SlideShare a Scribd company logo
Enterprise Security
- Critical Security Functions
 There are several elements to consider to properly protect an organization. In order to
align security adequately, it is possible to refer to an information security standard such
as ISO 27002.
 For many organizations, a smaller framework scope can be necessary in order to
quickly implement security controls and bring the organization to an acceptable
security posture.
 In this article, we describe the main areas where it is possible to focus to quickly
increase the security posture of an enterprise.
 This guide does not encompass all controls and controls objectives and its main focus
is to provide guidance on critical aspects often forgotten or not properly addressed.
Enterprise Security
- Critical Security Functions version 1.0
June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Among the biggest
security challenges
 One of the biggest challenge for organization is to established roles for security.
 Undefined roles lead to inappropriate security management and practice. In this
circumstance, everyone give best effort to maintain the overall security in an
unstructured way.
 It can give positive result for a certain time, but on a long period, the security posture
of the organization will almost always decrease.
 The planning, organization, implementation and verification of security is challenging
for every organization.
How to improve?
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Security Governance
 Establish authoritative role for Information Security with accountability and
responsibility in a security program.
 There must be a management role for Information Security Management such as
CISO, CSO, etc. This person must determine roles and responsibilities of the
Information Security members (incident management, vulnerability management,
system change/update, etc.). Formalize Operational Security Role & Responsibility
and Processes.
 Roles and responsibilities must be officially defined and integrated to work functions of
each members of the security team. Interaction with other team such as the system
administration group and other department must be defined and understood by the
security members.
 Security members must be adequately trained and a security awareness and training
standard practice must be in place.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
IT Risk Management
 An IT Risk Management standard practice must be in place in order to implement
appropriate controls and justify decisions according to the risk and impact on the
enterprise of various situations or scenarios (ex.: cyber-attack, natural disaster, human
error such as misconfiguration, etc.).
 Standard methodology and templates must exist for information classification and
risk/impact analysis.
 Controls to reduce the capability of threat/attack and controls to reduce vulnerabilities
must be identified, implemented, audit and verified regularly.
 When a necessary control cannot be implemented according to the identified
risk/impact, a justification must exist with compensatory measures. Justification must
be reviewed periodically and are valid only for a certain period of time. All effort must
be made to eliminate the justification and implement the control to reduce the
risk/impact.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Information System
Management
 Protection equipment, according to the identified risk and impact must be selected,
implemented, audit and verified regularly (ex.: servers, firewall, IPS, etc.).
 Appropriate systems and equipment must be available to security members to conduct
their task, such as a ticketing system for incident management.
 Protection systems must be kept up-to-date and modifications must follow a change
management process in place.
 Following an incident, according to the result of the investigation, protective systems
must be updated when applicable (ex.: increase logging, update protective rules, etc.).
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Threat & Incident
Management
 Role regarding incident management must be identified (ex.: security manager, IT
Security Leader, IT Security Analyst, other team responsibilities/interaction, etc.).
 A plan, a process and a practice must be in place regarding threat and incident
management.
 Manual threat and incident activities must be in place to identify irregularity (ex.: log
review, system audit, etc.).
 Automation must exist to automatically detect known threat at the organizational
boundaries or at sub-layer network if passed main defensive systems.
 A threat and intelligence mechanism is strongly suggested (ex.: correlation between
internal network/systems events with an external threat feeds).
 An incident management systems must be available and used to track and manage
incidents.
 Investigation standard must exist in the organization specifying the way to investigate
incidents, systems to be used and the procedure to follow.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Vulnerability Management
 A process and a practice must be in place regarding vulnerability management.
 Role of the security, system administration, assets owners, change management,
compliance, etc. must be defined in a process and RACI chart.
 There must be a mechanism to be informed of know vulnerabilities for systems in
scope (ex.: external advisory feeds).
 There must be a procedure for emergency or critical update in order to quickly
implement fix and remain secured.
