isaca tech session 19 feb 2013 securing mobile devices rev

57
Securing Mobile Devices Using COBIT® 5 for Information Security Dipresentasikan oleh: Sarwono Sutikno, Dr.Eng,CISA,CISSP,CISM [email protected]

Upload: sarwono-sutikno-drengcisacisspcism

Post on 09-May-2015

273 views

Category:

Education


0 download

DESCRIPTION

Discussion about ISACA's research publication "Securing Mobil Device using COBIT 5 for Security"

TRANSCRIPT

Page 1: Isaca tech session 19 feb 2013   securing mobile devices rev

Securing Mobile DevicesUsing COBIT® 5 for Information Security

Dipresentasikan oleh:Sarwono Sutikno, Dr.Eng,CISA,CISSP,CISM

[email protected]

Page 2: Isaca tech session 19 feb 2013   securing mobile devices rev

Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM

• Dosen Sekolah Teknik Elektro dan Informatika ITB• Dosen Universitas Pertahanan RI m.k. Cyber Warfare

Dynamics dan Cyber Security Policy and Strategy• ISACA Academy Advocate for ITB• (ISC)2 Information Security Leadership Award 2011 -

Senior Information Security Professional• Sedang membuat kurikulum S2 Keamanan Informasi

di ITB, akan mulai Agustus 2013• Cyber Security Center ITB - KOICA

Page 3: Isaca tech session 19 feb 2013   securing mobile devices rev

Outline

• Guiding Principles for Mobile Device Security• What Is a Mobile Device?• Mobile Device Impact on Business and Society• Threats, Vulnerabilities and Associated Risk• Security Governance• Security Management for Mobile Devices• Hardening Mobile Devices• Mobile Device Security Assurance

Page 4: Isaca tech session 19 feb 2013   securing mobile devices rev

Guiding Principles for Mobile Device Security

1. Know the business value and risk of mobile device use.2. Clearly state the business case for mobile device use.3. Establish systemic security for mobile devices.4. Establish security governance over mobile devices.5. Manage mobile device security using enablers.6. Place security technology in context.7. Know the assurance universe and objectives.8. Provide reasonable assurance over mobile device

security.

Page 5: Isaca tech session 19 feb 2013   securing mobile devices rev

What Is a Mobile Device?Mobile Device Use—Past, Present and Future

• Mobility and Flexibility

• Patterns of Work• Organizational

Perimeter• Other Impacts

Page 6: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 7: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 8: Isaca tech session 19 feb 2013   securing mobile devices rev

Mobile Device Impact on Business and Society

Page 9: Isaca tech session 19 feb 2013   securing mobile devices rev

Threats, Vulnerabilities and Associated Risk

• Physical Risk• Organizational Risk• Technical Risk

Page 10: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 11: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 12: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 13: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 14: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 15: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 16: Isaca tech session 19 feb 2013   securing mobile devices rev

Security Governance• The Business Case• Standardized Enterprise Solutions

– Hardware (front and back end)– OS– Applications– Data and information– User administration– Systems management (direct and remote)

• BYOD• Combined Scenario• Private Use of Mobile Devices• Defining the Business Case

Page 17: Isaca tech session 19 feb 2013   securing mobile devices rev

Standardized Enterprise Sol.

Page 18: Isaca tech session 19 feb 2013   securing mobile devices rev

BYOD

Page 19: Isaca tech session 19 feb 2013   securing mobile devices rev

Combined Solution

Page 20: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 21: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 22: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 23: Isaca tech session 19 feb 2013   securing mobile devices rev

Security Management for Mobile Devices

• Mobile Device Categories and Classification• Existing Security Controls• Principles, Policies and Frameworks• Processes• Organizational Structures• Culture, Ethics and Behavior• Information• Services, Infrastructure and Applications• People, Skills and Competencies

Page 24: Isaca tech session 19 feb 2013   securing mobile devices rev

COBIT Enterprise Enabler

Page 25: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 26: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 27: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 28: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 29: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 30: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 31: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 32: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 33: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 34: Isaca tech session 19 feb 2013   securing mobile devices rev

Key Operating Procedures• Auditing mobile devices—Procedure to facilitate audit of mobile

devices, alignedwith internal/external audit programs• Change management—Procedure describing how general change

management (which is usually standardized) should be applied to mobile devices

• Patch management—Procedure describing how patches for mobile devices are identified, acquired, tested, deployed

• Malware protection—Procedure describing various technical steps and measures for protecting mobile devices against malware

• Encryption, VPN, encapsulation—Procedure describing encryption for data at rest and data in flow, VPN tunnels and data encapsulation

• Damage, loss, theft—Procedure describing user and organization steps in the event of device loss, damage or theft

Page 35: Isaca tech session 19 feb 2013   securing mobile devices rev

Security Management Process

Page 36: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 37: Isaca tech session 19 feb 2013   securing mobile devices rev

Security Monitoring Process

Page 38: Isaca tech session 19 feb 2013   securing mobile devices rev

Organizational Structure

Page 39: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 40: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 41: Isaca tech session 19 feb 2013   securing mobile devices rev

Culture, Ethics and Behavior

Page 42: Isaca tech session 19 feb 2013   securing mobile devices rev

Information

• Step 1: Categorize information. Identify information unique to the device as opposed to replicated information.

• Step 2: Identify what is done with the information—storage, processing, creation, sharing.

• Step 3: Determine information and transaction sensitivity.• Step 4: Analyze the protection provided by preapplied

controls.• Step 5: Determine requirements for additional controls.• Step 6: Develop and implement an action plan for

additional controls.

Page 43: Isaca tech session 19 feb 2013   securing mobile devices rev

Protecting Personal Information

• Remove/prohibit—This is available only in a centralized management scenario with mobile devices provided by the organization.

• Segregate—Take technical steps to separate personal information on the device.

• Anonymize—Separate the personal identity of the user from the technical identity of the mobile device.

• Permit—Obtain end-user permission to store, process and use personal information.

Page 44: Isaca tech session 19 feb 2013   securing mobile devices rev

Skill set

Page 45: Isaca tech session 19 feb 2013   securing mobile devices rev

Hardening Mobile Devices

• Device and SIM card (if applicable)• Permanent internal storage• Removable or external storage• Connectivity (all channels)• Remote functionality (lockdown, GPS, etc.)

Page 46: Isaca tech session 19 feb 2013   securing mobile devices rev

Mobile Device Security Assurance

• Auditing and Reviewing Mobile Devices• Investigation and Forensics for Mobile Devices

Page 47: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 48: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 49: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 50: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 51: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 52: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 53: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 54: Isaca tech session 19 feb 2013   securing mobile devices rev

Investigative Requirements

• Develop the proper capabilities to perform forensic and investigative analysis

• Forensic and investigative policies and procedures should be established

• Identify the multidisciplinary team that will likely be involved

Page 55: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 56: Isaca tech session 19 feb 2013   securing mobile devices rev
Page 57: Isaca tech session 19 feb 2013   securing mobile devices rev

Diskusi