SlideShare a Scribd company logo
CNIT 160:
Cybersecurity
Responsibilities
4. Information Security
Program Development

Part 2

Pages 235-257
Chapter Topics
• This lecture covers:
• Policy Development (p. 235)
• Third-Party Risk Management
• Administrative Activities
• Internal Partnerships
• External Partnerships
• Compliance Management
• Personnel Management
Chapter Topics
For Later Lectures
• Administrative Activities
• External Partnerships
• Compliance Management
• Personnel Management
• Project and Program Management
• Budget
• Business Case Development
• Vendor Management
• Security Program Operations
• IT Service Management
• Controls
• Metrics and Monitoring
• Continuous Improvement
Chapter Topics
For Later Lectures
Policy Development
Security Policy
• Foundational
• Defines principles and required actions
• to protect assets and personnel
• Audience is all personnel
• Full-time and part-time employees
• Temporary workers, contractors and
consultants
Easily Accessible
• So no personnel can claim ignorance
• As an excuse for violating policy
• Often personnel must acknowledge
understanding of policy
• At time of hire and annually thereafter
Considerations
• Laws, regulations, standards
• Risk tolerance
• Controls
• Organizational culture
Alignment
• Alignment with Controls
• Policies and controls must not contradict
each other
• Alignment with Audience
• Policy must be understood by the workers
• Avoid overly technical policies
• May have a separate policy for technical
workers
Security Policy Structure
Security Policy Structure
Policy Distribution and
Acknowledgement
• Policy should be well-known and easily
accessible
• High-ranking executive should inform
workers that they are required to comply
with the policy
• Executives should lead by example
Third-Party Risk
Management
Outsourcing
• Must identify risks of cloud services
• You can outsource work
• But you cannot outsource responsibility
Benefits from Use of Third
Parties
• Available skills and resources
• Economies of scale
• Objectivity
• Reduced costs
Risks from Use of Third
Parties
• Higher-than-expected costs
• Poor quality or performance
• Loss of control
• Employee integrity and background
• Loss of competitive advantage
Risks from Use of Third
Parties (continued)
• Errors and omissions
• Vendor failure
• Differing mission and goals
• Difficult recourse for problems
• Lowered employee morale
Risks from Use of Third
Parties (continued)
• Audit and compliance
• Applicable laws
• Cross-border data transfer
• Time zone differences
• Language and cultural differences
Identifying Third Parties
• Inventory third party vendors in use
• Consult with stakeholders
• Legal
• Procurement
• Accounts payable
• Facilities
• Department heads
• Location-specific leaders
IT and Third Parties
• Ways to identify third parties in use
• Established data connections with third
parties
• Firewall, IDS, and IPS rules
• Connections to Identity and Access
Management (IAM) systems
• Cloud Access Security Broker (CASB)
systems
Applications to Manage
Third Parties
Risk Tiering and Vendor
Classification
• Cannot perform all due diligence on all
vendors
• Apply a level of due diligence according to
the level of risk
Criteria
• Volume of sensitive customer data
• Volume of sensitive internal data
• Operational criticality
• Physical access to company buildings
• Access to information systems
• Contractual obligations
Example
Ch 4c-1
Assessing Third Parties
• Questionnaires
• Questionnaire confirmation
• E.g. requesting evidence
• Site visit
• External attestation
• Such as compliance with SOC2,
HITRUST, ISO/IEC 27001, etc.
Assessing Third Parties
(continued)
• External business intelligence
• Services like Dunn & Bradstreet or Lexis
Nexus
• That collect information on health of
companies
• External cyber intelligence
• Security scans
• Dark web monitoring
Assessing Third Parties
(continued)
• Security scans and penetration tests
• Intrusive monitoring
• Third party can view internal control data
in real time
• Such as event logs, firewall logs, or
packet captures
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
Proactive Issue
Remediation
• The only means of exchange between
customer organization and third party are
• Money and reputation
• Especially when crossing national
boundaries
• Consider enforcement mechanisms
Contractual Provisions
• Service Level Agreement (SLA)
• Quality
• Security policy and controls
• Business continuity
• Employee integrity
• Ownership of intellectual property
• Roles and responsibilities
Contractual Provisions
(continued)
• Schedule
• Regulations and laws
• Warranty
• Dispute and resolution
• Payment
Responsive Issue
Remediation
• Results from a questionnaire may be
unacceptable
• Such as no password change
requirements
• Discussions with third parties may provoke
changes
• Or expose satisfactory compensating
controls
Onboarding
• Process to begin a relationship with a third
party
• Up-front due diligence
• To understand the level of risk
• Before signing a legal agreement
Contract Language
Security Incidents
• Incident response is more complex
• When two organizations are involved
Administrative Activities
Internal Partnerships
Importance
• Partnerships
• Are a source of information
• And help manage security
• Deputize team members from other groups
• Designate security liaisons
• But they need training and time allocated
for these added duties
Legal
• Manages business risk
• Through contract negotiations
• With service providers, customers, and
others
• Information security can help
• With security clauses
• Best if security assessment happens
before signing a contract
Human Resources (HR)
• Recruiting: background checks
• Onboarding
• Nondisclosure agreements
• Training, including Security Awareness
Training
• Provisioning Human Resource Information
Systems (HRISs)
Human Resources (HR)
(continued)
• Internal transfers
• Move to a different department
• Change access to systems and
applications
• Avoid accumulation of privileges
Human Resources (HR)
(continued)
• Offboarding
• Notify security, IT and other departments
• Terminate access rights promptly
• To prevent revenge and sabotage
• Collect company assets like laptops
• Sign nondisclosure and noncompete
agreements
Human Resources (HR)
(continued)
• Training
• Investigations
• Often in partnership with information
security
• Forensics and chain of custody
• Discipline
• Demotion, time off without pay, dismissal,
etc.
Facilities
• Access control
• Workplace surveillance
• Equipment check-in/check-out
• Guest processing
• Security guard
• Asset security
• Personnel safety
Information Technology (IT)
• Access control
• Architecture
• Hardening
• Scanning and patching
• Security tools
• Firewalls, IDS, spam filters, etc.
Information Technology (IT)
(continued)
• System monitoring
• Security monitoring
• Third-party connections
Product Development
• Security by design
• Secure development
• Security testing
• Code reviews
• Security review of open source software
• Developer training
• Protection of the development process
Procurement
• Due diligence for new purchases
Finance
• Accounts Payable is the partnership of last
resort for information security
• Because when they get involved, the
vendor relationship is already established
Business Unit Managers
• Security manager should understand how
each department functions
• Develop relationships of trust
Affiliates and Key Business Partners
• Half of all security breaches have their
nexus in third parties
Ch 4c-2

