SlideShare a Scribd company logo
Informa(on	
  Systems	
  Security	
  Programs	
  
Na(onal	
  Futures	
  Associa(on	
  
9070	
  -­‐	
  NFA	
  COMPLIANCE	
  RULES	
  2-­‐9,	
  2-­‐36	
  AND	
  2-­‐49:	
  INFORMATION	
  SYSTEMS	
  
SECURITY	
  PROGRAMS	
  
hNp://www.nfa.futures.org/nfamanual/NFAManual.aspx?RuleID=9070&Sec(on=9	
  
	
  
Wesley.Moore@Quarule.com	
  
What	
  Comprises	
  the	
  Informa(on	
  Systems	
  Security	
  Program?	
  
	
  
	
  Regulatory	
  rules	
  
	
  Five	
  areas	
  of	
  an	
  Informa.on	
  Systems	
  Security	
  Program	
  (ISSP):	
  
1.  Wri<en	
  Program	
  
2.  Security	
  and	
  Risk	
  Analysis	
  
3.  Deployment	
  of	
  Protec.ve	
  Measures	
  Against	
  Iden.fied	
  Threats	
  and	
  Vulnerabili.es	
  
4.  Response	
  and	
  Recovery	
  from	
  Threats	
  to	
  Electronic	
  Systems	
  
5.  Employee	
  Training	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   2	
  
Do	
  We	
  Have	
  a	
  WriNen	
  	
  
Informa(on	
  Security	
  Systems	
  Program	
  (ISSP)?	
  
	
  
Regulatory	
  rules	
  
a)  Members	
  must	
  adopt	
  and	
  enforce	
  a	
  wri<en	
  ISSP	
  designed	
  to	
  provide	
  safeguards	
  and	
  
protect	
  against	
  security	
  threats	
  or	
  hazards	
  to	
  their	
  technology	
  systems.	
  
b)  The	
  wri<en	
  ISSP	
  must	
  be	
  appropriate	
  to	
  the	
  Member's	
  size,	
  complexity	
  of	
  opera.ons,	
  type	
  
of	
  customers	
  and	
  counterpar.es,	
  the	
  sensi.vity	
  of	
  the	
  data	
  accessible	
  within	
  its	
  systems,	
  
and	
  its	
  electronic	
  interconnec.vity	
  with	
  other	
  en..es.	
  
c)  There	
  are	
  several	
  cybersecurity	
  best	
  prac.ces	
  and	
  standards	
  readily	
  available,	
  including	
  
those	
  promulgated	
  by	
  SANS,	
  OWASP,	
  ISACA's	
  COBIT	
  5,	
  and	
  NIST.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  have	
  a	
  wri<en	
  ISSP?	
  
2.  Is	
  the	
  ISSP	
  appropriate	
  for	
  the	
  Member’s	
  specific	
  needs?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   3	
  
Do	
  We	
  Analyze	
  Security	
  and	
  Risk?	
  	
  
	
  
There	
  are	
  many	
  different	
  types	
  of	
  internal	
  and	
  external	
  threats,	
  including:	
  
a)  Loss,	
  destruc.on	
  or	
  thea	
  of	
  data;	
  	
  
b)  A<acks	
  by	
  viruses,	
  spyware	
  and	
  other	
  malware;	
  and	
  
c)  Intercep.on	
  and	
  compromising	
  of	
  electronic	
  transmissions.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  keep	
  track	
  of	
  their	
  hardware	
  and	
  soaware?	
  	
  
2.  Has	
  the	
  Member	
  reviewed	
  the	
  vulnerabili.es	
  of	
  their	
  electronic	
  infrastructure?	
  
3.  Is	
  the	
  Member’s	
  data	
  secure?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   4	
  
Do	
  We	
  Assess	
  and	
  Priori(ze?	
  
Members	
  must	
  assess	
  and	
  priori.ze	
  the	
  risks	
  associated	
  with	
  the	
  
use	
  of	
  their	
  informa.on	
  technology	
  systems.	
  
Regulatory	
  rules	
  
a)  Es.mate	
  the	
  severity	
  of	
  the	
  poten.al	
  threats;	
  	
  
b)  Perform	
  a	
  vulnerability	
  analysis;	
  and	
  
c)  Decide	
  how	
  to	
  manage	
  the	
  risks	
  of	
  these	
  threats.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Have	
  there	
  been	
  any	
  past	
  incidents?	
  
