FM-AA-CIA-15 Rev.
0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
5
STUDY GUIDE FOR MODULE NO. ___
PLANNING FOR SECURITY
MODULE OVERVIEW
An information security plan is documentation of a firm's plan and systems put in place to protect
personal information and sensitive company data. This plan can mitigate threats against your
organization, as well as help your firm protect the integrity, confidentiality, and availability of your data.
MODULE LEARNING OBJECTIVES
At the end of this learning activity, you should be able to:
1. Define management’s role in the development, maintenance, and enforcement of information security
policy, standards, practices, procedures, and guidelines.
2. Describe what an information security blueprint is, identify its major components, and explain how it
supports the information security program.
3. Discuss how an organization institutionalizes its policies, standards, and practices using education,
training, and awareness programs.
4. Explain what contingency planning is and how it relates to incident response planning, disaster
recovery planning, and business continuity plans.
LEARNING CONTENTS | INTRODUCTION
Why Do Firms Need an Information Security Plan?
In today's changing regulatory and investor landscape, information security plans are critical for firms to comply
with SEC regulations, due diligence requests from investors and state laws. Additionally, cybersecurity threats
are increasingly becoming more common and more sophisticated. Aside from protecting the integrity of your
data and keeping it confidential, there are other legal requirements: any firm registered with the SEC must have
a plan in place, and there may be other state or industry specific regulations that require your firm to have a
formal plan.
• Creation of information security program includes:
Creation of policies, standards, and practices, selection or creation of information security
architecture and the development
Use of a detailed information security blueprint creates plan for future success
Creation of contingency planning consisting of incident response planning, disaster recovery
planning, and business continuity plans
• Without policy, blueprints, and planning, organization is unable to meet information security needs of
various communities of interest
.
PANGASINAN STATE UNIVERSITY 1
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
LEARNING CONTENTS | Information Security Policy, Standards and Practices
Communities of interest must consider policies as basis for all information security efforts
Policies direct how issues should be addressed and technologies used
Security policies are least expensive controls to execute but most difficult to implement
Shaping policy is difficult
Shaping Policy Difficult
We can define policy shaping as the formulation of a policy. The work of people who are involved in this stage
of the process is “preparation" or "pre-baking" of the decisions. This means that policy shaping consists of the
preparation and blending of the draft policy before the stage of negotiation and agreements.
Never conflict with laws
Standup in court if challenged
Be properly administered through dissemination and documented acceptance
Policy
Plan or course of action
Convey instructions
Organizational laws
Dictate acceptable and unacceptable behavior
Define
What is right
What is worn
The appeal process
What are the penalties for violating policy
Written to support the mission, vision and strategic plan of organization
For a policy to be effective, must be properly disseminated, read, understood and agreed to by all
members of organization
Standards
All standards are not created equal. Some are even less than that because they may come about due to
market and vendor forces.
Detail statements of what must be done to comply with policy.
Types
Informal – de facto standards
De facto standards, or standards in actuality, are adopted widely by an industry and its
customers. They are also known as market-driven standards. These standards arise
when a critical mass simply likes them well enough to collectively use them. Market-
driven standards can become de jure standards if they are approved through a formal
standards organization.
Formal – de jure standards
De jure standards, or standards according to law, are endorsed by a formal standards
organization. The organization ratifies each standard through its official procedures and
gives the standard its stamp of approval.
LEARNING CONTENTS | CRYPTOGRAPHY TECHNIQUES
PANGASINAN STATE UNIVERSITY 2
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Mission/Vision/Strategic Plan
Mission – written statement of organization purpose
Vision – written statement of organization goals
Strategic Plan - written statement of moving the organization toward its mission
FIGURE 1. Policies, Standards and Practices
LEARNING CONTENTS | Policies
Policies are set of ideas or plans of what to do in particular situations that have been agreed to officially by a
group of people, a business organization, a government, or a political party.
