View
143
Download
0
Embed Size (px)
Citation preview
Securing Ever Growing and Complex Business Systems, For Tomorrow
18th August 2016Maganathin Marcus Veeraragaloo
Security Domains
Digital Security
Cyber Security
Information Security
IT SecurityPhysical Security
IoT Security
OT Security
Smart Grid Security
Network PerimeterDisappearing
Impact on Security DisciplinesInfrastructure
Security
Network Security
IAM Security
Application Security
Data and Information
Security
SOC Security
Cloud Security
Endpoint Security
Mobile Security
Threat Intelligence
Threat and Vulnerability Management
Public Key Infrastructure
Cyber Security
Digital Security
Digital Security
Dig
ital S
ecur
ityD
igital Security
Impact
Impact
Impact
Impact
ImpactImpact
Impa
ctIm
pact
Impac
t
ImpactImpact
Impa
ct
Impact of South African Legislation
1. Electronic Communications and Transactions Act 2002
2. Regulation of Interception of Communications and Provision of Communication-Related Information Act 2002
3. Protection of Personal Information Act 4 2013
4. National Cybersecurity Policy Framework 2012
5. Cybercrimes and Cybersecurity Bill
6. Protection of Critical Infrastructure Bill
7. General Intelligence Laws Amendment Bill
8. Interception and Monitoring Bill
9. Copyrights Act 98 of 197810. Intelligence Services
Oversight Act 40 of 199411. Promotion of Access to
Information Act 2 of 200012. Protection of Information
Act 84 of 1982
Varying Standards and Guides1. ISO/IEC 27001:2013 - Information security management2. ISO/IEC 27002:2013 - Information technology -- Security techniques -- Code of
practice for information security controls3. NISTIR 7628 Guidelines for Smart Grid Cyber Security4. IEEE 1588 Annex K describes a security mechanism for clock synchronization 5. ISO 27019:2013 - Information Security for the Energy Utility Industry6. ISO/IEC 27018:2014 - Code of practice for protection of personally identifiable
information (PII) in public clouds acting as PII processors7. 240-55410927 – Cyber Security Standard for Operational Technology8. NERC CIP V 59. The Critical Security Controls for Effective Cyber Defence (SANS)10. NIST Cyber Security Framework11. NERC CIP / IEC 62443
Cyber Security CIACR
Confidentiality
Cyber Resilience
AvailabilityIntegrity
Cyber ResilienceCyber Resilience is to maintain the entity´s ability to deliver the intended outcome continuously at all times. This means even when regular delivery mechanisms have failed, such as during a crisis and after a security breach. The concept also includes the ability to restore regular delivery mechanisms after such events as well as the ability to continuously change or modify these delivery mechanisms if needed in the face of new risks.
AvailabilityInformation systems and the content they contain should be available for appropriate use. The failure of an important system, or even a data center, should not cause long-term outage. Redundancy in storage, processing, and network paths can be used in conjunction with business continuity and disaster recovery (DR) procedures to maintain appropriate availability levels.
ConfidentialityPrevent intentional or unintentional unauthorized or inappropriate disclosure of information.
IntegritySecurity technologies and processes should prevent unauthorized or inappropriate modification of information and processes, and ensure that information or IT systems—such as structured databases, operating system software, or websites that have many critical and inter-related objects—maintain internal consistency and correctness. Where possible, information should be kept externally consistent with the real-world situations it represents.
Enterprise Security Architecture – Secure by Design
SABSA Meta Model
Alignment, Integration & Compliance Strategy
Strategy & Planning Phase Alignment Risk Management Method Alignment
Performance & Reporting Methods Control Objectives Libraries & Standards
Controls Frameworks & Libraries
SABSA Risk & Opportunity Model
SABSA Controls & Enablers Derivation
Secure by Design
Thank-You