2.  What	
  are	
  the	
  known	
  threats	
  iden.fied	
  by	
  other	
  en..es?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   5	
  
How	
  Do	
  We	
  Protect	
  Against	
  	
  
Iden(fied	
  Threats	
  and	
  Vulnerabili(es?	
  
	
  
A	
  Member	
  should	
  document	
  in	
  their	
  ISSP	
  the	
  safeguards	
  that	
  they	
  deploy	
  aaer	
  reviewing	
  and	
  
priori.zing	
  threats	
  and	
  vulnerabili.es.	
  These	
  safeguards	
  will	
  depend	
  on	
  the	
  Member’s	
  specific	
  
needs,	
  and	
  can	
  include:	
  
a)  Physically	
  protec.ng	
  buildings,	
  equipment	
  and	
  assets;	
  
b)  Using	
  and	
  maintaining	
  up-­‐to-­‐date	
  firewall,	
  an.-­‐virus	
  and	
  an.-­‐malware	
  soaware;	
  
c)  Limi.ng	
  both	
  physical	
  and	
  electronic	
  access;	
  
d)  Ensuring	
  that	
  systems	
  are	
  regularly	
  and	
  properly	
  updated;	
  
e)  Deploying	
  encryp.on	
  soaware;	
  
f)  Preven.ng	
  the	
  use	
  of	
  unauthorized	
  soaware;	
  
g)  Backing	
  up	
  systems	
  and	
  data;	
  and	
  
h)  Ensuring	
  that	
  mobile	
  devices	
  are	
  subject	
  to	
  similar	
  applicable	
  safeguards.	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   6	
  
How	
  Do	
  We	
  Detect	
  Poten(al	
  Threats	
  and	
  Vulnerabili(es?	
  
	
  
Regulatory	
  rules	
  
Members	
  should	
  also	
  document	
  and	
  implement	
  reasonable	
  procedures	
  to	
  detect	
  poten.al	
  
threats,	
  including	
  new	
  and	
  emerging	
  threats.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  What	
  procedures	
  does	
  Member	
  have	
  in	
  place?	
  	
  
2.  Do	
  those	
  procedures	
  meet	
  the	
  proper	
  standards?	
  
3.  Is	
  the	
  Member	
  a	
  part	
  of	
  a	
  threat	
  sharing	
  organiza.on	
  which	
  can	
  alert	
  the	
  Member	
  of	
  new	
  
and	
  emerging	
  threats?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   7	
  
How	
  Do	
  We	
  Respond	
  to	
  Threats	
  to	
  Electronic	
  Systems?	
  
Regulatory	
  rules	
  
Members	
  should	
  create	
  an	
  incident	
  response	
  plan	
  to	
  provide	
  a	
  framework	
  to	
  manage	
  detected	
  
security	
  incidents,	
  analyze	
  their	
  poten(al	
  impact	
  and	
  take	
  appropriate	
  measures	
  to	
  contain	
  
and	
  mi.gate	
  their	
  threat.	
  
The	
  response	
  plan	
  should	
  list	
  out	
  how	
  the	
  Member	
  will	
  address	
  poten(al	
  incidents,	
  including	
  
how	
  it	
  will	
  communicate	
  and	
  escalate	
  incidents	
  internally,	
  and	
  how	
  it	
  will	
  communicate	
  
externally	
  with	
  customers,	
  counterpar.es,	
  regulators,	
  and	
  law	
  enforcement.	
  
The	
  Member’s	
  response	
  plan	
  should	
  also	
  include	
  how	
  the	
  Member	
  plans	
  to	
  restore	
  
compromised	
  systems	
  and	
  data,	
  and	
  how	
  it	
  will	
  incorporate	
  lessons	
  learned	
  into	
  the	
  ISSP.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  have	
  a	
  response	
  plan?	
  
2.  Does	
  the	
  response	
  plan	
  detail	
  how	
  to	
  determine	
  the	
  level	
  and	
  type	
  of	
  threat	
  and	
  how	
  to	
  
respond?	
  
