Cyber Security
Cyber Security
A few incidents
✓ Hillary Clinton e-mail server ; DNC HQ
✓ Erin Brockovich – how she gets access to data
✓ HSBC Switzerland , Panama Papers
✓ Watergate Scandal- Nixon tapes
✓ Bangladesh Bank Robbery – Billion dollars
✓ Aadhaar debate
✓ RG Twitter account
Multiple 25%
Insider’s misuse
How do they happen?
How do they happen?
How come easily preventable threats still materialize?????
Software code
Configuration settings
IoT signals
Paper
Voice etc.
Cybersecurity and Information security
Cybersecurity - Importance
✓ Privacy and Safety
✓ Financial
✓ IP Rights
✓ Compliance with regulations
✓ Reputation
✓ Competitive performance
✓ Impact on Customers
✓ Product Liability
✓ Impact on Society
Cybersecurity - Regulations
✓ IT Act 2000/amended 2008
✓ RBI – Gopalakrishna Committee Recommendations
✓ US – Health Insurance Portability and Accountability Act (HIPAA)
✓ US - Sarbanes-Oxley Act
✓ GDPR
Cybersecurity – Key Issue
✓ Senior management is NOT technically qualified, nor have the time
✓ But are expected to be accountable to government , customers and the
public on cybersecurity
✓ Cybersecurity Strategy
✓ Cybersecurity Management Framework
Cybersecurity – Strategy
An overall strategy for providing security
✓ Policy (specs): what security schemes are supposed to do
▪ Assets and their values
▪ Potential threats
▪ Ease of use vs security
▪ Cost of security vs cost of failure/recovery
✓ Implementation/mechanism: how to enforce
▪ Prevention
▪ Detection
▪ Response
▪ Recovery
✓ Correctness/assurance: does it really work (validation/review)
Cybersecurity – Frameworks
✓ NIST ( National Institute of Standards and Technology) - US
✓ ISO – International
ISO 27001 & 27002
ISO 27000 is a series of international standards all related to information
security.
The ISO 27001 standard has an organizational focus and details
requirements against which an organization’s ISMS (Information Security
Management System), can be audited.
ISO 27001 is a management system standard and therefore establishes
specific requirements in which it can be certified by a third party accredited
registrar.
If an organization wants to certify its Information Security Management
System (ISMS) it needs to comply with all requirements in ISO 27001.
Why ISO 27001?
✓ Framework that accounts for all legal and regulatory requirements
Annexure –A
11 Domains
39 Control Objectives
133 Controls
ISO 27001 Standard
ISO 27001 - Evolution of the standard
▪ ISO 27000 consists of a range of individual standards and documents
▪ ISO 27001 was published in 2005, replacing BS 7799-2 standard
▪ It enhanced the content of the previous version
▪ Harmonization with other standards
▪ Helps organization to establish and maintain an Information Security
Management System
PDCA
• Implement improvements
ACT
ACT PLAN • Define ISMS scope
• Corrective actions PLAN
Maintain, • Define policy
• Preventative actions Maintain, Establish
Establish • Identify risks
• Communicate with Improve the
Improve
ISMS theISMS
the ISMS • Assess risks
stakeholders
the ISMS • Select control objectives
Asset Management
Access Control
Compliance
Key Context 1 – Security Policy
Control Aspects
Documenting the InfoSec policy
Reviewing the Infosec policy
Key Context 2 – organization of information security
Control Aspects
• Management commitment of • Contact with special interest
InfoSec groups
• InfoSec coordination • Reviewing InfoSec in an
• Allocating InfoSec responsibilities independent manner
• Authorization of information • Identifying risks related to the
processing facilities external parties
• Protecting confidentiality in • Security care in customer
agreements interactions
• Contact with authorities • Approach to handling security in
third-party agreements
Key Context 3 – Asset Management
Control Aspects
▪ Assets inventory
▪ Asset ownership
▪ Using assets in an acceptable manner
▪ Guidelines for classification
▪ Labelling and handling of information
Key Context 4 – security of HR
Control Aspects • Education and training for InfoSec
• Roles and responsibilities awareness
• Screening • Disciplinary process
• Terms and conditions of • Termination of responsibilities
employment • Return of assets
• Responsibilities of management • Removal of access rights
Key Context 5 – physical and environmental security
Control Aspects
▪ Physical security perimeter ▪ Protection of equipment
▪ Control at physical entry points ▪ Supporting utilities
▪ Securing offices, rooms and ▪ Security of cabling, power and
facilities telecommunications cabling data
▪ Protection from external and or supporting information services
