home *** CD-ROM | disk | FTP | other *** search
-
- * * * * * * * * * * * * * NOTE * * * * * * * * * * * * * * * * *
-
- This file is a DRAFT chapter intended to be part of the NIST
- Computer Security Handbook. The chapters were prepared by
- different parties and, in some cases, have not been reviewed by
- NIST. The next iteration of a chapter could be SUBSTANTIALLY
- different than the current version. If you wish to provide
- comments on the chapters, please email them to roback@ecf.ncsl.gov
- or mail them to Ed Roback/Room B154, Bldg 225/NIST/Gaithersburg, MD
- 20899.
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- DRAFT DRAFT DRAFT
-
-
- 5. Security Program Management
-
-
- 5.1 Purpose of Security Program Management
-
- Organizations should view information resources security as a
- management issue, treated like any other item of strategic
- importance. Information and information processing assets
- (computers) are a critical component of most organizations'
- ability to perform their mission and business functions. The
- purpose of a security program is to protect these vital assets.
- Accordingly, ensuring security requires the development of a
- comprehensive management approach that integrates fundamental
- protection considerations.
-
- In general, organizations divide the management of security into
- two major types of activities: 'Central' and 'System'
- activities. Central security activities are the tasks carried
- out on behalf of the organization such as policy development,
- compliance reviews, and oversight. System level security
- activities are those tasks performed by functional management,
- 'end-users,' and computer systems personnel to secure a
- particular computer system. These tasks include performing risk
- analyses, installing safeguards, and administering security.
-
- The purpose of this chapter is to present security as a
- management function. An organization-wide approach to security
- program management is presented. Because organizations differ
- vastly in size, complexity, management styles, and culture, it is
- not possible to describe one ideal security program. However,
- this chapter does describe some of the features and issues common
- to most organizations.
-
- Note: This chapter addresses security program management, not
- the various activities such as risk analysis or contingency
- planning, that make up an effective security program.
-
-
- 5.2 Structure of a Security Program
-
- Most organizations have security programs which are distributed
- throughout the organization with different elements performing
- different functions. While this is a desirable management
- structure, the distribution of the security function in many
- organizations is haphazard, based on chance. Instead, the
- distribution of the security function should be the result of a
- planned and integrated management philosophy.
-
- Figure 5-1 shows a management structure based on that of an
- actual Federal agency. The agency in the example has five major
- units each of which has several large computer facilities. Each
- facility runs multiple applications. This type of organization
- needs to manage security at the agency level, the unit level, the
- computer facility level, and the application level.
-
-
-
-
-
-
-
-
-
-
-
-
- figure 5-1 (see attachment)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- There are many benefits to managing computer security at multiple
- levels. Each level contributes to the overall security program
- with different types of expertise, authority and resources. In
- general, the higher levels (such as the Headquarters or Unit
- Levels in the Agency described above) have more clout, better
- ability to set policy, to see the "big picture," and to enforce.
- On the other hand, the systems levels (such as the computer
- facility and applications levels) are more familiar with the
- technical and procedural requirements and problems of the systems
- and the users. The levels of security program management are
- complementary; each helps the other be more effective.
-
- Recognizing that each organization will have its own structure,
- this chapter divides security program management into two levels:
- the central level and the system level. The central security
- program address the overall management of security within an
- organization or a major component of an organization. The system
- level security program addresses the management of security for a
- particular information processing system. Most organizations
- have at least these two levels and many organizations, such as
- the example above, have several more levels.
-
-
- 5.3 Central Program
-
- The purpose of a central security program, as stated above, is
- the overall management of security within an organization. In
- the federal government, the organization could consist of a
- department, agency, installation or other major operating unit.
-
- A central security program provides two quite distinct types of
- benefits. The first type is increased efficiency and economy of
- security throughout the organization. The second type is the
- ability to provide enforcement and oversight. Both of these
- benefits are in keeping with the purpose of the Paperwork
- Reduction Act, as implemented in OMB Circular A-130.
-
- The Paperwork Reduction Act establishes a broad mandate for
- agencies to perform their information management activities
- in an efficient, effective, and economical manner....
- Agencies shall assure an adequate level of security for all
- agency automated information systems, whether maintained in-
- house or commercially. (Section 5; Appendix III,
- Section 3.)
-
- OMB Circular A-130, therefore, requires that Federal agencies
- have computer security programs.
-
- 5.3.1. Efficiency and Economy
-
- A central security program can manage or coordinate the use of
- security-related resources across the entire organization. The
- most important of these resources are normally information and
- financial resources.