 Every significant change must be logged, verified, confirmed and conducted according
to a change management practice in place.
Enterprise Security
- Critical Security Functions version 1.0
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
June 10th 2015
Protecting Information
Resources
 According to the classification scheme defined in the risk management activities, we
must classify data according to confidentiality, integrity and availability.
 To be able to protect the information, we must create a protection map (ex.: a map of
all information and systems of the organization).
 There must be roles specifying management, prevention, detection, response and
correction of security issue or disruption to maintain integrity/availability/confidentiality
(daily).
 Standards must be in place for encryption (ex.: hashing for integrity, symmetric
encryption for confidentiality, asymmetric keys for authenticity, etc.).
 Encryption mechanisms must implemented and used according to the information
classification, risk and impact defined in risk management activities where security
controls are defined.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
BCP Management
 Backup systems and data must be available in a timely fashion in order to maintain
operation, especially in case of incident.
 Backup must be verified regularly to ensure the viability of the information and
systems.
 It is strongly suggested to use virtual environment with ready image backup. In case of
incident, an image can be restore, updated to current stable and bring live to
production to continue the operation normally.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Identity and Access
Control Management
 Policies must exist regarding internal access and external access to ensure they are
managed according to different criteria and needs (ex.: vendor access, employee
access, etc.) and different rules must be implemented accordingly.
 It is strongly suggested to follow the least privileges principles at all time and remove
right at the moment someone doesn't have the need to know or to use in order to
accomplish his work.
 It is also strongly suggested to follow the principle:”all user are considered untrust until
they prove the needs to know or use according to criteria (ex.: group, ID, system
integrity check)”. Even an employe account can be considered untrust at first and
according to criteria, gain more access.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Identity and Access
Control Management
 A security architecture must defined the various zones of the organization (ex.:
Intranet, Extranet, shared services, etc.), control objectives defined for each zone with
controls to respect the control objectives. Risk and impact are important elements to
consider when defining control objectives (ex.: everyone can access the zone,
employee can access the zone, remote user cannot access the zone, etc.).
 Two factor authentication is strongly suggested for access to sensitive or critical
systems.
 A process must be in place for commissioning and decommissioning account. If
possible, automation can be used. A practice must be in place and defining the
management of identifies in the organization (ex.: account review, password
strength/change).
 Privilege account disclosure can lead to greater impact and must be managed, monitor
and verified closely. In the case of external access, such for vendors, it can be
appropriate that a security analyst monitor the session (remote session opening,
monitor changes, ensure remote session is closed).
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Change Management
 We must distinguished “significant change” vs “non-significant change” (ex.: kernel
update is significant, virus definition update is not a significant change.
 A policy, a process and the according procedures must be defined, understood and
followed for any significant change.
 There must be rules defined for emergency/critical changes in order to bring the
necessary flexibility to react quickly and properly. These rules must not be pass-trough
rules, every exception must be justified. Usually, standard change management steps
are just delayed, but followed as usual.
 There must be roll-back process, procedure with the information and systems ready to
go back to a stable state in case of unsuccessful change.
Enterprise Security
- Critical Security Functions version 1.0 June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Physical Security
 With the current tendencies, information is becoming more and more accessible
electronically and often online. Many objects are now integrating electronic remote
access (ex.: car) and physical security must be rethink to include electronic emissions,
radio frequency, mobile and WIFI transmissions and access to interfaces/protocols.
 Biometrics mechanisms are becoming standards in many organizations. False positive
is when an individual gain access while he is not supposed to and those incident are
very critical; tests and evidences must exist to confirm effectiveness of the device.
 Physical security can prevent, detect , deter, etc. (ex.: outside light, fence).
 Data center must be chose carefully (ex.: not close to river, with multiple road access,
etc.) and disaster center must be in an appropriate distance and location to prevent
any impact from a geographical disaster.
 Any privileges access must be supported by two factor authentication (ex.: magnetic
cards/pin pad locks and finger print).
June 10th 2015
Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM

