35
Cybersecurity and COBIT Leveraging the Cybersecurity Framework Tom Conkle

Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

  • Upload
    buithu

  • View
    223

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Cybersecurity and COBITLeveraging the Cybersecurity Framework

Tom Conkle

Page 2: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Voted #1 for Encouraging New Ideas

G2 Inc. delivers innovative ideas to solving our nations critical cybersecurity challenges

• Founded in 2001

• 120+ employees with 2016 revenues in excess of $28M

• Committed to “Turning Ideas into Impact”

• Located in Annapolis Junction, MD

• Mature prime contractor with four active prime contracts

• www.g2-inc.com

Page 3: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

G2 was the primary author of the Cybersecurity Framework

• Facilitated and managed five workshops to collect community feedback

• Interviewed hundreds of cybersecurity subject matter experts from across multiple sectors

• Developed analytic techniques to enable ~15,000 comments to be parsed and individually addressed

• Worked closely with industry partners to develop Cybersecurity Framework Core

Page 4: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

G2 has supported the implementation and use of the Framework• Assisted NIST in developing the Framework

and continue to support NIST in its evolution

• We wrote the ISACA Implementing the NIST Cybersecurity Framework book and associated certification exam

• Assisted organizations including a large maritime transportation, and higher education organizations implement the Framework

• Facilitated implementation workshops for large logistics company, large financial institution, and higher education organizations

Page 5: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Agenda

• Definitions for a few key terms• Introduction to the NIST Cybersecurity Framework• COBIT 5 Principles and Enablers• Cybersecurity Roles• 5 Phases to Implement a Cybersecurity Program• Q & A

Page 6: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Agenda

• Definitions for a few key terms• Introduction to the NIST Cybersecurity Framework• COBIT 5 Principles and Enablers• Cybersecurity Roles• 5 Phases to Implement a Cybersecurity Program• Q & A

Page 7: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

What is Cybersecurity?

ISACA defines cybersecurity as “the protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems.” - CSX Cybersecurity Fundamentals

The terms are often used interchangeably, but in reality cybersecurity is a part of information security.

Information security deals with information, regardless of its format—it encompasses paper documents, digital and intellectual property in people’s minds, and verbal or visual communications.

Page 8: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Agenda

• Definitions for a few key terms• Introduction to the NIST Cybersecurity Framework• COBIT 5 Principles and Enablers• Cybersecurity Roles• 5 Phases to Implement a Cybersecurity Program• Q & A

Page 9: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Cybersecurity spending is increasing, but companies are still being breached

§ Cybersecurity is concerned with protecting digital assets - networks to hardware and information

§ Concepts such as nation-state-sponsored attacks and advanced persistent threats (APTs) belong almost exclusively to cybersecurity

§ $46 billion in Cyber protections spending in 2013 – up by 10% over 2012

Page 10: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Compliant does notalways mean secure

Page 11: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Secure does not always mean appropriate or sufficient

Page 12: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Design Criteria§ Be globally applicable

§ Be non-prescriptive

§ Leverage existing approaches, standards, practices

§ Focus on risk management vs. rote compliance

Framework for Improving Critical Infrastructure Cybersecurity§ Referred to as “The Framework”

§ Issued by NIST on February 12, 2014.

§ Draft v1.1 update released on January 10, 2017

In response Executive Order (EO) 13636 required development of a cybersecurity framework

Page 13: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

The Framework is closely related to the existing Risk Management Process / Framework

Page 14: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

The Cybersecurity Framework provides three primary components to support holistic cybersecurity

Framework Core Framework ProfilesFramework Tiers

Page 15: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Source: Cybersecurity Framework 1.0, www.nist.gov

The Framework Core functions align to the cybersecurity domains to protecting digital assets§ Establishes a common language for

describing a cybersecurity program § Cybersecurity activities, desired

outcomes, and applicable references common across sectors.

§ Consists of: Identify, Protect, Detect, Respond, Recover. Provide high-level, strategic view of the organizational cyber risk management life cycle.

§ Categories and Subcategories for each Function, with example Informative References point to existing standards, guidelines, and practices for each Subcategory including COBIT 5.

Framework Core

Page 16: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Organizations select an Implementation Tier based on their risk threshold

Three attributes of Tiers§ Risk Management Process§ Integrated Risk

Management Program§ External Participation

Tier 4 is not always the goal!