-
- It is a truism to discuss both the overload of information
- available to modern managers and the utility of well-managed
- information. Most organizations, however, have trouble
- collecting information from myriad sources and effectively
- processing and distributing it within the organization. This
- section discusses some of the sources and uses of security
- information.
-
- Within the Federal government, many organizations such as the
- Office of Management and Budget, the General Services
- Administration, and the National Institute of Standards and
- Technology provide information on computer, telecommunications,
- and information resources. This information includes security-
- related policy, regulations, standards, and guidance. A
- considerable portion of the information is channelled through the
- Senior Designated Official for each agency (see FIRMR Part 201-
- 2). Agencies are expected to have mechanisms in place to
- distribute information received by the senior designated
- official.
-
- Security-related information is also available from private and
- Federal professional societies and groups. These groups will
- often provide the information as a public service, although some
- private groups charge for it. However, even for information that
- is free or inexpensive, the costs associated with personnel
- gathering the information can be expensive. For instance, it is
- not cost effective for an organization to send everyone to every
- security conference.
-
- Internal security-related information, such as procedures which
- worked, or did not work, virus infections, security problems and
- solutions also need to be shared within an organization. Often
- these issues are specific to the operating environment and
- culture of the organization.
-
- A security program at the organization level should provide a way
- to collect the internal security-related information and
- distribute it as needed throughout the organization. Sometimes
- an organization can also share this information with external
- groups. Figure 5-2 shows a simplified version of this flow of
- information. For example, in most organizations, external
- interaction occurs at both the organization and system levels.
- However, the central security program should be aware of the
- interaction at the system level to aid in the sharing of
- information and to make sure that the organization has identified
- and tapped all important sources.
-
- Another use of an organization-wide conduit of information is the
- increased ability to influence external and internal policy
- decisions. If the central security program office can speak for
- the entire organization, then it is more likely to be listened to
- by upper management and external organizations. However, to be
- effective, there must be excellent communication between the
- system level security programs and the organization level. For
- example, if an organization were considering consolidating its
- mainframes into one site (or considering distributing the
- processing currently done at one mainframe site), the central
- security program personnel could discuss the security
- implications and costs or cost savings. If the central security
- program knows the actual costs of providing for multiple
- contingency options and other security factors, then the central
- security program can speak authoritatively during policy
- discussions.
-
-
-
-
-
-
-
-
- figure 2 (see attachment)
-
-
-
-
-
-
-
-
- Beside being able to help an organization use information more
- cost effectively, a security program can also help an
- organization better spend its scarce security dollars.
- Organizations can develop expertise and then share it, reducing
- the need to contract out repeatedly for similar services. The
- following example is based on the Agency in Figure 1:
-
- Each of the agency five operating units developed a separate
- specialized expertise, and the organization as a whole
- shares the increased knowledge base. Operating Unit #1,
- which uses primarily UNIX, developed skills in UNIX
- security. Operating Unit #2, which uses primarily MVS, but
- has one UNIX machine, concentrated on MVS security but
- relies on Unit #1's skills for their one UNIX machine.
-
- The central security program can also develop its own areas of
- expertise. Many security programs develop skills in contingency
- planning and risk analysis in order to help the entire
- organization perform these vital security functions.
-
- Besides allowing an organization to share expertise, and
- therefore save money, a central security program can also use its
- position to negotiate discounts based on volume purchasing of
- security hardware and software.
-
- 5.3.2. Oversight
-
- Besides helping an organization to improve the economy and
- efficiency of its security program, the central security program
- can also serve as an independent evaluation or enforcement
- function. The purpose of this oversight role is to ensure that
- organizational subunits are cost-effectively securing resources
- and following applicable policy. While the Office of Inspector
- General (OIG) and external organizations, such as the General
- Accounting Office (GAO), also perform a valuable evaluation role,
- they operate outside the regular management channels. See
- Chapter XXXX for a further discussion of the role of independent
- audit.
-
- There are several reasons for having an oversight function within
- the regular management channel. First, since security is a part
- of the regular management of organization resources, it is a
- responsibility which cannot be abdicated to another organization.
- Second, it allows an organization to find and correct problems
- without the potential embarrassment of an IG or GAO audit or
- investigation. Third, the organization may find different
- problems than an outside organization. The organization better
- understands its assets, threats, systems and procedures than an
- external organization, and people involved in the audit may share
- information within the organization they would withhold from an
- outsider.
