SlideShare a Scribd company logo
Critical Infrastructure
                                              Protection (CIP)

                 Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE
                                   Volunteer Speaker, (ISC)²
                        Click Architect at Business Continuity & Security
                        Security to edit Master title style
                           Governance, BritishTelecom Global Services
                                                          www.isc2.org

                                                             #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Agenda
                             •          Introduction
                             •          Current State Of Play
                             •          Back To Basics
                             •          Practical Approach
                             •          Minimum Controls
                             •          Q&A
                        Click to edit Master title style

                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
CIP – Introduction*




                        Click to edit Master title style

                                              Entertaining, funny or scary ???
     * Source from Youtube.com
                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Current State Of Play – Recent Failures




                        Click to edit Master title style

                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Current State Of Play – Past Failures




                        Click to edit Master title style
                      Even in the movie - Jurassic Park , the risk of internal threat was clearly demonstrated by the character -
                      Dennis Nedry, the Park’s chief computer programmer who designed the system which ran the island. He was
                      suffering from unspecified financial problems and felt disgruntled when he was not paid as much as he wanted
                      for his job.

                      Dennis turned traitor and secretly for a sizable sum, agreed to smuggle embryos of all 15 dinosaur species off
                      the island. He shut down all the safety systems so as to avoid the electric fences and spying security cameras.
                      With the power gone, the dinosaurs began escaping from their pens and started killing people.
                                                                     #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
…Possible causes
                       •        Lack of segregation of duties?
                       •        Complacency? …contended self-satisfaction
                       •        Lack of visibility?
                       •        Lack of privileged access management?
                       •        Single-point-of-failure (SPOF)
                       •        Ineffective patch management?
                        Click to edit Master title style

                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Back To Basics
                        • CIP
                           – The preparedness and response to serious
                             incidents that involves critical infrastructure
                             (CI) e.g. airports, service providers (electric
                             power, water, telecommunication, etc)
                           – Some CI are SCADA (supervisory control and
                             data acquisition), computer systems that
                             monitor and control industrial, infrastructure,
                        Click to edit Master title style
                             or facility-based processes.



                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Practical Approach
                      • “Outside-in” versus “Inside-out”


                                                                                                 Physical
                                                 Physical




                                                                                                Asset (sub-
            Technology                           Asset      Logical               Technology
                                                                                               components)
                                                                                                              Logical




                        Click to edit Master title style
                                               Procedural                                       Procedural




                                                                      #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Outside-in
                • Explore all possible threats to the asset; no
                  breakdown of the asset
                • Access the potential impact and likelihood of each
                  threat
                • Determine the mitigating control to each threat
                • Design and build the controls for protection


                 Click to edit Master title style
                Outcome: Solution tends to be overly engineered and
                  can be costly. Might fail to address some peculiar
                  threats.

                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Inside-out
                • Identify the asset; classification and categorization
                • Explore all possible threats to each categorization
                • Access the potential impact and likelihood of each
                  threat
                • Determine the mitigating control to each threat
                • Design and build the controls for protection

                 Click to edit Master title style
                Outcome: Engineered solutions are targeted to the
                  respective threats and vulnerabilities of each
                  categorization. A more comprehensive approach.

                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Minimum Controls
                             • Executive management support
                             • Thorough understanding/knowledge
                                          – Business
                                          – IT (full inventory - everything)
                                          – Operations (supported by IT)
                             • Regular comprehensive review
                                          – Identify SPOF
                        Click to edit Master title style
                             • Continuous self assessment
                                          – Applicable control for tomorrow’s threats
                                                            #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
…Management wise
                       •        So what should we do?
                                 – Top-down; get the executive management to push down the
                                    compliance need (must-do even when it is difficult to reach the
                                    right people)
                                 – Bottom-up, work the ground to get the co-operation of the key
                                    stakeholders (lots of PR)
                                 – Acquire the necessary training (training, certification)
                                 – Define detail SOP (framework, standards e.g.
                                    ISO/IEC27001:2005)
                                 – Governance review committee (you chair the committee, using

                        Click to edit Master title style
                                    reference from a reputable source)
                                 – Put in measurements (measureable):
                                      • Key risk indicators
                                      • Key performance indicators


                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Key Messages
              • There’s no silver bullet to the problem, only mitigating
                controls to minimize the risk.

              • Know where are your asset; information & infrastructure
                (was and is).

              • Review and enhance your existing design and plans.

              • Review and enhance your existing controls to protect your
                        Click to edit Master title style
                information asset.

