1. Trang chủ
  2. » Công Nghệ Thông Tin

Assignment 2 Security (1623 Distinction)

48 1 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Assignment 2 Security
Tác giả Bui Quang Minh
Người hướng dẫn Tran Thanh Truc
Trường học Btec
Chuyên ngành Computing
Thể loại Assignment
Định dạng
Số trang 48
Dung lượng 1,99 MB

Cấu trúc

  • Task 1 Discussing risk assessment procedures (P5) (5)
    • I. Security Risk (5)
    • II. Assets, threats and threat identification procedures (6)
      • 2.1 Assets (6)
      • 2.2 Threats (6)
      • 2.3 Vulnerability (6)
      • 2.4 Threat identification procedures (7)
    • III. Risk assessment procedure (8)
    • IV. Risk identification steps (10)
  • Task 2 Explaining data protection processes and regulations as applicable to an organisation (P6) (12)
    • I. Data protection (12)
    • II. Data protection process in an organization (13)
    • III. Importance of data protection and security regulation (14)
  • Task 2.1 Summarising the ISO 31000 risk management methodology and its application in IT security (M3) (15)
    • I. ISO 31000 management methodology definition (15)
    • II. Its applications in IT security (16)
    • III. Practical examples for above applications (17)
  • Task 2.2 Discussing possible impacts to organisational security resulting from an IT security audit (M4) (19)
    • I. IT security audit definition (19)
    • II. Possible impacts to organizatioal security (19)
    • III. Practical examples (21)
  • Task 2.2.1 Considering how IT security can be aligned with organisational policy, detailing the security impact of (22)
    • I. Organizational policy and its purposes (22)
    • II. Impacts of an organizational policy on IT security (23)
  • Task 3 Designing and implementing a security policy for an organisation (P7) (25)
    • I. Security policy (25)
    • II. Most important elements when creating a policy (26)
    • III. Elements of a security policy (26)
    • IV. Steps to design a policy (27)
      • 1.1 Requirement (27)
      • 1.2 Idea concept (27)
      • 1.3 System model (28)
      • 1.4 Implementation (28)
  • Task 4 Listing the main components of an organisational disaster recovery plan, justifying the reasons for (31)
    • I. Business continuity (31)
    • II. Components of recovery plan (31)
    • III. Steps required in disaster recovery process (33)
    • IV. Policies and procedures required for business continuity (34)
  • Task 4.1 Discussing the roles of stakeholders in the organisation to implement security audit recommendations (M5) (36)
    • I. Stakeholders definition (36)
    • II. Stakeholders’ roles in an organization (37)
    • III. Security audit definition and why needs it (37)
    • IV. Security audit implementation to stakeholders in an organization (39)
  • Task 4.1.1 Evaluating the suitability of the tools used in an organisational policy (D3) (41)
    • I. Organizational policy definition (41)
    • II. Tools are used in organizational policy (42)
    • III. Evaluating the suitability of tools in organizational policy (45)

Nội dung

Khóa học này cung cấp cái nhìn tổng quan về các thách thức bảo mật và chiến lược đối phó trong môi trường hệ thống thông tin. Các chủ đề bao gồm định nghĩa về các thuật ngữ, khái niệm, thành phần và mục tiêu kết hợp các tiêu chuẩn và thực tiễn của ngành với trọng tâm là các khía cạnh sẵn có, dễ bị tổn thương, tính toàn vẹn và bảo mật của hệ thống thông tin.

Discussing risk assessment procedures (P5)

Security Risk

Unauthorized access, use, sharing, disruption, modification, or destruction of digital information poses significant security risks, stemming from cyber threats, data breaches, malware, and other vulnerabilities that compromise data privacy, integrity, and availability.

Cybersecurity risks severely impact businesses, leading to data breaches resulting in reputational damage, legal issues, and financial losses Malicious attacks disrupt operations, causing downtime, lost revenue, reduced productivity, and customer dissatisfaction.

Effective corporate smart risk control begins with comprehensive risk identification While specific risk assessments vary by company and circumstance, a foundational framework ensures a robust plan.

Identify potential threats to sensitive information by analyzing existing rules, processes, and systems to pinpoint vulnerabilities and risks.

Assess the likelihood and potential impact of risks, considering both frequency and severity.

Prioritize risks by assessing their severity and comparing them to your risk tolerance This allows for focused mitigation efforts on the most critical threats.

Mitigate risks by implementing appropriate safety measures, procedures, and controls to prevent incidents and negative consequences.

Assets, threats and threat identification procedures

Organizational assets, including data and devices, hold significant value, often due to their sensitive information or access capabilities.

Company assets include employee devices (desktops, laptops, phones) and their applications, as well as critical infrastructure like servers and support systems.

An organisation’s most common assets are information assets These are things such as databases and physical files – i.e the sensitive data that you store

Information assets reside in containers; for databases, this is the application, and for physical files, it's the filing cabinet.

A threat is any incident that could negatively affect an asset – for example, if it’s lost, knocked offline or accessed by an unauthorised party

Threats can be categorised as circumstances that compromise the confidentiality, integrity or availability of an asset, and can either be intentional or accidental

Intentional threats, like criminal hacking and insider theft, differ from accidental threats such as employee errors, technical malfunctions, or physical damage from events like fires or natural disasters.

A vulnerability is an organisational flaw that can be exploited by a threat to destroy, damage or compromise an asset

Software vulnerabilities, or bugs, are common due to software complexity and frequent updates, posing a significant risk of sensitive data breaches by malicious actors.