More Related Content

PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
CNIT 160 4d Security Program Management (Part 4)
PDF
CNIT 160: 3. Information Risk Management (Part 4)
PDF
CNIT 160 4d Security Program Management (Part 4)
PDF
CNIT 160 4b: Security Program Management (Part 2)
PDF
1. Security and Risk Management
PDF
CNIT 160 4e Security Program Management (Part 5)
PDF
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 4d Security Program Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4b: Security Program Management (Part 2)
1. Security and Risk Management
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 Ch 4b: Security Program Management

What's hot (20)

PDF
CNIT 160: Ch 2b: Security Strategy Development
PDF
Ch 3a: Risk Management Concepts
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
PDF
2. Asset Security
PDF
CNIT 160: Ch 2a: Introduction to Information Security Governance
PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
PDF
CNIT 160: Ch 3d: Operational Risk Management
PDF
6. Security Assessment and Testing
PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
3. Security Engineering
PPTX
Chapter 1 Law & Ethics
PPTX
CISSP - Security Assessment
PPTX
Chapter 5 - Identity Management
PDF
3. Security Engineering
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PDF
7. Security Operations
CNIT 160: Ch 2b: Security Strategy Development
Ch 3a: Risk Management Concepts
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CNIT 160 Ch 4a: Information Security Programs
CNIT 160: Ch 3c: The Risk Management Life Cycle
2. Asset Security
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3d: Operational Risk Management
6. Security Assessment and Testing
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4a: Information Security Programs
3. Security Engineering
Chapter 1 Law & Ethics
CISSP - Security Assessment
Chapter 5 - Identity Management
3. Security Engineering
CNIT 125: Ch 2. Security and Risk Management (Part 1)
7. Security Operations
Ad

Similar to CNIT 160 Ch 4 Information Security Program Development (Part 3) (20)

