systems Ensure that e-mail and office automation systems are tightly controlled There is a need to develop and formalize a statement of what is and is not acceptable use This is called an acceptable use policy Serves as the formal basis for subsequent control
Defining Good Security Practice for an E-Mail System Defining, communicating, and enforcing good security practice in the daily operation of the e-mail system can prevent most violations Monitoring of acceptable use is frequently used in larger organizations and can be embedded in a software utility

Chapter005

  • 1.
    Chapter 5 MaintainingSecurity of Operations
  • 2.
    Objectives Establish routinesecurity of operation Create a dependable operational security process Ensure operational response to incidents
  • 3.
    Security of OperationsA critical part of information assurance lifecycle Ensures the integrity and performance Process involves actions such as: Ensuring that current operating procedures are properly aligned with organization’s security policies Monitoring performance of assigned security duties to confirm that they correspond to proper processes Defining and executing operational housekeeping processes to ensure that the security function continues to operate properly
  • 4.
    Aims: Aligning Purposewith Practice Information assurance goals must be satisfied for the organization to be secure Factors that can affect this process include changes in: People who use the system or their motivations Types of systems interconnected with the organization’s systems Type or sensitivity of data Way the organization does business or type of business the organization conducts Rigor and extent of information assurance objectives Organizational risk model and risk tolerance approach
  • 5.
    Aims: Aligning Purposewith Practice If information assurance goal is not being met The organization performs a risk assessment/risk mitigation process to decide how to meet it
  • 6.
    Threat Response: Keepingthe Organization on Its Toes Threat response is either proactive or reactive Proactive activities include Identification of threats and vulnerabilities Creation, assessment, and optimization of security solutions Implementation of controls to protect the software and the information Reactive activities include Detecting and reacting to external or internal intrusions or security violations in a timely manner
  • 7.
    Staying Alert: Elementsof the Operational Security Process Operational security process is composed of principles These principles represent the primary functions of the operational security process: Sensing Analyzing Responding Managing
  • 8.
    Sensing: Understanding theThreat Operational sensing is proactive Must be performed continuously Implemented and run by defined policies, procedures, tools, and standards Monitors, tests, and assesses the environment, to detect vulnerabilities and security violations Identifies and resolves threats as they arise Reviews monitor and evaluate management and end-user behavior
  • 9.
    Sensing: Understanding theThreat Security assurance requires documentary evidence of: Feasible information assurance and security perimeter Overall concept of standard operating procedure Generic operational testing and review plan Policies to ensure appropriate response to unexpected incidents Secure site plan Business Continuity and Disaster Recovery Plan (BCP/DRP) Assurance that all are adequately trained in secure operation Assurance that all are capable of utilizing security functionality relevant to their position in the organization
  • 10.
    Analyzing: Making SmartDecisions A good decision about a given threat requires understanding the consequences and impacts Threat assessment – understanding the consequences Impact analysis – evaluating the strategy Reporting – understanding the alternatives Authorizing – getting the go-ahead
  • 11.
    Responding: Ensuring aDisciplined Response This function implements the authorized corrective action Factors that might influence the decision are: Resource constraints Difficulty, or unfeasibility of the response required All threats and vulnerabilities should be tracked and the resulting responses overseen A defined process is required to ensure that this is done accurately
  • 12.
    Managing: Maintaining anEffective Process All information assurance processes as a routine function have to be: Planned Designed Administered Maintained Ensure that effective leadership vision and expertise is exercised at all times It oversees and coordinates the alignment process to maintain the best response to threats and changes in a dynamically changing situation
  • 13.
    Implementation: Setting Upthe Security of Operations Process Security of operations is founded on organization-wide policies, procedures, and countermeasures Maintains the relevance and effectiveness of the infrastructure Specifies the approved methods and processes that will be followed to ensure security performance Should be embedded as part of day-to-day workplace functioning Operational assessment is critical Methods and metrics used to track performance must be specified Certifications must be used to judge proper execution
  • 14.
    Operational Planning Aformal security of operations plan is an important baseline document Acts as a point of reference in the evolution of events and day-to-day management Operationalizes and coordinates the elements of the security of operations function Organizes and focuses the effective deployment of resources Supports the budgeting process Makes the security objectives explicit Serves as a mechanism for assessing contractual and regulatory obligations Organizes technical and management response so that the right set of countermeasures is always in place
  • 15.
    Operational Planning Operationalsecurity plan is built and maintained through eight stages
  • 16.
    Steps for aSecure Operation Step 1: document the baseline Step 2: determine the benchmarks Step 3: establish a security architecture Step 4: build awareness Step 5: deploy supporting technology Step 6: assess performance Step 7: specify how corrective action will be taken Step 8: enforce accountability
  • 17.
    Operational Response Securityof operations should ensure that an effective operational response in in place It resolves problems as they appear Response is established and maintained by a plan Plan integrates the sensing, analyzing, and responding principles into a set of procedures that meet the security needs Pre-defined response ensures that an optimum solution is provided in a timely fashion Timeliness is underwritten by effective incident reporting
  • 18.
    Operational Response Ensuringeffective reporting and response Formal incident response team (IRT) or operational response team (ORT) Ensuring timely reports Provides a description of both the type and estimated impact of the incident Ensuring timely response Incident reports should go to a single central coordinator or facilitator for confirmation analysis and subsequent action
  • 19.