-
-
- 5.4 Central Security Program Elements & Considerations
-
- In order for a central security program to be effective, it must
- be an established part of organization management. If system
- managers and applications owners do not need to consistently
- interact with the security program, then it can become an empty
- token of upper management's "commitment to security." The
- following paragraphs describe some of the means of becoming an
- established program and some of the indicators that a program has
- achieved this goal.
-
- Stable Program Management Function. A well-established program
- will have a program manager recognized within the organization as
- the IT security program manager. In addition, the program will
- be staffed with able personnel and links will be established
- between the program management function and IT security personnel
- in other parts of the organization. A security program is a
- complex function that needs a stable base from which to direct
- the management of security resources, such as information and
- financial resources. The benefits of an oversight function
- cannot be achieved if the security program is not recognized
- within an organization as having expertise and authority.
-
- Stable Resource Base. A well-established program will have a
- stable resource base in terms of personnel, funds, and other
- support. Without a stable resource base, it is impossible to
- plan for and execute programs and projects effectively.
-
- Published Mission and Function Statement. A published mission
- statement grounds the IT security program into the unique
- operating environment of the organization. The statement clearly
- establishes the function of the IT security program and defines
- responsibilities for both the IT security program and other
- related programs and entities. Without such a statement, it is
- impossible to develop evaluation criteria for the effectiveness
- of the IT security program.
-
- Existence of Policy. Policy, as discussed in Chapter XX,
- provides the foundation for the IT security program and is the
- means for documenting and promulgating important decisions about
- IT security. In addition to policy, a central security program
- should also publish standards, regulations, and guidelines which
- implement and expand on policy. These are also discussed in
- Chapter XX.
-
- Long-Term Security Strategy. A well-established program explores
- and develops long-term strategies to incorporate security into
- the next generation of information technology. Since the IT
- field moves rapidly, it is essential to plan for future operating
- environments.
-
- Compliance Program. An IT security program must address whether
- the organization is in compliance with national policies and
- requirements as well as organization specific requirements.
- National requirements include those prescribed under the Computer
- Security Act of 1987, OMB Circular A-130, the FIRMR, and FIPS
- PUBs.
-
- Liaison with Other Offices Within the Organization. There are
- many offices within an organization that potentially affect IT
- security. The IRM and traditional security offices (such as
- personnel, industrial, or physical security) are the two most
- obvious. However, IT security often overlaps with other offices
- such as Safety, Reliability, and Quality Assurance, Internal
- Control or the Inspector General. An effective program must have
- established relationships with these groups in order to integrate
- security into the management of an organization. The
- relationships must be more than just passing information; the
- offices must influence each other.
-
- Example: Agency IRM Offices engage in strategic and
- tactical planning for both information and information
- technology, in accordance with the Paperwork Reduction Act
- and OMB Circular A-130. Security should be an important
- component of these plans. The security needs of the agency
- should affect information technology choices and the
- information needs of the agency should effect the security
- program.
-
- Liaison with External Groups. As discussed in this chapter,
- there are many sources of security information, such as NIST's
- Computer Security Program Managers' Forum, computer security
- bulletin board, and the Forum of Incident Response and Security
- Teams (FIRST). An established program will be knowledgeable of
- and take advantage of external sources of information. It will
- also be a provider of information.
-
-
- 5.5 System Level Security Program
-
- The purpose of the system level security program is to ensure
- appropriate and cost-effective security for each system. A
- central security program, as explained above, addresses the
- entire spectrum of information resources security for an
- organization. The system level security programs implement
- security for each information system. This includes influencing
- decisions about what controls to implement, purchasing and
- installing technical controls, day-to-day security
- administration, evaluating system vulnerabilities, responding to
- security problems, etc. It encompasses all the areas discussed
- in this Handbook.
-
- The system level security program is the advocate for security.
- The system security officer is the person who must raise the
- issue of security and help work on solutions. For example, has
- the data owner made clear the security requirements of the
- system? Will bringing a new function online impact security? Is
- the system vulnerable to hackers and viruses? Has the
- contingency plan been tested? Raising these kinds of questions
- will force system managers and data owners to identify their
- security requirements and ensure that they are being met.
-
-
- 5.6 System Level Security Program Elements and Considerations
-
- Like the central security program, there are many factors which
- influence how successful a system level security program is.
- Many of these are similar to the organization level. This
- section addresses some additional considerations.
-
- Integration with System Operations. The system level security
- program must consist of people who understand the system. For
- security management to be effective, it must be integrated into
- the management of the system. Effective integration will assure
- that system managers and data owners consider security in the
- planning and operation of the system. The system level security
- program manager must be able to participate in the selection and
- implementation of appropriate technical controls, security
- procedures, and must understand system vulnerabilities. The
- system level security program must be able to respond to system
- security problems in a timely manner.
