Loading in 2 Seconds...
Loading in 2 Seconds...
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
IS4680 Security Auditing for Compliance Unit 6 Compliance within the Workstation and LAN Domains
Class Agenda 7/25/16 • Covers Chapter 9 and 10 • Learning Objectives • Lesson Presentation and Discussions. • Discussion on Assignments. • Discussion on Lab Activities. • Lab will be perform in class. • Break Times as per School Regulation • Discussion on Project.
Learning Objective • Describe information security systems compliance requirements within the workstation and local area network (LAN) domains.
Key Concepts • Compliance law requirements and business drivers for workstation and LAN domains • Steps to maximize availability, integrity, and confidentiality (AIC) for workstation and LAN domains • Workstation and LAN domains—policies, standards, procedures, and guidelines
Key Concepts (Continued) • Vulnerability management in workstation and LAN domains • Best practices for workstation and LAN domain compliance requirements
Workstation and LAN Domain component and devices • Name some devices associated to workstation. • Connection Media and devices and protocol • Inter process communications
Compliance Law Requirements and Business Drivers • Most businesses require workstations to accomplish business tasks. • Within the workstation domain, the compliance satisfies two main purposes: • Increases information security—Information is a material organizational asset, and in some cases, the primary organizational asset. Thus, ensuring the security of information is equivalent to protecting the viability of the organization. • Reduces liability—If one or more attacks are successful against your organization’s information, you might be liable to damages caused to third parties. If information loss or leakage causes damage to other people or organizations, and the damage is a result of noncompliance; your organization might be liable for part or all of the damages.
IT Security Policies Workstation domain includes following policies. These policies are associated with standards, procedures, and guidelines: • E-mail policy • Uninterruptible power supply (UPS) for critical workstations • Information privacy policies • Removable storage device policy • Access rights policy
Devices and Access Controls • Removable storage devices include: • Removable hard disk drives • Universal serial bus (USB) flash drives • Removable Compact Disc (CD), read-only-memory (CD-ROM) and Digital Versatile Disc (DVD) drives • Removable tape drives
Devices and Access Controls (Continued) • Access control methods may be based on the permissions granted to a user or group, or they may be based on a user’s security clearance. • Operating systems require users to follow the identification steps with authentication. Authentication is the process of providing additional credentials that match the user identification data (ID) or user name.
Vulnerability Management • Define policy—Organizations must start out by determining what the desired security state for their environment. • Baseline the environment—Once a policy has been defined, the organization must assess the true security state of the environment and determine where instances of policy violations are occurring.
Vulnerability Management (Continued) • Prioritize vulnerabilities—Instances of policy violations are then prioritized by using risk and effort-based criteria. • Mitigate vulnerabilities—Ultimately, the root causes of vulnerabilities must be addressed.
Vulnerability Management (Continued) • Maintain and monitor—Organizations' computing environments are dynamic and evolve over time, as do security-policy requirements.
Maximize AIC • The overall purpose of compliance requirements is to enforce the basic pillars or tenets of security, the AIC properties of security, and some compliance requirements that might seem to be unnecessary. All these work together to support the AIC properties of a secure systems.
Maximize AIC (Continued) • AIC properties of a secure systems are: • Availability—Assurance that the information is available to authorized users in an acceptable time frame when the information is requested. • Integrity—Assurance that the information cannot be changed by unauthorized users. • Confidentiality—Assurance that the information cannot be accessed or viewed by unauthorized users.
Roles • Senior Managers • Responsible for organizational governance and compliance. • IT Managers • Responsible for application of controls to be in compliance.
Roles (Continued) • IT Auditors • Responsible for auditing IT controls for compliance. • Data Owners • Responsible for the data and who is granted access to it.
Roles (Continued) • System Administrators • Responsible to monitor the controls on systems, and follow them as well. • Risk Managers • Responsible for risk.
Workstation and LAN Domain Compliance Requirements • Protecting data privacy. • Implementing proper security controls for the workstation and LAN domain. • Workstation and LAN configuration and change management. • Access rights and access controls to the workstation and LAN domain. • Maximizing AIC.
Summary • In this presentation, the following were covered: • Workstation and LAN domain compliance requirements • IT security policies, devices and access controls, and vulnerability management • Process to maximize availability, integrity, and confidentiality • Roles and responsibilities related to workstation and LAN domain compliance
Assignment and Lab • Discussion 6.1 Vulnerability Management in Workstation and LAN Domains • Lab 6.2 Auditing the Workstation Domain for Compliance • Assignment 6.3 Best Practices for LAN Domain Compliance