    Anticipating Potential IncidentsPotential incidents include: Pre-attack probes Unauthorized access attempts Denial of service attempts Vulnerabilities in the infrastructure Reports are generic and result from routine data-gathering activity and analysis Reports also result from analyses performed by the software Reports are generated by intrusion detection devices Operational event logging monitors events taking place within the system
  • 20.
    Working with ActiveIncidents Always require an operational response Actions are dictated by circumstances requiring: Applying a technical patch Reconfiguration, or reinstallation of the system Change in policy and procedure Implementation of new enforcement mechanisms Operational response team: Contains the harm from an incident and prevents its reoccurrence Supervises the change to the target system through the configuration management process Performs the coordination and documentation activities needed
  • 21.
    Ensuring Continuing Integrity:Configuration Management Formal procedure undertaken for change management Refers to the evolution of change to objects It is a critical component of security for two reasons: Predictable day-to-day functioning of systems Ability to detect unauthorized changes Maintains the integrity of the items under its control Allows for the evaluation and performance of management changes Establishes the integrity of the system
  • 22.
    Human-based: Configuration ManagementConfiguration manager role Processes all requests for change Manages the change authorization process Verifies that the change is complete Baseline manager role Identifies, accounts for, and maintains all configuration items with the identification scheme Establishes a baseline management ledger (BML) Records all changes and promotions to baselines in this ledger Maintains libraries associated with it
  • 23.
    Human-based: Configuration ManagementVerification manager role Confirms that items in the change management ledger conform to the identification scheme Verifies that changes have been carried out Conducts milestone reviews and audits Status accounting – ensures the continuing correct status of each baseline Changes at any level in the structure must be maintained at all levels
  • 24.
    Human-based: Configuration ManagementConfiguration management plan Builds a plan that lists the activities in the configuration management function including: The procedures to be followed during the configuration management process The schedule for routine activities The procedures for performing configuration management activity involving other organizations
  • 25.
    Operational Housekeeping Operationalhousekeeping – ensures that routine information processing activities are performed securely Responsible for ensuring that the organization’s information is protected from common threats Proactive measures such as periodic inspections and compliance audits Managerial concerns Ensuring that routine patches and repairs to equipment and facilities are performed
  • 26.
    Preparing an OperationalProcedure Manual Every organization has to compile, distribute, and update a procedure manual Details all required procedures to ensure continuous security of operations Should contain simple checklists providing clear directions for employees performing routine housekeeping Should ensure that the required steps are listed along with expected results, and a way to determine those results are accurate There should be a clear statement of the interrelationship between related procedures
  • 27.
    Managing Security PatchesSecurity patches should be in place so that: Software can be consistently updated and maintained to close vulnerabilities They are important safeguards and are a routine part of the security maintenance process Any operating system security update should be verified, tested, and installed immediately
  • 28.
    Back Up YourData, Back Up Your Job Backups are important housekeeping functions Support the recovery function Are essential prerequisites for business continuity Support the recovery point objective (RPO) in business continuity planning Other reasons could include: Hard drive failure Serious virus attack or other accidents Based on a schedule dictated by operational circumstances
  • 29.
    Enforcing Personal SecurityDiscipline Personal security discipline implies that the staff members routinely follow approved security procedures Steps need to be taken to ensure that routine activities are performed in a continuous and repeatable way Discipline is the key to ensuring that routine behaviors are performed Discipline hinges on people understanding the importance of routine security practices Education, training, and awareness function
  • 30.
    Maintaining Your SoftwareSoftware must be configured and operate without conflict Ensure safe and secure operation Provide essential automated security service Visible part of the process: Registry and file system utilities aligned correctly, interacting properly Running disk cleanups and performing hardware checks Security utilities Virus and spyware checkers and spam filters
  • 31.
    Making Your SoftwareBehave Software functionality is difficult to assure since software interactions occur within the computer Necessary to perform system integrity checks Assure that the registry files, applications, and system utilities are installed properly and working as designed Preventive maintenance should be routinely scheduled, coordinated, enforced, and reported through the information assurance function
  • 32.
    Watching Your BackHave a set of operational procedures in place to secure application systems Procedures include system management responsibilities such as: Ensuring that security functions are enabled on both user and administrative accounts Conducting software engineering procedures such as routine operational testing Including simple processes such as regularly ensuring that passwords are changed Checking system event logs periodically
  • 33.
    Disposing of Assetsin a Secure Manner A critical part of the day-to-day integrity of information is the secure disposal of media There must be rules for the secure erasure or destruction of electronic storage media Routine clear out of temporary files and temporary Internet cache files Use of modern shredders to dispose of paper copies In the case of especially sensitive material, the use of contracted destruction services Magnetic storage media such as floppies routinely degaussed or shredded prior to disposal
  • 34.
    Locking Down ElectronicOffice Systems Ensure that e-mail and office automation systems are tightly controlled There is a need to develop and formalize a statement of what is and is not acceptable use This is called an acceptable use policy Serves as the formal basis for subsequent control
  • 35.
    Defining Good SecurityPractice for an E-Mail System Defining, communicating, and enforcing good security practice in the daily operation of the e-mail system can prevent most violations Monitoring of acceptable use is frequently used in larger organizations and can be embedded in a software utility