Vulnerabilities encompass technological flaws, physical weaknesses (like broken locks), and procedural shortcomings (e.g., inadequate employee processes), all potentially exposing sensitive information.

Cybersecurity threats stem from human error (phishing susceptibility), infrastructure weaknesses (e.g., faulty wiring), and communication failures (incorrect information sharing).

Threats come in many forms and through different channels, including:

Threats are often intentional and are done through hacking from an individual or a criminal organization A few intentional external threats include viruses, malware, Denial of Service (DoS) and ransomware attacks

Threats are sometimes accidents due to some internal issue such as a computer malfunction or employee lapse in protocol, judgment or memory

Natural disasters such as floods, earthquakes, fires, and lightning strikes pose significant threats to data integrity, potentially causing damage ranging from restricted access to complete data loss.

Internal threats, such as employee misconduct or occupational fraud, can significantly compromise asset security.

5 Steps to Complete a Successful Threat Assessment

1 Scope Determination: Define the scope of your assessment, specifying what's included and its level of detail Consider sensitivity and assess potential avenues for threats

2 Data Collection: Collaborate with your assessment team to gather necessary data, including company policies, regulations, interview notes, and technical details like system configurations and access permissions

3 Vulnerability Identification: Analyze the collected data to pinpoint vulnerabilities Conduct penetration tests to simulate hacking scenarios and discover potential weak points

4 Threat Analysis: Categorize identified threats based on severity and exposure levels, ranging from minor to high Evaluate their potential impact on the organization

5 Risk Mitigation: Develop a strategy to address threats, including implementing new software, enhancing security measures, refining access controls, and providing staff training to reduce risks.

Risk assessment procedure

Mitigate business risks by identifying potential threats impacting employees and operations, including natural disasters, biological hazards, workplace accidents, intentional acts, technological failures, chemical exposures, mental health stressors, and supply chain disruptions Thorough risk assessment should encompass all work areas, including remote and non-routine tasks, and learn from past incidents.

Step 2: Determine Affected Parties and Impact

Consider who within your organization could be harmed by these hazards and how For each identified hazard, assess the potential impact on individuals or groups

Step 3: Evaluate Risks and Apply Precautions

Prioritize risks by assessing hazard likelihood and consequence severity; implement mitigation measures for high-priority risks.

UK employers with five or more employees must legally document workplace risk assessments, detailing hazards, their impact, and mitigation strategies Comprehensive documentation should demonstrate thorough workspace checks, identification of at-risk personnel, hazard control measures, implemented precautions, and staff involvement.

Step 5: Regularly Review and Update

Workplace dynamics, including new equipment, processes, and personnel, introduce evolving hazards Regularly review and update risk assessments to maintain workplace safety.

Risk identification steps

Identifying business risks, from natural disasters to disgruntled employees, is crucial for financial success A structured approach to recognizing threats of varying magnitudes is vital for all business owners.

Effective risk identification is crucial for all businesses, especially small enterprises due to their vulnerability and limited resources Proactive risk identification offers significant benefits, enhancing resilience and mitigating potential harm.

 Enhancing your understanding of potential pitfalls and preventive measures

 Enabling you to devise strategies for managing emergent risks

 Facilitating sound decision-making within your business operations

The advantages of thorough risk identification encompass:

 Recognizing potential threats to your business, both internal and external, equipping you to anticipate and counter various challenges

 Evaluating your business's vulnerabilities, paving the way for reinforcement and defense against potential attacks

 Augmenting decision-making prowess by comprehending the risks inherent in different scenarios, averting costly errors

When it comes to risk identification, a few key steps need to be followed in order to ensure that all possible risks are considered Let’s go over them briefly:

The first step is making a risk statement This is a brief, concise description of the risk that you’re looking at

In this step, you will list all the relevant facts about the risk Examples include what could happen, who could be affected, and so on

Thorough risk assessment involves identifying potential causes and impacts on individuals and businesses Methods include brainstorming, interviews, and reviewing documentation to fully understand the risk's scope and potential consequences.

In the external cross-checking step, you will look for any potential risk or relevant information outside the project Some methods you can use are checklists and categories

Identify potential project risks overlooked in prior phases by meticulously reviewing project documents and work structures Internal cross-checking reveals hidden risks.

The last and final step is statement finalization This is where you put all the information together and come up with a final statement about the risk

Explaining data protection processes and regulations as applicable to an organisation (P6)

Data protection

Data protection balances individual privacy with business data use, encompassing data collection, dissemination, technology, public perception, and legal frameworks.

Data protection is paramount due to exponentially increasing data volumes and the critical need for continuous data accessibility.

Robust data protection strategies prioritize swift data restoration after corruption or loss, alongside comprehensive data privacy and security measures to prevent compromise.

Most data protection strategies have three key focuses:

 Data security – protecting data from malicious or accidental damage

 Data availability – Quickly restoring data in the event of damage or loss

 Access control – ensuring that data is accessible to those who actually need it, and not to anyone else

Data protection process in an organization

Data Protection Process: 10 Key Steps

Define sensitive data as information that, if exposed, could harm your organization financially, reputationally, or operationally Start by identifying what data falls into this category

Comprehend the lifecycle stages of sensitive data: creation, storage, use, sharing, archiving, and destruction This insight guides the implementation of protective measures at each stage

Recognize the relevant data protection regulations your organization must adhere to, and understand that exceeding these standards enhances security beyond mere compliance

Limit access to sensitive data to authorized personnel through authentication and authorization methods Assign specific roles to individuals based on their responsibilities

Educate all employees about data security responsibilities, irrespective of their roles, to foster a culture of vigilance and prevent inadvertent mishandling

Regularly back up sensitive data to secure locations to ensure data recovery in case of breaches or data loss, minimizing financial impact

Document how sensitive data is used within your organization's processes, aiding compliance and aiding vulnerability identification in case of compromise

Locate sensitive data across various repositories, including physical and digital sources, and create a comprehensive inventory

Classify data based on sensitivity levels to establish access controls and protection measures tailored to different types of data

Deploy automation tools to ensure accurate and consistent data protection processes, reducing human errors and enhancing overall efficiency.

