SlideShare a Scribd company logo
Is ISO 27001, an answer to Security
Breaches?
RAMANA KROTHAPALLI
Agenda
Terms & Definitions
Information Security Standards & Best Practices
What is ISO 27001?
Why is ISO 27001 Popular?
Security breaches – could these have been avoided?
Things you can do..
Terms & Definitions
ISO: International Organization for Standardization
IEC: International Electrotechnical Commission
HLS: High Level Structure
Control: any process, policy, procedure, guideline, practice or organisational structure, which
can be administrative, technical, management, or legal in nature which manage information
security risk
Objective: statement describing what is to be achieved as a result of implementing controls
Data Breach: is a security incident in which sensitive, protected or confidential data is copied,
transmitted, viewed, stolen or used by an individual unauthorized to do so
Information Security Standards / Best Practices
ISO 27001: 2013
NIST SP 800 Series - National Institute of Standards and Technology Special Publications
COBIT - Control Objectives for Information and Related Technology
SOGP – Standard of Good Practice
PCI DSS - Payment Card Industry Data Security Standard
HIPAA - Health Insurance Portability and Accountability Act of 1996
SANS Best Practices
What is ISO 27001?
ISO 27001: 2013 is an International Standard specifying requirements for information security
management systems (ISMS)
This is a certifiable standard from the ISO 27000 series of standards aka ISMS family of
standards
Published by ISO & IEC
Organisations meeting the requirements may gain an official certification issued by an
independent and accredited certification body on completion of a formal audit process
The official title of the standard is "Information technology— Security techniques —
Information security management systems — Requirements“
Has 10 clauses and an annexure that lists 114 controls and their objectives grouped into 14
domains
Why ISO 27001 is popular?
Information security is the biggest driver for companies
Generic standard for implementing an ISMS
Technology neutral
Globally recognised & accepted
Compliance with business, legal, contractual and regulatory requirements
HLS that allows easier integration with other ISO Standards
Risk Based approach to identify appropriate security requirements
Process approach – alignment with business objectives
Recent Security Breaches
Disclaimer
The discussions are based on the news in the public domain and a few assumptions . The
complete information about the massive security breaches is not available in the public domain.
The sole idea of this session is to see if a management system approach to information security
could help to prevent similar breaches, or at least improve the time to detection.
JP Morgan Chase
Hackers “exploited an employee’s access to a development server as part of the attack on a JPMorgan Chase &
Co. server that led the theft of data on 76 million households and 7 million small businesses”.
Source: JPMorgan Password Leads Hackers to 76 Million Households
So much data accessible using just one employee access right?
A.9.4.3: “Password systems shall be interactive and shall ensure quality passwords”
A.12.1.4: Development, testing, and operational environments shall be separated to reduce the risks of
unauthorized access or changes to the operational environment
Hackers used multiple custom-crafted bits of malware to infiltrate
A.12.2.1: Detection, prevention and recovery controls to protect against malware shall be implemented,
combined with appropriate user awareness
Hackers spent months pulling data from the servers
A. 12.6.1: Organization’s exposure to such vulnerabilities to be evaluated and appropriate measures taken to
address the associated risk.
Sony Pictures
The hack was a release of confidential data belonging to Sony Pictures Entertainment; the data included personal
information about Sony Pictures employees and their families, e-mails between employees, information about executive
salaries at the company, copies of (previously) unreleased Sony films, and other information.
Duration of the hack is unknown, though evidence suggests that the intrusion occurred for more than a year.
Article on SC Magazine: (Could the Sony breach have been prevented)
http://www.scmagazine.com/could-the-sony-breach-have-been-prevented/article/394249/
One of Sony's biggest problems wasn't being hacked; it was failing to detect the hack until it became public.
A.12.7: Information systems audit considerations - minimise the impact of audit activities on operational systems
A.18.2.1: Independent review of information security
A. 12.6.1: Organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the
associated risk.
Sony hack leaked 47,000 Social Security numbers
A.10.1: Cryptographic controls - to protect the confidentiality, authenticity and/or integrity of information
Anthem Healthcare
Personal records of as many as 80 million individuals were compromised.
Anthem data was encrypted on-the-wire but not in storage
A.10.1: Cryptographic controls - to protect the confidentiality, authenticity and/or integrity of
information
The attack was discovered when a database administrator noticed unauthorized queries running
with admin credentials
A.12.4.3: System administrator and system operator activities shall be logged and the logs protected
and regularly reviewed
An outsider could have phished the credentials from an employee
A.9.1.1: An access control policy shall be established, documented and reviewed based on business
and information security requirements
(Context-aware access control could have stopped an outsider, even with phished credentials, by
examining where the authentication session was coming from, what platform was in use etc.)
Green's Accounting
Stolen Server Exposes Accounting Clients' Personal Data. The server held unencrypted data,
including clients' names, addresses and Social Security numbers, Bank account numbers.
The burglars broke in by smashing the office's back window with the rock, then stole the firm's
network server.
A.11.1: Controls to prevent unauthorized physical access
A.11.2.1: Equipment shall be sited and protected to reduce the risks from unauthorized access
A.10.1: Cryptographic controls - to protect the confidentiality, authenticity and/or integrity of
information
Things you can do..
Implement Security Policies & Procedures
Security Awareness Training
Vulnerability Assessments – Internal & External
Penetration Testing – Internal & External
Social Engineering Exercises
Enterprise Security Assessments
 Administrative Safeguards
 Technical Safeguards
 Physical Safeguards
THANK YOU!

