Information Security - University of Wisconsin–Parkside

Download Report

Transcript Information Security - University of Wisconsin–Parkside

Physical &
Personnel
Security
Physical Security
Personnel Security
Acknowledgments
Material is from:
 CISA® Review Manual 2011, © 2010, ISACA. All rights reserved.
Used by permission.
 CISM® Review Manual 2012, © 2011, ISACA. All rights reserved.
Used by permission.
Author: Susan J Lincke, PhD
Univ. of Wisconsin-Parkside
Reviewers: Kahili Cheng
Funded by National Science Foundation (NSF) Course, Curriculum and
Laboratory Improvement (CCLI) grant 0837574: Information
Security: Audit, Case Study, and Service Learning.
Any opinions, findings, and conclusions or recommendations
expressed in this material are those of the author(s) and/or
source(s) and do not necessarily reflect the views of the National
Science Foundation.
CISA Review Manual 2009
Objectives
The students should be able to:
 Define power failures: blackout, brownout, sags, spike & surges,
electromagnetic interference (EMI)
 Define protections against power failures: surge protector, universal power
supply (UPS) , alternate power generators
 Define and describe mediums for Fire Suppression System: dry pipe,
charged, FM200, Argonite
 Define physical access controls: biometric door locks, bolting, deadman
doors
 Describe the relationship between deadman door and piggybacking
 Define and describe security awareness, security training, security
education, segregation of duties
CISA Review Manual 2009
Physical Security Problems
Forensically Analyzed Attacks:
 ATM, Point of Sale at banks,
gas stations, retail stores =


91% of physical security attacks
35% of all attacks
Organization-reported:
 #1 cause = lost, misdelivered or
stolen media, documents, and
faxes.
Remember Data
Criticality Classification?
Critical $$$$: Cannot be performed manually.
Tolerance to interruption is very low
Vital $$: Can be performed manually for very short
time
Sensitive $: Can be performed manually for a
period of time, but may cost more in staff
Nonsensitive ¢: Can be performed manually for
an extended period of time with little additional
cost and minimal recovery effort
CISA Review Manual 2009
… and Sensitivity
Classification?
Proprietary:
Strategic
Plan
Confidential:
Salary &
Health Info
Private:
Product Plans
Public
Product Users Manual
near Release
Internal
Security: Defense in Depth
Border Router
Perimeter firewall
Internal firewall
Intrusion Detection System
Policies & Procedures & Audits
Authentication
Access Controls
CISA Review Manual 2009
Locked Work
Stations
Video cameras &
Alarm system
Bonded personnel
Controlled visitor access
Security Guards, manual
logging & photo ID badges
Controlled single entry
point & barred windows
Not advertising location of
sensitive facilities
Defense in Depth:
Physical access
controls with Guards
Which controls are
Preventive?
Reactive?
Corrective?
CISA Review Manual 2009
Physical Issues
and Controls
Mobile Computing
Power Protection
Fire Suppression
Door Locks & Security
IPF Environment
CISA Review Manual 2009
Power Protection Systems
< x ms
Surge
Protector
< 30 minutes
UPS:
Universal
Power
Supply
Hours or days
Alternate Power Generators
Blackout: Total loss of power
Brownout: Reduced, nonstandard power levels may cause
damage
Sags, spikes & surges: Temporary changes in power level
(sag=drop) may cause damage
Electromagnetic Interference (EMI): Fluctuations in power due
to electrical storms or electrical equipment may cause
computer crash or damage
CISA Review Manual 2009
Computer Room Equipped with…
Water Detector: Placed under raised floors
 Risk of electric shock; training necessary
 Location of water detectors marked on floor
Manual Fire Alarm: Placed throughout facility
Smoke Detectors: Above & below ceiling tiles, below room floor
Emergency Power-Off Switch: Turn off power to all equipment
Fire Extinguishers: At strategic locations
 Tagged & inspected annually
Alarms should sound locally, at monitored guard station, and preferably
fire dept.
CISA Review Manual 2009
IPF Environment