Importance of data protection and security regulation

The CIA triad—confidentiality, integrity, and availability—is a fundamental data security model ensuring comprehensive data protection This framework provides a robust approach to safeguarding information for individuals and organizations.

 Confidentiality: Ensuring data access is limited to authorized personnel possessing valid credentials

 Integrity: Upholding the reliability and accuracy of stored data, preventing unwarranted alterations

 Availability: Guaranteeing secure and prompt data accessibility whenever required

Robust data protection strategies are crucial for organizations to prevent fraud, cyberattacks, phishing, and identity theft, ensuring effective operation.

Data protection is crucial in our age of expanding data volumes Cyber threats and breaches pose catastrophic risks, demanding proactive and adaptive security measures for organizations.

Data protection safeguards sensitive information from various threats Learn more about its crucial role in the linked article.

Summarising the ISO 31000 risk management methodology and its application in IT security (M3)

ISO 31000 management methodology definition

ISO 31000, established by ISO in 2009, is an international standard that offers guidance for designing, implementing, and maintaining effective risk management practices

Organizations of all sizes confront uncertainties—both internal and external—that can impact their objectives This uncertainty is termed "risk."

ISO 31000 outlines a systematic process for managing risk It involves identifying, analyzing, and evaluating risks to determine if they require treatment to meet established risk criteria

Applicable to entire organizations, specific functions, projects, and activities, risk management serves as a vital practice across different levels and areas

ISO 31000 provides universally applicable principles and guidance for flexible risk management frameworks, adaptable to any sector, organizational lifecycle stage, and activity, while respecting diverse organizational needs and practices.

Its applications in IT security

ISO 31000 aims to guide organizations in a systematic approach to managing risks through three key steps:

 Risk Identification: Identify potential risks

 Risk Probability Evaluation: Assess the likelihood of identified risks occurring

 Risk Impact Determination: Evaluate the severity of problems arising from potential events

ISO 31000 helps organizations manage, not eliminate, risk Its focus is on identifying and mitigating risks to an acceptable level.

Below are ten application of ISO 31000:

 Risk Identification: In IT security, ISO 31000 aids in systematically identifying potential threats and vulnerabilities to digital assets, networks, and systems

 Risk Assessment: The standard assists in evaluating the likelihood and potential impact of cyber threats, data breaches, and other security risks

 Risk Treatment: ISO 31000 helps IT security teams select and implement appropriate security controls, policies, and procedures to mitigate identified risks effectively

 Incident Response Planning: The framework supports the development of well-structured incident response plans, ensuring a coordinated approach to handling security breaches

 Compliance: ISO 31000 aids in meeting regulatory requirements by ensuring that IT security measures align with data protection and privacy regulations

 Vendor Risk Management: The standard guides the assessment of third-party IT vendors' security practices, helping organizations make informed decisions about partnerships

 Security Training: ISO 31000 principles can be applied to create IT security training programs for employees, ensuring they understand their roles in risk management

 Continuous Improvement: IT security practices benefit from ISO 31000's principle of continuous improvement, ensuring that protective measures evolve with changing threats

 Decision-Making: ISO 31000 provides a structured approach to evaluating IT security risks, enhancing decision-making regarding resource allocation and mitigation strategies

 Data Protection: The standard aids in identifying, assessing, and managing risks related to data breaches, unauthorized access, and data loss.

Practical examples for above applications

Example: An IT security team uses ISO 31000 to identify potential risks, such as outdated software vulnerabilities, weak password policies, and unencrypted data storage

Data breach risk assessment involves evaluating unauthorized access probability to sensitive customer data and estimating potential financial and reputational damage.

Example: After identifying vulnerabilities in their network infrastructure, an organization implements firewall and intrusion detection systems as part of their risk treatment strategy

Example: A financial institution develops an incident response plan using ISO 31000 principles, outlining roles and responsibilities for handling a cyberattack to minimize data loss and service disruption

Example: A healthcare organization aligns its IT security measures with ISO 31000 guidelines to ensure compliance with regulations like HIPAA, safeguarding patient data and avoiding legal penalties

Example: Prior to partnering with a cloud service provider, a company evaluates the provider's security practices using ISO 31000, ensuring data stored on their servers remains secure

Example: An IT department develops training programs based on ISO 31000 principles to educate employees about phishing threats, password management, and secure data handling

Example: A technology company regularly updates its risk management practices based on evolving cyber threats and technological advancements to maintain a robust IT security posture

Example: A financial organization uses ISO 31000 to evaluate potential risks associated with adopting a new online payment system, guiding informed decisions on resource allocation and implementation strategies

Example: A retail company identifies the risk of customer credit card data theft and implements encryption protocols and access controls to prevent unauthorized access

Discussing possible impacts to organisational security resulting from an IT security audit (M4)

IT security audit definition

IT security audits thoroughly examine an organization's security posture, analyzing infrastructure, processes, and configurations to identify vulnerabilities Regular audits are crucial for assessing the effectiveness of security safeguards against modern threats.