3.  Does	
  the	
  response	
  plan	
  detail	
  how	
  restore	
  compromised	
  systems	
  and	
  data?	
  
4.  Does	
  the	
  response	
  plan	
  detail	
  who,	
  how	
  and	
  when	
  to	
  communicate	
  details	
  of	
  an	
  incident?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   8	
  
Does	
  Everyone	
  Know	
  What	
  to	
  Do?	
  
	
  
Regulatory	
  rules	
  
A	
  Member's	
  ISSP	
  should	
  contain	
  a	
  descrip.on	
  of	
  the	
  Member's	
  educa(on	
  and	
  training	
  rela.ng	
  
to	
  informa.on	
  security	
  for	
  all	
  appropriate	
  personnel.	
  This	
  training	
  program	
  should	
  be	
  
conducted	
  for	
  employees	
  upon	
  hiring	
  and	
  periodically	
  during	
  their	
  employment,	
  and	
  should	
  be	
  
appropriate	
  to	
  the	
  security	
  risks	
  the	
  Member	
  faces	
  as	
  well	
  as	
  the	
  composi.on	
  of	
  its	
  workforce.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Are	
  the	
  Member’s	
  employees	
  trained	
  in	
  informa.on	
  security?	
  
2.  Does	
  the	
  Member	
  train	
  employees	
  on	
  informa.on	
  security	
  both	
  at	
  hiring	
  and	
  throughout	
  
employment?	
  
3.  Is	
  the	
  training	
  appropriate	
  for	
  the	
  risks	
  and	
  the	
  workforce?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   9	
  
How	
  Do	
  We	
  Know	
  if	
  the	
  	
  
Info	
  Systems	
  Security	
  Plan	
  (ISSP)	
  is	
  Effec(ve?	
  
	
  
Regulatory	
  rules	
  
A	
  Member	
  should	
  monitor	
  and	
  regularly	
  review	
  the	
  effec(veness	
  of	
  its	
  ISSP,	
  including	
  the	
  
efficacy	
  of	
  the	
  safeguards	
  deployed,	
  and	
  make	
  appropriate	
  adjustments.	
  	
  
The	
  review	
  should	
  be	
  done	
  at	
  least	
  once	
  every	
  year,	
  and	
  may	
  be	
  done	
  by	
  in-­‐house	
  staff	
  with	
  
appropriate	
  knowledge	
  or	
  by	
  engaging	
  an	
  independent	
  third-­‐party	
  informa.on	
  security	
  
specialist.	
  	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  schedule	
  regular	
  reviews	
  of	
  its	
  ISSP?	
  
2.  Does	
  the	
  Member	
  have	
  qualified	
  employees	
  who	
  can	
  perform	
  the	
  review	
  or	
  does	
  the	
  
Member	
  need	
  to	
  hire	
  an	
  outside	
  party?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   10	
  
Are	
  Third-­‐Party	
  Service	
  Providers	
  Secure?	
  
Regulatory	
  rules	
  
A	
  Member’s	
  ISSP	
  should	
  also	
  address	
  the	
  risks	
  posed	
  by	
  third-­‐party	
  service	
  providers	
  that	
  have	
  
access	
  to	
  a	
  Member's	
  systems,	
  operate	
  outsourced	
  systems	
  for	
  the	
  Member	
  or	
  provide	
  cloud-­‐
based	
  services	
  to	
  the	
  Member.	
  	
  
Since	
  the	
  Member	
  does	
  not	
  control	
  the	
  third-­‐party	
  service	
  providers,	
  it	
  is	
  crucial	
  that	
  the	
  
Member	
  perform	
  due	
  diligence	
  on	
  a	
  service	
  provider's	
  security	
  prac.ces	
  and	
  avoid	
  using	
  third	
  
par.es	
  whose	
  security	
  standards	
  are	
  not	
  comparable	
  to	
  the	
  Member's	
  standards	
  in	
  a	
  par.cular	
  
area	
  or	
  ac.vity.	
  	
  
A	
  Member	
  should	
  also	
  place	
  appropriate	
  access	
  controls	
  to	
  their	
  informa.on	
  systems	
  and	
  data	
  
and	
  have	
  a	
  procedure	
  to	
  remove	
  access	
  when	
  a	
  service	
  provider	
  is	
  no	
  longer	
  providing	
  services.	
  
