Lab #3 Defining an Information Systems Security Policy Framework for an IT Infrastructure

Similar documents
Lab #3 Defining the Scope and Structure for an IT

Lab #1 Creating an IT Infrastructure Asset List and. Identifying Where Privacy Data Resides

ACM Retreat - Today s Topics:

Vulnerability Management Policy

Information System Security. Nguyen Ho Minh Duc, M.Sc

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

University of Pittsburgh Security Assessment Questionnaire (v1.7)

An ICS Whitepaper Choosing the Right Security Assessment

Choosing the Right Security Assessment

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

CCNA Semester 2 - Skills Based Final Exam - Student Training Instructor Guidelines - Exam Overview and Administration

SC27 WG4 Mission. Security controls and services

Cyber Hygiene: A Baseline Set of Practices

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Checklist: Credit Union Information Security and Privacy Policies

Client Computing Security Standard (CCSS)

Cyber Security Program

MAKING SECURITY AWARENESS HAPPEN: APPENDICES

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Guidelines for Data Protection

HIPAA Compliance Assessment Module

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

CompTIA Security+ Study Guide (SY0-501)

SECURITY & PRIVACY DOCUMENTATION

Disaster Recovery and Business Continuity Planning (Mile2)

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

QuickBooks Online Security White Paper July 2017

EXHIBIT A. - HIPAA Security Assessment Template -

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

This course includes 14 lessons and 5 Course Activities. Each lesson contains one or more Lesson Activities. The lessons cover the following topics:

Introduction to Business continuity Planning

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

Securing an IT. Governance, Risk. Management, and Audit

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Heavy Vehicle Cyber Security Bulletin

Administering a SQL Database Infrastructure

Objectives of the Security Policy Project for the University of Cyprus

Information Security Controls Policy

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

CND Exam Blueprint v2.0

CYBER SECURITY AND MITIGATING RISKS

Network Security

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

A company built on security

Required Textbook and Materials. Course Objectives. Course Outline

Developing a Model for Cyber Security Maturity Assessment

Cybersecurity for Health Care Providers

NEN The Education Network

Juniper Vendor Security Requirements

2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

The Challenge of Cloud Security

Procurement Language for Supply Chain Cyber Assurance

HIPAA Security and Privacy Policies & Procedures

Cloud Computing Lectures. Cloud Security

Position Description IT Auditor

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data

How to Conduct a Business Impact Analysis and Risk Assessment

Symantec Business Continuity Solutions for Operational Risk Management

"Charting the Course... MOC C: Administering an SQL Database Infrastructure. Course Summary

ISO27001 Preparing your business with Snare

Security analysis and assessment of threats in European signalling systems?

IT 204 Final Project Guidelines and Rubric Database Proposal and Implementation Plan Report

Clinical Information Security Pre-Purchase Security Assessment Vendor Packet Instructions

The Honest Advantage

Guide to cyber security/cip specifications and requirements for suppliers. September 2016

Microsoft Administering a SQL Database Infrastructure

Business Continuity Management

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Modelling Cyber Security Risk Across the Organization Hierarchy

10/12/2017 WHAT IS NIST SP & WHY SHOULD I CARE ABOUT IT? OVERVIEW SO, WHAT IS NIST?

Course Outline. Core Solutions of Microsoft Exchange Server 2013 Course 20341A: 5 days Instructor Led

BCM Program Development

1) Are employees required to sign an Acceptable Use Policy (AUP)?

WORKSHARE SECURITY OVERVIEW

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Threat and Vulnerability Assessment Tool

External Supplier Control Obligations. Cyber Security

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

Administering a SQL Database Infrastructure (20764)

Annual Report on the Status of the Information Security Program

Data Security and Privacy Principles IBM Cloud Services

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

CompTIA Mobility+ Certification

emarketeer Information Security Policy

IoT & SCADA Cyber Security Services

20764C: Administering a SQL Database Infrastructure

Writing Information Security Policy for SMEs

IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Transcription:

Lab #3 Defining an Information Systems Security Policy Framework for an IT Infrastructure Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy. Learning Objectives Upon completing this lab, you will be able to: Identify risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure. Determine which domain is impacted by the risk, threat, or vulnerability. Determine security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. Select the appropriate policy definitions needed throughout the seven domains of a typical IT infrastructure to mitigate the identified risks, threats, and vulnerabilities. Organize the security policies in an overall framework as part of a layered security strategy for the seven domains of a typical IT infrastructure Deliverables Upon completion of this lab you are required to provide the following deliverables to your instructor: 1. Lab Report file; 2. Lab Assessments file. Hands-On Steps Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files. 1. On your local computer, create the lab deliverable files. 2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps.

