appendix c: designing an operations framework to manage security

14
Appendix C: Designing an Operations Framework to Manage Security

Upload: homer-fox

Post on 03-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Appendix C: Designing an Operations Framework to Manage Security

Appendix C:Designing an Operations

Framework to Manage Security

Page 2: Appendix C: Designing an Operations Framework to Manage Security

Overview

Analyzing Risks to Ongoing Network Operations

Designing a Framework for Ongoing Network Operations

Page 3: Appendix C: Designing an Operations Framework to Manage Security

Lesson 1: Analyzing Risks to Ongoing Network Operations

Management of Ongoing Network Operations

Why Security of Network Operations Is Important

Common Vulnerabilities to Network Operations

Page 4: Appendix C: Designing an Operations Framework to Manage Security

MOF provides a framework to manage operational security, including:MOF provides a framework to manage operational security, including:

Management of Ongoing Network Operations

Changes to security design.

Daily operation of network security.

IT Support for security issues.

Optimizing and revising the security design.

Changes to security design.

Daily operation of network security.

IT Support for security issues.

Optimizing and revising the security design.

Page 5: Appendix C: Designing an Operations Framework to Manage Security

Why Security of Network Operations Is Important

External Internal

Attacker Threat Example

External

No change and configuration management

A software company releases a new security hotfix for a recently discovered vulnerability. An attacker exploits the vulnerability before the administrators apply the hotfix to all computers.

InternalSecurity procedures not followed

An administrator notices a potential security compromise but is unsure how to report it. The administrator decides to remove the corporate network from the internet.

Page 6: Appendix C: Designing an Operations Framework to Manage Security

Common Vulnerabilities to Network Operations

Vulnerability Example

Inadequate plan for change management

New security patches are applied irregularly or not at all

Administrators and users lack proper training on securing new application.

Poor operations plan

Users do not follow security policies and procedures

Administrators do not regularly test backup media

Weak support structure

Security incident goes unreported

IT support services are not reliable

Failure to revise policy

New security risks are not added to risk management plan

Policies and procedures become outdated

Page 7: Appendix C: Designing an Operations Framework to Manage Security

Lesson 2: Designing a Framework for Ongoing Network Operations

Process for Planning a Security Operations Framework

Guidelines for Change Management

Guidelines for Daily Security Operations

Guidelines for Supporting Security Policies and Procedures

Guidelines for Using Service Level Agreements

Guidelines for Optimizing Security Policies and Procedures

Security Policy Checklist

Page 8: Appendix C: Designing an Operations Framework to Manage Security

When planning a security operations framework, you must:When planning a security operations framework, you must:

Design a change management process for security.

Design a plan for daily security operations.

Design a plan for security support.

Create service level agreements for IT operations and support.

Design a change management process for security.

Design a plan for daily security operations.

Design a plan for security support.

Create service level agreements for IT operations and support.

11

33

44

22

Process for Planning a Security Operations Framework

Page 9: Appendix C: Designing an Operations Framework to Manage Security

Guidelines for Change Management

Phase Example

Identify When new security hotfixes are released…

Review …the hotfixes will be tested on all applicable platforms…

Approve …and approved by the CIO within 24 hours…

Implement …and will be deployed according to the approved procedure for deploying security hotfixes

A change management process reduces:A change management process reduces:

Time to deployment

Cost of updating hardware and software

Disruption of business continuity

Time to deployment

Cost of updating hardware and software

Disruption of business continuity

Page 10: Appendix C: Designing an Operations Framework to Manage Security

Guidelines for Daily Security Operations

Include standards for:Include standards for:

Preparing for security incidents

Testing for security vulnerabilities

Monitoring network security

Preparing for security incidents

Testing for security vulnerabilities

Monitoring network security

For each daily security task, define:For each daily security task, define:

Who completes the task

When to complete the task

How to complete the task

Who completes the task

When to complete the task

How to complete the task

Page 11: Appendix C: Designing an Operations Framework to Manage Security

Guidelines for Supporting Security Policies and Procedures

Phase Responsibilities

Support request management

Receives support requests from users

Escalates support issues

Incident management

Resolves routine support

Escalates complex support requests and security incidents

Problem management

Identifies and resolves underlying causes of problems

Incorporates results in organizational learning

Support request management Incident management Problem management

Page 12: Appendix C: Designing an Operations Framework to Manage Security

Guidelines for Using Service Level Agreements

Include in your service level agreements:Include in your service level agreements:

Service hours and availability

Priorities and support levels

Reliability and accountability

Responsiveness and restrictions

Contingency

Costs and charges

Service hours and availability

Priorities and support levels

Reliability and accountability

Responsiveness and restrictions

Contingency

Costs and charges

Page 13: Appendix C: Designing an Operations Framework to Manage Security

Guidelines for Optimizing Security Policies and Procedures

Include measures in the security operations design for:Include measures in the security operations design for:

Preventing interruptions to network services over time

Recovering from security incidents as networks change

Improving security policies and procedures over time

Preventing interruptions to network services over time

Recovering from security incidents as networks change

Improving security policies and procedures over time

Activities include:Activities include:

Identifying new threats and vulnerabilities

Updating risk management plans

Improving daily procedures and processes

Incorporating learning from each incident response

Testing disaster recovery plans on a regular basis

Training new IT staff in security policies and procedures

Identifying new threats and vulnerabilities

Updating risk management plans

Improving daily procedures and processes

Incorporating learning from each incident response

Testing disaster recovery plans on a regular basis

Training new IT staff in security policies and procedures

Page 14: Appendix C: Designing an Operations Framework to Manage Security

Security Policy Checklist

Create policies and procedures for:Create policies and procedures for:

Designing a change management plan.

Performing daily security operations.

Supporting security issues.

Optimizing and revising security policies and procedures.

Designing a change management plan.

Performing daily security operations.

Supporting security issues.

Optimizing and revising security policies and procedures.