Four Tiers Available§ Partial§ Risk Informed§ Repeatable§ Adaptive

Page 17: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Current and Target state profiles help organizations capture their cybersecurity program

Page 18: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Agenda

• Definitions for a few key terms• Introduction to the NIST Cybersecurity Framework• COBIT 5 Principles and Enablers• Cybersecurity Roles• 5 Phases to Implement a Cybersecurity Program• Q & A

Page 19: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

COBIT 5 Principles’ Role assist organizations in cybersecurity planning and operations

Source: COBIT® 5, figure 2. © 2012 ISACA® All rights reserved.

Stakeholder needs should help inform security planning, resources, and – most importantly –prioritization.

The enterprise benefits from IT-enabled investments. It should equally achieve IT risk management at an enterprise level.

Application of a single, integrated security framework helps align processes and activities throughout the organization. Use of a common language enhances communication and collaboration.

Governance and Management processes

are critical but separate. Alignment through a framework ensures

effective goal achievement.

A holistic approach to cybersecurity supports activities, outreach and

external information sharing. It also reduces

miscommunication risk.

Page 20: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

The COBIT 5 Enablers support a holistic cybersecurity approach

Source: COBIT® 5, figure 12. © 2012 ISACA® All rights reserved.

Page 21: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Agenda

• Definitions for a few key terms• Introduction to the NIST Cybersecurity Framework• COBIT 5 Principles and Enablers• Cybersecurity Roles• 5 Phases to Implement a Cybersecurity Program• Q & A

Page 22: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

There are 4 Cybersecurity Roles for organizations to address

Board of

Directors

Executive Committee

Security Management

Cybersecurity Practitioners

Provides strategic direction and impetus. Receives high-level results of comprehensive risk assessments and business impact analyses (BIAs),

The cybersecurity manager (e.g. CISO) will be responsible for developing, overseeing, coordinating and monitoring security program and processes. Manages cybersecurity incidents and their remediation, as well as incorporating lessons learned

Security architects and security specialists help design,implement and manage processes and technical controls and respond to events and incidents.

Responsible for ensuring that needed org functions,resources, and supporting infrastructure are available and properly utilized to fulfill directives of the board, regulatory compliance and other demands.

Page 23: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

The Framework clarifies communications within an organization and with external partners

Adapted from Figure 2, Cybersecurity Framework

Page 24: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Agenda

• Definitions for a few key terms• Introduction to the NIST Cybersecurity Framework• COBIT 5 Principles and Enablers• Cybersecurity Roles• 5 Phases to Implement a Cybersecurity Program• Q & A

Page 25: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

The Framework identifies seven steps for improving or developing a risk informed cybersecurity program

Phase 1: What are the Drivers?Step 1: Prioritize and ScopePhase 2: Where are we now?Step 2: OrientStep 3: Create a Current ProfilePhase 3: Where do we want to be?Step 4: Conduct a Risk AssessmentStep 5: Create a Target ProfilePhase 4: What needs to be done?Step 6: Determine, Analyze, and Prioritize GapsPhase 5: How do we get there?Step 7: Implement Action Plan (Build a Roadmap)

Page 26: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Phase 1: What Are The Drivers?

Budget

Establish the organizational cybersecurity governance approach§ Identify key authoritative stakeholders

§ Document business drivers, and compliance requirements

§ Determine the scope

§ Identify the risk architecture

§ Use the COBIT 5 goals cascade to translate stakeholder needs into specific, actionable and customized enterprise goals.

Page 27: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Phase 2: Where Are We Now?Gain Situational Awareness (Orient) and Create a Current Profile§ With stakeholder goals and risk architecture in hand,

determine the current threats and the known vulnerabilities they might use

§ Create a Current Profile to determine how the program is currently addressing those threats

§ Leverage a consistent measurement model, such as the Achievement Rating Scale as guided by the principles in the COBIT PAM and Assessor’s Guide

§ Consider the selected Tier in assessing achievement and potential next steps

Page 28: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Phase 3: Where Do We Want To Be?

Consider the risks of the current state given the known threats

§ Use Current Profile and selected Tiers

§ Conduct risk analysis

§ Determine likelihood and impact of potential risks

§ Determine if any Framework Core subcategories are Not Applicable and add any new subcategories as needed

§ Complete Target Profile template

Page 29: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

§ The difference between Current and Target provides a useful gap assessment

§ For each subcategory with a gap, use COBIT5 Enabling Processes (as included in the Framework Core) determine required activities.

