itil security managmnet

24
ITIL SECURITY MANAGEMENT Security as a managed service Dr. Paul Overbeek Director KPMG Information Risk Management [email protected] kpmg +31 70 338 2563 June 2004 File SecMan-Lux-Jun04.PPT © June 2004

Upload: rituraj-tamrakar

Post on 22-Nov-2014

75 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ITIL Security Managmnet

ITILSECURITY MANAGEMENTSecurity as a managed service

Dr. Paul OverbeekDirector

KPMG Information Risk [email protected]

kpmg

+31 70 338 2563

June 2004

File SecMan-Lux-Jun04.PPT © June 2004

Page 2: ITIL Security Managmnet

2

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

ITIL SECURITY MANAGEMENT

ITIL SECURITY MANAGEMENT

• Information Security• Management of IT - ITIL• Security Management

– The ITIL Process– Relationships with other ITIL Processes

Ambition: show you how you can integrate the security process in the normal processes, in this case: ITIL ICT management

ITIL SECURITY MANAGEMENT

• Information Security• Management of IT - ITIL• Security Management

– The ITIL Process– Relationships with other ITIL Processes

Ambition: show you how you can integrate the security process in the normal processes, in this case: ITIL ICT management

Page 3: ITIL Security Managmnet

3

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

What is information security?

WHAT IS INFORMATION SECURITY?• Business drivers

– needs for information security• Business depends on services provided by second and third parties,

providing IT services• Business view: What should or may be expected from our IT service

providers?– define services also for security– define controls

• IT service providers view: What services should reasonably be offered– which services and controls as a minimum– what can be done in addition– how do we organise that in our ITIL management framework

• An introduction to information security ...

Page 4: ITIL Security Managmnet

4

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Converging from accepted industry standards

ITIL Security ManagementConverging from accepted industry standards

Take best Information Security Practices• Code Of Practice (BS7799/ISO17799)• Site Security Handbook• GASP (NIST)

Take existing ITIL framework

Develop Security Management

SecurityManagement

Page 5: ITIL Security Managmnet

5

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

ITIL security management

ITIL PROCESS SECURITY MANAGEMENT

ProcessPurpose: comply with objectives + baseline security

ActivitiesActivities reportsSLA withsecurity objectives

Relationships withother processes

Relationships withother processes

Page 6: ITIL Security Managmnet

6

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Relations between ITIL processes

Relations with:• Service Level Management• Availability Management• Performance & Capacity Management• Business Continuity Planning

Relations with:• Configuration & Asset Management• Incident Control / Helpdesk• Problem Management• Change Management • Release Management (SW C & D)

SecurityManagement

Page 7: ITIL Security Managmnet

7

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Security management

SECURITY MANAGEMENT

The Three Challenges• Process

– the Security Management Process itself

• Relationships– between Security Management

and the other processes• External relationships

– managing the SLA requirements for security

Page 8: ITIL Security Managmnet

8

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Security management ...

CUSTOMERREPORTREPORT

PLANPLAN

IMPLEMENTIMPLEMENT

CONTROLCONTROL

EVALUATEEVALUATE

MAINTAINMAINTAIN

IT S

ervi

ce P

rovi

der

SLASLA

Page 9: ITIL Security Managmnet

9

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Security management ...

PLAN: • Service level agreement• Underpinning contracts• Operational Level agreements• Policy statements

PLAN: • Service level agreement• Underpinning contracts• Operational Level agreements• Policy statements

IMPLEMENT:• Create awareness• Classification & registration• Personnel security• Physical security• Security management computers,

networks, applications ...• Control & management of access rights• Security incident handling, registration• …

IMPLEMENT:• Create awareness• Classification & registration• Personnel security• Physical security• Security management computers,

networks, applications ...• Control & management of access rights• Security incident handling, registration• …

CONTROL:• Get organised• Establish management

framework• Allocate responsibilities

CONTROL:• Get organised• Establish management

framework• Allocate responsibilities

EVALUATE:• Internal audits• External audits• Self assessments• Security incidents

EVALUATE:• Internal audits• External audits• Self assessments• Security incidents

MAINTENANCE:• Learn• Improve• plan• implementation

MAINTENANCE:• Learn• Improve• plan• implementation

Service Level Agreement / Security section• agreed between customer and provider

Service Level Agreement / Security section• agreed between customer and provider

IT SERVICE PROVIDER implements,SLA by ITIL Security Management

CUSTOMER defines requirementsbased on business needs

REPORT• conform SLA

REPORT• conform SLA

Page 10: ITIL Security Managmnet

10

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Let ITIL processes contribute to security management

SecurityManagement

Configuration and Asset

Management

Page 11: ITIL Security Managmnet

11

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Configuration management ...