Security audits identify vulnerabilities, ensure compliance (HIPAA, GDPR, CCPA), assess risks from organizational changes, and evaluate cybersecurity training effectiveness.

Figure 8 IT security audit question

Possible impacts to organizatioal security

IT audits significantly reduce organizational risks by identifying and assessing potential IT system vulnerabilities, enabling proactive mitigation strategies.

IT audits assess organizational risks across data security, confidentiality, infrastructure, and operations, evaluating IT effectiveness, reliability, and efficiency.

IT risks directly impact organizational success Today, IT's crucial role means any disruption jeopardizes the entire enterprise.

Conducting an IT audit empowers you to strengthen internal controls and enhance external security, thereby fortifying your organization against both internal and external threats and vulnerabilities

IT audits frequently leverage the COBIT framework's 32 control processes across four domains to assess and improve organizational controls, mitigating risks and optimizing control implementations.

IT audit requires robust regulatory compliance to meet diverse regulatory body requirements, presenting significant challenges for IT departments.

Effective IT communication is crucial IT audits improve cross-departmental communication by fostering better dialogue between IT and other business units.

IT auditors bridge communication gaps between management and IT, relaying reports, expectations, and objectives This two-way feedback improves collaboration and communication effectiveness.

Effective IT governance, overseen by executives and the board, aligns IT strategy with organizational objectives IT audits strengthen this governance by identifying and mitigating risks, improving internal controls, and implementing streamlined frameworks This alignment ensures IT supports overall business goals.

IT audits significantly improve business effectiveness by seamlessly integrating IT across all organizational levels, from top management to operational foundations.

Practical examples

Example: An IT audit spots outdated software, suggesting regular updates to prevent cyber threats and reduce the risk of hacking

Example: After an IT audit, stronger password rules and two-factor authentication are set up to prevent unauthorized access to company systems

Example: An IT audit ensures encryption of sensitive customer data, meeting data protection regulations like GDPR

Example: IT audit improves communication during security issues by establishing clear channels between IT and other departments

Example: An IT audit aligns IT projects with overall business goals, ensuring better management and coordination

Example: IT audit confirms proper controls for financial data access, proving compliance with financial regulations.

Considering how IT security can be aligned with organisational policy, detailing the security impact of

Organizational policy and its purposes

Organizations are structured groups of people, resources, and materials working together toward shared goals This concept stems from organicism, implying interconnected components with a unified purpose Different perspectives yield diverse organizational definitions.

 Coordinated Activities: Organization is a system where two or more individuals collaborate in a deliberate and synchronized manner to achieve objectives

 Planned Cooperation: It is a planned arrangement where participants have designated roles, responsibilities, and tasks, contributing to a collective effort

 Formal Authority Structure: Organization involves a formal hierarchy of authority that arranges and coordinates work divisions, ensuring alignment towards predefined objectives

 Relationship Network: Organization encompasses the arrangement of interactions among individuals within an enterprise, designed to fulfill its functions

 Structured Group Dynamics: It encompasses the interplay between individuals and groups, creating an organized distribution of tasks and responsibilities

Organizational Policies Serve Various Functions

Corporate policies offer clear procedures for employee benefits enrollment, vacation requests, grievance filing, performance reviews, salary increases, and terminations These guidelines streamline operations and ensure consistent management practices.

Businesses ensure legal compliance by educating employees on state and federal labor laws, including safety, hiring, harassment prevention, data security, and discrimination Signed policy acknowledgments protect against unawareness claims.

Strict travel policies, including pre-approval for all bookings and itemized expense reports, minimize business travel costs by preventing the use of personal rewards points and ensuring cost-effective choices.

Streamlined operations are achieved through well-defined policies guiding employee tasks Examples include pre-shift checklists, standardized work order submissions, and regulated software/hardware usage, all contributing to efficient organizational function.

Addressing Temporary Situations: During the COVID-19 pandemic, companies adopted policies following state and federal guidelines for safety practices like social distancing and disinfecting

Businesses implemented temporary, adaptable CDC-recommended workplace safety procedures.

Impacts of an organizational policy on IT security

Organizational IT security policies proactively manage risk by identifying, assessing, and mitigating threats through defined acceptable technology use, data handling, and security protocols.

Data protection policies govern the handling, storage, and transmission of sensitive data, encompassing encryption, access controls, classification, and retention guidelines to safeguard critical information.

Robust access control, utilizing role-based access controls (RBAC) and strong authentication, ensures only authorized users access systems and sensitive data.

Security incident response policies define procedures for detecting, reporting, and responding to cybersecurity incidents like breaches, data leaks, and malware attacks These policies outline crucial steps for effective incident management.

Robust IT security training and awareness programs, encompassing organizational policies and regular education, empower employees to understand security risks, their responsibilities, and compliance requirements.

Robust vendor and third-party management policies ensure data security by extending organizational IT security standards to all external entities with infrastructure access.

Remote work and BYOD policies are crucial for securing devices, networks, and data accessed remotely, especially given the rise of these practices.

Strong, unique passwords, regularly updated by all employees per organizational policy, mitigate unauthorized system access risks stemming from weak passwords.

Our data protection policy mandates encryption of all sensitive customer data during transmission and storage, ensuring data remains unreadable even if intercepted.

Job-role-based access control restricts employee access to specific folders and documents; for instance, junior employees access project files, while managers access sensitive financial data.

This security incident response policy mandates immediate IT reporting of breaches, enabling swift containment and remediation.