PDF
1. Security and Risk Management
PPTX
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
PPT
bh-win-04-conacher.ppt
PPT
Intro.ppt
PPT
Introduction to Information Security CSE
PPT
2211-III-IV-Information Security Cyber.ppt
PPT
Ch5-20_CISA.ppt About CISA Certification
PDF
How can the ISO 27701 help to design, implement, operate and improve a privac...
PPT
Intro kavindu rasanjahshdjdhhjxjxuxgxjdjs
PPT
2211-III-IV-Info-Security-061cab6ee6c0fb0-53969879.ppt
PPT
2211-III-IV-Info-Security-061cab6ee6c0fb0-53969879.ppt
PPT
2211-III-IV-Info-Security-061cab6ee6c0fb0-53969879.ppt
PDF
CISA-Exam-Prep-Domain-5-2019.pdf. CISA exam
PPT
Introduction_to_Security_Assessments.ppt
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
PPTX
crisc_wk_5.pptx
PDF
Accelerating Regulatory Compliance for IBM i Systems
PPTX
CISSP - Chapter 1 - Security Concepts
PDF
12 02-14 information security managers - unannotated
PPTX
Introduction to Information security ppt
1. Security and Risk Management
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
bh-win-04-conacher.ppt
Intro.ppt
Introduction to Information Security CSE
2211-III-IV-Information Security Cyber.ppt
Ch5-20_CISA.ppt About CISA Certification
How can the ISO 27701 help to design, implement, operate and improve a privac...
Intro kavindu rasanjahshdjdhhjxjxuxgxjdjs
2211-III-IV-Info-Security-061cab6ee6c0fb0-53969879.ppt
2211-III-IV-Info-Security-061cab6ee6c0fb0-53969879.ppt
2211-III-IV-Info-Security-061cab6ee6c0fb0-53969879.ppt
CISA-Exam-Prep-Domain-5-2019.pdf. CISA exam
Introduction_to_Security_Assessments.ppt
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
crisc_wk_5.pptx
Accelerating Regulatory Compliance for IBM i Systems
CISSP - Chapter 1 - Security Concepts
12 02-14 information security managers - unannotated
Introduction to Information security ppt
Ad

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Lesson notes of climatology university.
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Classroom Observation Tools for Teachers
PDF
RMMM.pdf make it easy to upload and study
PDF
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
Sports Quiz easy sports quiz sports quiz
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
GDM (1) (1).pptx small presentation for students
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Final Presentation General Medicine 03-08-2024.pptx
Computing-Curriculum for Schools in Ghana
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Lesson notes of climatology university.
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Classroom Observation Tools for Teachers
RMMM.pdf make it easy to upload and study
VCE English Exam - Section C Student Revision Booklet

CNIT 160 Ch 4 Information Security Program Development (Part 3)

