Last week focused on the objectives of information security.
Emphasis on the lack of a canonical definition of information security.
Key takeaway: Protecting data and ensuring only desired actions occur with that data.
Many standards exist, defined by various international bodies (e.g., NIST, ISO).
Standards serve to bundle collective knowledge about potential security problems and solutions.
Frameworks aim to cover similar content but differ in structure and approach.
Asset Management
Management of devices holding sensitive data.
Key issues:
Loss of devices without tracking (e.g., laptops, USB keys).
Unauthorized devices connecting to the network.
Secure disposal of devices.
Solutions include:
Asset tracking systems, lifecycle management, and inventory controls.
Physical and Environmental Security
Protecting physical assets from unauthorized access and environmental risks (e.g., fire, flooding).
Controls include:
Badge systems, access control guards, fire detection, and suppression systems.
Logical Access Control
Defining who has access to what data.
Components:
Authentication: verifying user identity.
Authorization: managing what authenticated users can do.
Key transitions include managing access for joiners, movers, and leavers.
Communication Security
Monitoring and controlling network traffic.
Use of firewalls, VPNs, and secure traffic protocols.
Cryptography
Securing communications through encryption and proper key management.
Importance of maintaining valid certificates and avoiding man-in-the-middle attacks.
Incident Management
Responding to security breaches: detection, containment, mitigation, and post-incident review.
Vulnerability Management
Regularly updating software to fix vulnerabilities and address malware threats.
Includes managing patches and monitoring for malware updates.
Implementing secure coding practices and performing security tests (static and dynamic analysis).
Importance of incorporating security practices early in the software development lifecycle.
Peer reviews to identify vulnerabilities before deployment.
Ensuring individuals in sensitive roles are vetted and trained.
Addressing insider threats through employee monitoring and background checks.
Evaluating the security of third-party services and systems.
Ensuring business operations can continue during disruptions (e.g., natural disasters).
Assigning roles and responsibilities for security management.
Establishing policies that reflect desired security practices and measuring against those standards.
Compliance with legal and regulatory responsibilities regarding data protection.
Embedded Systems Security: Managing security for devices that are integral and not easily accessible post-deployment.
Cash and ATM Security: Addressing specific concerns related to physical cash transactions and device tampering.
Cloud Security: Maintaining data security as assets move to cloud environments, establishing access protocols.
Regulatory Frameworks: Distinguishing between prescriptive and principles-based regulations affecting security practices.
Overview of the various aspects of information security highlights the necessity of a structured approach.
Encouragement to relate specific security frameworks and principles to practical applications in diverse environments.