-
- For large systems, such as a mainframe data center, the security
- program will often include a manager and several staff positions
- in such areas as access control, user administration, and
- contingency and disaster planning. For small systems, such as an
- office-wide LAN, the security program may be an adjunct
- responsibility of the LAN administrator.
-
- Separation From Operations. A natural tension exists between
- security and operational elements. In many instances,
- operational components, which tend to be far stronger entities,
- seek to resolve this tension by having the security program
- embedded in IT operations. The typical result of this
- organizational strategy is a security program that lacks
- independence, has minimal authority, receives little management
- attention, and has few resources. As early as 1978, the General
- Accounting Office (GAO) identified this organizational mode as
- one of the principal basic weaknesses in federal agency IT
- security programs. While it is possible for central security
- programs to face this problem, system level programs face this
- problem more often.
-
- This conflict between the need to be a part of system management
- and independence has several solutions. The basis of many of the
- solutions is a link between the security program and upper
- management, often through the central security program. A key
- requirement of this setup is the existence of a reporting
- structure which does not include systems management. Another
- possibility is for the security program to be completely
- independent of system management and report directly to higher
- management. There are many hybrids and permutations such as co-
- location of security and systems management staff, but separate
- reporting (and supervisory) structures. Figure 5-3 presents an
- example of placement of the security program within a typical
- Federal agency.
-
-
-
-
-
-
-
-
-
- Figure 5-3 (see attachment)
-
-
-
-
-
-
-
-
-
- System Security Plans. The Computer Security Act mandated that
- agencies develop computer security and privacy plans for
- sensitivie systems. The purpose of this plan is to ensure that
- each Federal and Federal interest system has appropriate and
- cost-effective security. System level security personnel should
- be in a position to develop and implement security plans.
- Chapter XX, Life Cycle, discusses the plans in more detail.
-
-
- 5.7 Interaction Between the Central and System Level Security
- Programs
-
- The need for central and system level security programs to work
- together has been a major theme of this chapter. A system level
- program that is not integrated into the organizational program
- may have difficulty influencing significant areas affecting
- security.
-
- The system level security program implements the policies,
- guidance, and regulations of the central security program. The
- system level office also learns from the information disseminated
- by the central program and uses the experience and expertise of
- the entire organization. The system level security program
- furthers distributes information to systems management as
- appropriate.
-
- The communication, however, is not one way. The system level
- security program tells the central office about needs, problems,
- incidents, and solutions. The organization shares experience and
- expertise. The central security program can then represent the
- system to the organization's management and to external agencies
- and advocate programs and policies beneficial to the security of
- all the systems.
-
-
- 5.8 Interdependencies
-
- Policy. Policy is the basis for the IT security program. The
- central security program(s) normally produces policy concerning
- general and organizational security issues. However, the system
- level security program normally produced some issue-specific
- policies and policies affecting only one system. Chapter XX,
- Policy, provides additional guidance.
-
- Life Cycle Management. The process of securing a system over its
- life cycle is the role of the system level security program.
- See Chapter XX Life Cycle Management.
-
- Independent Audit. The independent audit function described in
- Chapter XXXX should be complementary to the compliance function
- performed by a central security program.
-
- General. The general purpose of the IT security program, to
- improve security, causes it to overlap with every control. Most
- controls will be addressed at the policy, procedural, or
- operational level by the central or system security program.
-
-
- 5.9 Cost Considerations
-
- Section XXXX discussed how an organization-wide security program
- can manage security resources, including financial resources,
- more effectively. The cost considerations for a system level
- security program are more closely aligned with the overall cost
- savings in having security.
-
- The most significant cost of a security program is personnel. In
- addition, many programs make frequent and effective use of
- consultants and contractors. A program also needs funds for
- training of personnel and travel to perform oversight,
- information collection and dissemination activities, and meet
- with personnel at other levels of security management.
-
- 5.10 References
-
- CSI Course: Managing an Organization Wide Security Program
-
- OMB Circular A-130, especially Main Body and Appendix III
-
- FIRMR 201-2 (Designated Senior Officials)
-
- Information Resources Security: What Every Federal Manager
- Should Know. GSA IRMS
-
- "Security Policy and Organization Structure" in Information
- Security for Managers. Chapter 1.2
-
- Computer Security Act of 1987
-
- GAO Report LCD 78-123, "Automated Systems Security--Federal
- Agencies Should Strengthen Safeguards Over Personal and Other
- Sensitive Data"
-