SlideShare a Scribd company logo
1 of 28
Information Security Framework
Regulatory Compliance and Reporting
Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality
Security Structure
Policies
Technology-Independent Best Practices
Security,
Policies and Standards
Technology Physical Information
Asset Profile
Inventory, Ownership, Risk Assessment, Information Classification
Technology
Specifications
Virtual Private Network
Wireless Security
Platform Hardening
Intrusion Detection System
Security Event Management
PKI: Components & Applications
Business
Drivers
Business Strategies
Industry Regulations
Acceptable Risk
People &
Organizational
Management
Organizational Structure
Functional Definition
Roles and Responsibilities
Skills/Resource Plan
Security Architecture
Design, Deployment & Operations
Processes and
Operational Practices
Trust Management
Incident & Response Management
Identity & Access Mgmt
Key Management
Patch Management
Security Awareness/Education
Service Provider Management
Security Monitoring
Threat Management
Vulnerability Mgmt
Risk Management
3rd Party Security
Asset Management
Configuration Mgmt
Regulatory Compliance and Reporting
Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality
Security Structure
Policies
Technology-Independent Best Practices
Security,
Policies and Standards
Technology Physical Information
Asset Profile
Inventory, Ownership, Risk Assessment, Information Classification
Technology
Specifications
Virtual Private Network
Wireless Security
Platform Hardening
Intrusion Detection System
Security Event Management
PKI: Components & Applications
Business
Drivers
Business Strategies
Industry Regulations
Acceptable Risk
People &
Organizational
Management
Organizational Structure
Functional Definition
Roles and Responsibilities
Skills/Resource Plan
Security Architecture
Design, Deployment & Operations
Processes and
Operational Practices
Trust Management
Incident & Response Management
Identity & Access Mgmt
Key Management
Patch Management
Security Awareness/Education
Service Provider Management
Security Monitoring
Threat Management
Vulnerability Mgmt
Risk Management
3rd Party Security
Asset Management
Configuration Mgmt
Information Security Framework
Sarbanes Oxley (SOX)
Compliance with COSO Governance
Rules for SOX
Compliance
Network and System
Architecture and other Tools
to Protect SOX data
Event Management
Practices for Supporting
Operations on Systems
Hosting SOX related
applications
Practices for Monitoring the
Effectiveness of IT Controls
Identification of SOX
related data. and Where
it Resides
Security Impact of
Enterprise Network
and System
Architecture -
Vulnerabilities on
SOX supported
systems
Method to Monitor and
Maintain SOX
Compliance
Technology
Element of
Information and
Systems
Management
Regulatory Compliance and Reporting
Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality
Security Structure
Policies
Technology-Independent Best Practices
Security,
Policies and Standards
Technology Physical Information
Asset Profile
Inventory, Ownership, Risk Assessment, Information Classification
Technology
Specifications
Virtual Private Network
Wireless Security
Platform Hardening
Intrusion Detection System
Security Event Management
PKI: Components & Applications
Business
Drivers
Business Strategies
Industry Regulations
Acceptable Risk
People &
Organizational
Management
Organizational Structure
Functional Definition
Roles and Responsibilities
Skills/Resource Plan
Security Architecture
Design, Deployment & Operations
Processes and
Operational Practices
Trust Management
Incident & Response Management
Identity & Access Mgmt
Key Management
Patch Management
Security Awareness/Education
Service Provider Management
Security Monitoring
Threat Management
Vulnerability Mgmt
Risk Management
3rd Party Security
Asset Management
Configuration Mgmt
Information Security Framework
Gramm-Leach-Bliley Act
(GLBA) Compliance Risk Management, Efficiency Enhancement,
Business Process Enablement
Identification of PII
and Where It Resides
Rules for Using
and Protecting PII
Network and System
Architecture and other Tools
to Protect PII
Security Configuration and
Management of Systems
Hosting PII
Practices for Supporting
Operations (Tape Backup,
Application Execution,
Etc.) on Systems Hosting
PII
Roles, Responsibilities,
and Practices for Handling and
Using PII
Practices for Monitoring the
Security and Use of PII
Rule for Protection and
Use of Enterprise
Information
Identification of
Sensitive Business
Information such as
Legal, Financial,
Strategic, HR, Etc. and
Where it Resides
Security Impact of
Enterprise Network
and System
Architecture -
Vulnerabilities on
non-PII systems
may Expose PII
People Element of
Information and
Systems Management
Process Element of
Information and
Systems Management
Technology
Element of
Information and
Systems
Management
Method to Monitor and
Maintain Architecture
Integrity
Regulatory Compliance and Reporting
Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality
Security Structure
Policies
Technology-Independent Best Practices
Security,