More Related Content

PDF
SMB270: Security Essentials for ITSM
PDF
Five principles for improving your cyber security
PDF
Nist.sp.800 37r2
PPT
Information Security Identity and Access Management Administration 07072016
PPT
information security management
PPTX
Security management concepts and principles
PDF
Bit defender ebook_secmonitor_print
PDF
Security Maturity Model
SMB270: Security Essentials for ITSM
Five principles for improving your cyber security
Nist.sp.800 37r2
Information Security Identity and Access Management Administration 07072016
information security management
Security management concepts and principles
Bit defender ebook_secmonitor_print
Security Maturity Model

What's hot (20)

PPTX
Information security management best practice
PDF
Information Security Risk Management Overview
PPTX
DojoSec FISMA Presentation
PDF
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
PDF
Vskills Certified Network Security Professional Sample Material
PDF
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
PPTX
Information security management (bel g. ragad)
PDF
Chapter 10 security standart
PDF
Scada implement secure - architecture
PDF
Ch09 Information Security Best Practices
PDF
Risk Management
PDF
Ch06 Policy
PPT
Is awareness government
DOC
The security risk management guide
DOCX
Information security management iso27001
PPT
Security Management Practices
PDF
What is Enterprise Security Architecture (ESA)?
PPTX
Risk management ISO 27001 Standard
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Information security management best practice
Information Security Risk Management Overview
DojoSec FISMA Presentation
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Vskills Certified Network Security Professional Sample Material
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
Information security management (bel g. ragad)
Chapter 10 security standart
Scada implement secure - architecture
Ch09 Information Security Best Practices
Risk Management
Ch06 Policy
Is awareness government
The security risk management guide
Information security management iso27001
Security Management Practices
What is Enterprise Security Architecture (ESA)?
Risk management ISO 27001 Standard
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Ad

Viewers also liked (8)

PDF
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
PPTX
Integrating Qualys into the patch and vulnerability management processes
PPTX
Vulnerability Management
PPT
Framework for a business process management competency centre
PDF
Implementing Vulnerability Management
PDF
TrustedAgent GRC for Vulnerability Management
PPTX
Expert talk strategic building blocks for the digital transformation strategy
PPTX
Governance and Management of Enterprise IT with COBIT 5 Framework
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Integrating Qualys into the patch and vulnerability management processes
Vulnerability Management
Framework for a business process management competency centre
Implementing Vulnerability Management
TrustedAgent GRC for Vulnerability Management
Expert talk strategic building blocks for the digital transformation strategy
Governance and Management of Enterprise IT with COBIT 5 Framework
Ad

Similar to Enterprise Security Critical Security Functions version 1.0 (20)

DOCX
The Security and Compliance Plan for Maxistar Medical Supplies Company
DOC
Five Mistakes of Vulnerability Management
PPTX
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
PPTX
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
PDF
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
PDF
(Ebook) CIS Critical Security Controls by Center for Internet Security
PDF
PSIM: Why Should I Be Interested?
PPTX
Cyber Families - Incident Response.pptx
PDF
InTech-FOCUS-Process-Safety-Sept2020.pdf
PDF
Managing Compliance
PDF
It Security Audit Process
PDF
Se project-methodology-for-security-project-web
PDF
Symantec Managed AV Service - KAZ
PDF
Ignyte assurance platform NIST RMF datasheet.
PDF
Applying Lean for information security operations centre
PPT
Implementation of security standards and procedures
DOC
Automated Incident Handling Using SIM
PPTX
McAfee SIEM solution
DOCX
MATH215 Introduction To Analysis.docx
The Security and Compliance Plan for Maxistar Medical Supplies Company
Five Mistakes of Vulnerability Management
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
(Ebook) CIS Critical Security Controls by Center for Internet Security
PSIM: Why Should I Be Interested?
Cyber Families - Incident Response.pptx
InTech-FOCUS-Process-Safety-Sept2020.pdf
Managing Compliance
It Security Audit Process
Se project-methodology-for-security-project-web
Symantec Managed AV Service - KAZ
Ignyte assurance platform NIST RMF datasheet.
Applying Lean for information security operations centre
Implementation of security standards and procedures
Automated Incident Handling Using SIM
McAfee SIEM solution
MATH215 Introduction To Analysis.docx

More from Marc-Andre Heroux (9)

PPTX
Linux encrypted container
PDF
IT Control Framework
PPTX
Online Authentication
PDF
Monitoring your organization against threats - Critical System Control
PPTX
Frame - MAC Address Threats & Vulnerabilities
PPTX
Modèle de sécurité organisationnelle
PPT
Méthodologie - adoption d'une norme en 7 étapes
PPTX
BUSINESS MATURITY LIFE CYCLE
PPTX
Assurance compliance management system
Linux encrypted container
IT Control Framework
Online Authentication
Monitoring your organization against threats - Critical System Control
Frame - MAC Address Threats & Vulnerabilities
Modèle de sécurité organisationnelle
Méthodologie - adoption d'une norme en 7 étapes
BUSINESS MATURITY LIFE CYCLE
Assurance compliance management system