Security Policy – set of rules that protects and organization's assets
Information security policy – set of rules that protects an organization’s information assets
Three types
Enterprise Information
General Issue-specific
System-specific
PANGASINAN STATE UNIVERSITY 3
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Enterprise Information Security Policy (EISP)
General Information Security Document
Shapes the philosophy of security in IT
Executive-level document, usually drafted by or with CIO of the organization, 2-10 pages
Typically addresses compliance in two areas
Ensure meeting requirements to establish program
Responsibilities assigned therein to various organizational components
Use of specified penalties and disciplinary action
ISSP
Issue-Specific Security Policy
Addresses specific areas of technology
Requires frequent updates
Contains a statement on the organization’s position on a specific issue
Statement of Policy
Authorization Access & Equipment Use
Prohibited Equipment Use
System Management
Focus on user’s relationship
Violations of Policy
Policy review & modification
Limitations & Liability
3 Approaches to ISSP
Create independent document tailored to a specific issue
Scattered approach
Departmentalized
Create single comprehensive document covering all issues
Centralized management and control
Tend to over generalize the issue
Sip vulnerabilities
Create a modular plan
Unified policy creation and administration
Maintain each specific issue’s requirements
Provide balance
PANGASINAN STATE UNIVERSITY 4
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Systems-Specific Policy (SysSP)
SysSPs frequently codified as standards and procedures
Used when configuring or maintaining systems
Systems-specific policies fall into two groups
Access control lists (ACLs)
Configuration rules
ACL Policies
Restrict access from anyone & anywhere
Can regulate specific user, computer, time, duration, file
What regulated
Who can use the system
What authorization users can access
When authorization users can access
Where authorization users can access
Authorization determined by persons identity
Can regulated specific computer equipment
Regulate access to data
Read
Write
Modify
Copy
Compare
Rule Policies
Rule policies are more specific to operation of a system than ACLs
May or may not deal with user directly
Many security systems require specific configuration scripts telling systems what actions to perform on
each set of information they process
Policy Management
Living documents
Must be managed as they constantly changed and grow
Must be properly disseminated
Must be properly managed
PANGASINAN STATE UNIVERSITY 5
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Responsible individual
Policy administrator
Champion & manager
Not necessarily a technically oriented person
Reviews
Schedule
Retain effectiveness in changing environment
Periodically reviewed
Should be defined and published
Should be reviewed at least annually
Procedures and practices
Recommendations for change
Reality one person draft
Document Configuration Management
Includes date of original
Includes date of revision
Includes expiration date
Information Classification
Classification of information is an important aspect of policy
Policies are classified, least for “internal use only”.
A clean desk policy stipulates that at end of business day, classified information must be properly stored
and secured
In today’s open office environments, may be beneficial to implement a clean desk policy
The Information Security Blueprint
Security Blueprint is the basis for design, selection, and implementation of
all security policies,
education and training programs, and
technological controls
More detailed version of security framework (outline of overall information security strategy for
organization)
Should specify tasks to be accomplished and the order in which they are to be realized
One approach to selecting a methodology by which to develop an information security blueprint is to
adopt a published model or framework for information security.
PANGASINAN STATE UNIVERSITY 6
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
LEARNING CONTENTS | Hybrid Framework for a Blueprint of an Information Security System
Result of a detailed analysis of components of all documents, standards, and Web-based information
described previously
Offered here as a balanced introductory blueprint for learning the blueprint development process
People must become a layer of security
Human firewall
Information security implementation
Policies
People
• Education, training, and awareness
• Technology
FIGURE 2. Spheres of Security
Hybrid Framework
Managerial Controls
Cover security process
Implemented by security administrator
Set directions and scope
Addresses the design and implementation
Addresses risk management & security control reviews
Necessity and scope of legal compliance
Operational Controls
Operational functionality of security
Disaster recovery
Incident response planning
Personnel and physical security
Protection of production inputs and outputs
Development of education, training & awareness
Addresses hardware and software system maintenance
Integrity of data
PANGASINAN STATE UNIVERSITY 7
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Technical Controls
Addresses the tactical & technical issues
Addresses specifics of technology selection & acquisition
Addresses identification
Addresses authentication
Addresses authorization
Addresses accountability
Addresses development and implementation of audits
Covers cryptography
Classification of assets and users
LEARNING CONTENTS | Design of Security Architecture
Security Architecture Components
Defenses in Depth,
• Implementation of security in layers, policy, training, technology.