              • Continue to educate the end-users and raise awareness
                (most critical).
                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved
Thank you!


                        Click to edit Master title style

                                                          #IISF2011
© Copyright 1989 –   2011, (ISC)2 All   Rights Reserved

More Related Content

PDF
Tolly Group Report: IBM Security Network IPS GX7800 Appliance
PPTX
Fuller.david
PDF
Evaluating thin client_security
PDF
Turner.john
PPT
Jerzy Jurewicz & Boulos_Analysis of safety aspects associated with the plasma...
PPTX
Saltzman.john
PDF
More effective and more flexible security to lower your total cost of ownersh...
PPT
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Tolly Group Report: IBM Security Network IPS GX7800 Appliance
Fuller.david
Evaluating thin client_security
Turner.john
Jerzy Jurewicz & Boulos_Analysis of safety aspects associated with the plasma...
Saltzman.john
More effective and more flexible security to lower your total cost of ownersh...
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional

Viewers also liked (20)

PPT
Developing a Legal Framework for Privacy
PDF
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
ODP
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
PDF
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
ODP
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
PDF
Global informationsecurityissue_ZainalHasibuan
PDF
PDF
PDF
Sertifikat Digital - Kasubdit Teknologi Keamanan Informasi
PPTX
Persyaratan perangkat lunak 20141118_18november2014
Developing a Legal Framework for Privacy
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
Global informationsecurityissue_ZainalHasibuan
Sertifikat Digital - Kasubdit Teknologi Keamanan Informasi
Persyaratan perangkat lunak 20141118_18november2014
Ad

Similar to Chuan weihoo_IISF2011 (20)

PDF
The Aftermath: You Have Been Attacked! So what's next?
PDF
Information systems security_awareness_fy10
PPT
PDF
WP82 Physical Security in Mission Critical Facilities
PDF
The Cybersecurity Mess
PPTX
Shedding Light on Smart Grid & Cyber Security
PDF
PDF
Mission Critical Security in a Post-Stuxnet World Part 2
PPTX
Incident Response Triage
PDF
A6704d01
PDF
White Paper Aaci Data Center Physical Security Mc Donald
PDF
Infrastructure Trends -Jan 2010
PDF
DARPA: Cyber Analytical Framework (Kaufman)
PDF
PPT
2.4.1 - Intro to Cyber Security for students.ppt
PPTX
Life & Work Online Protecting Your Identity
PDF
Unit 1&2.pdf
PPTX
Ics Isac Overview V0.1pub
PDF
The Physical Security_&_Risk_Management_book
DOC
Jennings it security overview 1 2
The Aftermath: You Have Been Attacked! So what's next?
Information systems security_awareness_fy10
WP82 Physical Security in Mission Critical Facilities
The Cybersecurity Mess
Shedding Light on Smart Grid & Cyber Security
Mission Critical Security in a Post-Stuxnet World Part 2
Incident Response Triage
A6704d01
White Paper Aaci Data Center Physical Security Mc Donald
Infrastructure Trends -Jan 2010
DARPA: Cyber Analytical Framework (Kaufman)
2.4.1 - Intro to Cyber Security for students.ppt
Life & Work Online Protecting Your Identity
Unit 1&2.pdf
Ics Isac Overview V0.1pub
The Physical Security_&_Risk_Management_book
Jennings it security overview 1 2
Ad

More from Directorate of Information Security | Ditjen Aptika (20)

PDF
Sosialisasi Keamanan Informasi_Sektor Kesehatan
PDF
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
PDF
Sosialisasi Keamanan Informasi_Sektor Tranportasi
PDF
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
PDF
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
PDF
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
PDF
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
PPTX
Fetri Miftach_Uji publik rpm tata kelola
PPTX
Hasyim Gautama_Tata kelola tik 20151118
PDF
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
PDF
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
PPTX
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
PPTX
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
PDF
PDF
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
PPTX
Uji Publik RPM SMPI Fetri Miftah
PPTX
PDF
Pengamanan Jaringan dengan Honeynet-Charles Lim
Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Fetri Miftach_Uji publik rpm tata kelola
Hasyim Gautama_Tata kelola tik 20151118
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Uji Publik RPM SMPI Fetri Miftah
Pengamanan Jaringan dengan Honeynet-Charles Lim

Recently uploaded (20)