Computer room on middle floor
Fire department inspects room annually
Fire-resistant walls, floor, ceiling, furniture, electrical
panel & conduit

Two-hour fire resistance rating for walls
Emergency Power-off switch: Panel in and outside room
 Redundant power lines reduce risk of environmental
hazards
 Surge protectors & UPS
 No smoking, food or water in IPF
Audit: Observe some, request documentation, may test
batteries, handheld fire extinguishers, ensure fire
suppression system is to code

CISA Review Manual 2009
Fire Suppression Systems
Charged
water
sprinkler
Fire
Suppression
gas
Dry pipe
Gas systems do not damage
equipment during fire.
Dangerous systems replace oxygen
with another gas, and need lead time
Halon
for people to exit.
Halon was banned due to damage to
Carbon Dioxide ozone layer.
FM-200
envirofriendly
Water sprinkler systems
cause water damage when dispersed.
Charged pipes contain water and
can break or leak.
Argonite
FM-200 cools equipment down,
lowering combustion probability.
Enviro-friendly is safer to humans,
does not damage equipment.
CISA Review Manual 2009
Door Lock Systems
Bolting
key
eye
Biometric
Door
Locks
Combination
3-6-4
Electronic
Which systems…
 Enable electronic
logging to track who
entered at which
times?
 Can prevent entry by
time of day to
particular persons?
 Are prone to error,
theft, or
impersonation?
 Are expensive to
install & maintain?
 Which system do you
think is best?
CISA Review Manual 2009
Deadman Doors



Double set of doors:
only one can be open
at a time
One person permitted
in holding area
Reduces risk of
piggybacking:
unauthorized person
follows authorized
person into restricted
area
CISA Review Manual 2009
Computers in Public Places
Logical Protections

Imaged computers


Antivirus / antispyware


Avoid pornography, violence,
adult content
Login/passwords


Protects users from each
other
Web filters


No client storage for programs
and/or data
If privileged clientele allowed
Firewall protection from rest of
organization
Physical Locks
Commercial Copy Machines
Large disk storage
 Data may be sensitive
 Internet access or stolen disk
Security features:
 Encrypted disks
 Overwrite: writes random data
daily or weekly, or per job.
 Contract: Copier is returned
without disk(s) or disks are
securely destroyed by
contractor.
Mobile Computing





Engrave a serial number and company name/logo on
laptop using engraver or tamper-resistant tags
Back up critical/sensitive data
Use cable locking system
Encrypt sensitive files
Allocate passwords to individual files


Consider if password forgotten or person leaves company…?
Establish a theft response team for when a laptop is
stolen.


Report loss of laptop to police
Determine effect of lost or compromised data on company,
clients, third parties
CISA Review Manual 2009
Device Security
PDAs
 Approved & registered
 Configuration: controlled,
licensed, & tested S/W



Encryption
Antivirus
Flash & Mini Hard Drive
 Banned and USB
disabled
OR
 Encrypt all data
Training & Due Care
(including camera use)

Easily misplaced
CISA Review Manual 2009
Workbook: Physical Security
Room Classifications
Sensitivity
Description
Class.
Confidential Room contains
Confidential info.
storage or server
Privileged
Room contains
computer
equipment or
controlled
substances
Special Treatment
Guard key entry.
Badge must be visible.
Visitors must be escorted
Computers are physically
secured using cable
locking system
Doors locked between 5
PM and 7 AM, and
weekends unless class in
session.
Physical Workbook:
Criticality Table
Criticality
Description
Class.
Critical
Room contains Critical
computing
resources,
which cannot be performed
manually.
Vital
Room
contains
Vital
computing
resources,
which can be performed
manually for a short time.
Special Treatment
(Controls related to Availability)
Availability controls include:
Temperature control, UPS,
smoke
detector,
fire
suppressant.
Availability controls include:
surge protector, temperature
control, fire extinguisher.
CISA Review Manual 2009
Workbook: Physical Security
Physical Security map
Rm.
124
Rm.
128
Rm
130
Rm 132
Comp.
Facility
Lobby
Rm.
123
Sensitivity Classification:
Black: Confidential
Gray: Privileged
Light: Public
Rm.
125
Rm.
129
Criticality Classification: (Availability)
Rm 132: Critical
Rm 124, 125, 128, 129: Vital
Workbook: Physical Security
Allocation of Assets
Room Sensitivity & Sensitive Assets
Crit. Class
or Info.
Rm 123
Privileged,
Vital
Computer Lab:
Computers,
Printer
Rm
Privileged,
Classroom:
125
Vital
Computer &
projector
Rm 132 Confidential,
Servers and
Critical
critical/sensitive
information
Room Controls
Cable locking system
Doors locked 9PM8AM by security
Cable locking system
Teachers have keys to
door.
Key-card entry logs
personnel. Badges
required.
External Security