Annual cybersecurity training is mandatory for all employees, covering phishing email identification, secure password practices, and reporting suspicious activity.

Organizations must conduct thorough security assessments of all third-party vendors before partnering to ensure alignment with internal security standards.

Remote employees must use a company VPN to access resources, securing data transmission even on personal devices (BYOD).

Designing and implementing a security policy for an organisation (P7)

Security policy

A robust security policy formally documents a company's strategy for protecting physical and IT assets Regular revisions ensure this policy adapts to evolving threats and technological advancements.

There are three main types of security policies with distinct scopes:

 Organizational Policies: Shape overall security strategy

 System-Specific Policies: Tailored for specific systems

 Issue-Specific Policies: Address specific concerns like usage, access, changes, and recovery

 Comprehensive guidelines for the entire organization's security program

 Shape the overall approach to security and provide high-level guidance

 Tailored security procedures for specific information systems or networks

 Address unique security needs of individual systems

 Target specific security concerns within the organizational policy

Organizations utilize various IT policies, including Acceptable Use Policies for employee asset usage, Access Control Policies for defining resource access, Change Management Policies for minimizing IT change impacts, and Disaster Recovery Policies for ensuring business continuity after disruptions.

Most important elements when creating a policy

 This is like a public lobby where outside visitors enter your building

 It's for external internet services, like websites or email servers

 A special area that keeps risky outside stuff away from your internal things

 Imagine it as your company's private offices where only staff are allowed

 Used for internal work, like sharing files and communicating

 A safe space for your company's important stuff

 Think of it as a guard at the door between public and private areas

 It checks who's allowed in and what they can do

 Keeps things safe by making sure only approved connections go through

Software firewalls are crucial for network security, acting as a gatekeeper between the DMZ and private networks to control traffic and authorize connections Proper firewall configuration is essential for maintaining network integrity and security.

Elements of a security policy

Restricting Server Internet Access to Maintenance Windows:

 Purpose: Ensure server internet access is limited to specific maintenance times

 Benefits: Reduces risks like unauthorized access, malware, and data breaches

 Why: Minimizes potential threats while allowing safe updates and maintenance

Implementing NAT Policy for External Server Access:

 Purpose: Securely allows external computers to access internal resources

 Benefits: Guards against direct attacks, adds extra layer of defense

 Why: Enhances control, monitoring, and overall network protection

Allowing Only Management IP Access to Firewall and DMZ:

 Purpose: Limits access to critical areas to authorized personnel only

 Benefits: Safeguards configuration and monitoring from unauthorized changes

 Why: Increases security by isolating key components from general internet access

Enabling Staff Computers to Maintain Internet Access:

 Purpose: Lets staff access internet resources for efficient work

 Benefits: Supports tasks, resource access, and external communication

 Why: Balances security with operational needs for effective work.

Steps to design a policy

Robust security policies are crucial for organizations of all sizes, protecting sensitive information, mitigating risks, ensuring compliance, guiding employee behavior, and enabling effective incident response Policy implementation must align with available resources and budget.

This secure network plan implements a segmented architecture, separating the internet and internal network with robust firewalls Security measures include restricted server internet access, secure external connections, and limited administrative access.

My concept will include these main areas:

 DMZ area to serve for external internet

 Private network area for the company

 A Firewall between above areas (Using software firewall)

Therefore, there are 4 policies that I need to figure out:

 The server cannot access the internet except during maintenance time

 NAT policy to public server (Allow external computers to access indirectly to internal ones)

 Only management IP (computer) can access Firewall, DMZ but no internet connection

 Staff computers still access to the internet

DMZ area that is used to use different services such as folder sharing, mail service

A secure private network requires a management workstation, remotely accessing the server, accessible only to authorized staff This workstation needs to maintain a clean, internet-free environment (except during maintenance), while staff workstations retain internet connectivity.

Network implementation establishes a DMZ for external traffic and a private network for internal staff, separated by a software firewall with strict access control policies These policies include limiting server internet access to maintenance windows, using NAT for public server access, and granting management IP access to the firewall and DMZ only.

1) The server cannot access the internet except during maintenance time

Figure 10 Rule for blocking management workstation to the internet

2) Only management IP (computer) can access Firewall, DMZ but no internet connection

The first rule is allowing management workstation access to the pfsense server

The second one is allowing management workstation access to the DMZ area

The third one is blocking management workstation access to the internet

Figure 12 Rule for accessing Firewall, DMZ

3) NAT policy to public server (Allow external computers to access indirectly to internal ones)

This will direct port 7000 that comes from outside to the destination (Folder sharing service)

Figure 13 Configure NAT for external accessing

Figure 14 Rule for sharing folder from internal

Listing the main components of an organisational disaster recovery plan, justifying the reasons for

Business continuity

Business continuity ensures essential operations during emergencies and disruptions like natural disasters, pandemics, or internal crises Planning must account for events impacting services, not just complete operational halts The goal is sustaining critical functions even under challenging circumstances.

Components of recovery plan

Seven key components comprise a robust disaster recovery plan: IT asset inventory, criticality assessment, risk assessment, recovery objective definition, disaster recovery solution selection, budget allocation, and plan testing/review.

Maintain a comprehensive, up-to-date inventory of all IT assets (network equipment, hardware, software, cloud services, and data), regularly purging unnecessary data to ensure accuracy.

Categorize by Importance and Context

Inventorying assets allows prioritization based on organizational impact, enabling focused protection of critical assets during recovery planning This assessment ensures high-impact assets receive priority protection.