Key	
  Compliance	
  Ques(ons	
  
1.  Does	
  the	
  Member	
  keep	
  a	
  list	
  of	
  any	
  service	
  providers	
  it	
  employs?	
  
2.  Does	
  the	
  Member	
  monitor	
  the	
  security	
  prac.ces	
  of	
  its	
  service	
  providers?	
  
3.  Does	
  the	
  Member	
  have	
  access	
  controls	
  in	
  place	
  to	
  prevent	
  improper	
  access?	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   11	
  
ISSP	
  Resources	
  
	
  
SANS	
  Ins.tute	
  (SANS)	
  –	
  h<ps://www.sans.org/	
  
Open	
  Web	
  Applica.on	
  Security	
  Project	
  (OWASP)	
  –	
  h<ps://www.owasp.org	
  
ISACA's	
  Control	
  Objec.ves	
  for	
  Informa.on	
  and	
  Related	
  Technology	
  (COBIT)	
  5	
  –	
  
	
  h<ps://cobitonline.isaca.org/	
  
Na.onal	
  Ins.tute	
  of	
  Standards	
  and	
  Technology	
  (NIST)	
  –	
  h<ps://www.nist.gov/	
  
	
  
©	
  2014-­‐2016	
  Quarule,	
  Inc.	
  -­‐	
  Confiden.al	
  &	
  Proprietary	
  	
  	
   12	
  

More Related Content

PDF
Cyber Essentials Requirements for UK Government
PPTX
Emergency Services Sector Cybersecurity Initiative UASI briefing
PDF
FBI Memo on How to Protect Yourself from Ransomware
PDF
Cyber TTX Training Opportunity for mid-January 2017
PPT
RiskWatch for Credit Unions™
PDF
NIST Patch Management SP 800-40 Rev 3
PPT
CERT Certification
PDF
Assessing Risk: Developing a Client/Server Security Architecture,
Cyber Essentials Requirements for UK Government
Emergency Services Sector Cybersecurity Initiative UASI briefing
FBI Memo on How to Protect Yourself from Ransomware
Cyber TTX Training Opportunity for mid-January 2017
RiskWatch for Credit Unions™
NIST Patch Management SP 800-40 Rev 3
CERT Certification
Assessing Risk: Developing a Client/Server Security Architecture,

What's hot (20)

PPTX
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
PDF
1 info sec+risk-mgmt
PDF
NIST Framework for Information System
PDF
Noah Maina: Computer Emergency Response Team (CERT)
PDF
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
PDF
NIST CSD Cybersecurity Publications 20160417
PDF
IT SECURITY ASSESSMENT PROPOSAL
PPTX
Massachusetts data privacy rules v6.0
PPTX
Build an Information Security Strategy
PPTX
Critical Infrastructure Protection (CIP) NERC Training
PPT
Software security engineering
PPT
Incident handling.final
PPTX
Logging, monitoring and auditing
PPTX
APT Monitoring and Compliance
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PDF
Business case for information security program
PDF
Incident response methodology
PPTX
what is security
PPTX
Overview of the 20 critical controls
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
1 info sec+risk-mgmt
NIST Framework for Information System
Noah Maina: Computer Emergency Response Team (CERT)
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
NIST CSD Cybersecurity Publications 20160417
IT SECURITY ASSESSMENT PROPOSAL
Massachusetts data privacy rules v6.0
Build an Information Security Strategy
Critical Infrastructure Protection (CIP) NERC Training
Software security engineering
Incident handling.final
Logging, monitoring and auditing
APT Monitoring and Compliance
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Business case for information security program
Incident response methodology
what is security
Overview of the 20 critical controls
Ad

Viewers also liked (20)