Main Door
 Welcome
 Guards




Walkway
Low bushes
Trees: Friendly,
insecure
Benches
Summary of Physical Controls
Physical Access Control
 Walls, Doors, Locks
 Badges, smart cards
 Biometrics
 Security cameras &
guards
 Fences, lighting, sensors
 Cable locking system
 Computer screen hoods
Environmental Controls
 Backup power
 Air conditioning
 Fire suppressant
Secure procedures
 Engraved serial numbers
 Locked files, desks
 Clean desk
 Paper shredders
 Locking screensaver
 Secure procedures:
locked doors at night
Question
1.
2.
3.
4.
A Fire Suppression system that is
environmentally friendly, is not lethal,
and does not damage equipment is:
Dry Pipe
Halon
Charged
FM-200
Question
1.
2.
3.
4.
The best way to prevent piggybacking into
secured areas is:
Deadman door
Bolting door
Guard
Camera
Question
A surge protector is the best protection
against
1. Electromagnetic interference
2. Loss of power for 10-30 minutes
3. A blackout
4. Sags and spikes
Question
1.
2.
3.
4.
To eliminate problems with incomplete
transactions during a sudden power failure, Joe
has decided that some form of temporary power
supply is necessary to ensure a graceful shut
down. The best option for Joe is:
UPS
Surge protector
Alternate power generator
Battery supply
Personnel Security
Auditors check for both Physical
and Personnel Security too…
CISA Review Manual 2009
Workbook: Personnel Security
Personnel Threats
Threat
Divulging
private info
Grant abuse
Role
Liability or Cost if
threat occurs
Employee FERPA violation = loss
of federal funds
Employee Loss of funds from US
with
granting agencies
grant
Security Awareness & Training

Training covers what is
expected of employees
 Why
is policy in place?
 How is policy enforced?

Training may be
implemented as:
 New
employee orientation
 Company newsletters
 Determine effectiveness by
interviewing employees
CISA Review Manual 2009
Awareness Function:
Types of Security Training
Awareness:
Create securityconscious workforce
Employees, partners
& vendors
Newsletters, surveys,
quizzes, video
training, forums,
posters
Training:
Necessary skills for a
particular position
HR, legal, middle or
top mgmt, IT,
programmers
Workshops,
conferences
Education:
High level skills
High-skilled
professions: audit,
security admin/mgmt,
Risk mgmt…
Organized and
gradual development:
teaching & coaching
Awareness Training



Signed employment agreements, video, memos, emails,
posters, seminars and training classes
A combination of parallel approaches
Knowledge areas:








