ISMS End-User Training Presentation.pptx

comstarndt 144 views 29 slides Apr 25, 2024
Slide 1
Slide 1 of 29
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29

About This Presentation

ISMS End-User Training Presentation


Slide Content

June, 2022 Information Security Management System – ISO 27001:2013 ICT End-User Presentation

Agenda ISMS – ISO 27001:2013 Information & Information Security User Responsibility ISMS Implementation Q&A

3 Incidents…… Patient Health Information (PHI) of patients of Diatherix , providing clinical laboratory testing services was accessed by unauthorised external entity. Exposed Information included patient name, account number, address, date of test, insurance information and insured information Three persons indicted for their involvement in an International cybercrime scheme that used stolen information from banks, businesses and government agencies to steal $15 million. Tennessee Electric Company Inc., d.b.a. TEC Industrial Maintenance & Construction, in July filed a complaint against TriSummit Bank, a $278 million institution based in Tennessee for a series of fraudulent payroll drafts sent from TEC's account in 2012. TEC says the bank failed to have those ACH transactions approved by the utility before they were transmitted.

The internet allows an attacker to attack from anywhere on the planet. Risks caused by poor security knowledge and practice: Data/ information breach Unavailability of data/information Unavailability of system, internet, application etc. Identity Theft Monetary Theft Legal Ramifications (for yourself and companies) Why Information Security?

Solution to such situations.....?? Information Security Management System – ISO 27001

Information & Information Security 6

What is Information Information is an asset which, like other important business assets , has value to an organization and consequently needs to be suitably protected What is Information…

Information exists in many forms

9 Information can be…. Printed or written on paper Stored Electronically Transmitted by post/ courier or electronically Shown on corporate video Displayed / published on web Verbal – spoken in conversation Whatever form the information takes or means by which it is shared or stored, it should always be appropriately protected Transmitted through an individual

10 Information Lifecycle Create Store Distribute (to authorized persons) Modify (by authorized persons) Archive Delete (electronic) or Dispose (paper, disk, etc ) Information may need protection through its entire lifecycle including deletion or disposal

Why Information Assets are the most important? Business Requirements Client / customer / stakeholder Marketing Trustworthy Internal management tool Legal Requirements Revenue Department Qatar Stock Exchange Copyright, patents, … . Business Continuity Management Compliance with Legal Requirement Contractual Security Obligations Intranet connections to other BU Extranets to business partners Remote connections to staff VPN Customer networks Supplier chains SLA, contracts, outsourcing arrangement Third party access Information Security Infrastructure

What is Information Security? “Information security is protecting the information through preserving their Confidentiality, Integrity and Availability along with the authenticity and reliability ” Confidentiality Integrity Availability

In some organizations integrity and/or availability may be more important than confidentiality Information Security is preservation of Confidentiality Ensuring that information is available only to those with authorized access. Integrity Safeguarding the accuracy and completeness of information and information processing methods and facilities Availability Ensuring authorized users have access to information when required 15 Information Security Triads/Components –CIA

Information is not made available to unauthorized individuals, entities or processes; Confidentiality Measures include encryption, social engineering best practices, Access rights, Secured storage, etc Safeguarding the accuracy and completeness of assets Integrity Measures include Access controls, Backups, etc. Asset being accessible and usable upon demand by authorized entity Availability Measures include Disaster Recovery Plan, Redundancy, High A vailability, etc. Information Security Triads/Components – CIA

Information Security Management System –ISO 27001:2013 15

Information Security Management System

ISO 27001:2013 Information Security Management System Information Security Management System (ISMS) is : That part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security A management process Not a technological process The purpose of an Information Security Management System is to secure an organization’s Information Assets by identifying, assessing and managing Risks resulting from Threats exploiting Vulnerabilities .

Introduction to ISO 27001:2013 standard ISO 27001 is the international standard that provides requirements for safeguarding an organization’s asset ISO 27001:2005 was the first ISO standard for information security ISO 27001:2013 was published on 25 th September, 2013 Comprehensive set of Clauses and Controls comprising best practices in information security A framework for building a risk based information security management system

ISO 27001:2013 Features

ISO 27001:2013 Requirements Requirements Clause 4 – C ontext of the organization Clause 5 – L eadership Clause 6 – Planning Clause 7 – Support Clause 8 – O peration Clause 9 – P erformance Evaluation Clause 10 – Improvement Like other management system standards, ISO 27001:2013 has 10 clauses…. Additionally, ISO 27001:2013 has Controls in Annex A with 14 Domains, 35 Control Objectives & 114 Controls

21 A.5 Security Policy A.6 Organisation of Information Security A.7 Human Resources Security A.8 Asset Management A.9 Access Control A.10 Cryptography A.11 Physical and Environmental Security A.17 Information Security Aspects of BCM A.13 Communications Security A.14 System Acquisition, Development and Maintenance A.15 Supplier Relationships A.16 Information Security Incident Management A.12 Operations Security A.18 Compliance 14 Domains 35 Control Objectives 114 Controls Control Objectives & Controls (Annexure A of ISO 27001:2013) Confidentiality Integrity Availability INFORMATION

ISMS Implementation 22

Risk Management – The critical first step in ISO 27001 implementation RISK = ASSET VALUE X PROBABILITY X IMPACT Risk is the possibility that a threat exploits a vulnerability in an information asset, leading to an adverse impact on the organization

Information Assets & Types Software IT Hardware (Physical Assets) Persons who support and use the IT system Processes & support processes that deliver products and services IT and other Infrastructure of the organization System interfaces (internal and external connectivity) Electronic media and, above all Data and Information An asset is any tangible or intangible thing or characteristic that has value to an organization

Classification of Information Asset

Information Security Risk Assessment Inherent Risk = Asset Value X Threat Value X Vulnerability Value X Probability Value X Impact Value Asset Inventory Asset Classification Asset Value : Confidentiality Value + Integrity Value + Availability Value (each value will be assigned on a scale of 1 to 3, where 1 is low, 2 is medium & 3 is high) Existing Controls Effectiveness will be assigned on a scale of 1 to 3, where Treatment of Risk if it is Unacceptable Risk Priority Number = Inherent Risk /Existing Controls Effectiveness Residual Risk if risk is High or Moderate – will be signed by Management or Risk Owner

What is a Threat An Expression of intention to inflict evil injury or damage Attacks against key security services – Confidentiality, Integrity & Availability Threat means something bad is coming your way – High threat means it is highly likely to hit you and it will be very bad .

Q & A

Thank You!