Policies and Standards
Technology Physical Information
Asset Profile
Inventory, Ownership, Risk Assessment, Information Classification
Technology
Specifications
Virtual Private Network
Wireless Security
Platform Hardening
Intrusion Detection System
Security Event Management
PKI: Components & Applications
Business
Drivers
Business Strategies
Industry Regulations
Acceptable Risk
People &
Organizational
Management
Organizational Structure
Functional Definition
Roles and Responsibilities
Skills/Resource Plan
Security Architecture
Design, Deployment & Operations
Processes and
Operational Practices
Trust Management
Incident & Response Management
Identity & Access Mgmt
Key Management
Patch Management
Security Awareness/Education
Service Provider Management
Security Monitoring
Threat Management
Vulnerability Mgmt
Risk Management
3rd Party Security
Asset Management
Configuration Mgmt
Information Security Framework
Supervisor Control and
Data Acquisition (SCADA)
Best Practice
Understand the
business risk
Best Practice
Security Process Control
Establish Response
Capabilities
Practices for Supporting
Operations on Systems
Hosting SCADA related
applications
Identification of SCADA
related technology.
Security Impact of
Enterprise Network
and System
Architecture -
Vulnerabilities on
SCADA supported
systems
Manage Third Party
Risk
Technology
Element of
Information and
Systems
Management
Implement secure
architecture
Improve Awareness
and Skills
Regulatory Compliance and Reporting
Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality
Security Structure
Policies
Technology-Independent Best Practices
Security,
Policies and Standards
Technology Physical Information
Asset Profile
Inventory, Ownership, Risk Assessment, Information Classification
Technology
Specifications
Virtual Private Network
Wireless Security
Platform Hardening
Intrusion Detection System
Security Event Management
PKI: Components & Applications
Business
Drivers
Business Strategies
Industry Regulations
Acceptable Risk
People &
Organizational
Management
Organizational Structure
Functional Definition
Roles and Responsibilities
Skills/Resource Plan
Security Architecture
Design, Deployment & Operations
Processes and
Operational Practices
Trust Management
Incident & Response Management
Identity & Access Mgmt
Key Management
Patch Management
Security Awareness/Education
Service Provider Management
Security Monitoring
Threat Management
Vulnerability Mgmt
Risk Management
3rd Party Security
Asset Management
Configuration Mgmt
Information Security Framework
Payment Card Industry
(PCI) Compliance Info Security Policy
Identification of PCI
and Where It Resides
Rules for Using and
Protecting PCI Data
Network and System
Architecture and other Tools
to Protect PCI Data
Security Configuration and
Management of Systems
Hosting PCI Data
Vulnerability Management
Monitoring and Testing
Controls
Protect Card Holder
Data
Strong Access
Controls
Secure Network
Method to Monitor and
Maintain Architecture
Integrity
Technology
Element of
Information and
Systems
Management
Roles, Responsibilities,
and Practices for Handling and
Using PCI Data
• Confidentiality – Ensuring that only authorized
personnel have access to information
• Integrity – Ensuring that information is unchanged
and accurate
• Availability – Ensuring that information is available
to the user when it is needed
Confidentiality, Integrity and Availability
• Demonstrate support for, and commitment to,
information security
• States policy across the entire enterprise
• Broad statement of principle
• Long term; changed infrequently
• Few in overall number
• Provide overall direction for the organization
• Mandatory; require formal exception process
• Process and technology independent
• Require a high level of authority to create,
change or eliminate
Policies
• Suitable for complying with policies
• Specify a course of action
• Mandatory; require formal exception process
• Process and technology independent
• Mid-level authority required to create, change or
eliminate
Standards
• Process and/or technology dependent
• Require a low level of authority to create, change or
eliminate
• May have a high level of complexity
• Generally apply enterprise-wide, with some exceptions
locally
• May be situation-specific
• May require formal exception process
• They are detailed steps to be followed by users, system
operations personnel, or others to accomplish a
particular task (e.g., preparing new user accounts and
assigning the appropriate privileges).
Procedures / Guidelines
Policy, Standard, Procedure Framework
Policy, Standard, Procedure Framework
• Development: Planning and creation of the policy
• Review: Assessment of the policy by an independent party
• Approval: Authorizing implementation of the policy
• Communication: Dissemination of policy to enterprise
• Implementation: Initial execution of the policy
• Compliance Monitoring: Tracking and reporting on the
effectiveness
• Exception Approval: Evaluation, documentation and
tracking of exceptions
• Maintenance: Ensuring currency
Policy Management / Administration
