02.06.2013 Views

Editor's note

Editor's note

Editor's note

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

several security standards in widespread use.<br />

The most common standards are ISO27001,<br />

COBIT, and NIST. The International Organization<br />

for Standardization (ISO) [1] and the International<br />

Electrotechnical Commission (IEC) [2] created the<br />

ISO27001 [3] standard. This global standard is used<br />

heavily in Europe. The Information Systems Audit<br />

and Control Association (ISACA) [4] created the<br />

Control Objectives for Information related Technology<br />

(COBIT) [5] that is widely used for compliance with<br />

the US Sarbanes Oxley Act (SOX) requirements for<br />

US publicly traded companies. The National Institute<br />

of Standards and Technology (NIST) has developed a<br />

series of standards that are published at the Computer<br />

Security Resource Center [6]. The NIST standards<br />

are widely used by US government agencies. This<br />

article will discuss using the NIST Risk Management<br />

Framework but, the basic steps also apply to the other<br />

frameworks.<br />

After selecting a security framework, the system<br />

boundaries and information assets should be identified.<br />

It is easy to overlook information that is not contained<br />

in the computer systems such as paper forms. All<br />

information should be considered, even items not<br />

directly covered by regulations. For example, if your<br />

organization is a health care company, it would be<br />

easy to focus solely on the patient health information<br />

but, overlook the employee payroll information, the<br />

customer billing data, or the integrity of the financial<br />

systems.<br />

Once the information assets have been identified,<br />

you need to determine the business unit that owns the<br />

information resource. Meetings should be scheduled<br />

with the senior manager in charge of the unit so you<br />

can perform a business impact analysis (BIA). A<br />

business impact analysis will attempt to estimate the<br />

mission impact of failure to meet the security objectives<br />

of confidentiality, integrity, and availability. NIST Federal<br />

Information Processing Standards Publication 199<br />

(NIST FIPS Pub 199 [7]) recommends classifying<br />

systems into the categories of Low, Medium, and High<br />

impact.<br />

A system is considered low impact if the loss of<br />

confidentiality, integrity, or availability has a limited<br />

adverse effect on the organization. The system is<br />

considered medium impact if the loss of confidentiality,<br />

integrity, or availability has a severe impact on the<br />

organization. The system is considered high impact if<br />

they loss of confidentiality, integrity, or availability would<br />

have a catastrophic effect on the organization. When<br />

evaluating a system, you should consider confidentiality,<br />

integrity, and availability separately. The overall score of<br />

the asset is the highest rating of the three categories.<br />

starterkit 02/2011(2)<br />

A rating of not applicable should not be used since<br />

each system should have a low water mark of business<br />

impact.<br />

As an example, let’s consider a public facing<br />

webserver for a movie theater that advertises the<br />

currently showing films and show times. The information<br />

on the website is expected to be publicly available so the<br />

business impact for disclosure is considered low. Since<br />

the website is frequently updated with new movies and<br />

show schedules, website defacement or inaccurate<br />

information would be quickly corrected and result in a<br />

low business impact for integrity. Since many patrons<br />

of the movie theater check the website for movies<br />

and schedules when considering attending the movie,<br />

a loss of availability for several weeks could have a<br />

catastrophic impact on the business resulting in a rating<br />

of high impact for availability. The highest score of the<br />

confidentiality, integrity, and availability categories is<br />

high so the overall score of the system is high.<br />

It is important when characterizing the impact level<br />

of the systems to evaluate both user data as well<br />

as system data. System information could include<br />

password files, encryption keys and certificates,<br />

authenticated sessions, etc. Instead of focusing<br />

entirely on the individual system, the system should<br />

be evaluated in the context of the overall enterprise.<br />

For example, a low impact system could be used<br />

to compromise a higher impact system if network<br />

segmentation and firewall rules allow an attacker to<br />

pivot in the network or provide other resources for an<br />

attacker. The preliminary categorization of the system<br />

should be adjusted to reflect any legal or contractual<br />

obligations, the organizational environment,<br />

organizational mission and goals, and data sharing<br />

requirements.<br />

The information obtained through the system<br />

characterization will be used for several activities<br />

in the development of a security program. Business<br />

continuity and disaster recovery planning activity needs<br />

the business impact analysis (BIA) to determine the<br />

maximum tolerable downtime (MTD) used to establish<br />

the recovery time objectives (RTO). Enterprise risk<br />

management needs the BIA to identify resources<br />

that need to be protected during the enterprise risk<br />

assessment process. Capital planning needs the<br />

BIA to properly allocate resources when budgeting.<br />

Enterprise architects and system designers need<br />

the BIA to align technical initiatives with business<br />

priorities. Vendor management processes need a BIA<br />

to define data protection requirements when sharing<br />

data and interconnecting systems.<br />

After categorizing the security level of the information<br />

asset, appropriate controls should be considered. The<br />

Page 37 http://pentestmag.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!