Driving Factors Security Risk Mgt Controls Compliance.

7
Driving Factors Securi ty Risk Mgt Contro ls Compliance

Transcript of Driving Factors Security Risk Mgt Controls Compliance.

Page 1: Driving Factors Security Risk Mgt Controls Compliance.

Driving Factors

Security Risk Mgt

Controls

Compliance

Page 2: Driving Factors Security Risk Mgt Controls Compliance.

Risks, Threats, Vulnerabilities

• Risk – Generalized impact statement– Ex: disclosure of ratepayer data would be bad

• Threat – a generic method of exploiting a risk– Ex: interception of data in-flight or at rest

• Vulnerability – a specific, actual, existing technical issue that could be leveraged– Ex: an unencrypted customer information file on a

server

Page 3: Driving Factors Security Risk Mgt Controls Compliance.

Risk Profile: Confidential Data

• Generalized Risks:– Disclosure, Unauthorized Modification

• Threats:– Interception of data in-flight, at rest, after

transformation, after export, before destruction

• Vulnerabilities:– Unencrypted data transport– Unencrypted storage in flat files or in DB– Unencrypted storage after export to external

components– Unencrypted data prior to disposal or destruction

Page 4: Driving Factors Security Risk Mgt Controls Compliance.

Reliability Engineering• Security controls fail with individual

unpredictability but consistently across large control sets or long periods of time

• Layered security controls limit the scope and impact of individual control failures

• Existing control set for this service– Firewalls, IDS, server hardening, patching, access

request controls, authentication/authorization, filesystem access controls, virus scanning, enterprise hardening baseline analysis, OS software, service software, application software, maintenance scripts

Page 5: Driving Factors Security Risk Mgt Controls Compliance.

Mapping Vulnerabilities to Controls

• Vulnerability: Unencrypted data transport– Control: use NAESB, SFTP, or encrypted CD

• Vulnerability: Unencrypted data storage– Control:

• Vulnerability: Unencrypted data after transformation– Control:

• Vulnerability: Unencrypted data prior to disposal– Control:

Page 6: Driving Factors Security Risk Mgt Controls Compliance.

Data Transport Mechanisms• NAESB

+ Current Market Standard+ Existing management and maintenance infrastructure+ Existing application infrastructure+ Strong authentication/encryption

• SFTP+ Strong transport encryptiono Partially existing server infrastructureo Partially existing management infrastructure for static passwords- No existing management infrastructure for ssh-keys- Use of static passwords for authentication creates possibility for

password recovery via brute-force or disclosure at endpoints- Reduced visibility from network security monitoring platform- Additional implementation risk- Additional management/maintenance risk

Page 7: Driving Factors Security Risk Mgt Controls Compliance.

Data Transport Mechanisms• CD-R / DVD-R

+ Easy- Transportation via licensed/bonded couriers?- Still need to address encryption of data in transit- Physical media destruction becomes an issue- Need to develop operational procedures- Need to develop physical infrastructure for accepting, handling,

storing, and destroying media