 Provide simple, consistent and timely
classification and authorization processes
 Balance between protection of and access to an
organization’s business information
 Provide clear guidelines for employees and
contractors for the classification and handling of
information
Policy Management / Administration
 Maintain an inventory of assets, link those assets
to owners, and identify technologies supporting
key applications or groups of applications
 Enable organizations to track security controls
implemented to protect assets
 Monitor support of ongoing threats that may be
introduced to the asset environment
Asset Management – Asset Inventory
• Multi-tiered centrally managed approach to
Internet access
• All access to the Internet is controlled via
password protected proxy devices that filter
inappropriate content
• Third party connectivity is controlled via
connections to distinct network segments
• Connections to the enterprise network are only
made after a review of controls at connecting
organization
Security Architecture
Design, Deployment, Operations
• Network-based intrusion detection in place for all
external network connections
• Host-based intrusion detection in place for all
business critical servers
• Production data is strictly segmented from
development data
Security Architecture
Design, Deployment, Operations
• Multiple tiers of virus protection exist
• All email is filtered through a virus scanner
• All file servers and workstations are protected via a
managed (push-technology) virus protection solution
• Encryption Standards are employed consistently across
enterprise
• Only Standards Based Encryption is used
• Centralized Directory (LDAP) in use
Security Architecture
Design, Deployment, Operations
• Business Continuity Management
• Critical Business Process are identified and linked to
Applications
• Business Applications are linked to IT Disaster Recovery
Plans
• Incident Response
• Documented Incident Response Plans define roles and
actions
• Ensure proper control of information released to public
• Identity and Access Management
• Users are centrally managed
• Tools may assist in user provisioning
Processes and Operational Practices
• Trust Management
• Incident Reporting & Response Management
• Identity & Access Mgmt
• Key Management
• Patch Management
• Security Awareness/Education
• Service Provider Management
Processes and Operational Practices
• Security Monitoring
• Threat Management
• Vulnerability Mgmt
• Risk Management
• Service Party Security (i.e., Verizon, HP, CSC)
• Asset Management
• Configuration Mgmt
Processes and Operational Practices
• All Major Platforms are identified
• Minimum Security Baselines for Specific platforms in
use
• Technical Specifications for technologies created
before implementation
Technical Specifications
• Virtual Private Network
• Wireless Security
• Platform Hardening
• Intrusion Detection System
• Security Event Management
• PKI: Components & Applications
• Security and Privacy in Cloud Management
Technical Specifications
 Technical Security Standard for Unix (Solaris, Linux, AIX,
HPUX)
 Technical Security Standards for AS400
 Technical Security Standard for Firewalls
 Technical Security Standard for Routers
 Technical Security Standards for Oracle, SQL
 Technical Security Standards for Web Security
 Technical Security Standards for Citrix
 Technical Security Standards for Cryptography
 Technical Security Standards for System or Application
Development and Maintenance
 Technical Security Standards for Windows 2000, 2003, XP,
Vista
 Technical Security Standards for Wireless
Technical Specifications
• Security concerns are issues of corporate governance
• Identify and communicate high-level executive
sponsorship to manage information security risks
• Recognize information security as a business issue
that requires people, technology, policy, and process
to implement
Security Organization
• Structure is clearly defined and communicated in
leading organizations
• Reporting levels are appropriately aligned and have
appropriate authority
• Blends of both centralized and de-centralized
security structure
• De-centralized business unit or functional security
units are aligned with centralized corporate security
function
Security Organization - Structure
• Measures effectiveness of security program
• Gramm-Leach-Bliley Act (GLBA) Compliance
• Sarbanes Oxley (SOX) Compliance with COSO
• Payment Card Industry (PCI) Compliance
• Supervisor or Control and Data Acquisition (SCADA) Best Practice
• Conducts compliance reviews across all domains of
influence
• Reports across the enterprise
• Security audits performed on risk basis
• Goals have been defined for projects
Security Program Compliance and Reporting
 Determine the effectiveness and
maturity of a various business
supporting practices, processes,
and management
 Demonstrates where you
are in the security
lifecycle
 Organization will be able to
visualize
– Exceeding expectations
– Meeting requirements
– Gaps in business needs
Information Security Lifecycle
Questions
GSSFZE@outlook.com
Skype: GSSFZE