Identify and assess business risks, prioritizing significant threats to key assets Collaborate with staff to determine probabilities and impacts, informing a robust risk mitigation plan.

Define Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) early; collaborate with leadership and operations to establish acceptable downtime and data loss limits for effective disaster recovery planning.

Optimize disaster recovery (DR) design using asset, risk, RTO, and RPO analysis Consider hot site deployment, location (on-premise vs cloud), and backup strategies.

Emphasize the necessity of disaster recovery to senior management, presenting various budget options Highlight how diverse budgets correspond to differing RTOs, RPOs, and support levels, aiding business continuity

Conduct Rigorous Testing and Review

Regularly test disaster recovery plans via simulations to evaluate staff response and plan effectiveness Refine the plan based on these tests, ensuring ongoing alignment with evolving assets and IT infrastructure.

A disaster recovery plan remains a dynamic process, demanding ongoing attention Regular testing, reviews, and modifications uphold its effectiveness in safeguarding assets and ensuring uninterrupted operations.

Steps required in disaster recovery process

Effective disaster recovery plans are crucial for business continuity, compliance, and data protection, minimizing impacts from natural disasters and cyberattacks as highlighted by recent incidents involving Capcom, Campari, and Mattel Creating a robust plan involves eight key steps to safeguard data and maintain operations.

Step 1: Establish a Disaster Response Team and Document Responsibilities

Establish a disaster response team with assigned roles and documented responsibilities, including designated backups, to lead recovery and stakeholder communication.

Step 2: Define Clear RTOs and RPOs

Establish Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) for applications, prioritizing mission-critical apps with near-zero RTOs, less critical apps with four-hour RTOs, and non-essential apps with eight-plus hour RTOs Resource allocation should reflect data importance and calculated RPOs.

Step 3: Blueprint the Network Infrastructure

Prioritize network infrastructure documentation, classifying services as mission-critical, essential, or non-essential, and detailing system dependencies for efficient post-cyberattack recovery This detailed blueprint ensures faster system restoration.

Step 4: Choose a Disaster Recovery Solution

Choose a disaster recovery solution prioritizing fast recovery times, high system availability, and minimal cost and complexity Factors like storage capacity and recovery timeline are crucial Arcserve UDP Cloud Direct is one example.

Step 5: Establish Criteria for Disaster Response

A robust disaster recovery plan requires a clear activation checklist, differentiating minor incidents from genuine threats to prevent overreaction while ensuring swift responses This checklist should tailor responses to the specific incident type, ranging from localized power outages to large-scale natural disasters.

Step 6: Document the Recovery Process

Efficient data and operations recovery requires a detailed, easily-followed plan stored securely offline, ideally in the cloud, protecting against loss or corruption This plan should provide step-by-step instructions for your recovery team.

Step 7: Test the Disaster Recovery Plan

Regularly test the plan through partial recovery tests twice a year and full simulations annually

Conduct surprise drills to assess the plan's effectiveness in real emergency scenarios These tests ensure that your team is prepared and the plan functions as intended

Step 8: Regularly Review and Update the Plan

Regularly update your disaster recovery plan to reflect changes in personnel, policies, and business structure Maintaining alignment with evolving needs is crucial.

Create a robust disaster recovery plan to protect critical assets, ensure business continuity, meet regulatory compliance, and build resilience against unforeseen events.

Policies and procedures required for business continuity

A business continuity policy ensures organizational resilience and effective risk management by outlining standards and guidelines adaptable to unique circumstances and industry changes Its objective is maintaining normal operations during both routine and emergency situations, enabling realistic expectations for business continuity and disaster recovery, while addressing potential issues This policy, crucial for industry compliance, requires regular updates to reflect evolving technology and business risks.

While specifics vary, essential components of a business continuity policy encompass staffing, metrics, and standard requirements

1 Staffing: Internal staffing outlines the roles and responsibilities of department heads, corporate liaisons, and BC/DR team members It may extend to external personnel such as vendors, stakeholders, and customers, ensuring comprehensive coverage of all affected by the policy

2 Metrics: Common metrics include key performance indicators (KPIs) and key risk indicators (KRIs) KPIs help analyze essential functions and processes necessary to meet goals, while KRIs assess the likelihood of events impacting the company, aiding in risk management planning

3 Standards: Business continuity standards, issued by organizations like ISO and BSI, offer guidelines for creating and updating policies These standards evolve over time and should be closely monitored When crafting a business continuity policy, several key considerations are crucial:

1 Assess Risks: Identify potential risks based on the organization's location, weather patterns, geopolitical factors, and past experiences with threats like ransomware

2 Risk Assessment: Conduct a thorough risk assessment to determine hazards, potential harm, and measures to reduce their impact This step involves identifying hazards, evaluating risks, and implementing control measures

3 Business Impact Analysis (BIA): Perform a BIA to understand how potential disasters could affect the organization, focusing on meeting recovery objectives and assessing vulnerabilities

4 Policy Oversight and Verification: Designate leadership to oversee compliance with the policy, potentially involving executives as liaisons to the BC/DR team Regular verification of policy compliance should be conducted by the BC/DR team and relevant internal departments

5 Non-Compliance Resolution: If non-compliance is identified, corporate management may step in to address and rectify the situation.

Discussing the roles of stakeholders in the organisation to implement security audit recommendations (M5)

Stakeholders definition

Stakeholders are entities influencing or influenced by a company's performance Key stakeholders include investors, employees, customers, and suppliers.