Back-up work-related files
Choosing passwords and avoiding exposure
Avoiding email and web viruses
Recognizing social engineers
Recognizing & reporting security incidents
Securing electronic & paper media against theft & exposure
Spotting malware that could lead to identity theft & desktop
spying
Metrics should be established to determine effectiveness
of change in behavior and workforce attitude
Segregation of Duties
Authorization
Distribution
Approves
Acts on
Origination
Double-checks
CISA Review Manual 2009
Verification
Organizational
Segregation of Duties
Audit
Ensures procedures are professionally done
Security/
Compliance
Quality
Control
advises &
monitors for
security
tests or ensures
quality of S/W or
production
Business
serves
System/
Network
Admin
advises
Development
delivers
S/W to
IT Segregation of Duties
Requirements/Design
Systems Analyst
Database Administrator
User
End User
Data Entry
Test Environment
Quality Assurance
Security
Control Group
Security Admin
Development
Environment:
Application programmer
Systems programmer
Production Environment
Computer Operator
System Administrator
Network Administrator
Help Desk
Segregation of Duties Controls
Transaction Authorization
Custody of Assets
 Data owner’s responsibility is specific and
documented
 Allocates
authorization according to least-privilege
and segregation of duties

Security Administrator implements physical,
system & application security
 Authorization
forms
 User authorization tables: who can
view/update/delete data at transaction or field level
Workbook: Personnel Security
Personnel Controls
Threat
Divulging
private info
Role
Control
Employee FERPA training:
annual quiz review,
new employee training
Grant abuse Employee Financial
controls:
with grant employee
and
administrator
and
financial office check
Workbook: Personnel Security
Responsibility of Security to Roles
Role
Responsibility
Registrar Establish FERPA training
Data Owner: student scholastic and financial
information
Oversee FERPA adherence in Registration dept.
Admin. Attend FERPA training
Retain locked cabinets with student info
Security Monitor logs, enable/disable permissions,
Admin rebuild computers after malware infection,
collect security metrics for incident response, ...
Workbook: Personnel Security
Requirements: Training,
Documentation
Role
Registrar
Requirements: Training,
Documentation
FERPA experience in hiring.
Training every 3-5 years at national
conference or workshop
Employee University FERPA documentation,
handling FERPA web page, annual quizzes,
student
sign acceptable use policy
data
Personnel Issues

Background checks can reduce fraud
 More secure position=more checking required
 A standard or procedure may be useful


Training & signed contracts
Track and document theft
 Minor
incidents could add up to a major pattern
problem

Email can be monitored for potential problem
employees
 Assuming
policy is in place and employees are aware
Employee Hiring
Document security responsibilities
 Screen candidates for sensitive positions
 Have signed agreements regarding

 Job
responsibilities, conditions of employment
 Security responsibilities (incl. copyright)
 Confidentiality agreement

Indicate corrective actions taken if security
requirements not followed
New Employee Orientation
New employee signs Privacy Policy document:
 Has read and agreed to follow security policies
 Conform to laws and regulations
 Promise to not divulge logon IDs and passwords
 Create quality passwords
 Lock terminal when not present
 Report suspected violations of security
 Maintain good physical security (locked doors, private
keys)
 Use IT resources only for authorized business purposes
Employee Termination
Unless continued relationship expected:
 Return equipment
 Revoke access
 Return all access keys, ID cards and
budgets
 Notify all staff and security personnel
 Arrange final pay
 Perform termination interview
CISA Review Manual 2009
Security Roles





Chief Information Security Officer
Data Owner, Process Owner: Allocates permissions,
defines safe processes.
Info Security Steering Committee: Management with
knowledge of business and/or security functions defines
security
Incident Response Management/Team: Decides or
performs functions related to incident response.
Security Analyst, Security Administrator: Security staff to
design or implement security functions.
Signed Agreements
Code of Conduct: Describes general
ethical behavior requirements
 Acceptable Use Policy: Addresses which
and how company data is accessed
 Privacy Policy: Defines behavior re
confidential info:

 password
policies, physical security, locked
terminals, and reporting security issues.