PDF
Information Security Risk Management Overview
PPTX
Seminario III
PPTX
Music from Ireland and beyond
PDF
Manual slideshare
PDF
Apostila hidraulica
PDF
Apostila hidraulica
PPTX
Reflexões sobre nutrição no hospital - A otimização de atitudes interdependen...
PPT
Allegato 13-omega-3-slide-1
PDF
Sin título 1.tics
PDF
Jll cincinnati industrial outlook q1 2017
PPTX
My story pp 1
PDF
Cementerio de Barcos, Antonio Maldonado (primeras páginas)
PPTX
Pantallasos
PDF
PDF
PDF
PDF
Lokale regie uit macht of onmacht onderzoek naar de optimalisering van de g...
DOCX
Que es acces y definicion de conceptos
DOCX
proyecto de grado
PDF
Information Security Risk Management Overview
Seminario III
Music from Ireland and beyond
Manual slideshare
Apostila hidraulica
Apostila hidraulica
Reflexões sobre nutrição no hospital - A otimização de atitudes interdependen...
Allegato 13-omega-3-slide-1
Sin título 1.tics
Jll cincinnati industrial outlook q1 2017
My story pp 1
Cementerio de Barcos, Antonio Maldonado (primeras páginas)
Pantallasos
Lokale regie uit macht of onmacht onderzoek naar de optimalisering van de g...
Que es acces y definicion de conceptos
proyecto de grado
Ad

Similar to NFA Interpretive Notice on Info Security (20)

PPTX
Chapter #4 (Planning for security).pptx.
PPTX
We Bought Some Tools
PDF
Scot Secure 2019 Edinburgh (Day 2)
PPTX
Whitman_Ch04.pptx
PPT
Lesson 1- Information Policy
PPTX
Security Policies and Standards
DOCX
crucet1crucet2crucet
PPTX
Types of Security in Industrial Security
PPT
Information security policy_2011
PPT
Information security policy_2011
PPT
Policy formation and enforcement.ppt
PPTX
Database development and security certification and accreditation plan pitwg
PPTX
CISSP Chapter 7 - Security Operations
PDF
Cybersecurity Fundamentals for Bar Associations
PDF
Fdic ffiec cyber_security_assessments
ODT
Ch.5 rq (1)
PDF
Data Sheet For Erg
PDF
Using cloud services: Compliance with the Security Requirements of the Spanis...
Chapter #4 (Planning for security).pptx.
We Bought Some Tools
Scot Secure 2019 Edinburgh (Day 2)
Whitman_Ch04.pptx
Lesson 1- Information Policy
Security Policies and Standards
crucet1crucet2crucet
Types of Security in Industrial Security
Information security policy_2011
Information security policy_2011
Policy formation and enforcement.ppt
Database development and security certification and accreditation plan pitwg
CISSP Chapter 7 - Security Operations
Cybersecurity Fundamentals for Bar Associations
Fdic ffiec cyber_security_assessments
Ch.5 rq (1)
Data Sheet For Erg
Using cloud services: Compliance with the Security Requirements of the Spanis...

Recently uploaded (20)

PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Hindu Circuler Economy - Model (Concept)
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
IFRS Notes in your pocket for study all the time
PDF
How to Get Business Funding for Small Business Fast
PPTX
Business Ethics - An introduction and its overview.pptx
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Hindu Circuler Economy - Model (Concept)
Laughter Yoga Basic Learning Workshop Manual
Comments on Crystal Cloud and Energy Star.pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
340036916-American-Literature-Literary-Period-Overview.ppt
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Keppel_Proposed Divestment of M1 Limited
Daniels 2024 Inclusive, Sustainable Development
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Digital Marketing & E-commerce Certificate Glossary.pdf.................
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
IFRS Notes in your pocket for study all the time
How to Get Business Funding for Small Business Fast
Business Ethics - An introduction and its overview.pptx
Belch_12e_PPT_Ch18_Accessible_university.pptx