As the concept of corporate social responsibility gains prominence, the scope of stakeholders has expanded to include communities, governments, and trade associations

Stakeholders are those with a genuine concern for a company's operations and its impact on various aspects These encompass investors, employees, customers, suppliers, communities, governments, and trade associations

Stakeholders can be either internal or external to the organization Internal stakeholders maintain a direct connection with the company through factors like employment, ownership, or investment

External stakeholders, including suppliers, creditors, and public groups, are impacted by a company's actions despite lacking direct affiliation.

Stakeholders extend beyond shareholders to include individuals, groups, and entities invested in a company's success and environmental impact.

Stakeholders’ roles in an organization

The involvement of stakeholders within a business encompasses several key roles and responsibilities:

Senior management, including board members and executives, steer organizational direction through decision-making, task assignment, and strategic guidance Their responsibilities encompass staff recruitment, performance evaluation, and role definition, all measured against key performance indicators.

Stakeholders drive crucial company decisions, leveraging expertise and experience for strategic growth Decision-making authority varies by organizational structure, ranging from centralized to decentralized models.

Stakeholders drive business growth by setting objectives, developing strategic plans, and continuously evaluating performance to improve efficiency and fuel long-term expansion through investment Regular employee performance reviews ensure alignment with growth goals.

Large businesses rely on stakeholders to oversee legal and regulatory compliance, monitoring activities for adherence Consultants advise on mitigating compliance risks, especially during market expansion Stakeholder influence includes voting against non-compliant decisions and initiating referendums to promote ethical business practices.

Stakeholder support ensures sustainable business profitability Customer loyalty and feedback are crucial, while government incentives and policies also play a vital role.

Security audit definition and why needs it

A cybersecurity audit comprehensively evaluates an organization's information systems against industry best practices, standards, and regulations, focusing on the effectiveness of its security controls.

Information system security encompasses physical components and their environment, including data center security, facility access controls, and protection against physical threats.

 Applications and Software: The audit examines applications and software used within the organization This includes assessing the implementation of security patches by system administrators to address vulnerabilities

Secure network infrastructure is crucial We analyze public and private access points, assessing firewall configurations and vulnerabilities to prevent unauthorized access.

 Human Dimension: The audit explores how employees handle sensitive information, including data collection, sharing, and storage practices Employee awareness of security policies and adherence to security practices are evaluated

A robust organizational security strategy, encompassing policies, structure, and risk assessments, ensures alignment between security posture and objectives.

Security audits pinpoint organizational weaknesses, ensuring alignment with security criteria and identifying improvement areas These audits are crucial for developing risk assessments and mitigation strategies, especially for organizations managing sensitive data.

Security audits assess an organization's security posture, informing remediation strategies They can also fulfill compliance requirements for certifications such as ISO 27001 and SOC 2.

Security audits go beyond mere compliance, offering valuable insights to improve IT security practices, strengthen controls, and streamline processes for enhanced cybersecurity This broader perspective helps organizations effectively respond to the multifaceted nature of modern cyber threats.

Security audits are crucial for maintaining robust information security programs, ensuring alignment with industry standards and regulations.

Security audit implementation to stakeholders in an organization

Clearly defined roles and responsibilities, documented using a RACI matrix, streamline the audit recommendation and action plan process, preventing task confusion and duplication.

Set practical, measurable deadlines and milestones for each audit recommendation and action plan to track progress and ensure timely completion Utilize Gantt charts and incorporate contingency plans to mitigate potential delays.

Effective stakeholder communication is crucial in phase three This includes regular updates, using appropriate channels, to ensure alignment on objectives, roles, and deadlines among auditors, project teams, sponsors, and clients.

Implementing audit recommendations involves executing action plans within defined scope, quality, and standards, encompassing task completion, change application, issue resolution, and outcome delivery Thorough documentation of processes, results, and verification is crucial, facilitated by a dedicated system for consistent, transparent record-keeping.

Continuous monitoring and reporting of audit recommendations and action plans are crucial in the fifth stage Data analysis on status, achievements, challenges, risks, and deviations, presented via dashboards, scorecards, or reports, ensures effective progress tracking.

Evaluate and enhance audit recommendations' effectiveness, assessing impact and benefits on project objectives and stakeholders Employ SWOT analysis and appropriate evaluation methods (surveys, interviews, audits) for continuous improvement.

Evaluating the suitability of the tools used in an organisational policy (D3)

Organizational policy definition

Organizations are structured associations of people, resources, and materials working toward common goals, stemming from the organicist concept of interconnected components with a shared purpose Different perspectives offer varied definitions of this fundamental structure.

 Coordinated Activities: Organization is a system where two or more individuals collaborate in a deliberate and synchronized manner to achieve objectives

 Planned Cooperation: It is a planned arrangement where participants have designated roles, responsibilities, and tasks, contributing to a collective effort

 Formal Authority Structure: Organization involves a formal hierarchy of authority that arranges and coordinates work divisions, ensuring alignment towards predefined objectives

 Relationship Network: Organization encompasses the arrangement of interactions among individuals within an enterprise, designed to fulfill its functions

 Structured Group Dynamics: It encompasses the interplay between individuals and groups, creating an organized distribution of tasks and responsibilities

Policies can cover many areas, including:

 Guidelines for turning in paperwork

Tools are used in organizational policy

The Three Pillars of Compliance

Organizational risks and liabilities, including legal action, financial penalties, and reputational harm, often result from the lack of three critical elements.

Figure 17 Policy management system illustration

Effective organizational policy management relies on the Three Pillars of Compliance: policies, processes, and procedures These pillars, implemented through dedicated tools, ensure regulatory adherence, standard compliance, and best practice adoption, ultimately mitigating risk.