More Related Content

Similar to Information Security Framework

Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwgJohn M. Kennedy
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide shareSunera
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governancejkllee
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governancejkllee
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanationindianadvisory
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need LR_Yanus
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introductionSeccuris Inc.
 

Similar to Information Security Framework (20)

Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanation
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
it grc
it grc it grc
it grc
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introduction
 

Recently uploaded

Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New GirlfriendDubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriendkajalvid75
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budgetkumargunjan9515
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...Sareena Khatun
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...
Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...
Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...Escortgram India
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理F
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理SS
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirtrahman018755
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 

Recently uploaded (20)

Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New GirlfriendDubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...
Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...
Independent Escorts & Call Girls In Aerocity Delhi - 9758998899 - Escortgram ...
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 

Information Security Framework

  • 1. Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality Security Structure Policies Technology-Independent Best Practices Security, Policies and Standards Technology Physical Information Asset Profile Inventory, Ownership, Risk Assessment, Information Classification Technology Specifications Virtual Private Network Wireless Security Platform Hardening Intrusion Detection System Security Event Management PKI: Components & Applications Business Drivers Business Strategies Industry Regulations Acceptable Risk People & Organizational Management Organizational Structure Functional Definition Roles and Responsibilities Skills/Resource Plan Security Architecture Design, Deployment & Operations Processes and Operational Practices Trust Management Incident & Response Management Identity & Access Mgmt Key Management Patch Management Security Awareness/Education Service Provider Management Security Monitoring Threat Management Vulnerability Mgmt Risk Management 3rd Party Security Asset Management Configuration Mgmt
  • 2. Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality Security Structure Policies Technology-Independent Best Practices Security, Policies and Standards Technology Physical Information Asset Profile Inventory, Ownership, Risk Assessment, Information Classification Technology Specifications Virtual Private Network Wireless Security Platform Hardening Intrusion Detection System Security Event Management PKI: Components & Applications Business Drivers Business Strategies Industry Regulations Acceptable Risk People & Organizational Management Organizational Structure Functional Definition Roles and Responsibilities Skills/Resource Plan Security Architecture Design, Deployment & Operations Processes and Operational Practices Trust Management Incident & Response Management Identity & Access Mgmt Key Management Patch Management Security Awareness/Education Service Provider Management Security Monitoring Threat Management Vulnerability Mgmt Risk Management 3rd Party Security Asset Management Configuration Mgmt Information Security Framework Sarbanes Oxley (SOX) Compliance with COSO Governance Rules for SOX Compliance Network and System Architecture and other Tools to Protect SOX data Event Management Practices for Supporting Operations on Systems Hosting SOX related applications Practices for Monitoring the Effectiveness of IT Controls Identification of SOX related data. and Where it Resides Security Impact of Enterprise Network and System Architecture - Vulnerabilities on SOX supported systems Method to Monitor and Maintain SOX Compliance Technology Element of Information and Systems Management
  • 3. Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality Security Structure Policies Technology-Independent Best Practices Security, Policies and Standards Technology Physical Information Asset Profile Inventory, Ownership, Risk Assessment, Information Classification Technology Specifications Virtual Private Network Wireless Security Platform Hardening Intrusion Detection System Security Event Management PKI: Components & Applications Business Drivers Business Strategies Industry Regulations Acceptable Risk People & Organizational Management Organizational Structure Functional Definition Roles and Responsibilities Skills/Resource Plan Security Architecture Design, Deployment & Operations Processes and Operational Practices Trust Management Incident & Response Management Identity & Access Mgmt Key Management Patch Management Security Awareness/Education Service Provider Management Security Monitoring Threat Management Vulnerability Mgmt Risk Management 3rd Party Security Asset Management Configuration Mgmt Information Security Framework Gramm-Leach-Bliley Act (GLBA) Compliance