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
project resource management chapter-09.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
August Patch Tuesday
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
NewMind AI Weekly Chronicles - August'25-Week II
Heart disease approach using modified random forest and particle swarm optimi...
Tartificialntelligence_presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
project resource management chapter-09.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation_ Review paper, used for researhc scholars
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hindi spoken digit analysis for native and non-native speakers
Programs and apps: productivity, graphics, security and other tools
WOOl fibre morphology and structure.pdf for textiles
Group 1 Presentation -Planning and Decision Making .pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
OMC Textile Division Presentation 2021.pptx
August Patch Tuesday
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Mushroom cultivation and it's methods.pdf
TLE Review Electricity (Electricity).pptx

Enterprise Security Critical Security Functions version 1.0

  • 1. Enterprise Security - Critical Security Functions  There are several elements to consider to properly protect an organization. In order to align security adequately, it is possible to refer to an information security standard such as ISO 27002.  For many organizations, a smaller framework scope can be necessary in order to quickly implement security controls and bring the organization to an acceptable security posture.  In this article, we describe the main areas where it is possible to focus to quickly increase the security posture of an enterprise.  This guide does not encompass all controls and controls objectives and its main focus is to provide guidance on critical aspects often forgotten or not properly addressed. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 2. Among the biggest security challenges  One of the biggest challenge for organization is to established roles for security.  Undefined roles lead to inappropriate security management and practice. In this circumstance, everyone give best effort to maintain the overall security in an unstructured way.  It can give positive result for a certain time, but on a long period, the security posture of the organization will almost always decrease.  The planning, organization, implementation and verification of security is challenging for every organization. How to improve? Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 3. Security Governance  Establish authoritative role for Information Security with accountability and responsibility in a security program.  There must be a management role for Information Security Management such as CISO, CSO, etc. This person must determine roles and responsibilities of the Information Security members (incident management, vulnerability management, system change/update, etc.). Formalize Operational Security Role & Responsibility and Processes.  Roles and responsibilities must be officially defined and integrated to work functions of each members of the security team. Interaction with other team such as the system administration group and other department must be defined and understood by the security members.  Security members must be adequately trained and a security awareness and training standard practice must be in place. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 4. IT Risk Management  An IT Risk Management standard practice must be in place in order to implement appropriate controls and justify decisions according to the risk and impact on the enterprise of various situations or scenarios (ex.: cyber-attack, natural disaster, human error such as misconfiguration, etc.).  Standard methodology and templates must exist for information classification and risk/impact analysis.  Controls to reduce the capability of threat/attack and controls to reduce vulnerabilities must be identified, implemented, audit and verified regularly.  When a necessary control cannot be implemented according to the identified risk/impact, a justification must exist with compensatory measures. Justification must be reviewed periodically and are valid only for a certain period of time. All effort must be made to eliminate the justification and implement the control to reduce the risk/impact. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 5. Information System Management  Protection equipment, according to the identified risk and impact must be selected, implemented, audit and verified regularly (ex.: servers, firewall, IPS, etc.).  Appropriate systems and equipment must be available to security members to conduct their task, such as a ticketing system for incident management.  Protection systems must be kept up-to-date and modifications must follow a change management process in place.  Following an incident, according to the result of the investigation, protective systems must be updated when applicable (ex.: increase logging, update protective rules, etc.). Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 6. Threat & Incident Management  Role regarding incident management must be identified (ex.: security manager, IT Security Leader, IT Security Analyst, other team responsibilities/interaction, etc.).  A plan, a process and a practice must be in place regarding threat and incident management.  Manual threat and incident activities must be in place to identify irregularity (ex.: log review, system audit, etc.).  Automation must exist to automatically detect known threat at the organizational boundaries or at sub-layer network if passed main defensive systems.  A threat and intelligence mechanism is strongly suggested (ex.: correlation between internal network/systems events with an external threat feeds).  An incident management systems must be available and used to track and manage incidents.  Investigation standard must exist in the organization specifying the way to investigate incidents, systems to be used and the procedure to follow. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 7. Vulnerability Management  A process and a practice must be in place regarding vulnerability management.  Role of the security, system administration, assets owners, change management, compliance, etc. must be defined in a process and RACI chart.  There must be a mechanism to be informed of know vulnerabilities for systems in scope (ex.: external advisory feeds).  There must be a procedure for emergency or critical update in order to quickly implement fix and remain secured.  Every significant change must be logged, verified, confirmed and conducted according to a change management practice in place. Enterprise Security - Critical Security Functions version 1.0 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM June 10th 2015