• Requires that organization establish sufficient security controls and safeguards so that
an intruder faces multiple layers of controls
Security Perimeter
• Point at which an organization’s security protection ends and outside world begins
• Does not apply to internal attacks from employee threats or on-site physical threats
Security Architecture Components
First level of security – protects all internal systems from outside threats
Multiple technologies segregate the protected information
Security domains or areas of trust
Key Technology Components
Firewall
Device that selectively discriminates against information flowing in and out
Specially configured computer
Usually on parameter part of or just behind gateway router
DMZ
Buffer against outside attacks
No man’s land between computer and world
Web servers often go here
Proxy Server
Performs actions of behalf of another system
Configured to look like a web server
Assigned the domain name
Retrieves and transmits data
Cache server
IDS
Intrusion Detection System
Host based
Installed on machines they protect
Monitor host machines
Network based
Look at patterns of network traffic
Attempt to detect unusual activity FIGURE 3. Firewalls, Proxy Servers and DMZs
Requires database of previous activityUses “machine learning” techniques
Can use information form similar networks
PANGASINAN STATE UNIVERSITY 8
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
SETA
Security education, training and awareness
Employee errors among top threats
Purpose
Improve awareness of need to protect
Develop skills and knowledge
Build in-depth knowledge to design, implement, or operate security programs
LEARNING CONTENTS | Continuity Strategies
Continuity Strategies
Continuous availability of info systems
Probability high for attack
Managers must be ready to act
Contingency Plan (CP)
Prepared by organization
Anticipate, react to, & recover from attacks
Restore organization to normal operations
FIGURE 4. Components of Contingency Plan
FIGURE 5. Contingency Planning Timeline
PANGASINAN STATE UNIVERSITY 9
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Before planning can begin, a team has to plan effort and prepare resulting documents
Champion: high-level manager to support, promote, and endorse findings of project
Project manager: leads project and makes sure sound project planning process is used, a complete
and useful project plan is developed, and project resources are prudently managed
Team members: should be managers or their representatives from various communities of interest:
business, IT, and information security
FIGURE 6. Major Steps in Contingency Planning
Business Impact Analysis (BIA)
Investigate & assess impact of various attack
First risk assessment – then BIA
Prioritized list of threats & critical info
Detailed scenarios of potential impact of each attack
Answers question
“If the attack succeeds, what do you do then?”
Threat attack identification & prioritization
Attack profile – detailed description of activities that occur during an attack
Determine the extent of resulting damage
PANGASINAN STATE UNIVERSITY 10
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Business Unit analysis
Analysis & prioritization-business functions
Identify & prioritize functions w/in orgs units
Attack success scenario development
Series of scenarios showing impact
Each treat on prioritized list
Alternate outcomes
• Best, worst, probable cases
Potential damage assessment
Estimate cost of best, worst, probable
What must be done under each
Not how much to spend
Subordinate Plan Classification
Basis for classification as disastrous not disastrous
Incident Response Planning (IRPs)
Incident response planning covers identification of, classification of, and response to an incident
Attacks classified as incidents if they:
Are directed against information assets
Have a realistic chance of success
Could threaten confidentiality, integrity, or availability of information resources
Incident response (IR) is more reactive, than proactive, with the exception of planning that must occur
to prepare IR teams to be ready to react to an incident
Set of activities taken to plan for, detect, and correct the impact
Incident planning
Requires understanding BIA scenarios
Develop series of predefined responses
Enables org to react quickly
Incident detection
Mechanisms – intrusion detection systems, virus detection, system administrators, end users
Incident Detection
Possible indicators
Presence of unfamiliar files
Execution of unknown programs or processes
Unusual consumption of computing resources
Unusual system crashes
Probable indicators
Activities at unexpected times
Presence of new accounts
Reported attacks
Notification form IDS
PANGASINAN STATE UNIVERSITY 11
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Definite indicators
Use of dormant accounts
Changes to logs
Presence of hacker tools
Notification by partner or peer
Notification by hackers
Predefined Situation
Loss of availability
Loss of integrity
Loss of confidentiality
Violation of policy
Violation of law
Actions outlined in the IRP
Guide the organization
Stop the incident
Mitigate the impact
Provide information recovery
Notify key personnel
Document incident
Incident Containment Strategies
Sever affected communication circuits
Disable accounts
Reconfigure firewall
Disable process or service
Take down email
Stop all computers and network devices
Isolate affected channels, processes, services, or computers
Incident Recovery
Get everyone moving and focused
Assess Damage
Recovery
Identify and resolve vulnerabilities
Address safeguards
Evaluate monitoring capabilities
Restore data from backups
Restore process and services
Continuously monitor system
Restore confidence
PANGASINAN STATE UNIVERSITY 12
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Disaster Recovery Plan (DRPs)
Provide guidance in the event of a disaster
Clear establishment of priorities
Clear delegation of roles & responsibilities
Alert key personnel
Document disaster
Mitigate impact
Evacuation of physical assets
Crisis Management
Disaster recovery personnel must know their responses without any supporting documentation
Actions taken during and after a disaster focusing on people involved and addressing viability of
business
Crisis management team responsible for managing event from an enterprise perspective and covers:
Support personnel and loved ones
Determine impact on normal operations
Keep public informed
Communicate with major players such as major customers, suppliers, partners, regulatory
agencies, industry organizations, the media, and other interested parties
Business Continuity Planning (BCPs)
Outlines reestablishment of critical business operations during a disaster that impacts operations
If disaster has rendered the business unusable for continued operations, there must be a plan to allow
business to continue functioning
Development of BCP somewhat simpler than IRP or DRP; consists primarily of selecting a continuity
strategy and integrating off-site data storage and recovery functions into this strategy
Continuity Strategies
There are a number of strategies for planning for business continuity
Determining factor in selecting between options usually cost
In general there are three exclusive options: hot sites; warm sites; and cold sites
Three shared functions: time-share; service bureaus; and mutual agreements
PANGASINAN STATE UNIVERSITY 13
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Alternative Site Configurations
Hot sites
Fully configured computer facilities
All services & communication links
Physical plant operations
Warm sites
Does not include actual applications
Application may not be installed and configured
Required hours to days to become operational
Cold sites
Rudimentary services and facilities
No hardware or peripherals
empty room
Time-shares
Hot, warm, or cold
Leased with other orgs
Service bureau
Provides service for a fee
Mutual agreements
A contract between two or more organizations that specifies how each will assist the other in
the event of a disaster.