More Related Content

PPTX
Basic introduction to iso27001
PPTX
Iso 27001 isms presentation
PPT
Popular Pitfalls In Isms Compliance
PDF
Isms awareness presentation
PDF
NQA ISO 27001 Implementation Guide
PDF
ISO 27001 Certification - The Benefits and Challenges
PPTX
Iso 27001 awareness
PPT
ISMS Part I
Basic introduction to iso27001
Iso 27001 isms presentation
Popular Pitfalls In Isms Compliance
Isms awareness presentation
NQA ISO 27001 Implementation Guide
ISO 27001 Certification - The Benefits and Challenges
Iso 27001 awareness
ISMS Part I

What's hot (20)

PPT
Iso27001 Isaca Seminar (23 May 08)
PPTX
Iso iec 27001 foundation training course by interprom
PPT
Information Security Management Systems(ISMS) By Dr Wafula
PDF
ISO27001: Implementation & Certification Process Overview
PPSX
Isms Implementer Course Module 1 Introduction To Information Security
PPT
Overview of ISO 27001 ISMS
PPT
ISO 27001 Benefits
PDF
ISO 27001 - IMPLEMENTATION CONSULTING
PDF
What is ISO 27001 ISMS
PDF
Implementing a Security Framework based on ISO/IEC 27002
PPTX
Presentation on iso 27001-2013, Internal Auditing and BCM
ODP
PPTX
Iso 27001 2013 clause 6 - planning - by Software development company in india
DOCX
Iso 27001 2013 Standard Requirements
PPTX
What is iso 27001 isms
PPTX
ISO 27001 - three years of lessons learned
PDF
Why ISO27001 For My Organisation
PDF
Transitioning to iso 27001 2013
DOC
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Iso27001 Isaca Seminar (23 May 08)
Iso iec 27001 foundation training course by interprom
Information Security Management Systems(ISMS) By Dr Wafula
ISO27001: Implementation & Certification Process Overview
Isms Implementer Course Module 1 Introduction To Information Security
Overview of ISO 27001 ISMS
ISO 27001 Benefits
ISO 27001 - IMPLEMENTATION CONSULTING
What is ISO 27001 ISMS
Implementing a Security Framework based on ISO/IEC 27002
Presentation on iso 27001-2013, Internal Auditing and BCM
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 Standard Requirements
What is iso 27001 isms
ISO 27001 - three years of lessons learned
Why ISO27001 For My Organisation
Transitioning to iso 27001 2013
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Ad

Viewers also liked (20)

PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PDF
ISO/IEC 27001:2013 An Overview
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PDF
ISO 27001 Information Security Management Systems Trends and Developments
DOC
Buying a business in florida
PDF
Null July - OWTF - Bharadwaj Machiraju
PPTX
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
PPT
Null dec 2014
PDF
Social engineering by-rakesh-nagekar
PDF
Security News Bytes
PPTX
Ted talk newest
PDF
Nomadic Display Instand Instructions
PDF
z/OS Communications Server: z/OS Resolver
PDF
World Cup! Young Germany Guest Blogging
DOC
SAmador CV
PPTX
Newsbytes_NULLHYD_Dec
PDF
Investor alert—investment scams exploit immigrant investor program
PDF
Raspberry pi 2
PPTX
Marvella city a complete township in haridwar
ISO 27001 - Information security user awareness training presentation - part 3
ISO/IEC 27001:2013 An Overview
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 Information Security Management Systems Trends and Developments
Buying a business in florida
Null July - OWTF - Bharadwaj Machiraju
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
Null dec 2014
Social engineering by-rakesh-nagekar
Security News Bytes
Ted talk newest
Nomadic Display Instand Instructions
z/OS Communications Server: z/OS Resolver
World Cup! Young Germany Guest Blogging
SAmador CV
Newsbytes_NULLHYD_Dec
Investor alert—investment scams exploit immigrant investor program
Raspberry pi 2
Marvella city a complete township in haridwar
Ad