Risk Management, Efficiency Enhancement, Business Process Enablement Identification of PII and Where It Resides Rules for Using and Protecting PII Network and System Architecture and other Tools to Protect PII Security Configuration and Management of Systems Hosting PII Practices for Supporting Operations (Tape Backup, Application Execution, Etc.) on Systems Hosting PII Roles, Responsibilities, and Practices for Handling and Using PII Practices for Monitoring the Security and Use of PII Rule for Protection and Use of Enterprise Information Identification of Sensitive Business Information such as Legal, Financial, Strategic, HR, Etc. and Where it Resides Security Impact of Enterprise Network and System Architecture - Vulnerabilities on non-PII systems may Expose PII People Element of Information and Systems Management Process Element of Information and Systems Management Technology Element of Information and Systems Management Method to Monitor and Maintain Architecture Integrity
  • 4. Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality Security Structure Policies Technology-Independent Best Practices Security, Policies and Standards Technology Physical Information Asset Profile Inventory, Ownership, Risk Assessment, Information Classification Technology Specifications Virtual Private Network Wireless Security Platform Hardening Intrusion Detection System Security Event Management PKI: Components & Applications Business Drivers Business Strategies Industry Regulations Acceptable Risk People & Organizational Management Organizational Structure Functional Definition Roles and Responsibilities Skills/Resource Plan Security Architecture Design, Deployment & Operations Processes and Operational Practices Trust Management Incident & Response Management Identity & Access Mgmt Key Management Patch Management Security Awareness/Education Service Provider Management Security Monitoring Threat Management Vulnerability Mgmt Risk Management 3rd Party Security Asset Management Configuration Mgmt Information Security Framework Supervisor Control and Data Acquisition (SCADA) Best Practice Understand the business risk Best Practice Security Process Control Establish Response Capabilities Practices for Supporting Operations on Systems Hosting SCADA related applications Identification of SCADA related technology. Security Impact of Enterprise Network and System Architecture - Vulnerabilities on SCADA supported systems Manage Third Party Risk Technology Element of Information and Systems Management Implement secure architecture Improve Awareness and Skills
  • 5. Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory, service provider) Program Quality Security Structure Policies Technology-Independent Best Practices Security, Policies and Standards Technology Physical Information Asset Profile Inventory, Ownership, Risk Assessment, Information Classification Technology Specifications Virtual Private Network Wireless Security Platform Hardening Intrusion Detection System Security Event Management PKI: Components & Applications Business Drivers Business Strategies Industry Regulations Acceptable Risk People & Organizational Management Organizational Structure Functional Definition Roles and Responsibilities Skills/Resource Plan Security Architecture Design, Deployment & Operations Processes and Operational Practices Trust Management Incident & Response Management Identity & Access Mgmt Key Management Patch Management Security Awareness/Education Service Provider Management Security Monitoring Threat Management Vulnerability Mgmt Risk Management 3rd Party Security Asset Management Configuration Mgmt Information Security Framework Payment Card Industry (PCI) Compliance Info Security Policy Identification of PCI and Where It Resides Rules for Using and Protecting PCI Data Network and System Architecture and other Tools to Protect PCI Data Security Configuration and Management of Systems Hosting PCI Data Vulnerability Management Monitoring and Testing Controls Protect Card Holder Data Strong Access Controls Secure Network Method to Monitor and Maintain Architecture Integrity Technology Element of Information and Systems Management Roles, Responsibilities, and Practices for Handling and Using PCI Data
  • 6. • Confidentiality – Ensuring that only authorized personnel have access to information • Integrity – Ensuring that information is unchanged and accurate • Availability – Ensuring that information is available to the user when it is needed Confidentiality, Integrity and Availability
  • 7. • Demonstrate support for, and commitment to, information security • States policy across the entire enterprise • Broad statement of principle • Long term; changed infrequently • Few in overall number • Provide overall direction for the organization • Mandatory; require formal exception process • Process and technology independent • Require a high level of authority to create, change or eliminate Policies
  • 8. • Suitable for complying with policies • Specify a course of action • Mandatory; require formal exception process • Process and technology independent • Mid-level authority required to create, change or eliminate Standards
  • 9. • Process and/or technology dependent • Require a low level of authority to create, change or eliminate • May have a high level of complexity • Generally apply enterprise-wide, with some exceptions locally • May be situation-specific • May require formal exception process • They are detailed steps to be followed by users, system operations personnel, or others to accomplish a particular task (e.g., preparing new user accounts and assigning the appropriate privileges). Procedures / Guidelines
