...

RESILIA™ Cyber Resilience Best Practice

by user

on
Category: Documents
18

views

Report

Comments

Transcript

RESILIA™ Cyber Resilience Best Practice
RESILIA™
Cyber Resilience Best Practice
Stuart Rance
Consultant, trainer and author
IT service management and information security management
@StuartRance
Agenda
Why does cyber resilience matter?
The need for balance
ITSM and Infosec collaboration
RESILIA™ overview
Q&A
@StuartRance
2
Why does cyber resilience matter?
$£€¥
@StuartRance
3
Why does cyber resilience matter?
• Security breaches are reported in the press daily
–
–
–
–
–
Large and small organizations are affected
Organizations in every industry are affected
Breaches impact many millions of end customers
Losses typically run into millions of $£€¥
CEOs and CIOs have been forced to resign
• If you think you’ve never been breached then you
probably aren’t monitoring well enough to know!
@StuartRance
4
The need for balance
@StuartRance
5
The need for balance
Prevent, detect and correct
• Prevent
– Do everything practical to prevent security breaches
• Detect
– Make sure you detect breaches that you failed to prevent
• Correct
– Recover quickly and effectively from detected breaches
@StuartRance
6
The need for balance
People, process and technology
• People
– Almost every breach has people as part of the cause
– Policies, Awareness training, Due care, HR standards etc.
• Process
– Many processes can help prevent, detect and correct
– Backups, change management, patch management etc.
• Technology
– Definitely needed as a large part of your solution
– Many organizations rely too much on security technology
@StuartRance
7
The need for balance
Risks and opportunities
• Infosec people often focus on risks
– Their customers often see infosec as a constraint
• Customers circumvent security controls that stop
them working effectively
– Making the security controls ineffective
• You need to get the balance right
– To enable business opportunity
– And protect against threats
@StuartRance
8
The need for balance
Getting it right and continual improvement
• Don’t aim for perfection
– Cyber resilience is an ongoing effort, it’s never complete
• Continual improvement is a state of mind
– Everyone always looking for ways to work better
• Audit is your friend, it’s not something to avoid
–
–
–
–
External audits
Internal audits
Vulnerability scans
Assurance testing
@StuartRance
9
ITSM and Infosec collaboration
@StuartRance
10
ITSM and Infosec collaboration
IT service management is about managing
INFORMATION technology services
Infosec is about managing INFORMATION security
They are both dealing with
• The same information
• The same IT services
• The same need to manage
@StuartRance
11
ITSM and Infosec collaboration
Many organizations implement
• An information security management system
• AND an IT service management system
BUT they are trying to manage the same information
• This will never work
• What is needed is collaboration
• Work together on designing, building and running
information systems and information technology
@StuartRance
12
ITSM and Infosec collaboration
ITSM people tend to think in terms of
• Processes
– Incident management, change management etc.
• Lifecycle stages
– Strategy, design, transition, operation, improvement
Infosec people tend to think in terms of controls
• Using people, processes and technology
• To prevent, detect and correct breaches
@StuartRance
13
ITSM and Infosec collaboration
Every ITSM process
• Can contribute to infosec
• Needs a contribution from infosec
For example
• Asset and configuration management
–
–
–
–
Infosec provides required security controls for the CMS
Infosec provides tools to detect unauthorized changes
ITSM provides data about numbers and revisions of assets
ITSM detects unauthorized changes
@StuartRance
14
ITSM and Infosec collaboration
Security incident management
• This is an enormous area of overlap
• If you haven’t been involved in testing scenarios
–
–
–
–
–
Find the infosec people in your organization
Discuss how they plan security incident responses
Understand how this impacts nearly every ITSM process
Work together to design interfaces and improve processes
Get involved in testing recovery scenarios
@StuartRance
15
ITSM and Infosec collaboration
ITSM professionals have an enormous opportunity
Seek out the infosec people in your organization
• Ensure they understand how ITSM processes could
contribute to information security
• Learn how security controls could contribute to
ITSM
• Start building the relationships needed to
– Work together to jointly create value
– Collaboratively improve every aspect of infosec and ITSM
@StuartRance
16
RESILIA™ overview
@StuartRance
17
RESILIA: best practice overview
RESILIA is documented in a single publication
• Covering the entire lifecycle of cyber resilience
RESILIA describes a similar lifecycle to ITIL
• Strategy, design, transition, operation,
continual improvement
• The RESILIA lifecycle is about cyber resilience
• RESILIA integrates well with ITSM and other
management system approaches
@StuartRance
18
Publication structure
1.
2.
3.
4.
5.
6.
7.
8.
9.
Introduction
Risk management
Managing cyber resilience
Three case studies
about fictional
Cyber resilience strategy
organizations are
Cyber resilience design
threaded through
all the chapters
Cyber resilience transition
Cyber resilience operation
Cyber resilience continual improvement
Roles and responsibilities
@StuartRance
19
Risk management
Cyber resilience is largely about managing risks
Threat
Vulnerability
Asset
A risk is created by a threat exploiting a vulnerability to
impact an asset
@StuartRance
20
Risk management
Establish context
Establish criteria for risk assessment and acceptance
Risk identification
Risk analysis and evaluation
Risk treatment
Risk monitoring and review
@StuartRance
21
Cyber Resilience Life Cycle
@StuartRance
22
All lifecycle stages
•
•
•
•
•
Lifecycle stage summary
Control objectives and controls
Aligning with ITSM
Scenarios (from the three case studies)
Questions (to help you think about applying the
ideas)
@StuartRance
23
Aligning with ITSM - example
@StuartRance
Strategy Controls
•
•
•
•
Governance
Stakeholder management
Policies
Audit and compliance
@StuartRance
@StuartRance
Design controls
• HR security
• System acquisition, development, architecture
and design
• Supplier and 3rd party security
• Endpoint
• Cryptography
• Business continuity management
@StuartRance
@StuartRance
Transition controls
•
•
•
•
•
•
Asset and configuration management
Change management
Testing
Training
Document management
Information retention and disposal
@StuartRance
@StuartRance
Operation controls
•
•
•
•
•
Access control
Network security
Physical security
Operations security
Security incident management
@StuartRance
@StuartRance
Continual improvement controls
• Audit and review
• Control assessment
• Remediation and improvement planning
@StuartRance
@StuartRance
Summary
Cyber resilience needs a balanced approach
• Protect, detect and correct
• People, process and technology
• Risks and opportunities
• Getting it right and continual improvement
ITSM and Cyber Resilience both manage information
• Cyber resilience can contribute to ITSM
• ITSM can contribute to cyber resilience
Find your infosec people and discuss how to collaborate
• To deliver best business value with acceptable risk
@StuartRance
30
Thank you
@StuartRance
[email protected]
Fly UP