Chapter 5: Information Security Maintenance
Chapter 5: Information Security Maintenance
Developing a comprehensive list of all the possible dynamic factors in an organization’s environment is beyond the scope of this
text. However, some changes that may affect an organization’s information security environment are the following:
The acquisition of new assets and the divestiture of old assets
The emergence of vulnerabilities associated with the new or existing assets
Shifting business priorities
The formation of new partnerships
The dissolution of old partnerships
The departure of personnel who are trained, educated, and aware of policies,
procedures, and technologies
The hiring of personnel
The following sections describe the monitoring actions for each of the thirteen information security areas. This
information is adapted from SP 800-100.
1. INFORMATION SECURITY GOVERNANCE. An effective information security governance program
requires constant review. Agencies should monitor the status of their programs to ensure that:
Ongoing information security activities are providing appropriate support to the agency mission
Policies and procedures are current and aligned with evolving technologies, if appropriate
Controls are accomplishing their intended purpose
3. AWARENESS AND TRAINING. Once the program has been implemented, processes must be put in
place to monitor compliance and effectiveness. An automated tracking system should be designed to capture
key information on program activity (e.g., courses, dates, audience, costs, sources). The tracking system
should capture this data at an agency level, so it can be used to provide enterprise-wide analysis and
reporting regarding awareness, training, and education initiatives.
4. CAPITAL PLANNING AND INVESTMENT CONTROL. Increased competition for limited resources
requires that departments allocate available funding toward their highest-priority information security
investments to afford the organization, and its systems and data, the appropriate degree of security for their
needs. This goal can be achieved through a formal enterprise capital planning and investment control (CPIC)
process designed to facilitate and control the expenditure of agency funds.
Metrics are tools that support decision making. Like experience, external mandates, and strategies, metrics
are one element of a manager’s toolkit for making and substantiating decisions. Metrics are used to answer
three basic questions:
“Am I implementing the
tasks for which I am
responsible?”
“How efficiently or
effectively am I
accomplishing those
tasks?”
“What impact are those
tasks having on the
mission?”
7. SECURITY PLANNING. Planning is one of the most crucial ongoing responsibilities in security
management. Strategic, tactical, and operational plans must be developed that align with and support
organizational and IT plans, goals, and objectives.
8. INFORMATION TECHNOLOGY CONTINGENCY PLANNING. Contingency planning consists of a
process for recovery and documentation of procedures for conducting recovery. Planning, implementing,
and testing the contingency strategy are addressed by six of the seven steps; documenting the plan and
establishing procedures and personnel organization to implement the strategy is the final step.
External monitoring
Internal monitoring
Planning and risk assessment
Vulnerability assessment and remediation
Readiness and review
The objective of the external monitoring domain within the maintenance model is to provide the early awareness
of new and emerging threats, threat agents, vulnerabilities, and attacks that the organization needs in order to mount
an effective and timely defense. Figure 5.4 shows the primary components of the external monitoring process.
External monitoring entails collecting intelligence from various data sources and then giving that intelligence
context and meaning for use by decision makers within the organization.
a. Data Sources. Acquiring data about threats, threat agents, vulnerabilities, and attacks is not difficult. There
are many sources of raw intelligence and relatively few costs associated with gathering the intelligence.
b. Monitoring, Escalation, and Incident Response. The basic function of the external monitoring process is
to monitor activity, report results, and escalate warnings. The optimum approach for escalation is based on a
thorough integration of the monitoring process into the IRP.
c. Data Collection and Management. Over time, the external monitoring processes should capture
information about the external environment in a format that can be referenced both across the organization
as threats emerge and for historical use.
The process of identifying and documenting specific and provable flaws in the organization’s information asset
environment is called vulnerability assessment (VA).
IAS 102-Information Assurance and Security 2
Dinalyn A. Mallares
Instructor 1
7
Chapter 5: Information Security Maintenance
DIGITAL FORENSICS
Digital forensics is based on the field of traditional forensics. Forensics is the coherent application of methodical
investigatory techniques to present evidence of crimes in a court or court-like setting.
Digital forensics involves the preservation, identification, extraction, documentation, and interpretation of computer
media for evidentiary and/or root cause analysis. Like traditional forensics, it follows clear, well-defined
methodologies, but still tends to be as much art as science.
An affidavit is sworn testimony that certain facts are in the possession of the investigating officer that they feel
warrant the examination of specific items located at a specific place. The facts, the items, and the place must be
specified in this document.
When an approving authority signs the affidavit or creates a synopsis form based on this document, it becomes a
search warrant, or permission to search for EM at the specified location and/or to seize items to return to the
investigator’s lab for examination.
Figure 5.6 Evidence Form Used in Digital Forensics Figure 5.7 Affidavit and Search Warrant
Evidentiary Procedures
In information security, most operations focus on policies—those documents which provide managerial guidance for
ongoing implementation and operations. In digital forensics, however, the focus is on procedures. When
investigating digital malfeasance or performing root cause analysis, keep in mind that the results and methods of the
investigation may end up in criminal or civil court.
Organizations should develop specific procedures, along with guidance on the use of these procedures. The policy
document should specify the following:
Who may conduct an investigation
Who may authorized an investigation
What affidavit-related documents are required
What search warrant-related documents are required
What digital media may be seized or taken offline
What methodology should be followed
What methods are required for chain of custody or chain of evidence
What format the final report should take and to whom it should it be given
ACTIVITIES
IAS 102-Information Assurance and Security 2
Dinalyn A. Mallares
Instructor 1
9
Chapter 5: Information Security Maintenance
ACTIVITY 2.
Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager.
What other components of security management, as outlined by this model, can be adapted for use in the
security management model?
Activity 1
2. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT?
Activity 2