Service Level Agreement: Contract
Third Party Agreements






Define information security policy
Define procedures to implement policy
Deploy controls to protect against malicious
software
Publish restrictions on copying/distributing
information
Implement procedures to determine whether
assets were compromised
Ensure return or destruction of data at end of job
Other Personnel Preventive
Controls





Training and written policies and procedures
Ethical Culture: Mgmt must live, mentor, insist
on ethical behavior.
Employee Support Programs: Addresses
personal/financial problems before they are
unmanageable.
Background checks: For handlers of PII.
Need to Know/Least Privilege
Detective & Corrective Controls
Detective/Deterrence
Controls
 Fraud reporting or hotline
 Logged transactions
 Internal Audit Dept and
Surprise Audits
 Mandatory vacations or
job rotation.
Corrective Controls
 Employee Bonding:
Insurance protects
against losses due to
theft, mistakes and
neglect.
 Fidelity Insurance:
Insurance against fraud
or employee misdeeds is
useful for rare but
expensive risks
CISA Review Manual 2009
Summary of Personnel Controls







Segregation of Duties
Mandatory vacations or job rotation
Training and written policies and procedures
Background checks
Need to Know/Least Privilege
Fraud reporting mechanism
Transaction logs
Question
1.
2.
3.
4.
Which of the following duties can be performed
by one person in a well-controlled IS
environment?
Software Developer and System
Administration
Database administration and Data Entry
System Administrator and Quality Assurance
Quality Assurance and Software Developer
Question
Which is MOST important for a successful
security awareness program?
1. Technical training for security administrators
2. Aligning the training to organization
requirements
3. Training management for security awareness
4. Using metrics to ensure that training is effective
Question
To detect fraud, the BEST type of audit trail
to log would be:
1. User session logs
2. Firewall incidents
3. Operating system incidents
4. Application transactions
Vocabulary






Blackout, brownout, sag, spike, surge, electromagnetic
interference
Surge protector, UPS, alternate power generator
Fire suppression: charged, dry pipe, FM200, Argonite
Deadman door, piggybacking
Security awareness, security training, security education
Segregation of duties
Jamie Ramon MD
Doctor
Chris Ramon RD
Dietician
Terry
Pat
Licensed
Software Consultant
Practicing Nurse
HEALTH FIRST CASE STUDY
Designing Physical Security
Defining Room Classifications
and Controls
Sensitivity
Classification
Proprietary
Description
Special Treatment
(Examples)
Room contains Propriety information storage. Room and all cabinets remained
locked.
Confidential
Room contains Confidential information Workstation monitor has hood.
storage.
Private
Room contains computer with access to Room remains locked when not
sensitive data or room contains controlled attended. No visitors are allowed
in these areas unescorted
substances.
Privileged
Room contains computer with access to
sensitive data but public has access when
escorted.
Public
The public is free to spend time in this room,
without escort.
Criticality Classification
Critical
Room contains Critical computing resources,
which cannot be performed manually.
Vital
Room contains Vital computing resources,
which can be performed manually for a short
time.
Physical Security Map
Sensitivity
Classification
Color Key:
•Green: Public
•Yellow: Privileged
•Orange: Private
•Red: Confidential
Workbook: Physical Security
Allocation of Assets
Room
Rm 123
Rm 125
Rm 132
Sensitive Assets or
Information
Room Controls
Computer
Lab: Cable locking system
Computers, Printer Doors locked 9PM8AM by security
Classroom:
Cable locking system
Computer
& Teachers have keys to
projector
door.
Servers
and Key-card entry logs
critical/sensitive
personnel.
Badges
information
required.
Reference
Slide #
Slide Title
Source of Information
4
Criticality Classification
CISA: page 127 Exhibit 2.18
6
Security: Defense in Depth
CISM: page 60, 61 Exhibit 1.16
7
Defense in Depth: Physical access controls with Guards
CISM: page 61 Exhibit 1.16
9
Power Protection Systems
CISA: page 381, 383
10
Computer Room Equipped with
CISA: page 382
12
Fire Suppression Systems
CISA: page 382
13
Door Lock Systems
CISA: page 385
14
Deadman Doors
CISA: page 386
16
Mobile Computing
CISA: page 386, 387
17
Device Security
CISA: page 256, 256, 344
29
Security Awareness & Training
CISA: page 321, 369
32
Segregation of Duties
CISA: page 117, 118
35
Segregation of Duties Controls
CISA: page 119, 120
40
Employee Hiring
CISA: page 105
42
Employee Termination
CISA: page 106