Similar to Is iso 27001, an answer to security (20)

PDF
1678784047-mid_sem-2.pdf
PPTX
ISMS End-User Training Presentation.pptx
PDF
Chapter 12 iso 27001 awareness
PDF
1 info sec+risk-mgmt
PPTX
Topic11
PPTX
Dancyrityshy 1foundatioieh
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
ISO / IEC 27001:2005 – An Intorduction
PPTX
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPT
Information Security Identity and Access Management Administration 07072016
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPTX
ISO 27001 2022 REQUIREMENTS EXPLAINED 4.pptx
PPT
ch01.ppt
PPT
educational content, educational contented educational content
PPT
information security presentation topics
PPT
CISSP Certified Information System Security Professional_009.ppt
PPTX
Information Security Management System ISO/IEC 27001:2005
PPT
INFORMATION SECURITY STUDY GUIDE for STUDENTS
1678784047-mid_sem-2.pdf
ISMS End-User Training Presentation.pptx
Chapter 12 iso 27001 awareness
1 info sec+risk-mgmt
Topic11
Dancyrityshy 1foundatioieh
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
Accounting Information Systems 11th Edition Bodnar Solutions Manual
ISO / IEC 27001:2005 – An Intorduction
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Information Security Identity and Access Management Administration 07072016
Accounting Information Systems 11th Edition Bodnar Solutions Manual
ISO 27001 2022 REQUIREMENTS EXPLAINED 4.pptx
ch01.ppt
educational content, educational contented educational content
information security presentation topics
CISSP Certified Information System Security Professional_009.ppt
Information Security Management System ISO/IEC 27001:2005
INFORMATION SECURITY STUDY GUIDE for STUDENTS

More from Raghunath G (16)

PPSX
Securitynewsbytes
PPT
Whats app forensic
PPTX
Seh based exploitation
PPSX
Securitynewsbytes april2015-150418153901-conversion-gate01
PPTX
Analysis of malicious pdf
PPTX
Mobile application security 101
PPTX
Security News Bytes
PDF
Null HYD Playing with shodan null
PDF
Null HYD VRTDOS
PPTX
Metasploit
PPTX
Decoy documents
PDF
Spear phishing attacks-by-hari_krishna
PDF
Netcat 101 by-mahesh-beema
PDF
Xss 101 by-sai-shanthan
PDF
The art of_firewalking-by-sujay
PDF
Heartbleed by-danish amber
Securitynewsbytes
Whats app forensic
Seh based exploitation
Securitynewsbytes april2015-150418153901-conversion-gate01
Analysis of malicious pdf
Mobile application security 101
Security News Bytes
Null HYD Playing with shodan null
Null HYD VRTDOS
Metasploit
Decoy documents
Spear phishing attacks-by-hari_krishna
Netcat 101 by-mahesh-beema
Xss 101 by-sai-shanthan
The art of_firewalking-by-sujay
Heartbleed by-danish amber

Recently uploaded (20)

PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
RMMM.pdf make it easy to upload and study
PDF
01-Introduction-to-Information-Management.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Pre independence Education in Inndia.pdf
PDF
Complications of Minimal Access Surgery at WLH
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
RMMM.pdf make it easy to upload and study
01-Introduction-to-Information-Management.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
PPH.pptx obstetrics and gynecology in nursing
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Classroom Observation Tools for Teachers
Pre independence Education in Inndia.pdf
Complications of Minimal Access Surgery at WLH

