You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 57 Next »

Table of Contents

Overview

To be effective in reducing security risk and ensuring correct computing, a security program needs to include operational procedures, controls, and well-defined responsibilities. Additional formal policies, procedures, and controls are needed to protect exchange of data and information through any type of communication media or technology. Operational and communication exchange procedures and controls address:

  • Operating procedures including: proper documentation of all normal and emergency functions, management of audit logs and other security or system log information. Procedures for change management that include the planning and testing of changes, assessment of changes, formal approval, and fallback procedures. System capacity and resource planning and acceptance including: management of projections of future capacity requirements and acceptance and test criteria for addition of new information systems, upgrades, or new versions. You will also want to make sure you have separate development, test, and production (operational) environments with rules for development, testing to minimize risk and exposure of sensitive data. 
  • Protection from malware should be in place for information and information processing facilities.
  • System back-up procedures and policy with tested restoration processes in case of a disaster or media failure.
  • System logging and monitoring allow for evaluating the effectiveness of controls, anomaly detection and the collection of system log data for use evidence.
  • Procedures should be written and enforced to control the installation of software on any operational systems.
  • Technical vulnerability management relies on having a detailed asset inventory to identify and patch known vulnerabilities in your asset groups.  Also, it is critical to have control over how your end users are allowed to install software.
  • Information systems audit functions and activities should be well documented and communicated in order to avoid impact to the operational systems.

#Top of page

Standards

ISO

NIST

COBIT

PCI DSS

2014 Cybersecurity Framework

HIPAA Security

27002:2013 Information Security Management
Chapter 12: Operations Security
ISO/IEC 27003:2010
ISO/IEC 27004:2009

800-100: Information Security Handbook: A Guide for Managers
800-53: Recommended Security Controls for Federal Information
Systems and Organizations
800-14: Generally Accepted Principles and Practices for Securing
Information Technology Systems

APO12.01
APO12.02
APO12.03
APO12.04
APO13.01
BAI01.06
BAI06.01
BAI07.04
BAI10.01
BAI10.02
BAI10.03
BAI10.05
DSS02.07
DSS05.01 

Req 2
Req 6
Req 12

ID.BE-4
ID.4A-1
ID.RA-5
PR.DS-4
PR.DS-6
PR.DS-7
PR.IP-1
PR.IP-3
PR.IP-4
PR.IP-12
PR.PT-1
DE.CM-3
DE.CM-4
DE.CM-5
DE.CM-8

45 CFR 164.308(a)(5)(ii)(B)
45 CFR 164.308(a)(7)(ii)(A)
45 CFR 164.308(a)(7)(ii)(A)
45 CFR 164.316(a), 45 CFR 164.316(b)(1)
45 CFR 164.308(a)
45 CFR 164.310(d)(1)
45 CFR 164.310(d)(2)(iv)
45 CFR 164.312(c)(1)
45 CFR 164.312(b)
45 CFR 164.308(a)(5)
45 CFR 164.312(a)(1)

#Top of page

Getting Started

Many of our universities have data processing facilities, network and/or security operations centers. This chapter offers discussion on key topics of interest, with emphasis on the need for formalized policies, procedures and controls which assist in data and system protection.

How do I assess the confidentiality, integrity, and availability of my institution's data center controls? 

Section 12.1 - Operational procedures and responsibilities offers guidance in regards to documentation, change management, capacity management, and separation of development, test and production environments.

Section 12.2 - What malware detection and prevention controls are In place and are they effective?

Section 12.3 - What is your data center's backup strategy and is there a well-documented procedure that is effective both for on and off-premises backup management?

Section 12.4 - Are audit trails and logging implemented effectively to allow you to conduct security reviews to detect tampering, unauthorized access, record user activities, and are clocks within your data center synchronized to a single time source?

Section 12.5 - Are procedures implemented to control installation of software on operational systems?

Section 12.6 - Is your vulnerability management program ensuring that you can detect and mitigate vulnerabilities and do you obtain information about new vulnerabilities and provide that to key stakeholders in an ongoing and effective manner?

Section 12.7 - When IT controls audits take place at your institution, are they planned to avoid disruptions to critical systems?

#Top of page

Operational Procedures and Responsibilities (ISO 12.1)

Objective: To ensure the effective operation and security of information processing facilities such as data centers, network and/or security operations centers.

Developing documented operating procedures which are maintained, current, relevant and provided to all users who need them is very important. The scale of implementation should be commensurate with the size and complexity of your information processing environments. At any rate, sufficient documentation should be available to handle typical issues that may arise in the day-to-day working environment. Inadequate or incorrectly documented procedures can result in system or application failures, resulting in loss of availability, failure of data integrity, and breaches of confidentiality. Operating procedures should be treated as formal documents, maintained and managed with version and approval processes and controls in place. Additional areas of interest are segregation of duties and separation of development, test, and operational facilities. The objective in implementing guidelines and controls is to minimize the risk of errors, omissions, and unauthorized activity.

Formal change management procedures which control changes to information processing facilities should be implemented. Uncontrolled changes to operational information processing facilities and systems can cause major interruptions. Typical changes that can cause problems are new software installations, changes to a key business/IT process or operational environment, or introducing third party arrangements.

Formalize capacity management by conducting system tuning, monitor the use of present resources and, with the support of user planning input, project future requirements. Controls in place to detect and respond to capacity problems can help lead to a timely reaction. This is especially important for communications networks where changes in load balancing can be sudden and result in poor performance and dissatisfied users. Monitoring of disk capacity, transmission throughput, service/application utilization and other typical bottlenecks is recommended.

Maintain separate platforms for development, testing and operational environments.  Levels of separation should be maintained to reduce the risk of unauthorized access and eliminate unintentional changes to the operational environment.

