RaymondHuang
RaymondHuang
发布于 2025-08-26 / 0 阅读
0
0

Security Management

  • The overall process for managing security risk within an organization.

  • Several standards set out the process including accreditation(认证) and certification.

  • ISO/IEC 27001 is a standard that requires that an organization has:

    • Performed risk analysis to recognize their information assets and their associated information security risks based on threats, vulnerabilities, and impacts.

    • Designed and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment to address those risks.

    • Designed and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment to address those risks.

    • Adopted a management process to monitor, review and update risks and controls on an ongoing basis.

  • Other standards that are similar include Australia’s Protective Security Policy Framework (https://www.protectivesecurity.gov.au/) and NIST Cybersecurity Framework (https://www.nist.gov/cyberframework)

Establishing an ISMS(信息安全管理系统)

  • Many organisations implement an 27001-like security management system but unless you are doing it properly, i.e. to get certified

  • Although information security refers to non-digital assets, very few companies store non-digital information, Even if they use paper, it is archived digitally for example.

  • Security requirements come from 3 sources (ISO/IEC 27002):

    • Information security risks based on an organization's business strategy and objectives.

    • Legal, statutory(法定的), regulatory and contractual obligations.

    • The principles, objectives and business requirements for information processing that an organization has developed to support its operations.

Security Policy

  • Outlines an organizational approach to security through a set of policies that cover:

  • Internal organisation

    • Information security roles and responsibilities, segregation of duties, contact people.

  • Mobile devices and teleworking(远程办公).

  • Employment

    • Screening/onboarding, Information security awareness and training, disciplinary processes, termination.

  • Asset management

  • Media handling

  • Access control

    • User access management

    • System application access control

  • Cryptographic controls

  • Physical and environmental security

  • Operations security

  • Communications security

  • Systems acquisition, development and maintenance

  • Supplier relationships especially supply chain

  • Incident management

  • Business continuity

Risk Management

Assessing Risk

  • Qualitative (定性评估)

  • Quantitative (定量评估)

  • In both cases, need to understand:

    • The business itself

    • Assets of organisation

    • Threat analysis

    • Vulnerability assessment

Qualitative Risk Assessment (定性风险评估)

  • Uses a variety of techniques to assess risk:

    • Brainstorming

    • Delphi technique: anonymous question and answer technique (德菲儿问答,本质上是向企业主询问并获得答案)

    • Storyboarding (通过场景用例来分析)

    • Focus groups

    • Surveys/Questionnaires

    • Checklists

  • Can help in communication of risks but difficult to prioritise based on the range of values.

  • 进行定性风险评估的流程:

Open FAIR (定量风险评估)

  • FAIR is the Factor Analysis Information Risk adopted by the Open Group as an open standard

  • Quantitative risk analysis approach.

  • Main difference in this approach is that everything is expressed in probabilities and risk is:

    • Probable frequency and probable magnitude of loss

  • Vulnerability is the probability that a threat agent’s actions will result in a loss.

  • Controls are applied to risk and will reduce either

    • The frequency of threat actions

    • The magnitude(程度) of the loss

Risk Treatment

  • Once risks have been identified, they can be:

    • Reduced or mitigated

      • Use controls to reduce risk

    • Assigned or transferred

      • Transfer to a third party such as a cloud provider

      • Use cyberinsurance

    • Accepted

      • Accept the potential losses

    • Deterred (阻止)

      • Try and avoid the risk by using deterrences such as policies and warnings, security cameras, guards, fences, auditing etc.

    • Avoided

      • Change the business so that the risk is avoided. e.g. choose a different supplier or provider.

    • Rejected or ignored

      • Don’t accept the risk as being credible (dangerous move).

Risk Residual (剩余风险)

  • Once a risk is treated, the remaining risk is called residual risk.

  • So if total risk = threats × vulnerabilities × asset value

  • And the risk reduction from treatment is controlled risk(可控风险)

  • Then residual risk = total risk - controlled risk

Controls

  • Controls are applied to mitigate cybersecurity risk

  • Types:

    • Physical

    • Technical

    • Administrative

  • Functions

    • Preventative

    • Detective

    • Corrective

  • Technical Controls

    • Technical, or logical, controls are the use of hardware or software to manage access provide protection to assets.

    • Examples include:

      • Authentication methods

      • Encryption

      • Anti-malware software

      • IDPS

      • Firewalls

  • Administrative Controls

    • Organisation's policies and procedures defined by its security policies

    • Focus on personnel and business practices

    • Examples include:

      • Hiring practices

      • Security screening

      • Data classification and labelling

      • Security awareness training

  • Physical Controls

    • Physical controls that prevent, monitor or detect unauthorised access to assets.

    • Examples include:

      • Lock systems

      • CCTV

      • Swipe cards

      • Mantraps (类似旋转门,一次只允许一个人进入,防止尾随)

      • Alarms

  • Deterrent Controls (威慑控制)

    • Discourages violation of security policies through visible warnings and consequences for violators.

    • Examples include:

      • Security-awareness training

      • Locks

      • Fences

      • Security badges

      • Guards

      • Mantraps

      • Security cameras

  • Preventive Controls

    • A control that aims to stop violation of security policies. Whilst similar to deterrence, preventive controls are far harder to casually violate than deterrence.

    • Examples include:

      • Locks

      • Biometrics

      • Alarm systems

      • Separation of duties

      • Data classification

      • Penetration testing

      • Access-control methods

      • Encryption

      • Auditing

      • Security policies

      • Security-awareness training

      • Anti-malware software

      • Firewalls

      • IPS

  • Detective Controls

    • Detective controls are concerned with detecting or discovering malicious activity during or after it has occurred.

    • Examples:

      • Audit trails

      • Logging

      • IDS

      • Honeypots (and honeynets)

      • CCTV

  • Summary:

Security Operations

  • Need-to-know and Least Privilege

    • Aim is to keep secrets secret.

    • Grant users and systems access only to data and resources they need for their specific duties.

  • Separation of duties and responsibilities

    • Never put a single person in charge of an entire function

    • Includes putting cybersecurity responsibilities outside of IT

    • Don’t want the people implementing systems also checking them

  • Two-person control, Job rotation, mandatory vacations

  • Privileged account management

  • Change management

  • Personnel security

    • Security awareness training

    • Mobile device management

    • Working from home

  • Information management lifecycle

    • Creation, storage, use, archiving, destruction and purging

  • Hardware and software

    • Asset management

    • Protection of physical assets

    • Machine rooms: access, cooling and fire prevention

    • Virtual assets

    • Licensing and Software License Agreements


评论