Is iso 27001, an answer to security

  • 1. Is ISO 27001, an answer to Security Breaches? RAMANA KROTHAPALLI
  • 2. Agenda Terms & Definitions Information Security Standards & Best Practices What is ISO 27001? Why is ISO 27001 Popular? Security breaches – could these have been avoided? Things you can do..
  • 3. Terms & Definitions ISO: International Organization for Standardization IEC: International Electrotechnical Commission HLS: High Level Structure Control: any process, policy, procedure, guideline, practice or organisational structure, which can be administrative, technical, management, or legal in nature which manage information security risk Objective: statement describing what is to be achieved as a result of implementing controls Data Breach: is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so
  • 4. Information Security Standards / Best Practices ISO 27001: 2013 NIST SP 800 Series - National Institute of Standards and Technology Special Publications COBIT - Control Objectives for Information and Related Technology SOGP – Standard of Good Practice PCI DSS - Payment Card Industry Data Security Standard HIPAA - Health Insurance Portability and Accountability Act of 1996 SANS Best Practices
  • 5. What is ISO 27001? ISO 27001: 2013 is an International Standard specifying requirements for information security management systems (ISMS) This is a certifiable standard from the ISO 27000 series of standards aka ISMS family of standards Published by ISO & IEC Organisations meeting the requirements may gain an official certification issued by an independent and accredited certification body on completion of a formal audit process The official title of the standard is "Information technology— Security techniques — Information security management systems — Requirements“ Has 10 clauses and an annexure that lists 114 controls and their objectives grouped into 14 domains
  • 6. Why ISO 27001 is popular? Information security is the biggest driver for companies Generic standard for implementing an ISMS Technology neutral Globally recognised & accepted Compliance with business, legal, contractual and regulatory requirements HLS that allows easier integration with other ISO Standards Risk Based approach to identify appropriate security requirements Process approach – alignment with business objectives
  • 8. Disclaimer The discussions are based on the news in the public domain and a few assumptions . The complete information about the massive security breaches is not available in the public domain. The sole idea of this session is to see if a management system approach to information security could help to prevent similar breaches, or at least improve the time to detection.
  • 9. JP Morgan Chase Hackers “exploited an employee’s access to a development server as part of the attack on a JPMorgan Chase & Co. server that led the theft of data on 76 million households and 7 million small businesses”. Source: JPMorgan Password Leads Hackers to 76 Million Households So much data accessible using just one employee access right? A.9.4.3: “Password systems shall be interactive and shall ensure quality passwords” A.12.1.4: Development, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to the operational environment Hackers used multiple custom-crafted bits of malware to infiltrate A.12.2.1: Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user awareness Hackers spent months pulling data from the servers A. 12.6.1: Organization’s exposure to such vulnerabilities to be evaluated and appropriate measures taken to address the associated risk.
  • 10. Sony Pictures The hack was a release of confidential data belonging to Sony Pictures Entertainment; the data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of (previously) unreleased Sony films, and other information. Duration of the hack is unknown, though evidence suggests that the intrusion occurred for more than a year. Article on SC Magazine: (Could the Sony breach have been prevented) http://www.scmagazine.com/could-the-sony-breach-have-been-prevented/article/394249/ One of Sony's biggest problems wasn't being hacked; it was failing to detect the hack until it became public. A.12.7: Information systems audit considerations - minimise the impact of audit activities on operational systems A.18.2.1: Independent review of information security A. 12.6.1: Organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk. Sony hack leaked 47,000 Social Security numbers A.10.1: Cryptographic controls - to protect the confidentiality, authenticity and/or integrity of information
  • 11. Anthem Healthcare Personal records of as many as 80 million individuals were compromised. Anthem data was encrypted on-the-wire but not in storage A.10.1: Cryptographic controls - to protect the confidentiality, authenticity and/or integrity of information The attack was discovered when a database administrator noticed unauthorized queries running with admin credentials A.12.4.3: System administrator and system operator activities shall be logged and the logs protected and regularly reviewed An outsider could have phished the credentials from an employee A.9.1.1: An access control policy shall be established, documented and reviewed based on business and information security requirements (Context-aware access control could have stopped an outsider, even with phished credentials, by examining where the authentication session was coming from, what platform was in use etc.)
  • 12. Green's Accounting Stolen Server Exposes Accounting Clients' Personal Data. The server held unencrypted data, including clients' names, addresses and Social Security numbers, Bank account numbers. The burglars broke in by smashing the office's back window with the rock, then stole the firm's network server. A.11.1: Controls to prevent unauthorized physical access A.11.2.1: Equipment shall be sited and protected to reduce the risks from unauthorized access A.10.1: Cryptographic controls - to protect the confidentiality, authenticity and/or integrity of information
  • 13. Things you can do.. Implement Security Policies & Procedures Security Awareness Training Vulnerability Assessments – Internal & External Penetration Testing – Internal & External Social Engineering Exercises Enterprise Security Assessments  Administrative Safeguards  Technical Safeguards  Physical Safeguards