§ Described in COBIT 5 Enabling Processes as the how, why and what to implement for each governance or management practice to improve IT performance and/or address IT solution and service delivery risk.

§ Additional informative references from the Framework Core may assist with determining appropriate controls or activities.

§ Create and record an action plan of activities with milestones, ensuring appropriate responsibility and accountability, to achieve the desired outcomes according to the determined priorities.

Phase 4: What Needs To Be Done?

Page 30: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Phase 5: How Do We Get There?§ Execute the action plan as defined in Phase 4

§ Consider root causes & success factors from the COBIT 5 Implementation Guide

§ Make small improvements to test approach

§ Involve process owners and other stakeholders in development of the improvement.

§ Apply adequate training where required.

§ Develop processes before attempting to automate.

§ Match roles to individual capabilities and characteristics.

§ Set clear, measurable and realistic goals (outcome expected from the improvement).

§ Set practical performance metrics (to monitor whether the improvement is driving achievement of goals).

Page 31: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

Risk tolerances change over time with evolving threats and the adoption of new technology

Security Implications§ Current Threat Landscape

§ Advanced Persistent Threats

Security Opportunities§ Mobile Technology

§ Consumerization of IT and Mobile Devices

§ Cloud and Digital Collaboration

§ Information Sharing

Page 32: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

There are several benefits for using the COBIT 5 Principles for cybersecurity

§ Collaboration Opportunities

§ Ability to Demonstrate Due Care

§ Easily Maintain Compliance

§ Secure Supply Chain

§ Cost Efficiency

§ Common Language

Rote Compliance Secure

Page 33: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

.

The CSX Practitioner designation is a globally-offered certification for cybersecurity professionals. This certification allows you to professionally serve as afirst responder who is an expert at following established procedures, usingdefined processes, and working mostly with known problems on a singlesystem.

.After completing the Practitioner level, you qualify for a CSX Specialistcertification, designating you as a specialist in one or more of five areas alignedto existing global cyber security frameworks: Identify, Protect, Detect, Respond,Recover — Five separate certifications are available..

As the entry point to our cyber security program, our CybersecurityFundamentals program offers a knowledge-based certificate in the introductoryconcepts that frame and define the standards, guidelines and practices of theindustry.

ISACA Cybersecurity Certifications

A CSX Expert certification designates you as an expert level cybersecurityprofessional who can identify, analyze, respond to, and mitigate complex cybersecurity incidents. For professionals with master-level technical skills who serve asthe authoritative source for all cyber security matters within an organization.

Page 34: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

We are available to answer any additional questions

Tom ConkleSecurity Engineer

[email protected](443) 292-6679

ManagetheRisk.com

Follow up questions:

Page 35: Cybersecurity and COBIT - ISACA South Floridaisacasfl.org/wp-content/uploads/conference/grc2017/05_Implimenting... · §Identify the risk architecture §Use the COBIT 5 goals cascade

CSF Steps continue to align with the work that AST has been building onOrg. Tier CSF Activities RMF Activities

Tier 1 (Org.)

Organization-wide risk response decisions informed by risk-related information from other tiers. Risk treatment includes risk acceptance, avoidance, mitigation, sharing, and transfer.

Tier 2 (Mission/Business)

Alternative courses of action evaluated in terms of anticipated impacts on organizational missions, processes, and resource requirements. These activities are informed by senior leaders’/executives’ input from earlier steps.

Tier 3 (Information System)

“Step 3 – Current Profile” - record existing security posture (e.g. general support systems, physical / infrastructure security components).“Step 4 – Risk Assessment” - using results from Step 2 (Orient), performs a “needs assessment” to consider courses of action.“Step 5 –Target Profile” - record determined course including planned security activities.“Step 6 – Determine Gaps” Determine gaps between current & target profiles, and create prioritized action plan to address those.

SELECT - select applicable security control baseline (i.e., from SP 800-53) and apply tailoring process to align controls with organization-specific conditions.IMPLEMENT - document the selected course of action (including strategy for continuous monitoring of security control effectiveness) and changes to the information system and its operational environment.ASSESS - assessing security control effectiveness (SP 800-53A) against the planned target.AUTHORIZE - Prepare the plan of action and milestones based on assessment results and confirm that residual risk is acceptable.