HOME LAB : HANDS-ON
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Training will be 4 days and what will take away from this Training.
Two words on Knowledge and Skill.
Learning Objectives
Three pillars: Confidentiality, Integrity and Availability [CIA]
Means cannot be challenged by anybody.
Means unaltered information. Information cannot be changed in-between end to end.
Also need to secure the in-between facility which is processing the information.
How the information should be discarded.
Reduce Security incidents, increase staff retention, Protection of brand and reputation, reduce costs of correction, customer retention, etc
Why is Information security management important within the organization?
Stats:
What Needs to be managed in a Information Security Management system?
As an ISMS manager: just telling them to follow. Do not be a SME in Statutory field to implement ISMS. Show what are the list of Statutory and regulatory requirements you are adhered to.
working under other organization: - Policies, regulation, contractual terms will be passed on to the vendor organization also.
Top management should create and provide resources,
Create security Policy, security objectives
Directions:
As directed by your tutor, consider clause 5 and in particular sub-clause 5.1 and identify
which leadership/commitment behaviours and competencies, with respect to information
security management, you would expect from the organization provided
****************************************************************
Notes:
14 Security clause headings
35 security categories
114 controls
The statement of applicability is these are the control which will be used and not used. The justification has to be given why it is used and why not used, for treating the RISK in the organization.
Objective means: to achieve the target or goals
E.g., Objective
Top management will provide the support.
Clause 8 is also the DO part from PDCA
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
Problem Statement:
Organization A: An IT Support and Services Provider. The organization’s purpose is to provide IT support and hosting services to both public and private sector organizations.
Internal Issues:
Directions, Part 1:
Points Discussed:
Interested parties:
Customer
Top management
Employees
Internal Issues: -
Down time of the service should not exceed less than 1HR.
RISK:
Customer satisfaction going down
Financial loss
Appropriate access control to be provided for intended parties
RISK:
Confidentiality of the data not maintained.
Awareness of ISMS policy should not reduce less 95%.
RISK:
Not meeting the STD requirement of ISO27001
Reducing in Bandwidth of internet will impact
services.
RISK:
Availability of hosted services is impacted
External Issues: -
Zero security breaches in the Cloud Framework.
Adherence to Government norms for protecting data.
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit
9.3 Management review
Here Monitoring and measurement is done.
The Objectives which are identified earlier will be monitored and measured.
These audits internal and external are conducted
Documentation must be maintained
Internal Audit
Conformance and non – conformance
As an external auditor will look into the internal NC’s are reported and closed.
10.1 Nonconformity and corrective action
10.2 Continual improvement
Read the standards 27001 and 27002
Remaining activities to be completed
Annexure A has to be read.
A.5 Information security policies
A.5.1 Management direction for information security
A.5.1.1 Policies for information security
A.5.1.2 Review of the policies for information security
A.6 Organization of information security
A.6.1 Internal organization
A.6.1.1 Information security roles and responsibilities
A.6.1.2 Segregation of duties
A.6.1.3 Contact with authorities
A.6.1.4 Contact with special interest groups
A.6.1.5 Information security in project management
A.6.2 Mobile devices and teleworking
A.6.2.1 Mobile device policy
A.6.2.2 Teleworking
A.7 Human resource security
A.7.1 Prior to employment
A.7.1.1 Screening
A.7.1.2 Terms and conditions of employment
A.7.2 During employment
A.7.2.1 Management responsibilities
A.7.2.2 Information security awareness, education and training
A.7.2.3 Disciplinary process
A.7.3 Termination and change of employment
A.7.3.1 Termination or change of employment responsibilities
A.8 Asset management
A.8.1 Responsibility for assets
A.8.1.1 Inventory of assets
A.8.1.2 Ownership of assets
A.8.1.3 Acceptable use of assets
A.8.1.4 Return of assets
A.8.2 Information classification
A.8.2.1 Classification of information
*******************************************************************************
Gap analysis:
Top management interest
Understanding requirements. Legal and guidance.
Baseline review, Gantt chart & resource requirements
Approve & communicate implement plan
Baseline for awareness:
information related to Information Security management has to be made aware by making them take exams.
Baseline for competence:
Baseline is 30% must be implementer and rest 70% should be aware of ISMS
It is a Microsoft Project Plan and WBS.
E.g., for a bank one ISMS Manager would be recruited.