environmental threats ▪ Maintenance of equipment off-
▪ Physical protection and guidelines premises
for working ▪ Secure disposal of reuse of
▪ Public access, delivery and loading equipment
area ▪ Removal of property
Key Context 6 – Communications and operations management
Control Aspects
▪ Operating procedure ▪ Monitoring and review of third
documentation party services
▪ Change management ▪ Managing changes to third party
▪ Segregation of duties (SoD) services
▪ Separation of facilities for ▪ Capacity management
development, testing and ▪ System acceptance
operations ▪ Controls against malicious code
▪ Service delivery
Key Context 6 – Communications and operations management
Control Aspects
▪ Controls against mobile code ▪ Policies and procedures for
▪ Information backup information exchange
▪ Network controls ▪ Exchange agreements
▪ Security of network services ▪ Protecting physical media in
transit
▪ Management of removal media
▪ Electronic messaging security
▪ Disposal of media
▪ Information handling procedures
▪ Securing systems documentation
Key Context 6 – Communications and operations management
Control Aspects
▪ Business IS ▪ Fault logging
▪ E-Commerce ▪ Clock synchronization
▪ Online transactions
▪ Publicly available information
▪ Audit logging
▪ System usage monitoring
▪ Protecting information log
▪ Administrator and operator log
Key Context 7 – Access control
Control Aspects
▪ Access control policy ▪ Clear desk and clear screen
▪ Registration of users policy
▪ Managing user privileges ▪ Policy for use of network
services
▪ Managing user passwords
▪ User authentication for external
▪ Review of user access rights connections
▪ Usage of passwords ▪ Network equipment
▪ Unattended user equipment identification
Key Context 7 – Access control
Control Aspects
▪ Control of network connection ▪ Limitation of connection time
▪ Control of network routing ▪ Information access restrictions
▪ System log-on procedure ▪ Isolation of sensitive systems
▪ Identification and authentication ▪ Securing mobile computing and
of users teleworking
▪ System for managing password ▪ Teleworking policy
▪ Use of system facilities
▪ Session of time-out
Key Context 8 – information systems acquisitions development and
maintenance
Control Aspects
▪ Security requirement analysis and ▪ Access control to program source
specification code
▪ Input data validation ▪ Change control procedure
▪ Internal processing controls ▪ Technical review of applications
▪ Maintaining message integrity after OS changes
▪ Output data validation ▪ Restrictions on changes to
software packages
▪ Policy on the use of cryptographic ▪ Protection of information leakage
controls
▪ Key management ▪ Control over outsources software
development
▪ Control of operational software ▪ Control of technical vulnerabilities
▪ Protection of system test data
Key Context 9 – information security incident management
Control Aspects
▪ Reporting InfoSec events
▪ Reporting security weaknesses
▪ Responsibilities and procedures
▪ Learning from InfoSec incidents
▪ Collecting evidence
Key Context 10 – business continuity management
Control Aspects
▪ Integrating InfoSec with BCP
▪ Business continuity and risk awareness
▪ Development and implementation of BCP integrated with InfoSec
▪ BCP framework
▪ Testing, maintaining and re-accessing business continuity plan
Key Context 11 – compliance
Control Aspects
▪ Identification of applicable legislations
▪ Intellectual property rights (IPR)
▪ Protection of organizational records
▪ Data protection and privacy of personal information (PI)
▪ Prevention and misuse of IPF
▪ Regulation of cryptographic controls
▪ Compliance with security policy and standards
▪ Technical compliance checking
▪ Information systems and considerations
▪ Protection of IS and audit tools
STEPS FOR ISO 27001 IMPLEMENTATION
Step 1: Identify objective of the business
• To provide security to data and information thereby increasing the value
of the organization for its stakeholders
Business Asset
Continuity
Management
Information Classification
and Control
Security
Management Personnel
System
Development System Security / HR
Security
Physical &
Access Control
Environmental
Communicatio
ns &
Operations
NIST – US President Executive Order
Function Category ID
Asset Management ID.AM
Business Environment ID.BE
What processes and assets Governance ID.GV
Identify
need protection? Risk Assessment ID.RA
Risk Management Strategy ID.RM
Access Control PR.AC
Awareness and Training PR.AT
What safeguards are Data Security PR.DS
Protect Information Protection Processes & Procedures PR.IP
available?