Off-Site Disaster Data Storage
To get sites up and running quickly, organization must have ability to port data into new site’s systems
Electronic vaulting
Transfer of large batches of data
Receiving server archives data
Fee
Journaling
Transfer of live transactions to off-site
Only transactions are transferred
Transfer is real time
Shadowing
Duplicated databases
Multiple servers
Processes duplicated
3 or more copies simultaneously
Model for a Consolidated Contingency Plan
Single document set supports concise planning and encourages smaller organizations to develop, test,
and use IR and DR plans
Model is based on analyses of disaster recovery and incident response plans of dozens of organizations
PANGASINAN STATE UNIVERSITY 14
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
LEARNING CONTENTS | Planning Documents
Six steps in contingency planning process
Identifying mission- or business-critical functions
Identifying resources that support critical functions
Anticipating potential contingencies or disasters
Selecting contingency planning strategies
Implementing contingency strategies
Testing and revising strategy
FIGURE 7. Contingency Plan Format
Law Enforcement Involvement
When incident at hand constitutes a violation of law, organization may determine involving law
enforcement is necessary
Questions:
When should organization get law enforcement involved?
What level of law enforcement agency should be involved (local, state, federal)?
What happens when law enforcement agency is involved?
Some questions are best answered by organization’s legal department
PANGASINAN STATE UNIVERSITY 15
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
Benefits and Drawbacks of Law Enforcement Involvement
Involving law enforcement agencies has advantages:
Agencies may be better equipped at processing evidence
Organization may be less effective in convicting suspects
Law enforcement agencies prepared to handle warrants and subpoenas needed
Law enforcement skilled at obtaining witness statements and other information collection
Involving law enforcement agencies has disadvantages:
Once a law enforcement agency takes over case, organization loses complete control over
chain of events
Organization may not hear about case for weeks or months
Equipment vital to the organization’s business may be
tagged evidence
If organization detects a criminal act, it is legally obligated to involve appropriate law
enforcement officials
Summary
Management has essential role in development, maintenance, and enforcement of information security
policy, standards, practices, procedures, and guidelines
Information security blueprint is planning document that is basis for design, selection, and implementation
of all security policies, education and training programs, and technological controls
Information security education, training, and awareness (SETA) is control measure that reduces accidental
security breaches and increases organizational resistance to many other forms of attack
Contingency planning (CP) made up of three components: incident response planning (IRP), disaster
recovery planning (DRP), and business continuity planning (BCP)
LEARNING ACTIVITY
Cite at least five IT related companies in the Philippines and identify each what is their top cybersecurity concern?
Also know the company’s disaster recovery plan and when was it reviewed and updated?
PANGASINAN STATE UNIVERSITY 16
FM-AA-CIA-15 Rev. 0 10-July-2020
Study Guide in Information Assurance and Security Module No. 5
REFERENCES
Books
Principles of Information Security, 6th Edition, Michael E. Whitman; Herbert J. Mattord
Andress, J. The Basics of Information Security: Understanding the fundamentals of InfoSec in Theory and
Practice. Elsevier Inc.
Online materials
https://www.eci.com/blog/16023-9-steps-to-create-information-security-
plan.html#:~:text=An%20information%20security%20plan%20is%20documentation%20of%20a%20firm's%20plan,and
%20availability%20of%20your%20data
https://www.upf.edu/web/eu-governance/policy-shaping-and-policy-making
https://www.electronicdesign.com/technologies/embedded-revolution/article/21796209/whats-the-difference-between-
de-jure-and-de-facto-standards
https://dictionary.cambridge.org/us/dictionary/english/policy
PANGASINAN STATE UNIVERSITY 17