NFA Interpretive Notice on Info Security

  • 1. Informa(on  Systems  Security  Programs   Na(onal  Futures  Associa(on   9070  -­‐  NFA  COMPLIANCE  RULES  2-­‐9,  2-­‐36  AND  2-­‐49:  INFORMATION  SYSTEMS   SECURITY  PROGRAMS   hNp://www.nfa.futures.org/nfamanual/NFAManual.aspx?RuleID=9070&Sec(on=9     Wesley.Moore@Quarule.com  
  • 2. What  Comprises  the  Informa(on  Systems  Security  Program?      Regulatory  rules    Five  areas  of  an  Informa.on  Systems  Security  Program  (ISSP):   1.  Wri<en  Program   2.  Security  and  Risk  Analysis   3.  Deployment  of  Protec.ve  Measures  Against  Iden.fied  Threats  and  Vulnerabili.es   4.  Response  and  Recovery  from  Threats  to  Electronic  Systems   5.  Employee  Training   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       2  
  • 3. Do  We  Have  a  WriNen     Informa(on  Security  Systems  Program  (ISSP)?     Regulatory  rules   a)  Members  must  adopt  and  enforce  a  wri<en  ISSP  designed  to  provide  safeguards  and   protect  against  security  threats  or  hazards  to  their  technology  systems.   b)  The  wri<en  ISSP  must  be  appropriate  to  the  Member's  size,  complexity  of  opera.ons,  type   of  customers  and  counterpar.es,  the  sensi.vity  of  the  data  accessible  within  its  systems,   and  its  electronic  interconnec.vity  with  other  en..es.   c)  There  are  several  cybersecurity  best  prac.ces  and  standards  readily  available,  including   those  promulgated  by  SANS,  OWASP,  ISACA's  COBIT  5,  and  NIST.   Key  Compliance  Ques(ons   1.  Does  the  Member  have  a  wri<en  ISSP?   2.  Is  the  ISSP  appropriate  for  the  Member’s  specific  needs?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       3  
  • 4. Do  We  Analyze  Security  and  Risk?       There  are  many  different  types  of  internal  and  external  threats,  including:   a)  Loss,  destruc.on  or  thea  of  data;     b)  A<acks  by  viruses,  spyware  and  other  malware;  and   c)  Intercep.on  and  compromising  of  electronic  transmissions.   Key  Compliance  Ques(ons   1.  Does  the  Member  keep  track  of  their  hardware  and  soaware?     2.  Has  the  Member  reviewed  the  vulnerabili.es  of  their  electronic  infrastructure?   3.  Is  the  Member’s  data  secure?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       4  
  • 5. Do  We  Assess  and  Priori(ze?   Members  must  assess  and  priori.ze  the  risks  associated  with  the   use  of  their  informa.on  technology  systems.   Regulatory  rules   a)  Es.mate  the  severity  of  the  poten.al  threats;     b)  Perform  a  vulnerability  analysis;  and   c)  Decide  how  to  manage  the  risks  of  these  threats.   Key  Compliance  Ques(ons   1.  Have  there  been  any  past  incidents?   2.  What  are  the  known  threats  iden.fied  by  other  en..es?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       5  
  • 6. How  Do  We  Protect  Against     Iden(fied  Threats  and  Vulnerabili(es?     A  Member  should  document  in  their  ISSP  the  safeguards  that  they  deploy  aaer  reviewing  and   priori.zing  threats  and  vulnerabili.es.  These  safeguards  will  depend  on  the  Member’s  specific   needs,  and  can  include:   a)  Physically  protec.ng  buildings,  equipment  and  assets;   b)  Using  and  maintaining  up-­‐to-­‐date  firewall,  an.-­‐virus  and  an.-­‐malware  soaware;   c)  Limi.ng  both  physical  and  electronic  access;   d)  Ensuring  that  systems  are  regularly  and  properly  updated;   e)  Deploying  encryp.on  soaware;   f)  Preven.ng  the  use  of  unauthorized  soaware;   g)  Backing  up  systems  and  data;  and   h)  Ensuring  that  mobile  devices  are  subject  to  similar  applicable  safeguards.   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       6  
  • 7. How  Do  We  Detect  Poten(al  Threats  and  Vulnerabili(es?     Regulatory  rules   Members  should  also  document  and  implement  reasonable  procedures  to  detect  poten.al   threats,  including  new  and  emerging  threats.   Key  Compliance  Ques(ons   1.  What  procedures  does  Member  have  in  place?     2.  Do  those  procedures  meet  the  proper  standards?   3.  Is  the  Member  a  part  of  a  threat  sharing  organiza.on  which  can  alert  the  Member  of  new   and  emerging  threats?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       7  