#Top of page

Protection from Malware (ISO 12.2)

Objective: To protect the confidentiality, integrity, and availability of information technology resources and data.

While malware prevention efforts can only be as effective as the level of protection offered by current anti-malware solutions in place---proactive measures to assess the effectiveness of anti-malware controls in place are both appropriate and necessary, as well as user awareness training. The ability to maintain centrally-managed and current protection updates is important, as is ensuring that users understand the importance of properly installed and utilized anti-malware solutions that they are provided. Malicious mobile code that is obtained from remote servers, transferred across networks and downloaded to computers (active X controls, java script, flash animations) is a continuing area of concern as well. If identified as pertinent, technical provisions can be made to comply with guidelines and procedures that distinguish between authorized and unauthorized mobile code.

(lightbulb) Enhancing Application Security with a Web Application Firewall - UC, Irvine (2011)

#Top of page

Backups (ISO 12.3)

Objective: To ensure the integrity and availability of information processed and stored within information processing facilities.

System backups are a critical issue and the integrity and availability of important information and software should be maintained by making regular copies to other media. Risk assessments should be used to identify the most critical data. Develop well-defined procedures. Establish well-defined long term storage requirements and testing/business continuity planning.

#Top of page

Logging and Monitoring (ISO 12.4)

Objective: To detect unauthorized activities occurring that may have a detrimental effect upon information processing facilities.

For all systems processing information, audit logs are important to investigate events and anomalies. Audit trails assist in incident investigations as well as in determining accountability for situations that occur. Typical activities that can be detected are false access attempts, attempts to change restricted data items, excessive use of certain data, etc. Both automated and hand written logs of administrator and operator activities ensure the integrity of operations in information processing facilities, such as data and network centers. Systems fault monitoring may expose vulnerabilities due to loss of service integrity and availability. A policy around systems monitoring and logging will specify operational requirements, usage and authorization for data access requests, as well as retention of log and audit trail information. Monitoring activities also assist in measuring the effectiveness of controls applied to handle risks and vulnerabilities. The information contained in various audit trails and logs is only valuable if its integrity can be relied upon; therefore, commensurate levels of protection and controls should be applied to safeguard this information. Without proper timing and synchronization across all systems, audit and monitoring logs can become inaccurate and their integrity compromised. There should be a means of monitoring system time clocks and correction of inaccuracies.

#Top of page

Control of Operational Software (ISO 12.5)

Objective: To ensure the integrity of operating systems.

Make sure to establish and maintain documented procedures to manage the installation of software on operational systems.  Operational system software installations should only be preformed by qualified, trained administrators.  Updates to operational system software should utilize only approved and tested executable code.  It is ideal to utilize a configuration control system and have a rollback strategy prior to any updates. Audit logs of updates and previous versions of updated software should be maintained.  Third parties that require access to preform software updates should be monitored and access removed once updates are installed and tested.

#Top of page

Technical Vulnerability Management (ISO 12.6)

Objective: To prevent exploitation of technical vulnerabilities.

Technical vulnerabilities need to be understood and managed appropriately.  It is important to keep up-to-date with industry notices about technical vulnerabilities and evaluate risk and mitigation strategies.  There needs to be a reporting mechanism in place to allow timely review of any information on such technical vulnerabilities.  It is imperative to have an up-to-date, and full inventory of your asset groups to allow for action to be taken once a technical vulnerability if reviewed and a mitigation strategy agreed on.  Technical vulnerability management should be incorporated to work with existing change management and incident management processes.  Also, it is critical to have control over how your end users are allowed to install software.

Three approaches to managing technical vulnerabilities in application software are described in the Application Security and Software Development Life Cycle presentation from the 2010 Security Professionals Conference.

(lightbulb) Campus Case Study: Enhancing Application Security with a Web Application Firewall - UC, Irvine

Vulnerabilities should be monitored, and one way to do that is with a web application scanner. ;An article from the August, 2011, Security Tools Benchmarking blog lists web application scanners, both open source and commercial, and enumerates their features. Windows system vulnerabilities allow hackers to gather information from applications. Rapid Windows Analysis, presented at the 2013 Security Professionals Conference, describes tools for detecting Windows vulnerabilities.

#Top of page

Information Systems Audit Considerations (ISO 12.7)

Objective: Minimize the impact of audit activities on operational systems.

Auditing of operational systems needs to be managed and communicated so as not effect the system in an adverse manner.  The up-time and availability of operational systems is critical to support business requirements.  Any and all audit activity, to assess an operational system, should always be managed to minimize any impact on the system during required hours of operation.  Any testing of operational systems that could pose an adverse effect to the system should be conducted during off hours.

#Top of page

Resources

Campus Case Studies On This Page
(lightbulb) Enhancing Application Security With a Web Application Firewall - UC, Irvine (2011)

EDUCAUSE Resources
EDUCAUSE Resources & Resource Center Pages

HEISC Toolkits/Guidelines

Templates/Sample Plans

Security Professionals Conference 2013

Enterprise IT Leadership Conference 2013

EDUCAUSE Annual Conference 2012

Security Professionals Conference 2012

Southeast Regional Conference 2012

Mid-Atlantic Regional Conference 2012

EDUCAUSE Annual Conference 2011

Security Professionals Conference 2011

EDUCAUSE Annual Conference 2010

Security Professionals Conference Archives 2008-2010

Management and Operations:

Policy and Compliance:

Corporate and Campus Solutions:

Strategic Security:

Technology Concepts:

Advanced Technology:

Initiatives, Collaborations, & Other Resources

  • ECAR Working Groups; Bring together higher education IT leaders to address core technology challenges.

#Top of page


(question) Questions or comments? (info) Contact us.

(warning) Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0).

  • No labels