CONFIGURATION and ASSET MANAGEMENT SERVICE SUPPORT SET

• The foundation for control• Know what you have– version management

• Use it to control the changes• Terms– CI : Configuration Item– CMDB : Configuration

Management Data BaseConfiguration management

CMDB

Page 12: ITIL Security Managmnet

12

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Security attributes

CONFIGURATION and ASSET MANAGEMENT SUPPORT OF SECURITY MANAGEMENT

SECURITY ATTRIBUTES• Classification system

– confidentiality– integrity / reliability– availability / continuity

• Classification connects CI to– activities, to be understood as

» instructions for how to handle, or» procedures !» documentation» or Manuals / Implementation Guidelines

Page 13: ITIL Security Managmnet

13

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Incident management, help desk

SecurityManagement

IncidentControl,

Help Desk

Page 14: ITIL Security Managmnet

14

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Incident management support of Security management

INCIDENT MANAGEMENT SUPPORT OF SECURITY MANAGEMENT

• When is an incident a security incident ?– CI classified– SLA-defined events– ?

• Activities– handling security incidents is a ‘normal’ procedure– possible contact with / reporting to security officer / manager– implement some security measures

» e.g., security incident reporting and alarm» rapporting

• Consider classification scheme for incidents– incidents making it impossible to comply with the security

objectives mentioned in the SLA

Page 15: ITIL Security Managmnet

15

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Change management

SecurityManagement

ChangeManagement

Page 16: ITIL Security Managmnet

16

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Change management support of Security management

CHANGE MANAGEMENT SUPPORT OF SECURITY MANAGEMENT

In change management many issues are to be ensured• Perform risk analyses

– impact on business processes (customer’s responsibility) - dependencies

– impact on IT infrastructure as a whole - vulnerabilities– which level of security is needed - service level

requirements for security• Security plan (SOLL)

– selection of security controls / measures + audit + contingency + availability + BASELINE

– define Operational Level Agreements (OLAs), UPCs

Page 17: ITIL Security Managmnet

17

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Change management support of Security management ...

CHANGE MANAGEMENT SUPPORT OF SECURITY MANAGEMENT (cont.)

• Implementation plan for security (‘to be’ minus ‘as is’), plan for– implementation of selected controls / measures– implementation of security baseline– OLA’s, UPC’s

• Implementation plan for security is part of RFC• Change Advisory Board (CAB) decides and authorizes

Page 18: ITIL Security Managmnet

18

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

A change

RFC = Request for Change, change proposal on CI(s)

Urgent / not

Impact on security

Reviewed / authorised by CAB

Implementation

Tests

Acceptance

Page 19: ITIL Security Managmnet

19

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Change Advisory Board

CHANGE ADVISORY BOARD (CAB)Configuration Control Board, participation should vary• Change Manager• Service Level Manager• Case specialists

– architect– technical experts– design & development

• Operational management• Customer ?• … • Other process managers

• Security Manager for security relevant changes !

Page 20: ITIL Security Managmnet

20

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

Availability, Capacity / Performance & Service level management

SecurityManagementCapacity and

PerformanceManagement

Service LevelManagement

AvailabilityManagement

Page 21: ITIL Security Managmnet

21

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

SLA

ITIL Management processes

Service Level management

Service requirementmanagement

Customer / company ‘controls’ via SLA

IT service provider givesfeedback on compliance

Security management

SLASLA

Customer / company

IT Service Provider

Page 22: ITIL Security Managmnet

22

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

SLA ...

Representant• customer

• user organisation• service user

Representant• customer

Account manager• on behalf of

• IT organisation• Service Provider

SLA• service catalog• including security

SLA• service catalog• including security

• user organisation• service user

Account manager• on behalf of

• IT organisation• Service Provider

Underpinning contracts:external focus, e.g., datacomprovider, electricity, hardware maintenance

Service Provision Agreements:performance of the Service Provider itself

Page 23: ITIL Security Managmnet

23

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

ITIL & security: a controlled process

ITIL & security provides a controlled process and hence results in less errors in operation and security

Help Desk / Incidentmanagement

Incidents

Problems

Known errors

RFC’s

} Problem Management

Change Management

Page 24: ITIL Security Managmnet

24

PO/JUN/04

kpmg Information Risk Management - ITIL Security management

ITIL Security management: in summary

ITIL SECURITY MANAGEMENT: IN SUMMARY

√ Background√ Information security√ Management of IT - ITIL√ Security Management

√ the ITIL process√ relationships with other ITIL processes√ external relationships: SLA + UC√ organisation of … : OLA

Security Management: Transforming security into a managed service