  • 8. How  Do  We  Respond  to  Threats  to  Electronic  Systems?   Regulatory  rules   Members  should  create  an  incident  response  plan  to  provide  a  framework  to  manage  detected   security  incidents,  analyze  their  poten(al  impact  and  take  appropriate  measures  to  contain   and  mi.gate  their  threat.   The  response  plan  should  list  out  how  the  Member  will  address  poten(al  incidents,  including   how  it  will  communicate  and  escalate  incidents  internally,  and  how  it  will  communicate   externally  with  customers,  counterpar.es,  regulators,  and  law  enforcement.   The  Member’s  response  plan  should  also  include  how  the  Member  plans  to  restore   compromised  systems  and  data,  and  how  it  will  incorporate  lessons  learned  into  the  ISSP.   Key  Compliance  Ques(ons   1.  Does  the  Member  have  a  response  plan?   2.  Does  the  response  plan  detail  how  to  determine  the  level  and  type  of  threat  and  how  to   respond?   3.  Does  the  response  plan  detail  how  restore  compromised  systems  and  data?   4.  Does  the  response  plan  detail  who,  how  and  when  to  communicate  details  of  an  incident?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       8  
  • 9. Does  Everyone  Know  What  to  Do?     Regulatory  rules   A  Member's  ISSP  should  contain  a  descrip.on  of  the  Member's  educa(on  and  training  rela.ng   to  informa.on  security  for  all  appropriate  personnel.  This  training  program  should  be   conducted  for  employees  upon  hiring  and  periodically  during  their  employment,  and  should  be   appropriate  to  the  security  risks  the  Member  faces  as  well  as  the  composi.on  of  its  workforce.   Key  Compliance  Ques(ons   1.  Are  the  Member’s  employees  trained  in  informa.on  security?   2.  Does  the  Member  train  employees  on  informa.on  security  both  at  hiring  and  throughout   employment?   3.  Is  the  training  appropriate  for  the  risks  and  the  workforce?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       9  
  • 10. How  Do  We  Know  if  the     Info  Systems  Security  Plan  (ISSP)  is  Effec(ve?     Regulatory  rules   A  Member  should  monitor  and  regularly  review  the  effec(veness  of  its  ISSP,  including  the   efficacy  of  the  safeguards  deployed,  and  make  appropriate  adjustments.     The  review  should  be  done  at  least  once  every  year,  and  may  be  done  by  in-­‐house  staff  with   appropriate  knowledge  or  by  engaging  an  independent  third-­‐party  informa.on  security   specialist.     Key  Compliance  Ques(ons   1.  Does  the  Member  schedule  regular  reviews  of  its  ISSP?   2.  Does  the  Member  have  qualified  employees  who  can  perform  the  review  or  does  the   Member  need  to  hire  an  outside  party?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       10  
  • 11. Are  Third-­‐Party  Service  Providers  Secure?   Regulatory  rules   A  Member’s  ISSP  should  also  address  the  risks  posed  by  third-­‐party  service  providers  that  have   access  to  a  Member's  systems,  operate  outsourced  systems  for  the  Member  or  provide  cloud-­‐ based  services  to  the  Member.     Since  the  Member  does  not  control  the  third-­‐party  service  providers,  it  is  crucial  that  the   Member  perform  due  diligence  on  a  service  provider's  security  prac.ces  and  avoid  using  third   par.es  whose  security  standards  are  not  comparable  to  the  Member's  standards  in  a  par.cular   area  or  ac.vity.     A  Member  should  also  place  appropriate  access  controls  to  their  informa.on  systems  and  data   and  have  a  procedure  to  remove  access  when  a  service  provider  is  no  longer  providing  services.   Key  Compliance  Ques(ons   1.  Does  the  Member  keep  a  list  of  any  service  providers  it  employs?   2.  Does  the  Member  monitor  the  security  prac.ces  of  its  service  providers?   3.  Does  the  Member  have  access  controls  in  place  to  prevent  improper  access?   ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       11  
  • 12. ISSP  Resources     SANS  Ins.tute  (SANS)  –  h<ps://www.sans.org/   Open  Web  Applica.on  Security  Project  (OWASP)  –  h<ps://www.owasp.org   ISACA's  Control  Objec.ves  for  Informa.on  and  Related  Technology  (COBIT)  5  –    h<ps://cobitonline.isaca.org/   Na.onal  Ins.tute  of  Standards  and  Technology  (NIST)  –  h<ps://www.nist.gov/     ©  2014-­‐2016  Quarule,  Inc.  -­‐  Confiden.al  &  Proprietary       12