SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
PRESENTATION BY-
KAJAL SINGH
Operations Security – ISO
27001:2013
Operations Security
 Operations security involves planning and sustaining
the day-to-day processes that are critical for
maintaining the security of institutions’ information
environments
 Members of the IT team with knowledge of and access to
networks, data centers and admin accounts, can cause
serious damage
 Providing the direction, resources, support, and review
necessary to ensure that information assets are
appropriately protected within their area of
responsibility
Risks
 Uninformed Employees – Not trained in security
best practices, week passwords, unattended systems,
visiting unauthorized websites
 Solution: Train employees on cyber security best
practices and offer ongoing support, password
management system
 Mobile Devices (BYOD) - Data theft is at high
vulnerability when employees are using mobile
devices [particularly their own] to share data, access
company information, or neglect to change mobile
passwords
Risks
 Tailgating and Piggybacking Through an Access
Controlled Secure –
 Tailgating is when another person, whether an employee or
not, passes through a secure door without the knowledge
of the person
 Piggybacking is when another person follows through a door
WITH the permission of the person who has received
access.
 Solution: 3-dimensional machine vision system that can
differentiate between humans and objects, CCTV, anti-
tailgating systems
Controllable Measures
 Review documentation and evaluate guidance in regards to change
management, capacity management, and separation of
development, test, and production environment
 Malware detection and prevention controls - Evaluate their level of
effectiveness
 Data centre backup strategy - backup procedures and methods
(e.g., encryption) are effective both for on- and off-premises backup
management
 Prepare in advance for IT controls audits to avoid service disruption
 Provide intuitive, visual dashboards that reflect your current
security status An essential checklist for your security response
solution

More Related Content

PPTX
Vulnerability assessment and penetration testing
PDF
Access_Control_Systems_and_methodology
PPTX
Access Controls
PPTX
Operational Security
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
PPTX
Risk assessment
PPTX
Mitigating Risk from Cyber Security Attacks
Vulnerability assessment and penetration testing
Access_Control_Systems_and_methodology
Access Controls
Operational Security
Cybersecurity 1. intro to cybersecurity
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
Risk assessment
Mitigating Risk from Cyber Security Attacks

What's hot (20)

PPTX
Information security threats
PPT
8. operations security
PPT
Physical Security
PPT
Information Security Principles - Access Control
PPT
Viruses, Worms And Trojan Horses
PPSX
Next-Gen security operation center
PDF
Physical Security Management System
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Physical security
PPTX
CyberSecurity
PPTX
Memory forensics
PPTX
Network security
PDF
Forensics of a Windows System
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PPTX
System Security-Chapter 1
PPTX
iOS Forensics
PDF
Rothke secure360 building a security operations center (soc)
Information security threats
8. operations security
Physical Security
Information Security Principles - Access Control
Viruses, Worms And Trojan Horses
Next-Gen security operation center
Physical Security Management System
VAPT - Vulnerability Assessment & Penetration Testing
Network security (vulnerabilities, threats, and attacks)
Physical security
CyberSecurity
Memory forensics
Network security
Forensics of a Windows System
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
System Security-Chapter 1
iOS Forensics
Rothke secure360 building a security operations center (soc)
Ad

Similar to operation security (20)

PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
PDF
Remote access security services are crucial for several reasons_.pdf
PPTX
Introduction to Network Security
PPTX
Mitigating Insider Threats with Layered Access Controls
PPTX
Data Security Management - Data Analytics
PDF
The Growing Importance of Information Security in the Digital Age.pdf
PDF
ASSIGNMENT CYBERSECURITY ESSENTIALSsssss
PDF
Data Center Perimeter Security in UAE.pdf
PDF
Data Center Perimeter Security in UAE.pdf
PDF
Data Center Perimeter Security in UAE.pdf
PDF
DigaCore _ Why Senior Living Staff Need Strong Mobile Device Security.pdf
PPT
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
PDF
Effective Cyber Security Technology Solutions for Modern Challenges
PPTX
Privileged Access Management (PAM) Compliance in IT Security
PPTX
sec.This includes policy settings that prevent unauthorized people
PPTX
Cyber-Security-Unit-1.pptx
PDF
Essential Cybersecurity Best Practices for Safeguarding Digital Assets.pdf
PDF
The Role of Cybersecurity in Physical Security Systems.pdf
PPTX
Advanced Operating System Principles.pptx
PDF
Importance of Access Control Systems for Business Security.pdf
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Remote access security services are crucial for several reasons_.pdf
Introduction to Network Security
Mitigating Insider Threats with Layered Access Controls
Data Security Management - Data Analytics
The Growing Importance of Information Security in the Digital Age.pdf
ASSIGNMENT CYBERSECURITY ESSENTIALSsssss
Data Center Perimeter Security in UAE.pdf
Data Center Perimeter Security in UAE.pdf
Data Center Perimeter Security in UAE.pdf
DigaCore _ Why Senior Living Staff Need Strong Mobile Device Security.pdf
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
Effective Cyber Security Technology Solutions for Modern Challenges
Privileged Access Management (PAM) Compliance in IT Security
sec.This includes policy settings that prevent unauthorized people
Cyber-Security-Unit-1.pptx
Essential Cybersecurity Best Practices for Safeguarding Digital Assets.pdf
The Role of Cybersecurity in Physical Security Systems.pdf
Advanced Operating System Principles.pptx
Importance of Access Control Systems for Business Security.pdf
Ad

More from Kajalsing23 (6)

PPTX
ppt on brexit
PPTX
presentation on Airtel
PPTX
Customer Service Strategy
PPTX
Development communication
PPTX
COmparision of bpcl and hoec.
PPTX
Bajaj auto ssm project.
ppt on brexit
presentation on Airtel
Customer Service Strategy
Development communication
COmparision of bpcl and hoec.
Bajaj auto ssm project.

Recently uploaded (20)

PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
01-Introduction-to-Information-Management.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Week 4 Term 3 Study Techniques revisited.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
human mycosis Human fungal infections are called human mycosis..pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Types and Its function , kingdom of life
01-Introduction-to-Information-Management.pdf
Insiders guide to clinical Medicine.pdf
Pre independence Education in Inndia.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RMMM.pdf make it easy to upload and study
2.FourierTransform-ShortQuestionswithAnswers.pdf

operation security

  • 1. PRESENTATION BY- KAJAL SINGH Operations Security – ISO 27001:2013
  • 2. Operations Security  Operations security involves planning and sustaining the day-to-day processes that are critical for maintaining the security of institutions’ information environments  Members of the IT team with knowledge of and access to networks, data centers and admin accounts, can cause serious damage  Providing the direction, resources, support, and review necessary to ensure that information assets are appropriately protected within their area of responsibility
  • 3. Risks  Uninformed Employees – Not trained in security best practices, week passwords, unattended systems, visiting unauthorized websites  Solution: Train employees on cyber security best practices and offer ongoing support, password management system  Mobile Devices (BYOD) - Data theft is at high vulnerability when employees are using mobile devices [particularly their own] to share data, access company information, or neglect to change mobile passwords
  • 4. Risks  Tailgating and Piggybacking Through an Access Controlled Secure –  Tailgating is when another person, whether an employee or not, passes through a secure door without the knowledge of the person  Piggybacking is when another person follows through a door WITH the permission of the person who has received access.  Solution: 3-dimensional machine vision system that can differentiate between humans and objects, CCTV, anti- tailgating systems
  • 5. Controllable Measures  Review documentation and evaluate guidance in regards to change management, capacity management, and separation of development, test, and production environment  Malware detection and prevention controls - Evaluate their level of effectiveness  Data centre backup strategy - backup procedures and methods (e.g., encryption) are effective both for on- and off-premises backup management  Prepare in advance for IT controls audits to avoid service disruption  Provide intuitive, visual dashboards that reflect your current security status An essential checklist for your security response solution

Editor's Notes

  • #3: The objective of ‘A.12.Operations Security’ domain is to help the organizations to put in place appropriate controls to ensure that day to day operations of an organization are carried out in a controlled and a secure manner, which includes documenting operating procedures, ensuring changes to information assets are carried out efficiently, the information assets are protected from malware and other threats & vulnerabilities, controls to ensure backup is performed effectively to ensure timely availability of information, logging and monitoring of user activities and ensuring continuous improvement through Information systems audit & mitigations.