3. Review the seven domains of a typical IT infrastructure (see Figure) 4. On your local computer, open a new Internet browser window. 5. In the address box of your Internet browser, type the URL http://www.continuitycompliance.org/security-policy-components-of-agood-policy/ and press Enter to open the Web site. 6. Review the information to determine the components of an information systems security policy. 7. In your Lab Report file, identify the major components of an information systems security policy. 8. In your Lab Report file, align each of the risks, threats, and vulnerabilities identified in the table in Lab 2 to the domain impacted (refer to Figure for the seven IT domains). 9. In your Lab Report file, explain how risks like these can be mitigated with an information systems security policy. 10. In the address box of your Internet browser, type the URL http://download.matus.in/security/bezpecnostna%20politika/howtos/policy _Primer.pdf and press Enter to open the Web site. 11. Read the SANS Institute s document, A Short Primer for Developing Security Policies. 12. Visit the website http://www.sans.org/security-resources/policies for various information security policy templates and get yourself acquainted with these templates. 13. In your Lab Report file, define what a policy is according to the SANS Institute. Note:It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often.

Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the why questions. Standards are also high-level, but instead should answer the what questions. Finally, the procedures and guidelines provide the how. 14. Using the SANS primer and the various policy templates (step 12), in your Report file, describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs. 15. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list: Policy Definition List Acceptable Use Policy Access Control Policy Definition Business Continuity Business Impact Analysis BIA) Policy Definition Business Continuity Disaster Recovery Policy Definition Data Classification Standard & Encryption Policy Definition Internet Ingress/Egress Traffic Policy Definition Mandated Security Awareness Training Policy Definition Production Data Backup Policy Definition Remote Access Policy Definition Vulnerability Management & Vulnerability Window Policy Definition Wide Area Network (WAN) Service Availability Policy Definition 16. In your Lab Report file, organize your security policies and the definitions you selected so that they can be used as part of an overall framework for a layered security strategy.

Evaluation Criteria and Rubrics The following are the evaluation criteria for this lab that students must perform: 1. Identify risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure. [25%] 2. Determine security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. [25%] 3. Select the appropriate policy definitions needed throughout the seven domains of a typical IT infrastructure to mitigate the identified risks, threats, and vulnerabilities. [25%]. 4. Organize the security policies in an overall framework as part of a layered security strategy for the seven domains of a typical IT infrastructure. [25%]

Lab #3 - Assessment Worksheet Defining an Information Systems Security Policy Framework for an IT Infrastructure Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you identified known risks, threats, and vulnerabilities, and you determined which domain of a typical IT infrastructure was affected. You then discussed security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You next determined which appropriate security policy definition helped mitigate the identified risk, threat, or vulnerability. You organized your results into a framework that could become part of a layered security strategy. Lab Assessment Questions 1. What is the purpose of defining a framework for IT security policies? 2. What are the major components of an information systems security policy? 3. What is the definition of a policy? 4. What are the benefits of a policy? 5. What policy definition in the SANS primer or in the list provided in the lab is required to restrict and prevent unauthorized access to organization-owned IT systems and applications? 6. What policy definition in the SANS primer or in the list provided in the lab can help remind employees in the User Domain about ongoing acceptable use and unacceptable use? 7. Why should an organization have a remote access policy even if it already has an acceptable use policy (AUP) for employees? 8. What security controls can be implemented on your mail system to help prevent rogue or malicious software disguised as URL links or e-mail attachments from attacking the Workstation Domain? What kind of policy definition should you use? 9. Why should an organization have annual security awareness training that includes an overview of the organization s policies?