Fill in the gaps:
Implement and operate the plan
Any Improvement from filling the gap
Refer to the page 73 from the file [02 slide*.PDF]
Baseline creation / Review:
Identify the minimum document requirements
Baseline Gap analysis
Process: is the key for the organization to last for centuries
Plan : requirements: - Clause 4 Context of the org. / 5 leadership / 6 Planning / 7 Support
DO : implement: - Clause 8 Operation
Check : Audits/ gaps/ managements review: - Clause 9 Performance evaluation
Act : Results/ improvement: - Clause 10 Improvement
Required documented information
Control of documentation information
Exercises Activity 18: home work
Activity 19: Create Gantt Chart
Create a Excel and do the Gantt chart
Define the scope: Decide of the organization
Call Centre: 50 to 100 people will be working, for Airtel, dealing with customers of the Airtel
Telecom Company: SIM CARD
Department:
It Network Department, HR Department, Telecom regulatory, Physical Scope, Centre situated, Staff,
Core Business activities:
In bound: answering the question from the custom
Call centre 24/7
Scope:
Type of activities: Inbound
Locations: Pune, Chennai
Departments: It Network Department, HR Department, Telecom regulatory, Physical Scope, Centre situated, Staff,
Services: voice calls, SIM card delivery
Requirement from Leadership and Commitment
Info sec Policy and objectives
Integration of Info sec
Resources needed
Direction and supporting
Continual improvements.
Investment
Resources
Infrastructure
Defining and roles the responsibilities
Will show the intention of the organization and will be the driving force.
Roles, Responsibility and authorities: for an ISMS Manager
CIA on information assets
Risk criteria 🡪 Risk acceptance Criteria/ Criteria for performing
Asset Register
Cause
Sources
Statement of applicability
Activity 26 / 27 / 28 / 29: home work
****************************************************************
Awareness
Communications: Posters, Emails
Documented information
Documentation must be revisited every year, why?
The Organisation is called as Living or dynamic organization, hence there will be changes and documentation should reflect those changes.
Activity 30: Communication Process
What is the process? Certain input, to get desired output based on the certain steps
Who to communicate, when to, who shall, on what to…?
Process should have:
Input:
Steps:
Output:
Risk treatment Plan:
Security Incidents
Internal Audits
Consistency results
Monitoring
Measuring
Effectiveness of ISMS
Evaluation
Internal Audit
External Audit
Weekly check on Latest Windows Security patches whether installed in all the machines?
DRBC Plan is conducted every 6 moths
Performance Evaluation
Internal Audit
Management Review
Gap Analysis is also a type of Audit
Inputs 🡪 Audit activity 🡪Outputs
Three Things about Audit
Intent: means expectation
Implementation
Effectiveness
Positive Findings means Conformance.
Negative Findings means Non-Conformance.
As an Auditor you are not there to give any suggestions or do consulting
Also called as Aide Memory
Has Security been employed?
Scope: Physical Security
Leadership = guidance’s [leadership are Born]
Management = controls [Mangers are created]
Kotter’s 8 Steps to successful change.
1) Increase urgency - inspire people to move, make objectives real and relevant.
2) Build the guiding team - get the right people in place with the right emotional
commitment, and the right mix of skills and levels.
3) Get the vision right - get the team to establish a simple vision and strategy, focus on
emotional and creative aspects necessary to drive service and efficiency.
4) Communicate for buy-in - Involve as many people as possible, communicate the
essentials, simply, and to appeal and respond to people's needs. De-clutter
communications - make technology work for you rather than against.
5) Empower action - Remove obstacles, enable constructive feedback and lots of support
from leaders - reward and recognise progress and achievements.
6) Create short-term wins - Set aims that are easy to achieve - in bite-size chunks.
Manageable numbers of initiatives. Finish current stages before starting new ones.
7) Don't let up - Foster and encourage determination and persistence – on-going change -
encourage on-going progress reporting - highlight achieved and future milestones.
8) Make change stick - Reinforce the value of successful change via recruitment,
promotion, new change leaders. Weave change into culture.
Example:
Confidentiality and Integrity: the balance sheet will be
confidence till published to public. Once published Integrity becomes High and confidentiality becomes zero.
Controls are required to reduce the RISK.
****************************************************************
Day 05: Jun-2021:Why ISMS?
Improved security for the organization and its clients
Increase in the quality of information security processes and procedures
Clause 4: Context of Org
Clause 6: Planning
A risk assessment process should then be defined that identifies risks associated with the
loss of confidentiality, integrity and availability for information within the scope of the ISMS,
analyses the risks and then evaluates them
Clause 7: Support
Leadership will provide the support
Clause 8: Operation
Info sec Risk Assessment
Info sec Risk Treatment
Statement of Applicability: 114 Controls are present. When the controls are not applied, then the reason will be provided.
Clause 9: Performance evaluation
Internal Audits
Management Review
Clause 10: Improvement
Non-Conformity and corrective action
Continual Improvement
Implementation: of ISMS -
Determine the Need for Documentation
Baseline Gap Analysis
Project Plan: Gannt Chart
Scope of ISMS
Leadership Commitments and Roles, responsibility & Authorities.
Reduce/ Treat
Avoid/ Terminate
Accept/ Tolerate
Transfer/ share
Audit:
Intent
implement
Effectiveness
Non conformity reports
Management Review
Change Management
Comments
Post a Comment