PDF
How to Get Business Funding for Small Business Fast
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
IFRS Notes in your pocket for study all the time
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Daniels 2024 Inclusive, Sustainable Development
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
DMT - Profile Brief About Business .pptx
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPT
Chapter four Project-Preparation material
How to Get Business Funding for Small Business Fast
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
340036916-American-Literature-Literary-Period-Overview.ppt
Deliverable file - Regulatory guideline analysis.pdf
Probability Distribution, binomial distribution, poisson distribution
Ôn tập tiếng anh trong kinh doanh nâng cao
IFRS Notes in your pocket for study all the time
ICG2025_ICG 6th steering committee 30-8-24.pptx
Module 2 - Modern Supervison Challenges - Student Resource.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Daniels 2024 Inclusive, Sustainable Development
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
Comments on Crystal Cloud and Energy Star.pdf
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
DMT - Profile Brief About Business .pptx
Solaris Resources Presentation - Corporate August 2025.pdf
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Chapter four Project-Preparation material

Chuan weihoo_IISF2011

  • 1. Critical Infrastructure Protection (CIP) Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE Volunteer Speaker, (ISC)² Click Architect at Business Continuity & Security Security to edit Master title style Governance, BritishTelecom Global Services www.isc2.org #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 2. Agenda • Introduction • Current State Of Play • Back To Basics • Practical Approach • Minimum Controls • Q&A Click to edit Master title style #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 3. CIP – Introduction* Click to edit Master title style Entertaining, funny or scary ??? * Source from Youtube.com #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 4. Current State Of Play – Recent Failures Click to edit Master title style #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 5. Current State Of Play – Past Failures Click to edit Master title style Even in the movie - Jurassic Park , the risk of internal threat was clearly demonstrated by the character - Dennis Nedry, the Park’s chief computer programmer who designed the system which ran the island. He was suffering from unspecified financial problems and felt disgruntled when he was not paid as much as he wanted for his job. Dennis turned traitor and secretly for a sizable sum, agreed to smuggle embryos of all 15 dinosaur species off the island. He shut down all the safety systems so as to avoid the electric fences and spying security cameras. With the power gone, the dinosaurs began escaping from their pens and started killing people. #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 6. …Possible causes • Lack of segregation of duties? • Complacency? …contended self-satisfaction • Lack of visibility? • Lack of privileged access management? • Single-point-of-failure (SPOF) • Ineffective patch management? Click to edit Master title style #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 7. Back To Basics • CIP – The preparedness and response to serious incidents that involves critical infrastructure (CI) e.g. airports, service providers (electric power, water, telecommunication, etc) – Some CI are SCADA (supervisory control and data acquisition), computer systems that monitor and control industrial, infrastructure, Click to edit Master title style or facility-based processes. #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 8. Practical Approach • “Outside-in” versus “Inside-out” Physical Physical Asset (sub- Technology Asset Logical Technology components) Logical Click to edit Master title style Procedural Procedural #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 9. Outside-in • Explore all possible threats to the asset; no breakdown of the asset • Access the potential impact and likelihood of each threat • Determine the mitigating control to each threat • Design and build the controls for protection Click to edit Master title style Outcome: Solution tends to be overly engineered and can be costly. Might fail to address some peculiar threats. #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 10. Inside-out • Identify the asset; classification and categorization • Explore all possible threats to each categorization • Access the potential impact and likelihood of each threat • Determine the mitigating control to each threat • Design and build the controls for protection Click to edit Master title style Outcome: Engineered solutions are targeted to the respective threats and vulnerabilities of each categorization. A more comprehensive approach. #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 11. Minimum Controls • Executive management support • Thorough understanding/knowledge – Business – IT (full inventory - everything) – Operations (supported by IT) • Regular comprehensive review – Identify SPOF Click to edit Master title style • Continuous self assessment – Applicable control for tomorrow’s threats #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 12. …Management wise • So what should we do? – Top-down; get the executive management to push down the compliance need (must-do even when it is difficult to reach the right people) – Bottom-up, work the ground to get the co-operation of the key stakeholders (lots of PR) – Acquire the necessary training (training, certification) – Define detail SOP (framework, standards e.g. ISO/IEC27001:2005) – Governance review committee (you chair the committee, using Click to edit Master title style reference from a reputable source) – Put in measurements (measureable): • Key risk indicators • Key performance indicators #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 13. Key Messages • There’s no silver bullet to the problem, only mitigating controls to minimize the risk. • Know where are your asset; information & infrastructure (was and is). • Review and enhance your existing design and plans. • Review and enhance your existing controls to protect your Click to edit Master title style information asset. • Continue to educate the end-users and raise awareness (most critical). #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved
  • 14. Thank you! Click to edit Master title style #IISF2011 © Copyright 1989 – 2011, (ISC)2 All Rights Reserved