Top organizational policy management tools

 Document storage and management system

 Customizable and integrates with Microsoft Office suite

 Features centralized storage, collaboration, document security, scalability, and mobile functionality

Figure 18 Logo of Microsoft Sharepoint

 Compliance management solution built on SharePoint

 Specializes in policy management for mid- to large-sized companies

 Offers modules for policy creation, distribution, and acknowledgment

 Provides centralized storage, custom workflows, version control, and more

 Human Capital Management system with a focus on policy management

 Provides accreditation, workflow, version control, and training management

 Frequent updates and affordability make it an attractive option

Figure 20 Logo of PMAM HCM

 Cloud-based policy management solution

 Part of NAVEX Global's compliance and risk management suite

 Offers centralized storage, workflow automation, access control, audit-ready reporting, and Microsoft integration

Streamline policy, process, and procedure management with specialized tools, improving compliance, mitigating risks, and optimizing document handling These tools offer diverse features to suit varying organizational needs and scales.

Evaluating the suitability of tools in organizational policy

Effective organizational policy management requires tools precisely aligned with an organization's unique needs, requirements, and objectives A thorough evaluation assesses each tool's suitability for achieving these goals.

Microsoft SharePoint's seamless Microsoft Office integration, centralized storage, robust collaboration tools, and advanced security features make it ideal for organizations needing comprehensive document and policy management.

 Strengths: Integration with Office tools, scalability, and customization options

 Considerations: While SharePoint is versatile, its complexity may require dedicated IT expertise for optimal setup and customization

 Suitability: ConvergePoint is designed specifically for compliance management, including policy management It extends SharePoint's capabilities and offers centralized storage, workflows, and version control

 Strengths: Compliance-focused features, role-based access, real-time dashboards

 Considerations: ConvergePoint may be better suited for mid- to large-sized organizations due to its features and target audience

PMAM HCM provides a comprehensive Human Capital Management (HCM) suite, ideal for organizations needing an all-in-one solution for accreditation, policy management, and performance appraisals.

 Strengths: Affordable, accreditation and audit features, frequent updates

 Considerations: The overseas software development may impact support and customization options

 Suitability: PolicyTech is designed for compliance and risk management It provides a cloud- based solution for policy management and is suitable for organizations focusing on GRC-related documents

 Strengths: Cloud-based, audit-ready reporting, Microsoft integration

 Considerations: PolicyTech's features are tailored to compliance management, which may be advantageous for organizations with a strong emphasis on regulatory adherence

When evaluating the suitability of these tools, consider the following factors:

Select project management software that aligns with your organization's size and complexity; smaller businesses may require different tools than large enterprises.

 Compliance Requirements: Assess whether the tool offers the necessary features to meet your industry-specific compliance requirements

 Ease of Use: Consider the tool's user-friendliness and the ease of adoption for your employees

 Integration: Evaluate how well the tool integrates with your existing systems and applications

 Scalability: Ensure that the tool can scale as your organization grows and its policy management needs evolve

 Cost: Compare the cost of the tool with your budget and the value it provides in terms of features and benefits

 Support and Training: Look into the level of customer support and training provided by the tool's vendor

Spirion (2023) Ten steps to an effective data protection program, Spirion, [online] Available at: https://www.spirion.com/blog/ten-steps-to-an-effective-data-protection-program/ (Accessed 11 August 2023)

Pecb (n.d.) ISO 31000 Risk Management – Principles and guidelines, PECB, [online] Available at: https://pecb.com/whitepaper/iso-31000-risk-management principles-and-guidelines (Accessed 12 August 2023)

Milano, S (2021) The role of the organization’s policies, Small Business - Chron.com, Chron.com, [online] Available at: https://smallbusiness.chron.com/role-organizations-policies-68191.html (Accessed 12 August 2023)

Lutkevich, B (2021) What is a security policy? - definition from searchsecurity, Security, TechTarget, [online] Available at: https://www.techtarget.com/searchsecurity/definition/security-policy

A robust disaster recovery plan requires seven key components: business impact analysis, recovery time objective (RTO) and recovery point objective (RPO) definition, detailed recovery strategies, communication plan, testing and review procedures, vendor management, and training and awareness programs These elements ensure business continuity and minimize downtime following a disruptive event.

Anon (n.d.) What is information security risk? — riskoptics - reciprocity, [online] Available at: https://reciprocity.com/resources/what-is-information-security-risk/ (Accessed 11 August 2023)

Anon (2018) A complete guide to the risk assessment process, A Complete Guide to the Risk Assessment

Process | Lucidchart Blog, [online] Available at: https://www.lucidchart.com/blog/risk-assessment- process (Accessed 11 August 2023)

Anon (2023) Risk identification: Importance & process, SafetyCulture, [online] Available at: https://safetyculture.com/topics/risk-identification/ (Accessed 11 August 2023)

Anon (n.d.) Step-by-step guide to creating a disaster recovery plan, Arcserve, [online] Available at: https://www.arcserve.com/blog/step-step-guide-creating-disaster-recovery-plan (Accessed 13 August 2023b)

Anon (n.d.) A guide on the role of stakeholders (types and examples - indeed, [online] Available at: https://ca.indeed.com/career-advice/career-development/role-of-stakeholders (Accessed 13 August 2023c)

Anon (n.d.) Security audits: A comprehensive overview, AuditBoard, [online] Available at: https://www.auditboard.com/blog/what-is-security-

Ngày đăng: 02/02/2024, 10:35