  • 12. • Development: Planning and creation of the policy • Review: Assessment of the policy by an independent party • Approval: Authorizing implementation of the policy • Communication: Dissemination of policy to enterprise • Implementation: Initial execution of the policy • Compliance Monitoring: Tracking and reporting on the effectiveness • Exception Approval: Evaluation, documentation and tracking of exceptions • Maintenance: Ensuring currency Policy Management / Administration
  • 13.  Provide simple, consistent and timely classification and authorization processes  Balance between protection of and access to an organization’s business information  Provide clear guidelines for employees and contractors for the classification and handling of information Policy Management / Administration
  • 14.  Maintain an inventory of assets, link those assets to owners, and identify technologies supporting key applications or groups of applications  Enable organizations to track security controls implemented to protect assets  Monitor support of ongoing threats that may be introduced to the asset environment Asset Management – Asset Inventory
  • 15. • Multi-tiered centrally managed approach to Internet access • All access to the Internet is controlled via password protected proxy devices that filter inappropriate content • Third party connectivity is controlled via connections to distinct network segments • Connections to the enterprise network are only made after a review of controls at connecting organization Security Architecture Design, Deployment, Operations
  • 16. • Network-based intrusion detection in place for all external network connections • Host-based intrusion detection in place for all business critical servers • Production data is strictly segmented from development data Security Architecture Design, Deployment, Operations
  • 17. • Multiple tiers of virus protection exist • All email is filtered through a virus scanner • All file servers and workstations are protected via a managed (push-technology) virus protection solution • Encryption Standards are employed consistently across enterprise • Only Standards Based Encryption is used • Centralized Directory (LDAP) in use Security Architecture Design, Deployment, Operations
  • 18. • Business Continuity Management • Critical Business Process are identified and linked to Applications • Business Applications are linked to IT Disaster Recovery Plans • Incident Response • Documented Incident Response Plans define roles and actions • Ensure proper control of information released to public • Identity and Access Management • Users are centrally managed • Tools may assist in user provisioning Processes and Operational Practices
  • 19. • Trust Management • Incident Reporting & Response Management • Identity & Access Mgmt • Key Management • Patch Management • Security Awareness/Education • Service Provider Management Processes and Operational Practices
  • 20. • Security Monitoring • Threat Management • Vulnerability Mgmt • Risk Management • Service Party Security (i.e., Verizon, HP, CSC) • Asset Management • Configuration Mgmt Processes and Operational Practices
  • 21. • All Major Platforms are identified • Minimum Security Baselines for Specific platforms in use • Technical Specifications for technologies created before implementation Technical Specifications
  • 22. • Virtual Private Network • Wireless Security • Platform Hardening • Intrusion Detection System • Security Event Management • PKI: Components & Applications • Security and Privacy in Cloud Management Technical Specifications
  • 23.  Technical Security Standard for Unix (Solaris, Linux, AIX, HPUX)  Technical Security Standards for AS400  Technical Security Standard for Firewalls  Technical Security Standard for Routers  Technical Security Standards for Oracle, SQL  Technical Security Standards for Web Security  Technical Security Standards for Citrix  Technical Security Standards for Cryptography  Technical Security Standards for System or Application Development and Maintenance  Technical Security Standards for Windows 2000, 2003, XP, Vista  Technical Security Standards for Wireless Technical Specifications
  • 24. • Security concerns are issues of corporate governance • Identify and communicate high-level executive sponsorship to manage information security risks • Recognize information security as a business issue that requires people, technology, policy, and process to implement Security Organization
  • 25. • Structure is clearly defined and communicated in leading organizations • Reporting levels are appropriately aligned and have appropriate authority • Blends of both centralized and de-centralized security structure • De-centralized business unit or functional security units are aligned with centralized corporate security function Security Organization - Structure
  • 26. • Measures effectiveness of security program • Gramm-Leach-Bliley Act (GLBA) Compliance • Sarbanes Oxley (SOX) Compliance with COSO • Payment Card Industry (PCI) Compliance • Supervisor or Control and Data Acquisition (SCADA) Best Practice • Conducts compliance reviews across all domains of influence • Reports across the enterprise • Security audits performed on risk basis • Goals have been defined for projects Security Program Compliance and Reporting
  • 27.  Determine the effectiveness and maturity of a various business supporting practices, processes, and management  Demonstrates where you are in the security lifecycle  Organization will be able to visualize – Exceeding expectations – Meeting requirements – Gaps in business needs Information Security Lifecycle