  • 1. CNIT 160: Cybersecurity Responsibilities 4. Information Security Program Development Part 2 Pages 235-257
  • 2. Chapter Topics • This lecture covers: • Policy Development (p. 235) • Third-Party Risk Management • Administrative Activities • Internal Partnerships • External Partnerships • Compliance Management • Personnel Management
  • 3. Chapter Topics For Later Lectures • Administrative Activities • External Partnerships • Compliance Management • Personnel Management • Project and Program Management • Budget • Business Case Development • Vendor Management
  • 4. • Security Program Operations • IT Service Management • Controls • Metrics and Monitoring • Continuous Improvement Chapter Topics For Later Lectures
  • 6. Security Policy • Foundational • Defines principles and required actions • to protect assets and personnel • Audience is all personnel • Full-time and part-time employees • Temporary workers, contractors and consultants
  • 7. Easily Accessible • So no personnel can claim ignorance • As an excuse for violating policy • Often personnel must acknowledge understanding of policy • At time of hire and annually thereafter
  • 8. Considerations • Laws, regulations, standards • Risk tolerance • Controls • Organizational culture
  • 9. Alignment • Alignment with Controls • Policies and controls must not contradict each other • Alignment with Audience • Policy must be understood by the workers • Avoid overly technical policies • May have a separate policy for technical workers
  • 12. Policy Distribution and Acknowledgement • Policy should be well-known and easily accessible • High-ranking executive should inform workers that they are required to comply with the policy • Executives should lead by example
  • 14. Outsourcing • Must identify risks of cloud services • You can outsource work • But you cannot outsource responsibility
  • 15. Benefits from Use of Third Parties • Available skills and resources • Economies of scale • Objectivity • Reduced costs
  • 16. Risks from Use of Third Parties • Higher-than-expected costs • Poor quality or performance • Loss of control • Employee integrity and background • Loss of competitive advantage
  • 17. Risks from Use of Third Parties (continued) • Errors and omissions • Vendor failure • Differing mission and goals • Difficult recourse for problems • Lowered employee morale
  • 18. Risks from Use of Third Parties (continued) • Audit and compliance • Applicable laws • Cross-border data transfer • Time zone differences • Language and cultural differences
  • 19. Identifying Third Parties • Inventory third party vendors in use • Consult with stakeholders • Legal • Procurement • Accounts payable • Facilities • Department heads • Location-specific leaders
  • 20. IT and Third Parties • Ways to identify third parties in use • Established data connections with third parties • Firewall, IDS, and IPS rules • Connections to Identity and Access Management (IAM) systems • Cloud Access Security Broker (CASB) systems
  • 22. Risk Tiering and Vendor Classification • Cannot perform all due diligence on all vendors • Apply a level of due diligence according to the level of risk
  • 23. Criteria • Volume of sensitive customer data • Volume of sensitive internal data • Operational criticality • Physical access to company buildings • Access to information systems • Contractual obligations
  • 26. Assessing Third Parties • Questionnaires • Questionnaire confirmation • E.g. requesting evidence • Site visit • External attestation • Such as compliance with SOC2, HITRUST, ISO/IEC 27001, etc.
  • 27. Assessing Third Parties (continued) • External business intelligence • Services like Dunn & Bradstreet or Lexis Nexus • That collect information on health of companies • External cyber intelligence • Security scans • Dark web monitoring
  • 28. Assessing Third Parties (continued) • Security scans and penetration tests • Intrusive monitoring • Third party can view internal control data in real time • Such as event logs, firewall logs, or packet captures
  • 31. Proactive Issue Remediation • The only means of exchange between customer organization and third party are • Money and reputation • Especially when crossing national boundaries • Consider enforcement mechanisms
  • 32. Contractual Provisions • Service Level Agreement (SLA) • Quality • Security policy and controls • Business continuity • Employee integrity • Ownership of intellectual property • Roles and responsibilities
  • 33. Contractual Provisions (continued) • Schedule • Regulations and laws • Warranty • Dispute and resolution • Payment
  • 34. Responsive Issue Remediation • Results from a questionnaire may be unacceptable • Such as no password change requirements • Discussions with third parties may provoke changes • Or expose satisfactory compensating controls
  • 35. Onboarding • Process to begin a relationship with a third party • Up-front due diligence • To understand the level of risk • Before signing a legal agreement
  • 37. Security Incidents • Incident response is more complex • When two organizations are involved
  • 39. Importance • Partnerships • Are a source of information • And help manage security • Deputize team members from other groups • Designate security liaisons • But they need training and time allocated for these added duties
  • 40. Legal • Manages business risk • Through contract negotiations • With service providers, customers, and others • Information security can help • With security clauses • Best if security assessment happens before signing a contract
  • 41. Human Resources (HR) • Recruiting: background checks • Onboarding • Nondisclosure agreements • Training, including Security Awareness Training • Provisioning Human Resource Information Systems (HRISs)
  • 42. Human Resources (HR) (continued) • Internal transfers • Move to a different department • Change access to systems and applications • Avoid accumulation of privileges
  • 43. Human Resources (HR) (continued) • Offboarding • Notify security, IT and other departments • Terminate access rights promptly • To prevent revenge and sabotage • Collect company assets like laptops • Sign nondisclosure and noncompete agreements
  • 44. Human Resources (HR) (continued) • Training • Investigations • Often in partnership with information security • Forensics and chain of custody • Discipline • Demotion, time off without pay, dismissal, etc.
  • 45. Facilities • Access control • Workplace surveillance • Equipment check-in/check-out • Guest processing • Security guard • Asset security • Personnel safety
  • 46. Information Technology (IT) • Access control • Architecture • Hardening • Scanning and patching • Security tools • Firewalls, IDS, spam filters, etc.
  • 47. Information Technology (IT) (continued) • System monitoring • Security monitoring • Third-party connections
  • 48. Product Development • Security by design • Secure development • Security testing • Code reviews • Security review of open source software • Developer training • Protection of the development process
  • 49. Procurement • Due diligence for new purchases
  • 50. Finance • Accounts Payable is the partnership of last resort for information security • Because when they get involved, the vendor relationship is already established
  • 51. Business Unit Managers • Security manager should understand how each department functions • Develop relationships of trust
  • 52. Affiliates and Key Business Partners • Half of all security breaches have their nexus in third parties