Maintenance PR.MA
Protective Technology PR.PT
Anomalies and Events DE.AE
What techniques can
Detect Security Continuous Monitoring DE.CM
identify incidents? Detection Processes DE.DP
Response Planning RS.RP
What techniques can Communications RS.CO
contain impacts of Respond Analysis RS.AN
incidents? Mitigation RS.MI
Improvements RS.IM
Recovery Planning RC.RP
What techniques can
Recover Improvements RC.IM
restore capabilities? Communications RC.CO
Cybersecurity – C I A
Confidentiality:
Data confidentiality: Assures that confidential information is not disclosed to
unauthorized individuals
Privacy: Assures that individual control or influence what information may be
collected and stored
Integrity:
Data integrity: assures that information and programs are changed only in a
specified and authorized manner
System integrity: Assures that a system performs its operations in unimpaired
manner
Availability:
Assure that systems works promptly and service is not denied to authorized users
InfoSec – C I A Triad
Other Considerations :
✓ Non-repudiation
✓ Accountability
✓ Auditability
✓ Consistency
✓ Freshness
✓ Usable format
✓ Reliability
Some key terms
CIA Triad
Threat
Vulnerability
Control
Governance
Compliance, Legal Requirements
Audit
Policies, Standards
Incident Management, RCA
Disaster readiness
Organisation for Cybersecurity management
Information Security
Security in Cloud , Mobile and partner systems
Basic Cybersecurity Model
Basic Cybersecurity Model
which are endangered by Threats exploit
Vulnerabili
Assets ties
Safeguards Exposure
- Encryption concepts
- Digital signatures
- Crpytanalytic attacks
- Public Key Infrastructure (PKI)
- Information hiding alternatives
Attack Surfaces
• Attack surface: the reachable and exploitable vulnerabilities in a system
– Open ports
– Services outside a firewall
– An employee with access to sensitive info
– …
• Three categories
– Network attack surface (i.e., network vulnerability)
– Software attack surface (i.e., software vulnerabilities)
– Human attack surface (e.g., social engineering)
• Attack analysis: assessing the scale and severity of threats
Security Design Principles
✓ Economy of mechanism: The design of security measures should be as
simple as possible
✓ Simpler to implement and to verify
✓ Fewer vulnerabilities
✓ Fail-safe default: Access decisions should be based on permissions; i.e.,
the default is lack of access
✓ Complete mediation: Every access should checked against an access
control system
✓ Open design: The design should be open rather than secret (e.g.,
encryption algorithms)
Security Design Principles
✓ Isolation
✓ Public access should be isolated from critical resources (no
connection between public and critical information)
✓ Users files should be isolated from one another (except when
desired)
✓ Security mechanism should be isolated (i.e., preventing access to
those mechanisms)
✓ Encapsulation: Similar to object concepts (hide internal structures)
✓ Modularity: Modular structure
✓ Separation of privilege: Multiple privileges should be needed to do
achieve access (or complete a task)
Security Design Principles
✓ Least privilege: Every user (process) should have the least privilege to
perform a task
✓ Least common mechanism: A design should minimize the function
shared by different users (providing mutual security; reduce deadlock)
✓ Psychological acceptability: Security mechanisms should not interfere
unduly with the work of users
✓ Layering (defense in depth): Use of multiple, overlapping protection
approaches
✓ Least astonishment: A program or interface should always respond in a
way that is least likely to astonish a user
Cyber Security – Essential practices
10 Most Important Risks and Mitigation
Overreliance on security monitoring software:
Mitigation strategy: Understand and use a diverse portfolio of monitoring tools.
Inadequate system logging:
Mitigation strategy: Consider third-party software that allows you to refine the logging process
and alert your personnel to significant incidents and events. Combined with a well-managed
SEIM tool (see caveat above), strong logging practices can help diversify your system defences.
Technology innovations that outpace security:
Mitigation strategy: Follow a “non-first adopter” policy and allow the software to prove itself
for six months to a year before using the product. For organizations that develop software, we
encourage you to keep a specific focus on security from the start of the development process.
Outdated operating systems:
Mitigation strategy: Track and plan for these major system changes to prevent systems from
running unsupported software.
10 Most Important Risks and Mitigation
Lack of encryption:
Mitigation strategy: Use third-party software tools to aid with encryption. These tools can scan
outbound emails for sensitive data and require the sender to use a secure file load site or to
encrypt the data before transmission. Laptop hard drives should have hard-drive encryption that
only unlocks the data after a user successfully logs into the device.
Data on user-owned mobile device
Mitigation strategy: Third-party applications allow for each user to have a “sandbox” of data (a
secured segment of your organization’s information accessible to your mobile device), including
email and files stored in a secure directory on your organization’s system.
IT “diplomatic immunity” within your organization :
Mitigation strategy: Complete user reviews of accounts and settings at least twice per year by
Independent auditors.
10 Most Important Risks and Mitigation
Lack of management support:
Mitigation strategy: Educate and encourage members of management who understand the need to
protect systems and are able to communicate that need throughout the organization.
Challenges recruiting and retaining qualified IT staff:
Mitigation strategy: Focus on capabilities, training, and retention to reduce turnover and develop a strong
IT security team.
Segregation of duties:
Mitigation strategy: Security should belong to a dedicated role, such as a Security Analyst or Chief
Information Security Officer