5.1 Summarize elements of effective security governance
Policies, standards, and procedures are fundamental components of an organization's security program.
- Policies: High-level, authoritative documents that define the organization's commitment to security.
- Standards: More specific than policies, they specify methods to implement technical and procedural requirements.
- Procedures: Detailed, step-by-step instructions for completing specific tasks while aligning with standards.
- Procedures ensure clear directions for individuals to perform their job duties consistently, securely, and efficiently.
Organizational Policies
Organizational policies are critical for effective governance and compliance.
- Framework for Operations: They provide the framework for operations, decision-making, and behavior within the organization.
- Governance Definition: Governance refers to processes used to direct and control an organization, including decision-making and risk management.
- Outputs of Governance: Policies are the outputs of governance, establishing rules for decision-making processes, risk mitigation, fairness, and transparency.
- Expectations for Performance: Policies set performance expectations, align the organization, prevent misconduct, and eliminate inefficiencies.
- Compliance: Refers to how well an organization adheres to relevant regulations, policies, standards, and laws.
- Policies integrate legal and regulatory requirements into operations, defining rules and procedures for compliance and consequences of non-compliance.
- Example: A data privacy policy detailing practices for maintaining compliance with laws protecting customer data.
Common Organizational Policies
Acceptable Use Policy (AUP): Outlines acceptable behavior by users of network and computer systems.
- Addresses browsing behavior, content, software downloads, and handling sensitive information.
- Ensures user activities do not harm the organization or resources.
- Details consequences for non-compliance and requires user acknowledgment of the policy.Information Security Policies: Policies ensuring compliance from all IT users regarding security of information within the organizational authority.
Business Continuity & Continuity of Operations Plans (COOP): Focus on essential processes during and after disruptions (e.g., natural disasters, cyber-attacks).
Disaster Recovery Policies: Outline steps to recover from catastrophic events (e.g., natural disasters, hardware failures, security breaches) aiming to restore operations efficiently.
Incident Response Policy: Details procedures to follow after a security breach or cyberattack, including steps for investigating and mitigating impacts.
Software Development Life Cycle (SDLC) Policies: Govern software development, detailing stages from requirement analysis to maintenance post-deployment, ensuring compliance with efficiency, reliability, and security standards.
Change Management Policies: Define processes for requesting, reviewing, approving, and implementing changes to IT systems.
Guidelines
Guidelines provide recommendations that steer actions within specific roles or departments, offering flexibility compared to policies.
- They represent best practices and suggestions for achieving goals effectively.
- Example of a guideline: Help desk support procedures related to email responses.
- Differences: Policies are mandatory, while guidelines offer recommendations allowing discretion.Regular reviews of guidelines are essential to ensure they remain practical and relevant.
Procedures
Procedures translate policies and standards into specific tasks, providing checklists for compliance.
Personnel Management
Identity and Access Management (IAM)
IAM encompasses both IT/security procedures and HR policies across three phases:
- Recruitment: Finding and selecting candidates, including security screening and background checks.
- Operation: HR communicates policy and training to employees, emphasizing security training.
- Termination: Managing the exit process, including security implications for departing employees.
Background Checks
Background checks verify identity and check for potential risks (criminal activity, bankruptcy).
- Higher scrutiny for positions with access to confidential information or requiring security clearance.
Onboarding
Onboarding processes involve welcoming new employees and may include similar processes for contractors.
- Joint efforts from IT and HR to create user accounts and assign appropriate privileges while preventing configuration vulnerabilities.Tasks involved in onboarding include:
- Secure Transmission of Credentials: Issuing passwords or smart cards securely to avoid exploitation.
- Asset Allocation: Providing users with computers or mobile devices, ensuring security.
- Training/Policies: Scheduling security awareness training and assessments.IAM automation can streamline onboarding processes by automating user account provisioning and management, improving security.
Playbooks
Essential for documenting standardized operational procedures and guiding personnel, enhancing consistency and quality.
- Promote knowledge sharing and continuity within the organization.Important in incident response and crisis management, aiding personnel in making swift decisions under pressure.
Best practices and frameworks (like MITRE ATT&CK and NIST SP800-61) assist in developing effective playbooks.
Change Management
Changes in systems should be planned with careful consideration of their impacts.
Significant changes should be trialed, and changes must come with a rollback plan for unforeseen consequences.
Offboarding
Offboarding processes are crucial for ensuring a secure exit.
- Account Management: Disabling user accounts and ensuring access to company information.
- Company Assets Retrieval: Collecting all company devices and confirming no retained copies of sensitive information.
- Personal Asset Wiping: Ensuring corporate data is removed from employee-owned devices.
Standards
Standards define expected outcomes for tasks and are influenced by regulatory requirements, business needs, risk management strategies, and industry practices.
Common Regulatory Standards
ISO/IEC 27001: Information security management system (ISMS) framework ensuring security controls are proportionate.
ISO/IEC 27002: Companion standard with guidance on controls for ISMS.
ISO/IEC 27017: Addresses cloud services within ISO/IEC 27001 scope.
ISO/IEC 27018: Focuses on protecting personally identifiable information (PII) in clouds.
NIST SP800-63: Guidelines for digital identity, including password controls.
PCI DSS: Security standards for organizations handling credit card transactions.
FIPS: Guidelines developed by NIST for federal systems, specifying cryptographic requirements.
Internal Standards
Organizations create internal standards to manage operations and protect resources.
- Standards differ from policies, focusing on implementation over business practices.
- Example of password standards:
- Hashing Algorithms: Requirements for secure password storage.
- Secure Password Transmission: Secure methods for transmitting passwords.
Access Control Standards
Ensure only authorized individuals can access necessary information, preventing unauthorized changes.
- Include models like role-based access control (RBAC) and methods for user identity verification.
Physical Security Standards
Protect physical aspects of IT environments (data centers, hardware).
- Standards encompass building security, workstation security, and visitor management.
Encryption Standards
Define acceptable encryption methods to protect data.
- Address algorithms, key lengths, and key management procedures.
Legal Environment
Governance committees ensure compliance with cybersecurity laws to mitigate legal liabilities.
- Must address risks like regulatory compliance, contractual obligations, privacy laws, and public disclosure laws.
Key Cybersecurity Laws
GDPR: Governs personal data collection, requiring informed consent and privacy rights.
CCPA: Grants California residents the right to access and delete personal data collected.
FISMA: Promotes security for federal data management.
- Various other national and regional laws enforce specific cybersecurity practices across industries, such as HIPAA, GLBA, and others relevant to healthcare and finance.
Governance Practices
Organizations must regularly monitor, evaluate, and update their cybersecurity policies and legal compliance measures.
- Collaboration is essential for reviewing and updating policies.
Governance Boards and Committees
Governance boards provide strategic direction for cybersecurity governance, involving executives and stakeholders.
- Committees aid in complex decision-making, offering analysis and recommendations.
- Hybrid governance balances centralized and decentralized approaches for flexibility and standardization.
Government Entities
Specialized agencies enforce security standards and provide a regulatory framework for security governance across various sectors (e.g., regulatory, intelligence, law enforcement).
Data Governance Roles
Key roles include:
- Owner: Responsible for data protection strategy and access decision-making.
- Controller: Ensures compliance with data regulations and processing legally.
- Processor: Manages data processing on behalf of the controller, maintaining security measures.
- Custodian: Implements security controls and safeguards data integrity.Effective security governance relies on effective coordination among these roles to maintain compliance and security.