  • 8. Protecting Information Resources  According to the classification scheme defined in the risk management activities, we must classify data according to confidentiality, integrity and availability.  To be able to protect the information, we must create a protection map (ex.: a map of all information and systems of the organization).  There must be roles specifying management, prevention, detection, response and correction of security issue or disruption to maintain integrity/availability/confidentiality (daily).  Standards must be in place for encryption (ex.: hashing for integrity, symmetric encryption for confidentiality, asymmetric keys for authenticity, etc.).  Encryption mechanisms must implemented and used according to the information classification, risk and impact defined in risk management activities where security controls are defined. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 9. BCP Management  Backup systems and data must be available in a timely fashion in order to maintain operation, especially in case of incident.  Backup must be verified regularly to ensure the viability of the information and systems.  It is strongly suggested to use virtual environment with ready image backup. In case of incident, an image can be restore, updated to current stable and bring live to production to continue the operation normally. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 10. Identity and Access Control Management  Policies must exist regarding internal access and external access to ensure they are managed according to different criteria and needs (ex.: vendor access, employee access, etc.) and different rules must be implemented accordingly.  It is strongly suggested to follow the least privileges principles at all time and remove right at the moment someone doesn't have the need to know or to use in order to accomplish his work.  It is also strongly suggested to follow the principle:”all user are considered untrust until they prove the needs to know or use according to criteria (ex.: group, ID, system integrity check)”. Even an employe account can be considered untrust at first and according to criteria, gain more access. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 11. Identity and Access Control Management  A security architecture must defined the various zones of the organization (ex.: Intranet, Extranet, shared services, etc.), control objectives defined for each zone with controls to respect the control objectives. Risk and impact are important elements to consider when defining control objectives (ex.: everyone can access the zone, employee can access the zone, remote user cannot access the zone, etc.).  Two factor authentication is strongly suggested for access to sensitive or critical systems.  A process must be in place for commissioning and decommissioning account. If possible, automation can be used. A practice must be in place and defining the management of identifies in the organization (ex.: account review, password strength/change).  Privilege account disclosure can lead to greater impact and must be managed, monitor and verified closely. In the case of external access, such for vendors, it can be appropriate that a security analyst monitor the session (remote session opening, monitor changes, ensure remote session is closed). Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 12. Change Management  We must distinguished “significant change” vs “non-significant change” (ex.: kernel update is significant, virus definition update is not a significant change.  A policy, a process and the according procedures must be defined, understood and followed for any significant change.  There must be rules defined for emergency/critical changes in order to bring the necessary flexibility to react quickly and properly. These rules must not be pass-trough rules, every exception must be justified. Usually, standard change management steps are just delayed, but followed as usual.  There must be roll-back process, procedure with the information and systems ready to go back to a stable state in case of unsuccessful change. Enterprise Security - Critical Security Functions version 1.0 June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
  • 13. Physical Security  With the current tendencies, information is becoming more and more accessible electronically and often online. Many objects are now integrating electronic remote access (ex.: car) and physical security must be rethink to include electronic emissions, radio frequency, mobile and WIFI transmissions and access to interfaces/protocols.  Biometrics mechanisms are becoming standards in many organizations. False positive is when an individual gain access while he is not supposed to and those incident are very critical; tests and evidences must exist to confirm effectiveness of the device.  Physical security can prevent, detect , deter, etc. (ex.: outside light, fence).  Data center must be chose carefully (ex.: not close to river, with multiple road access, etc.) and disaster center must be in an appropriate distance and location to prevent any impact from a geographical disaster.  Any privileges access must be supported by two factor authentication (ex.: magnetic cards/pin pad locks and finger print). June 10th 2015 Marc-Andre Heroux, CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM